Premium Essay

Lab Tec Cost

In:

Submitted By tcwatson23
Words 434
Pages 2
After hearing how much was budgeted for the lab costs for Signing Hills and Cordillera Ranch I thought we might be able to get a better price and cut some costs. Here some proposed costs and savings of changing labs. I don't know how the money works as far as how we pay the GBRA lab so my numbers might be off a bit. The sample costs for GBRA are off the website. Attached are the quotes I got with the costs for the two sets of samples for PCS lab.

Cordillera Ranch
Budgeted cost - $12,000 per year
Samples required : BOD, TSS, Ammonia and TSS (Mix Liquor)
Existing using GBRA Lab
Cost of samples off of GBRA Website = $109.00
Shipping cost - average of $35.00 per week
Total cost weekly = $144.00 X 52 weeks = $7,488.00
Proposed using PCS Lab
Actual cost of samples - $70.00 per week X 52 weeks = $3,640.00 Yearly Cost
Shipping cost - $30 per week*
Total cost weekly = $100.00 X 52 weeks = $5,200.00
Total Weekly Savings of actual cost = $44.00 or 31%
Yearly Savings of actual sample cost = $2,288.00

Singing Hills ( I assume the same amount would be budgeted for Johnson Ranch also since they will need the same samples permit)
Proposed Budgeted cost - $15,000 per year
Samples required : BOD, TSS, Ammonia, Phosphorus and TSS (Mix Liquor)
Existing using GBRA Lab
Cost of samples off of GBRA Website = $139.00 per week
Shipping cost - average of $35.00 per week
Total cost weekly = $174.00 X 52 weeks = $9,048.00
Proposed using PCS Lab
Actual cost of samples - $97.00 per week X 52 weeks = $5,044.00 Yearly Cost
Shipping cost - $30 per week*
Total cost weekly = $127.00 X 52 weeks = $6,604.00
Total Weekly Savings of actual sample cost = $47.00 or 27%
Yearly Savings of actual sample cost = $2,444.00

I just wanted to give us an option on the lab costs and I have a pretty good relationship with Chuck and his employees at PCS. In the end the choice is not mine

Similar Documents

Premium Essay

Assessing the Role of It in Generating Competitive Advantage - the Case Study of Fidor Group, Germany

...customers can access such services from anywhere, at anytime of convenience. Salesforce UK (2015) summarises ten major benefits of cloud computing, most notably its advantage in flexibility, free capital expenditure and increased collaboration. Particularly in the case of Fidor Group, cloud computing has caved a unique path to create the first network-based strategy in a financial service provider (Bird 2014). To illustrate the massive potential of cloud computing this report will carry out an analysis in the Fidor Group. I. Introduction: The Fidor Group consists of two main entities, with Fidor Bank being the primary financial service provider and Fidor Tecs acting as the technical supporter for the technology running the Bank. The company has its foundation in the operating system designed by the Fidor Tecs team back in 2007, called “fidorOS”. The system was established on top of local banking systems, deploying the standard APIs infrastructure to enable integration with trusted external partners. It was...

Words: 3306 - Pages: 14

Premium Essay

Management Cases

... | |5-7 |Forest Hill Paper Company | | | | Readings 5-1: “Activity-Based Costing and Predatory Pricing: The Case of the Petroleum Retail Industry” by Thomas L Burton and John B MacArthur, Management Accounting Quarterly, (Spring 2003). The assignment of indirect costs in a volume-based costing system can lead to product-cost subsidization—overcost high-volume products and undercost low-volume products. Undercosted products can lead to the appearance of predatory pricing where it actually does not exist. This article focuses on a lawsuit brought against a major chain of retail motor fuel (gasoline) service centers for allegedly selling regular-grade gasoline below cost, as defined by state statutes. The defendant employed ABC analysis to support its position that it was not selling...

Words: 33150 - Pages: 133

Premium Essay

Bridging the Valley of Death: Lessons Learned from 14 Years of Commercialization of Technology Education

...BRIDGING THE VALLEY OF DEATH: LESSONS LEARNED FROM 14 YEARS OF COMMERCIALIZATION OF TECHNOLOGY EDUCATION ABSTRACT We argue for the increasing importance of providing graduate students skills in technology entrepreneurship and the commercialization of technology. We describe the lessons we have learned from fourteen years of developing commercialization of technology pedagogy and adapting it for use on four continents and within numerous corporations. We demonstrate that the straightforward theory-driven approach that we use to shape the curriculum improves our ability to learn from our mistakes and to structure small experiments to improve the pedagogy. INTRODUCTION Interest in the commercialization of technology and high technology entrepreneurship has increased significantly in the past decade. It is apparent that in many increasingly knowledge-based economies, effective managers will need to be better trained in dealing with technologists and in creating business growth and advantage through commercializing technology. Technical education faces new demands as well. For example, the National Academy of Sciences (COSEPP, 1995) issued a committee statement calling for rethinking graduate education for scientists and engineers to include the skills to promote the commercialization of technologies that they create. As interest in commercialization of technology has increased, so has academic research interest in this area. For example, the Journal of Product Innovation...

Words: 8941 - Pages: 36

Free Essay

Innocentive Business Model

...Business Model INNOCENTIVE is an “open source innovation” company founded in 2001 as a venture company within Eli Lilly & Co, a major pharmaceutical company. It is based on the idea that valuable ideas come inside or outside the company, and is distributed widely in markets and around the world. The business model of crowdsourcing pioneer INNOCENTIVE is quite similar to a question-answer web forum on the web. Main stakeholders in this model • The “Seeker”- The Company, organization or individual who is looking for an answer to a problem or a question. • The “Solver” – Individuals who are willing to answer to the questions or problems, usually giving a good solution based on experience or their idea • The “Observer” –Though this does not appear on their company page, INNOCENTIVE acts as a moderator to guide the two parties. The “Seeker” (it can be a corporation, governmental entity, nonprofit organization or partners) registers to INNOCENTIVE site and sets: 1. The question or problem to ask, 2. Set the amount of reward when the problem is answer to the “solver” 3. And, set the deadline, by when the problem would like to be solved. The “Seeker” will also pay a fee each time the problem is posted. The amount of the reward will be decided by the “Seeker” and INNOCENTIVE, based on such criteria as how effective the answer/idea was, or by how much profit it would bring to the “Seeker”. On the other hand, the uniqueness of this model is that the “Solver”...

Words: 1966 - Pages: 8

Premium Essay

Digital Brand Forum

...#DBForum digital BRAND marketing 13 2013+ sustained strategic shifts_ 1.17.13 @StevenCook CMO Brand building DNA - global Fortune 50 B2C brand builder that shifted to Silicon Valley funded start-up - not a ‘digital native’ … am a ‘hybrid’ brand marketer … stay current, curious, courageous - strong belief in understanding people & their user experience WW Director Brand Marketing WW VP Strategic Brand Marketing, Biz Dev & Innovation SVP, CMO U.S., Canada, Mexico Global CMO & Biz Dev Contributing writer Contributing writer Brief - digital BRAND marketing state of union - 2013 forecast Goals: I hope our discussion does one or all: -  validates your current beliefs and strategic activity -  gives you additional business case proof points to advance your digital brand marketing initiatives inside your company or with your clients -  gives you something new to think about -  gets your juices flowing and your mind racing - gives you additional reasons to connect with Neustar AdAdvisor & Legolas Media About 107,000,000 results About 107,000,000 results insightful & inspirational sources digital BRAND marketing ‘state of union’ How would you characterize the era that we’re in now with regard to the relationship between digital and brands?   “Brands for the last 15 years have been looking at online as another media channel to buy ads on. So they buy or rent eyeballs or audiences or uniques from the media properties that provide them. Now you’ve got with all...

Words: 3892 - Pages: 16

Premium Essay

Week 5 Paper

...Benchmarking for Bernard Lester University of Phoenix MBA – 540 Introduction In this paper will compare and contrast issues that various companies had experienced in past mergers to the issues presented in the Lester Electronic Scenario. The companies benchmarked are Disney-Pixar, Lucent-Alcatel, Monaco Coach Corporation, SMC Corporation, Infosmart-Cyber Merchants, Fidelity Bank of Nassau, Royal Bank of Canada, and AT&T. One of the issues presented in the scenario is that LEI was preparing to conduct a joint venture with Shang-wa when Transnational Electronics made an offer to acquire Shang-wa. The main issue is that if Shang-wa is acquired by TEC, the joint venture between Shang-wa and LEI will not be possible. LEI intends to remain as the company of choice but this might not be possible if TEC acquires Shang-wa. Some of the concepts that Team A will evaluate considering the LEI scenario issues are: capital management strategies to maximize shareholder wealth, economic exposure, the challenges of cross-border growth strategies, working capital management, and internal and external growth strategies, and cultural barriers, while identify the best financing alternative for the merger. Companies Benchmarked Alcatel-Lucent – Yolanda Smothers Alcatel-Lucent provides telecommunications solutions globally to service providers, enterprises and governments...

Words: 5014 - Pages: 21

Premium Essay

Journal

...RESEARCH TECHNIQUES CLASSIFICATION Uni-bi variant techniques • Uni-variant analysis – Frequency Tables (qualitative) – Descriptive Statistics (quantitative) – Summary Tables • Bi-variant analysis – Contingency Tables – Correlation analysis – Variance analysis Research Techniques II 2 Multivariant analysis techniques DESCRIPTIVE TECHNIQUES Factor Analysis Correspondence Factor analysis Cluster Analysis Output Association / Reducing dimensions Typology EXPLANATORY TECHNIQUES Varian Analysis Regression Analysis Discriminant Analysis CHAID AID Conjoint Analysis Multidimensional Analysis Research Techniques II Output Experiment results Prediction / Classification Segmentation Ideal Product Image / Positioning 3 VARIANCE ANALYSIS ONE FACTOR A random design is that where random simples are selected for each treatment. Yij = µi + εij where Yij: it is the answer of observation j who has received the treatment i µi: it is the mean of the treatment i, and εij: it is a specific random part for each observation Hypotheses: H0 : µ1 = µ2 = . . . = µp Ha: At least two treatments have different means. Assumptions: 1. The probability distributions of the p populations follow a normal distribution. 2. The variances of the p populations are equal. 3. Samples are selected randomly and independently from the populations. This model could be also expressed as the following: Yij = µ + τi + εij Where µ: it is the general mean, and τi: it is the differential effect of the treatment i. H 0 : τ...

Words: 34573 - Pages: 139

Premium Essay

Usama Azam

...Hospital Management System Project Report On “Hospital Management System” Submitted By: 1. Mansi Chitkara. 2. Namita Khandelwal. 3. Avinash Chaporkar. Guided By: Mrs. Kapila Pareek Assistant Professor IIIM, Jaipur. Team Number: - 09 International School of Informatics & Management Formerly India International Institute of Management 1 Hospital Management System CERTIFICATE This is to certify that Hospital Management System embodies the original work done by Mansi Chitkara, Namita Khandelwal, and Avinash Chaporkar during this project submission as a partial fulfillment of the requirement for the System Design Project of Masters of Computer Application IV Semester, of the Rajasthan Technical University, Kota. Swati V. Chande Principal (MCA Department) International School of Informatics and Management Mrs. Kapila Pareek Assistant Professor International School of Informatics and Management 2 Hospital Management System ACKNOWLEDGEMENT The satisfaction that accompanies that the successful completion of any task would be incomplete without the mention of people whose ceaseless cooperation made it possible, whose constant guidance and encouragement crown all efforts with success. We are grateful to our project guide Mrs. Kapila Pareek for the guidance, inspiration and constructive suggestions that helpful us in the preparation of this project. We also thank our colleagues who have helped in successful completion of the project. Mansi...

Words: 4206 - Pages: 17

Free Essay

Kevin Mitnick - Social Engineering and Computer Hacking Mastermind

...Kevin Mitnick – Social Engineering and Computer Hacking Mastermind Shelby Descoteaux Professor Kabay IS 340 A Nov. 22, 2013 Table of Contents Introduction 3 Kevin Mitnick 3 Hackers and Their Motives 3 The Early Years 4 Adolescence 5 Kevin in Trouble 6 Kevin’s Final Visit from the FBI 7 Hacker or Engineer? 8 Impact on Computer Security 8 Conclusion 9 Works Cited 10 Introduction Most people today are aware of the detrimental risk that hackers pose to their computers. They might know about identity theft, viruses, Trojans and worms however what they fail to recognize is how these things are accomplished and if they have actually fallen victim to one of these horrible attacks. But what about attacks with even greater impacts…like someone hacking into the computer system of a car that controls the brakes? Perhaps penetrating the systems that control nuclear power plants? Although it seems unlikely that either of these extremely scary scenarios would ever happen, it is most definitely possible. One researcher for IBM’s Internet Security Systems told the owners of a nuclear power station that he could hack into their system through the Internet. The power station took this as a joke, responding to Scott Lunsford, the IBM researcher, with a laugh in his face saying that it was “impossible”. In response, Scott took up the power plant on their words and proved them wrong. In less than twenty-four hours, Scott’s team had infiltrated the system and in...

Words: 4016 - Pages: 17

Premium Essay

Business Plan - Child Tracking Device

...Business Plan Safe Haven Technology 911 Keep Me Safe Lane Waldorf, Md. 20603 (301) 645-SAFE Fax: (301) 645-LANE [pic] Prepared By Student Name Submitted To: Professor Freeman BUS 205 TABLE OF CONTENTS Abstract…………………………………………………………………………………………...3 Section 1.0 – Executive Summary………………………………………………………………..4 1.1 Objectives………………………………………………………………………………..4 1.1.2 Business Objectives ……………………………………………………………….…….4 1.1.3 Financial Objectives ……………………………………………………………….……4 1.1.4 Marketing Objectives ……………………………………………………………………4 1.2 Mission…………………………………………………………………………………….5 1.3 Keys to Success…………………………………………………………………………….5 Section 2.0 Company Summary………………………………………………………………….5 2.1 Company Ownership………………………………………………………………………6 2.2 Start-up Summary………………………………………………………………………….6 Section 3.0 Products and Services………………………………………………………………..8 Section 4.0 Market Analysis Summary…………………………………………………………..8 4.1 Market Segmentation………………………………………………………………………8 4.1.1 Family Consumers……………………………………………………………………….9 4.1.2 Channel Sales to Original Equipment Manufacturers (OEMs)…………………………9 4.1.3 Businesses……………………………………………………………………………….9 4.1.4 The Military……………………………………………………………………………..9 4.1.5 The Political Market…………………………………………………………………….9 4.1.6 Maritime Market………………………………………………………………………...9 4.1.7 Pet Supply Chain Stores………………………………………………………………..10 Section...

Words: 4277 - Pages: 18

Free Essay

Research Proposal

...1. Companies Listed on KSE SYMBOL COMPANY 1 AABS AL-Abbas Sugur 2 AACIL Al-Abbas CementXR 3 AASM AL-Abid Silk 4 AASML Al-Asif Sugar 5 AATM Ali Asghar 6 ABL Allied Bank Limited 7 ABLTFC Allied Bank (TFC) 8 ABOT Abbott (Lab) 9 ABSON Abson Ind. 10 ACBL Askari Bank 11 ACBL-MAR ACBL-MAR 12 ACCM Accord Tex. 13 ACPL Attock Cement 14 ADAMS Adam SugarXD 15 ADMM Artistic Denim 16 ADOS Ados Pakistan 17 ADPP Adil Polyprop. 18 ADTM Adil Text. 19 AGIC Ask.Gen.Insurance 20 AGIL Agriautos Ind. 21 AGTL AL-Ghazi 22 AHL Arif Habib Limited 23 AHSL Arif Habib Sec. 24 AHSM Ahmed Spining 25 AHTM Ahmed Hassan 26 AIBL Asset Inv.Bank 27 AICL Adamjee Ins. 28 AJTM Al-Jadeed Tex 29 AKDCL AKD Capital Ltd 30 AKDITF AKD Index 31 AKGL AL-Khair Gadoon 32 ALFT Alif Tex. 33 ALICO American Life 34 ALNRS AL-Noor SugerXD 35 ALQT AL-Qadir Tex 36 ALTN Altern Energy 37 ALWIN Allwin Engin. 38 AMAT Amazai Tex. 39 AMFL Amin Fabrics 40 AMMF AL-Meezan Mutual 41 AMSL AL-Mal Sec. 42 AMZV AMZ Ventures 43 ANL Azgard Nine 44 ANLCPS Azg Con.P.8.95 Perc.XD 45 ANLNCPS AzgN.ConP.8.95 Perc.XD 46 ANLPS Azgard (Pref)XD 47 ANLTFC Azgard Nine(TFC) 48 ANNT Annoor Tex. 49 ANSS Ansari Sugar 50 APL Attock Petroleum 51 APOT Apollo Tex. 52 APXM Apex Fabrics 53 AQTM Al-Qaim Tex. 54 ARM Allied Rental Mod. 55 ARPAK Arpak Int. ...

Words: 3364 - Pages: 14

Premium Essay

Ethical Hacking

...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically...

Words: 6103 - Pages: 25

Premium Essay

Sixth Sense Technology

...digital information and lets us use natural hand gestures to interact with that information. It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces Group at the MIT Media Lab.. Sixth Sense comprises a pocket projector, a mirror and a camera. The hardware components are coupled in a pendant like mobile wearable device Sixth Sense Technology Although miniaturized versions of computers help us to connect to the digital world even while we are travelling there aren’t any device as of now which gives a direct link between the digital world and our physical interaction with the real world. Usually the information’s are stored traditionally on a paper or a digital storage device. Sixth Sense integrates digital information into the physical world and its objects, making the entire world your computer. It can turn any surface into a touch-screen for computing, controlled by simple hand gestures. It is not a technology which is aimed at changing human habits but causing computers and other machines to adapt to human needs. It also supports multi user and multi touch provisions. Sixth Sense device is a mini-projector coupled with a camera and a cell phone—which acts as the computer and your connection to the Cloud, all the information stored on the web. The current prototype costs around $350.  The Sixth Sense prototype is used to implement several applications that have shown the usefulness, viability and flexibility of the system. The device sees what we see but...

Words: 7221 - Pages: 29

Premium Essay

Human Resource

...Chaptet t ft.lutian t)t Huranr F.rorr.e r\.hr.rqen)rnr .jird Hil/5 conlercnce sponsored by the Socrety [or Human Resources Management (SHRM) and remember how ar HRIS rnay be what you needl As this chapter and the ones that follow w ll ne lsactvtesandthedemands' ol the human capital ol the orgarrzal on Thrs aLrtomairon he ps develop the capabr t es to es an HR deparlmenl to streaml rlunrale. af HRlS enab placed on rt by automating lhe HR dala and pro.esses necessary for the management prodlce rn[ormation and reports on lhe r€quests contained n the memos in the v gn€tte and lhese reports wri lac lrtate efliclent afd eflective manageria dec s on mak ng WhiLe an HR 5 canfol make the ludgement ca ls in terms ol whom lo recru I or promote, it can cerlarnLy lacrl lale better inputt fg integratiof afd use ol employee data, wh ch wil reduce the admrn strat ve blrrden oI keeping detailed records and should aid and enhance dec srons about stclegic d rections Need for an HRIS in Decision Situations ll you read the above memos again. you w ll recogn ze iha! each one has a request lor HRI\4 nfornraton lhal wil be used n a decston stlaton The inlormatror rcquested n Memo I wil help the egal depa(menl delermne the compafys potertal labr ty vad n a workplace gender disc(m nat on s tLat on Thrs rlomat on rnay help to determrne whether the company shoLr d decide lo rect ly lhe silual on in lerms ol an nforma sett e' mertwth the lemale statf membels orto defend...

Words: 4270 - Pages: 18

Free Essay

Tracer Study

...TERTIARY EDUCATION COMMISSION Graduate Tracer Study 2011 A Preliminary Report February 2012 Table of Contents List of Tables ......................................................................................................................................... ii List of Figures........................................................................................................................................ ii List of Acronyms..................................................................................................................................iiii 1. 2. 3. 4. 5. 6. 7. 8. 9. Preface…………………………………………………………………………………………………………………………………………….1 Background……………………………………………………………………………………………………………………………………..1 Objectives of the Tracer Study.............................................................................................................. 2 Methodology......................................................................................................................................... 3 Population and Sample Design.............................................................................................................4 Survey Implementation.........................................................................................................................5 Coverage of this Preliminary Report.....................................................................................................5 Graduates' Characteristics......................

Words: 14039 - Pages: 57