...government still has a controlling interest. The Austrian Government indirectly owns the 52.8% of its post office. In the following table compares Royal Mail with Deutsche Post and Austria Post, in terms of revenues, earnings and profits. | Royal Mail | Deutsche Post | Austria Post | Revenues (£m) | 9,279 | 46,347 | 1,975 | Earnings before interest and taxation (£m) | 367 | 2,225 | 152 | Earnings (or profit) | 562 | 1,384 | 103 | Share Price (£m) | £5.64 | £20.48 | £30.01 | Market Capitalization (£m) | 5,640 | 24,758 | 2,028 | Earnings per share | £0.56 | £1.15 | £1.52 | P/E ratio | 10.0 | 17.9 | 19.7 | Return on Sales | 3.96% | 4.80% | 7.70% | % state of ownership | 30.00% | 21.00% | 52.80% | | | | | Financial performance The revenues of Royal Mail, at £9.3 billion, are significantly higher than Austrian (£2.0 billion). However, Deutsche Post’s revenues, at £46.3 billion are nearly five times greater than the revenues for Royal Mail. Profits measured by earnings before interest and taxation has increased for Royal Mail from £277 million in 2010/11 to £367 million in 2011/12. This is mainly due to revenue growth. Parcel revenue increased 13 per cent year on year, with letters revenue growing three per cent. Whilst this is strong year-on-year performance in profits for Royal Mail, profits as a percentage of revenues (referred to as “return on sales” in the table above) of 3.96% is a little lower than the 4.80% for Deutsche Post, but...
Words: 1391 - Pages: 6
...Junk Mail Some of the main reasons why I am for junk mail or as they call it, direct or stand mail is simply because they it’s a way for small businesses to advertise themselves, keeps our USPS employees employed, also give companies the advantage to send direct mail pieces to specific buying groups, based on key demographics, such as gender, age, household income, household size and profession (Suttle); on a lighter note it even contains coupons. I know a lot of people are against junk mail because it takes up space, goes into the landfills, and most people just throw their junk mail without even reading it, however, I feel that as long as it’s used in the correct manner, its harmless. In regard to keeping employment for our USPS carriers, as much as we may dislike all that extra bulk mail we receive in our mail, we have to remember behind that junk/bulk mail is a hard working individual like ourselves just trying to make a living. According to an article I read, there is saturation mailing, where the Post Office helps bulk mailers send mail to every address in an area (with addresses only - no names - on the mailings). The bulk mailer has to build up a list containing at least 90% of the addresses in a carrier-route. The Post Office will then supply the remaining 10% for a small fee so that the bulk mailer will reach everyone on the route. ("U.S. Post Office") Whether we like it or not, there is a deadline to be met by our fellow USPS employee. All this junk mail in the...
Words: 544 - Pages: 3
...Privatisation of Royal Mail: Will this lead to further efficiency improvements? 1. Background In recent years, the postal industry has changed. We have seen a recent boom in internet shopping, and while once Royal Mails sole purpose was to deliver letters, there is now an increasing emphasis on parcel deliveries. The shift in focus as well as the ever increasing competition in the industry, often from firms serving the 'bulk mail' side of the market such as UK mail and TNT is posing threat to the sustainability of the universal postal industry. It was decided in 2011 under the postal services act that in order to maintain competitive and to preserve the longstanding future of Royal Mail that 90% of the company would be privatised. This was seen as the most appropriate option, as the falling demand from consumers as they switched to their electronic communications came at a time where the government was not willing to add to public spending. In the event of this, responsibility for economic regulation was passed from Postcomm to Ofcom, who designed and implemented a new regulatory framework. Throughout this report, we will look at the potential benefits and detriments of privatisation; this will be applied in order to draw a conclusion as to whether the privatisation of Royal Mail was the most appropriate action. 2. Reasons for Privatisation One of the main reasons why privatisation may lead to greater efficiency than public ownership is that governments may not have exercised...
Words: 1975 - Pages: 8
...The Express Mail Industry Analysis The express mail industry has expanded tremendously in recent years. Businesses and individuals spent $16-17 billion on expedited shipments within the United States in 1996. The main reason of the evolution of express mail industry is urgency, which includes urgent documents, parcels and perishable good. Business cycle became faster, and customers demand to fast delivery expanded. By increasing demand, express companies offer diverse services: overnight shipping, next-afternoon delivery, second-day service, same-day, and early next morning delivery. Not only delivery were proliferated, but also delivery service itself was advanced. Now customer can track their shipments and get guarantee on time service. These conveniences also affected how express mail industry evolved. The volume of shipping has increased to 15-20% per year for the past decade. However, total revenue of express mail industry increased only 10-15% because of falling price. Among many express mail companies, Federal Express, UPS, and Airborne Express (The big three) served more than 85% of the market share. Because of an investment in physical, information, and human assets, the big three delivered more than 5 million packages each day, and arrived on time over 98%. Even though each company had different operational structure, their basic infrastructures and activity were the same. They used large fleet of vans and drivers, and collected packages from customers. Drivers...
Words: 866 - Pages: 4
...Privatization of Royal Mail Maastricht University School of Business and Economics Maastricht, 5th April 2014 Wall, Sebastian (SW) ID numbers: I6029483 Course code: Group number: 1 Tutor’s name: Professor Hans van Mierlo Writing Assignment: Final Paper 1 Executive Summary Royal Mail is the largest provider of postal services in the United Kingdom and one of the largest postal service providers in the world. This paper analyzes the recent move of the British Government to privatize the Royal Mail. It looks at various aspects leading up to the privatization and the effect that privatization has had on the Royal mail currently. Royal Mail will also be compared to another firm Deutsche Post in an attempt to see if one of the most successful postal privatizations bares any resemblance to the privatization carried out by the Royal Mail. The ...
Words: 5171 - Pages: 21
...Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha Amarasinghe Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha Amarasinghe Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha Amarasinghe Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha Amarasinghe Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha...
Words: 495 - Pages: 2
...Mail System Outline Author’s Note This Outline is being submitted on August 12th, 2013, for N234/CET2810C Section 01 Microsoft Exchange Server course. Mail System Outline When designing a Microsoft Exchange mailing system you will need to gather information about your environment. You will need to see if the installation is going to be a migration or if you’re walking in to a fresh setup. With a fresh installation you will have a lot of things to consider such as the customer requirements: * Mailbox profile requirements * Geographic location * Server and data protection You will also have to make assumptions based on all configurations. With the migration of an Exchange environment things become a little easier because some of the things you have to take into consideration during a fresh install are already done. You can just move the Exchange resources from one installation to the other such as: * Mailboxes * Public folders * Connectors But you will need to determine the specific needs for the migration and you will need to Archive non-essential data before you migrate to reduce cost and shorten your timeline. Also there are plenty of tools to assist in Exchange migration to where it becomes a simple task. So if you ask me if you should go with a fresh install vs. migration if they already have Exchange in place my choice is Migration. Storage is also a big factor when setting up an exchange Server environment. There are a lot of architectural...
Words: 824 - Pages: 4
...Unit 210 – Handle Mail Section 1: Understand security procedures when handling mail or packages. 1.1 Explain the purpose of security procedures for handling mail and packages. The purpose of having security procedures in place for when you’re handling mail or packages is to make sure that nothing confidential to the business is received by the wrong person. Mail to a business could contain information about customers, staff or upcoming events for the business which would need to kept secure until they reached the recipient the security procedures would make sure that the mail was not lost while it is being sent it would also make sure that the mail wasn’t picked up by the wrong person before the recipient. 1.2 Give examples of security procedures for handling mail in organisations. One of the procedures would be to never open a package that seems suspicious or wasn’t expected by anybody in the business. If a questionable parcel is delivers it should not be passed on to the member of staff it was addressed to or any other member of staff, the parcel should be kept in a safe place and if you feel it needed call the emergency services to come and check the parcel and potentially dispose of it. It is also important to make sure that you can remember who delivered the parcel if not take a note of them if possible. You could also check to see if they work for any regular courier company that delivers to the business or if they work for the local mail office. Section 2: Understand...
Words: 848 - Pages: 4
...Mail System Project Author’s Note This annotated bibliography is being submitted on August 5th, 2013, for N234/CET2810C Section 01 Microsoft Exchange Server course. Mail System Project When designing my Microsoft Exchange mailing system I will need to gather information about my environment. I will need to see if the installation is going to be a migration or am I walking in to a fresh setup. With a fresh installation I will have a lot of things to consider such as the customer requirements, mailbox profile requirements, geographic location, and server and data protection. I will also have to make assumptions based on all configurations. With the migration of an Exchange environment things become a little easier because some of the things you have to take into consideration during a fresh install are already done. You can just move the Exchange resources from one installation to the other such as mailboxes, public folders, and connectors. But you will need to determine the specific needs for the migration and I will need to archive non-essential data before I migrate to reduce cost and shorten my timeline. Also there are plenty of tools to assist in Exchange migration to where it becomes a simple task. So if you ask me if I want to go with a fresh install vs. migration if the already had Exchange in place my choice is Migration. Storage is also a big factor when setting up an exchange Server environment. There are a lot of architectural factors the play in to the...
Words: 1249 - Pages: 5
...Data and E-mail Archiving 1 Data and E-mail Archiving: Legal Concerns Joel Zart Capella University TS5536-Ethics in Technology Data and E-mail Archiving 2 Table of Contents Abstract……………………………………………………………………………………Page 3 Introduction to the world of Archiving……………………………………………………Page 4 Laws and penalties associated with archiving……………………………………………..Page 5 My ethical and legal dilemma……………………………………………………………...Page 6 Ethical dilemmas in archiving……………………………………………………………...Page 6 Process of identifying archiving liability…………………………………………………...Page 7 The solution based on law…………………………………………………………………..Page 8 The affects…………………………………………………………………………………..Page 9 The solution………………………………………………………………………………...Page 10 Conclusion………………………………………………………………………………….Page 11 References………………………………………………………………………………….Page 12 Data and E-mail Archiving 3 Abstract The purpose of this is to analyze the importance of data and e-mail archiving within an enterprise organization. At my organization I am currently in the planning stages of having a fully fledged data and e-mail archiving solution in place by the end of 2009. Archiving data and e-mail within an enterprise is important for legal litigation. According to industry experts 90% of communication in business takes place through e-mail and electronic documentation such as instant messaging and word documents (2009 para.1). Companies are now required to archive all communication to not only protect the company but also their employees....
Words: 2619 - Pages: 11
...receives and sends about 121 emails per day. It is important to utilize best practices when drafting e-mails since it is one of the primary modes of communication in the workplace. A helpful guideline for work e-mails is to KISSS – keep it short, simple and sweet. Keep it short. In the beginning of the e-mail, write a clear subject header with a maximum of 5 words and address the person correctly by title. Then, send a greeting in 1-2 sentences, present your main point and call to action in another 3-5 sentences and close with a short closing message and signature. Keep it simple. Make the e-mail simple and easy to read. Receiving a long e-mail is daunting not only to read but also to look at. A quick rule of thumb is to consider limiting e-mails to be no more than 5-10 sentences. Any additional information, like meeting notes and detailed information surrounding a project, should be sent in an attachment. This practice will allow the reader to understand the main point of the e-mail and revisit the details at a more optimal time. Keep it sweet. A recent study has shown that 64% of people have sent or received an e-mail that caused unintentional anger. An e-mail does not always have to be sweet but it is important to practice empathy when writing an e-mail. While proofreading, check your tone. If you have crafted a particularly angry e-mail on purpose, put the e-mail down for a couple hours or even a full day and think again before sending it. It is important to practice...
Words: 314 - Pages: 2
...New e-mail policy Below are the guide lines we will use to communicate through our company e-mail system. These rules will increase productivity and reduce time sorting through e-mail that does not affect your area of the company. • Be brief and Professional; stick to the facts of what your trying to communicate, keep the bottom line up front and be respectful we are all on the same team. • Courtesy Copy and Reply all too only those needed; ensure you only send your e-mail to people with whom the message is intended for. Reply all can cause problems with personnel getting the wrong information. • Attachment size will be limited; Large attachment clog up e-mail inbox and slow down the performance of the net work. • All attachments will be screened by antivirus before opened; software viruses are a great risk to our company network and no one wants to be the one to crash our communication system. • No forwarding of chain e-mail; chain e-mail can be counterproductive and offensive your fellow employees. • Spell out all words before using Acronyms; Not everyone is familiar with all acronyms so the first time you use an acronym spell the words out then put the acronym next to it in parentheses. • No writing in all CAPs; No shouting within your e-mail. This refers back to being professional and courteous to your fellow employees. • Use spell check; This will not always work to correct all misspelled words and bad grammar, but will cut down on the majority of problems...
Words: 836 - Pages: 4
...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state...
Words: 941 - Pages: 4
...Mail System Project – Diagram Author Note This diagram is being submitted on August 21st, 2013 for N234/CET2810C Section 01 Microsoft Exchange Server course. Mail System Project – Diagram Explanation All outside messages will be routed through the edge transport server to control the flow of messages that are sent to or received from the Internet. And will also to its part in protecting us against viruses and spam. Then from within my organization the hub transport server will handle all flow of mail from within the company. All messages will be using SMTP to submit messages to the hub transport server. I have kept RPC encryption enabled for protection between my hub transport servers, mailbox servers, and my client access servers. But do to issues with RPC encryption and versions of outlook I am using Https between my client access server and the outlook web application. We have our second site that replicates with site 1 for redundancy and the communication between these two sites our secured by SMTP over TLS (SSL) this enables a certificate-based authentication and helps provide security-enhanced data transfers by using symmetric encryption keys. The shared secret key is appended to the data to be hashed. This helps enhance the security of the hash because both parties must have the same shared secret key to verify that the data is authentic. Site 2 houses the domain controller with active directory and the global address list. And again everything in Site...
Words: 254 - Pages: 2
...correspondence through mail, and leaving messages on home answering machines. At one time, these outdated items were the wave of the future. Mark Twain couldn’t believe his eyes when he saw the typewriter. Why aren’t these technical advances not good enough anymore? Why have these ways of communicating become historical artifacts? Most of one’s answer lies in the fact that people are constantly looking for faster, more convenient ways to achieve their goals, and cyber culture does just that. Tools such as e-mail provide one with a way to write and communicate with others in a very convenient way. The world we live in is very fast paced. Tasks such as hand writing and mailing letters have become too time consuming. As Dennis Baron writes in his essay “From Pencils to Pixels”, “…the physical effort of handwriting, crossing out, revising, cutting and pasting, in short, the writing practices I had been engaged in regularly since the age of four, now seemed to overwhelm and constrict me, and I longed for the flexibility of digitized text” (Tribble and Trubek 36). Besides the troubles of writing a letter, one would then have to stamp and seal the envelope, and rely on the trusty post office to deliver your letter in a timely manner. As essayist Adam Gopnik states, “Ten years ago, even the most literate of us wrote maybe half a dozen letters a year” (181). Ten years ago, one would have more than likely picked up the phone rather than sit down and write a letter. E-mail, in a way, has...
Words: 1167 - Pages: 5