Friday, January 31, 2020

Supply chain management Essay Example | Topics and Well Written Essays - 2500 words

Supply chain management - Essay Example The active participants in a supply chain are linked by information flows and physical flows. Information flows are the various communication channels that these firms use to coordinate and control the daily flow of goods and services in the supply chain. These channels are used by various partners in the supply chain as a conduit of information regarding their plans. Physical flows are the storage, transformation and movement of goods and services, and they constitute the most visible component of the supply chain. Supply chains find themselves competing against other supply chains due to the competitive nature of today’s markets (Lu 2012: 59). This has led to the creation of various forms of supply chain management modules. One of these modules of supply chain management is the green supply chain management. This involves the incorporation of environmental friendly practices in activities and processes that take place in supply chain. Green supply chain management requires i ntegration of environmental friendly practices in all levels of the chain of supply. This includes product design, material selection and sourcing, delivery of the final product to the consumer and manufacturing process. Firms should also consider the end of life handling of the product after it is used or after fulfilling its intended purpose. This paper aims to discuss green supply chain management. Green supply management is the process of using environmentally friendly implements and their transformation into byproducts that can improve or be recycled (Ehrgott 2009: 271). The basic principle of green supply management is to reduce costs while at the same time conserving the environment. When a company reconsiders its options and adopts environmental friendly solutions for their production activities, they are likely to reap substantial benefits (Worthington 2012: 104). This is because, instead of focusing on reducing the unit cost of production, a company strives to reduce overa ll production costs. This can be achieved by applying environmental friendly innovations, which can have a substantial impact on production. This is because most environmental solutions are cheap and easy to implement at no extra cost (Zhang 2010: 2). An example of this is a top European company that designed a system that would be using 95 horsepower. The engineer in this company re-designed the system by using pipes with a bigger diameter than the initial ones and reducing their length. This saw a significant reduction for energy in terms of horsepower to 7. This goes to show that environmental friendly designs do not necessarily mean spending a lot of money, but small changes can bring about tremendous benefits to a firm. Various factors have influenced the management of supply chains around the world ranging from the beginning of the global economy to changes in the environment. The environment has played a significant role, in influencing supply chains, to change their orientat ion towards environmental solutions. These solutions are effective and efficient in terms of costs and resource utilisation. Human utilisation of natural resources has been an on-going process since the beginning of life, which until a few hundred years ago, was a sustainable activity (Cohen 2010: 213). This is because up until then, the environment was able to cope and sustain the demands of humans. Today, human activities have

Thursday, January 23, 2020

Insanity and Madness in A Rose For Emily and Yellow Wallpaper

Insanity in A Rose For Emily And The Yellow Wallpaper    The women in Faulkner's and Gilman's stories are victims of male over-protectiveness.   The men that rule their lives trap Emily in "A Rose For Emily" and the narrator of "The Yellow Wallpaper". Each character must retreat into their own world as an escape from reality. Emily is destroyed by her father's over-protectiveness. He prevents her from courting anyone as "none of the young men were quite good enough for Miss Emily and such" (82). When her father dies, Emily refuses to acknowledge his death; "[W]ith nothing left, she . . . [had] to cling to that which had robbed her" (83). When she finally begins a relationship after his death, she unfortunately falls for Homer Baron who "liked men" and was "not a marrying man" (84)... ...the trap that society has placed them in. Works Cited Faulkner, William. "A Rose For Emily." The Norton Introduction To Literature. Eds. Jerome Beaty and J. Paul Hunter. 7th Ed. New York, Norton, 1998. 1: 502-509. Gilman, Charlotte Perkins. "The Yellow Wallpaper." The Norton Introduction To Literature. Eds. Jerome Beaty and J. Paul Hunter. 7th Ed. New York, Norton, 1998. 2: 630-642.

Wednesday, January 15, 2020

Physics Projectile Motion

Name:Lab Group 4 Date:10/26/2011 Partners: Kayla Stephens, Robin Poole, Megan McIlvoy Grade: Instructor: JPS Name:Lab Group 4 Date:10/26/2011 Partners: Kayla Stephens, Robin Poole, Megan McIlvoy Grade: Instructor: JPS Physics I Laboratory Worksheet Lab 4: Projectile Motion Objectives: Using a projectile gun on an incline plane, calculate the velocity of the steel ball at ten different distances, then find the average velocity. In order to find the velocity of the steel ball two different equations are needed. In order to find the velocity of the steel ball fired from the projectile gun on an inclined plane, the first equation must be manipulated and substituted into the second equation. Then use the average velocity to determine the distance of a projectile being released at a different angle. Physics Principles: * Converting from centimeters to meters * Trigonometric functions * Quadratic formula:x=-b ±b2-4ac2a * Know how to get the derived formula: Materials Needed: * Projectile gun * Projectile * Incline paper * Carbon paper * 4 sheets of regular printing paper * Tape Measure * Calculator * Pen * Notebook paper Pre-Lab exercise: Using the two formulas solve forv0. Equation 1: x= v0xt(vox=v0cos? ) x=v0cos? (t) t=xv0cos? Equation 2: y= y0+v0yt-12gt2(v0y=v0sin? ) y= y0+v0sin? xv0cos? -12gxv0cos? 2 y= y0+xsin? cos? -12gx2v02cos2? Procedure: 1. Tape 4 sheets of carbon paper together portrait style, end to end. Tape 4 sheets of printing paper using the same portrait style. Then tape 4 sheets of regular printing paper behind the carbon paper. Make sure to adjust the bottom edge of the taped sheets so that the bottom touches the ground. 2. Next, assemble the projectile gun with the incline plane. The angle of the incline plane was placed at 35 degrees and make sure the wing is secure so that it will not slip. 3. Test fire the projectile gun and record the distance in centimeters using the tape measure. This distance is used to determine how far the gun shoots the steel ball and will be used in the actual experiment. 4. Aim the projectile gun at the carbon paper, make sure you measure the distance from the steel ball to the ground. Fire the projectile gun at the paper and write down the number 1 next to the point where the ball hit. 5. After the first shot you can move the projectile gun backwards or forwards, depending on your decision. Fire the projectile gun and write down the number 2 for the second point. Repeat this step 8 more times and record the results on a table. 6. After all ten trials have been completed take down the printing paper sheet and measure how far between from where the bottom was to each point of contact made with the projectile gun. 7. Use the equation v0=12gx2cos2? [xtan? -y-y0] on each trial to find the velocity. Then find the average velocity for all ten trials. Carbon Paper Carbon Paper Projectile Gun Projectile Gun Results Results Conclusion: For Part I,

Tuesday, January 7, 2020

The Position Of Corporate Security - 1468 Words

Abstract Due to present and ongoing dangers and threats to our nation’s businesses, the position of corporate security manager within the security field is experiencing ample growth opportunities that are expected to continue in years to come. Without proper security, businesses may suffer the potential consequences of operational risks, making the position of corporate security manager vital for their success and safety. In conducting research, I discovered the potential consequences of not securing your business, and the importance of protecting the resources contained within your business, making it apparent businesses will require those with the expertise to handle these threats. So it is without fail, corporate leaders†¦show more content†¦According to the Bureau of Labor Occupational Outlook Handbook, positions available within the security field are based on experience and education, with many entry-level positions requiring only a high school diploma (Statisti cs, 2014). The charts below show employment estimates, mean wages, and percentile wage estimates for the security management field. Employment estimates and mean wages for the security management field (Statistics, 2014): Employment (1) Employment Mean hourly Mean annual Wage RSE (3) RSE (3) wage wage (2)________________ 3,207,790 0.4% $20.70 $43,510 0.7% Percentile wage estimates for the security management field (Statistics, 2014): Percentile 10% 25% 50% (Median) 75% 90% __ Hourly Wage $9.13 $11.73 $17.68 $27.34 $38.03_ Annual Wage (2) $18,990 $24,390 $36,770 $56,860 $79,100 After job availability and position outlook, it was apparent to me most potential employees are concerned with job wages and/or salary. Within the security management field, pay scale varies based on position, location, education, and experience. Investing in further education and obtaining a college certificate, a bachelor’s degree, or a master’s degree may assist an individual in securing a better paying position. Military service aShow MoreRelatedNetworking Management And Technician Side Of Information Technology953 Words   |  4 PagesCorporatization of Information Technology The field of Information Technology is a broad field. In the Corporate aspect of IT, it has many sub-categories and jobs that in actuality work together to create one system. I am more into the Networking management and Technician side of Information Technology. We work with computers communicating over a network with other computers and the internet. There are many other important parts to IT like general computer troubleshooters, and server managers, web-interfaceRead MoreThe Case Of The Securities And Exchange Commission Essay1371 Words   |  6 PagesCurrently, the Securities and Exchange Commission (SEC) requires beneficial owners to file for ownership and disclose their ownership interests if he/she owns more than 5% of a registered class of security equity within 10 days. However, the Brokaw Act would reduce this disclosure period from 10 to 2 business days and require short interests disclosures pertaining to the security. Further, the Act would amend the SEC’s curren t definition of beneficial ownership from just ownership over securities with votingRead MoreSecurity Site Survey1014 Words   |  5 PagesSECURITY SITE SURVEY REPORT The DeVry Corporate Center The security survey at the DeVry Corporate Center was conducted on June 10, 2013, by Christian Moreno who was retained by the DeVry University for this purpose. Information set forth in this report was obtained from Gregory Smith, Executive Vice President amp; Chief Financial Officer, and from David Davis, Facilities Manager, and from personal observations of Thomas Brown during the inspection of this facility. Read MoreData Privacy1063 Words   |  5 Pagesspecification principle †¢ Any change in the purpose for data processing should be notified †¢ The Use Limitation Principle – Personal data should not be disclosed other than with the consent of the data subject †¢ The Security Safeguards Principle – Reasonable security measures should be adopted The OECD Guidelines †¢ The Openness Principle – Transparent Policy †¢ Individual Participation Principle – Access to data †¢ The Accountability Principle – Data Controller should be accountable Read MoreInsider Trading Essay example1149 Words   |  5 Pages The American Stock Exchange (Amex), also in New York City, and regional exchanges account for the remainder. Unlisted shares, often of smaller companies, are traded in the growing over-the-counter market. The NASDAQ (National Association of Securities Dealers Automated Quotations) system, an over-the-counter U.S. organization, accounts for the fifth largest stock trade in the world. Increasing computerization of stock trading may eventually render trading on a stock exchange floor obsolete.Read MoreThe Stages Of The Employment Cycle Essay765 Words   |  4 Pagesbusinesses. Some of the smaller organization are either corporate own or franchise. Whatever the case maybe in order for an organization to stay afloat they must develop an employment process. They can develop an employment process that will benefit the organization to grow economically. This employment proces s will help provide employees with customer service skills and employees with company expectation. According to the author Sari Greene of Security Program and Policies: Principles and Practices statesRead MoreMy Motivation For Seeking A Masters Degree870 Words   |  4 PagesComputer Security part time at Portland State University starting in January of 2016. My motivation for seeking a masters degree is two-fold: first, after years of self study and independent research and learning, the depth and rigor provided by a graduate level academic program will significantly solidify the skills and knowledge I have gained. Second, the in-depth knowledge that comes from a graduate level program will prove invaluable in furthering my career. Both my current position, MobileRead MoreNetwork Access Policy Of Millennium Corporation1098 Words   |  5 Pagesindividual in a position to know or get data about PCs or gadgets on the LAN. The firewall is an equipment or software which protect the ports of PCs on the LAN. For the reason behind this policy, Remote Access might mean access to the Local Area Network from any area outside the firewall by any method, including access through Virtual Private Network (VPN), dial-in modem, Telnet, SSH and some other technique for getting to the LAN from outside the firewall. Physical Security †¢ All PCs and gadgetsRead MoreCorporate Reporting Under The Corporations Act 20011529 Words   |  7 Pages3.4 Principle 4: Safeguard intergrity in corporate reporting All companies are obligated to corporate reporting under the Corporations Act 2001. It involves corporate reporting through the implementation of an audit committee. This motion requires accountability and transparency, without it, companies may be viewed as sneaky and troublesome. JB Hi-Fi has established an Audit and Risk Management Committee (ARM) as stated in their annual reports. This committee meets regularly and are independent ofRead MoreThe Sarbanes Oxley Act : A Direct Effect On Corporate Governance955 Words   |  4 PagesAct has a direct effect on corporate governance, and it is the strengthening of audit committees at public companies. This audit committee members oversees the company’s the management accounting decisions and gain new responsibilities such as approving numerous audit and non-audit services, selecting and overseeing external auditors, and handling complaints regarding the management’s accounting practices (Blokhin, 2015). There has been inc reased attention to corporate governance resulted from the