Tuesday, August 25, 2020

Community Colleges which deliver Essay

Module depiction: This module covers the significance of volunteerism in adding to an improvement in the personal satisfaction in networks around UTech and Community Colleges which convey its projects just as the more extensive society. It further joins homeroom directions with genuine cultural needs and investigates the connection between General Education modules and CSP 1001. MODULE OBJECTIVES: At the finish of the module, you ought to have the option to: 1. comprehend the idea of volunteerism 2. perceive the job of people in offering deliberate support 3. welcome the estimation of a help ethic in the improvement of a general public. REQUIRED READINGS †¢ Robotham, D. (1998). Vision and Volunteerism. Elegance Kennedy Foundation Lecture. †¢ Vision 2030 Jamaica: National Development Plan. National Planning Institute of Jamaica. 2009 ASSESSMENT 1. You will be required to finish four intelligent pieces. Every reflection must be type composed, Times New Roman, 12pt, twofold â €spaced and no short of what one page or multiple pages. You won't be permitted to present each of the four pieces toward the finish of the semester. You should finish every one and submit it on the due date. You will get ready two duplicates of every task. Submit one duplicate to your instructor. Have your teacher sign and date the other duplicate to recognize receipt of your work. Keep every single marked duplicate of your assignments in a sheltered spot. You may need to give these as proof of accommodation of your work. 2. NB: My duplicate of every reflection is to be messaged to mmarch@utech.edu.jm. I don't require a printed copy of reflections 1 †3. 3. A printed version of your last (REFLECTION # 4) must be submitted to the office before you leave toward the finish of the semester. This marked duplicate of the reflection must be submitted alongside the finished timecard. You should introduce all your work in an organizer with the accompanying data on the spread page: NAME: ACADEMIC YEAR: SCHOOL: LECTURER: NAME OF AGENCY/PROJECT: ID#: SEMESTER: TUTORIAL DAY/TIME: AGENCY SUPERVISOR: 4. Toward the finish of every reflection, you should type this data: Lecturer’s signature: Submission Date: 2 CONTENT Meeting 1 Week starting Aug 26 Content Introduction to CSP 1001 †¢ Structure of the module †¢ Assignment to gatherings and office †¢ Readings and assignments Activities Assign perusing for next class Explain rules for reflections ASSIGNMENTS Reflection # 1 2 pages Vision 2030 and network administration: a. What does network administration/volunteerism intend to you? b. Which 2 of the 4 objectives of Vision 2030 do you believe is most firmly connected to network administration/volunteerism? Why? c. Select 1 of the 2 objectives talked about in (b) and recommend ways you can add to accomplishing this objective through your locale administration. d. Understand Vision and Volunteerism: Reviving Voluntarism in Jamaica, by Don Robotham 2 Week starting Sept 9 Relating the way of thinking and practice of network administration/volunteerism to Vision 2030 †¢ What is vision 2030 †¢ Goals of Vision 2030 †¢ Meaning of network administration/volunteerism Reflection # 1 due Discussion of reflection Discuss Vision and Volunteerism. Is volunteerism dead? Would we be able to have a Fifth Peak of volunteerism in Jamaica? Reflection #2 2 pages Distinguishing your locale administration venture goals a. Recognize your office and quickly talk about the history, objectives and targets of the office. b. Bearing the Vision 2030 objective you chose in reflection 1 at the top of the priority list, recognize a lot of goals you expect to satisfy in your task at your office. c. Talk about the particular advances you will take to achieve those targets. Reflection # 3 2 pages a. Distinguish a portion of the issues/issues you encountered or saw during your position. b. What exactly degree did issues you experienced/saw in your arrangement reflect issues predominant in the more extensive Jamaican culture? c. What effect do you figure these issues will have on our capacity to accomplish the objectives spread out in Vision 2030? d. In the event that the issue was something you experienced, what solution(s) did you utilize to address the issue? On the off chance that the issue was something you seen, what potential arrangements would you re commend could be utilized to address the issue? Task # 4 3 pages a. Quickly sum up your impressions of your time spent in your office. What do you believe was the best piece of your administration? What was the most exceedingly terrible part? b. Survey the targets you set for yourself and talk about to what degree were these goals accomplished? c. Examine in what ways did the network wherein you worked advantage from your undertaking. 3 Week starting Sept 30 Network Service as a change operator †¢ How has a network administration added to our nation’s advancement truly. †¢ What job would community be able to support play in accomplishing the objectives of Vision 2030. †¢ Reflection # 2 due Discussion of reflection #2 4 Week starting Oct 28 Network Service for advancement †¢ Nation †¢ Community †¢ Globally †¢ Role of UTech/Community Colleges Evaluation of encounters †¢ Challenges †¢ Solutions Reflection # 3 due Discussion of reflection #3 Distribution of assessment structures. 3 d. State whether the association would profit by having more CSP ventures finished. Propose the sort of administration which would help the association/network in which you worked, in light of your experience there. e. In what ways do you think could CSP 1001 be improved? f. Give reflections on your perusing of Vision 2030 and Vision and Volunteerism You will make a duplicate of this task which you will submit to your organization BEFORE YOU LEAVE toward the finish of the semester. 5 Week starting Nov 18 Evaluation of encounters †¢ Objectives †¢ Benefits †¢ Challenges †¢ Solutions Reflection # 4 due (Final Assignment)

Saturday, August 22, 2020

The Magna Carta

1. Magna Carta [1215] (52): The Magna Carta was an understanding that guaranteed security of honorable (primitive) freedoms from usurpation by the King. The Magna Carta impacted the advancement of customary law (legitimate point of reference), just as protected standards (as found in the United States Constitution). 2. Boss Powhatan (59): Chief Powhatan was the head of Algonquian-talking towns (Powhatan Confederacy) in eastern Virginia, head of around 10,000 Indians. Powhatan took 80% of the corn his kin developed and exchanged that and stows away for weapons. Subsequently, the English individuals assumed control over his territories. . Mercantilism (163): Mercantilism was a national program that said that the aggregate sum of the world’s gold and silver remained the equivalent and just what percent of that every country had changed then one country could just get more extravagant by taking another’s gold and silver and assuming control over its exchange. Thus, countrie s needed to create and secure its own delivery and needed to exploit the states. 4. London (Virginia) Company (57): The Virginia Company was a joint-stock between the First Colony of London and the Second Colony of Plymouth. Lord James had them go on a strict crucial carry the Christian religion to the locals of the settlements. The pioneers attempting to change the locals religion drove the relations between the two to get tenser. 5. John Smith (59): John Smith was delegated by the Virginia Company to oversee Jamestown. Smith was severe and made everybody work. On the off chance that pilgrims quarreled, he detained them, whipped them and constrained them to work. He haggled with Indians and investigated and mapped the Chesapeake locale. As a result of him, Jamestown endure, yet he was not popular with the pioneers. . Jamestown (58): Jamestown was the primary changeless state in Virginia by the Virginia Company. The 105 men fabricated a fortress, cottages, a storage facility and a congregation. Exchange with the Indians and the lessons of the Indians were the main explanation Jamestown at first endure. 7. John Rolfe (62): John Rolfe was the explanation tobacco turned into a mainstream crop. He got it tog ether of certain seeds and tobacco got famous. It had a major benefit and helped the economy. It likewise drove contracted workers to come over, boosting the populace. John Rolfe likewise wedded Pocahontas, Chief Powhatan’s girl. She wedded John Rolfe and they moved to London. John Rolfe was the purpose behind the tobacco business in the states and greater strength between the homesteaders and Indians. 8. Place of Burgesses: 9. Pocahontas (63): Pocahontas was the little girl of Chief Powhatan. She spared John Smith when he intruded. Powhatan let Smith go in return for weapons, dots and knickknacks. She was caught in 1614 by Jamestown to attempt to extort Powhatan. She wound up changing over to Christianity, changed her named to Rebecca, and wedded, had a child and moved to London with John Rolfe. She was an explanation Indians and settlers relations improved. 10. Sir William Berkeley (64): Sir William Berkeley was Virginia’s regal senator beginning in 1642 and stayed it for the following 35 years. Berkeley supported the most extravagant grower and the ordinary people defied him in Bacon’s Rebellion. At long last, Berkeley recovered control. 11. Headright System (63): The headright framework said that any individual who purchased an offer in The Virginia Company could get 50 sections of land and 50 more on the off chance that they brought workers along. Sir Edwin Sandys founded this change. It helped the populace develop. 12. Contracted hirelings (62): Indentured workers were individuals who couldn’t stand to go to America so in return for work, grower would pay for their ride over. This expanded the progression of foreigners to the settlements. 13. Bacon’s Rebellion (65): Lowered tobacco costs, rising duties and liberated workers needing Indian terrains added to Bacon’s Rebellion. Bacon’s Rebellion became out of the scorn for Berkeley for preferring the rich grower and detesting everyday people. Liberated obligated workers needed land and drove them to take the Indian’s land. Berkeley didn’t bolster them so they revolted. The grower and Indians began to get vicious. In 1676, Bacon challenged Berkeley by assuming responsibility for a gathering of outskirts men. Bacon needed all Indians dead and Berkeley didn’t. Bacon’s insubordination was the main battle of normal society versus privileged people. Berkeley recovered control in the wake of hanging 23 revolutionaries. A regal commission made a harmony bargain with the Indians. The aftereffects of the insubordination were new grounds opened to pilgrims and affluent become increasingly helpful with average people. 14. William Bradford (69): William Bradford drove 100 men, ladies and youngsters to the settlements on board the Mayflower. He and the pioneers arrived at Plymouth and they based on a surrendered Indian town. Bradford prompted the Indians and Pilgrims having better relations with one another and Thanksgiving. 15. City on a Hill (72): John Winthrop imagined the Massachusetts Bay Colony as a city on a slope. Winthrop utilized slope allegorically to show that he felt they would above rest of the provinces. 16. John Winthrop (72): John Winthrop was the main legislative leader of Massachusetts Bay Colony and needed to utilize the province as an asylum for Puritans. He exploited the contract by the Massachusetts Bay Company by taking its sanction with them, moving government authority so they could have neighborhood control. 17. Pioneers/separatists (69): The Pilgrims were a piece of the most extreme segment of Puritans, the Separatists (Nonconformists). They didn’t like the Church of England and chose it couldn’t be fixed so they would make their own authentic assemblages. Dissenter pioneers were detained and now and then hung. Lord James I needed to disposed of them. Accordingly, they left and went to the provinces to get away. 18. Puritans (68): The Puritans were a gathering of English Protestants. The Puritans in England executed King Charles and made his child the lord. The Puritans settled in New England. They were very religions and professed to be on an awesome strategic make a model Christian culture. 19. Massachusetts Bay Colony (72): Massachusetts Bay Colony was expected to be a heavenly district. The greater part of the Puritans there were Congregationalists who shaped self-overseeing houses of worship. 20. Plymouth Colony (69): Plymouth Colony held a land award however had no contract of government structure any English position. The Mayflower Compact represented it. Its populace never transcended 7,000. 21. Mayflower Compact (69): The Mayflower Compact was made by 41 Pilgrim pioneers who went into a conventional consent to comply with the laws made by the pioneers based on their personal preference. The Mayflower Compact was the essential wellspring of government for Plymouth Colony. 22. Anne Hutchinson (77): Anne Hutchinson contended with Puritan pioneers. She lived in Boston and held lessons in her home. Before long they become well known lessons drove by her. She asserted that she got disclosures from the Holy Spirit that persuaded her that solitary a couple of Puritan pastors lectured the fitting pledge of elegance. She said the remainder of them were â€Å"godless hypocrites† and bumbling. 23. Fate: Predestination is the Calvinist hypothesis that God has foreordained who will go to paradise and who will take a hike. This drove individuals, for example, Roger Williams to address why church was vital. 24. Roger Williams (75): Roger Williams was one of the â€Å"purest of Puritans† and was pained by the disappointment of the Massachusetts Nonconformists to dispose of the Church of England. He advocated freedom and said that the genuine pledge was among God and the person. He offered a conversation starter that if one’s salvation relies entirely on god’s elegance and you can’t influence it, why even trouble having chapels? Why not simply let individuals practice their unrestrained choice in love? 25. Pequot War (82): The flash of the Pequot War was when pioneers in Massachusetts blamed a Pequot for killing a settler. The pioneers sought retribution by burning down a Pequot town. As the Pequot’s fled, the Puritans shot and executed them. The Pequot’s invalidated by assaulting the English. The homesteaders and their partners the Narragansett-slaughtered several Pequots. 26. Iroquois League (96): The Iroquois League was compensated for 12,000 individuals administered by 50 boss. The boss settled on choices for all the towns and went about as peacemakers. They held onto Canadian chasing grounds and crushed western clans to chase beaver in the area to elimination. French and Indian partners picked up the bit of leeway over them and diminished their populace by a third. The Iroquois made harmony with the French in 1701. 27. Quakers (98): The Quakers were the most powerful of the extreme strict gatherings. George Fox established them in 1647. They were a very open minded gathering of individuals. They accepted everybody ought to have total strict opportunity. 28. William Penn (98): William Penn was the organizer of the Quaker state of Pennsylvania. At the point when he assumed responsibility for Pennsylvania, there was a dispersing of religions and races and he put forth attempts to acquire more pilgrims of any religion as long as they trusted in God. He offered land and the province developed quickly. He bought land titles from the Indians and even took in an Indian language. The Indians and settlers lived one next to the other in harmony. 29. Atlantic Slave Trade: When manors expanded, the requirement for slaves expanded. This prompted the formation of the Atlantic Slave Trade The Atlantic Slave Trade was the selling and moving of African slaves over the Middle Passage. In any case, 1 out of 7 slaves kicked the bucket during the excursion. 30. Stono Slave Rebellion (123): Mistreated slaves opposed their lords. The slaves who took an interest in this disobedience were murdered and their heads were set up on mile imprints to caution different slaves not to revolt. 31. Triangular Trade (135): New Englanders delivered rum to Africa which they exchanged for slaves, took the captives toward the West Indies a

Sunday, July 26, 2020

ENFJ Personality Characteristics & Cognitive Functions

ENFJ Personality Characteristics & Cognitive Functions Theories Personality Psychology Print ENFJ: The Giver (Extraverted, Intuitive, Feeling, Judging) An Overview of the ENFJ Personality Type By Kendra Cherry facebook twitter Kendra Cherry, MS, is an author, educational consultant, and speaker focused on helping students learn about psychology. Learn about our editorial policy Kendra Cherry Updated on May 14, 2019 Myers-Briggs Type Indicator Overview Intuitive-Thinking INTJ INTP ENTJ ENTP Intuitive-Feeling INFJ INFP ENFJ ENFP Sensing-Judging ISTJ ISFJ ESTJ ESFJ Sensing-Perceiving ISTP ISFP ESTP ESFP In This Article Table of Contents Expand Key ENFJ Characteristics Cognitive Functions Personal Relationships Career Paths Tips for Interacting With ENFJs View All ENFJ is one of the 16 different personality types identified by the Myers-Briggs Type Indicator.?? Some other types are known by the acronyms ESFJ, ENFP,  INFP, ISFJ, and INTP. People with ENFJ personality type are often described as warm, outgoing, loyal, and sensitive. Illustration by JR Bee, Verywell Of all the personality types, the ENFJ is often perceived as being the strongest people person. They are capable of forging friendships of all personality types, even with more introverted or reticent individuals. Because of their ability to sense what others feel and affect how people behave, they do have the ability to influence and even manipulate others. This is balanced by their strong value system and desire to help other people be the best that they can be. ENFJ is the opposite of the ISTP personality type. Psychologist David Keirsey suggests that approximately two to five percent of all people have an ENFJ personality. Key ENFJ Characteristics ENFJs are strong extraverts; then sincerely enjoy spending time with other people. They have great people skills and are often described as warm, affectionate and supportive. Not only are people with this personality type great at encouraging other people, they also derive personal satisfaction from helping others.ENFJs are often so interested in devoting their time to others that they can neglect their own needs. They also have a tendency to be too hard on themselves, blaming themselves for when things go wrong and not giving themselves enough credit when things go right. Because of this, it is important that people with this personality type regularly set aside some time to attend to their own needs.They are also good at bringing consensus among diverse people. For this reason, they can be outstanding leaders and bring an enthusiasm to a group that can be motivating and inspirational.One common myth about ENFJs is that they are always sociable. While they love people, they do need time alone in order to assimilate and organize their thoughts. Strengths Outgoing and warm-hearted Empathetic Wide social circle Encouraging Organized Weaknesses Approval-seeking Overly sensitive Indecisive Self-sacrificing Cognitive Functions Each MBTI personality type can be identified by a hierarchical stack of cognitive functions that represent how each person interacts with the world. These functions focus on how people take in information about the world and how they then use this information to make decisions. Dominant: Extraverted Feeling ENFJs express this cognitive function through their engaging social behavior and harmonious social relationships. They are in tune with other peoples feelings, often to the point that they ignore their own needs in order to please others. ENFJs place a stronger emphasis on personal, subject considerations rather than objective criteria when making decisions. How a decision will impact others is often a primary concern. Auxiliary: Introverted Intuition ENFJs like to think about the future rather than the present. They may often become so focused on the larger goal that they lose sight of the immediate details. As ENFJs take in information about the world, their introverted intuition processes this data in order to create impressions, ideas, and thoughts. This allows them to spot patterns and make sense of complex or abstract data. Tertiary: Extraverted Sensing In an ENFJs personality, extraverted sensing causes them to take in the present moment, gathering concrete details and sensory information from the environment. Because of this, they will often seek out novel or interesting experiences and sensations. People with this personality type tend to be very aware of their present environment. This can lead to a great appreciation of aesthetics and a desire to create a pleasing space. Inferior: Introverted Thinking ENFJs are organized and enjoy structure and careful planning. Sticking to a predictable schedule helps ENFJs feel in control of the world around them. Because this is an inferior function, ENFPs may not have a great deal of confidence in their own ability to be logical and organized. Developing this function can help people with this personality type feel more balanced and in control of their decision-making process. Neglecting this aspect of personality can lead to relying solely on personal values when making decisions and neglecting the need for logic. ENFJs You Might Know Abraham Maslow, psychologistPeyton Manning, football playerBarack Obama, U.S. presidentBono, musicianElizabeth Bennet, character in Pride and Prejudice Personal Relationships ENFJs value other people highly and are warm, nurturing, and supportive in personal relationships. At times they can become very wrapped up in other peoples problems. They are altruistic and interested in helping others, which can sometimes come off as a bit overbearing. Despite this, they are usually very well liked and people appreciate their genuine concern and care. As parents, ENFJs are nurturing and warm, although they can sometimes be accused of being so-called helicopter parents. They are directly involved in their childrens lives, although they can sometimes be quite strict and even rigid at times. ENFJs need to remember to give their children room to explore and express their individuality, particularly as children age into adolescence. ENFJs have an outgoing personality and enjoy spending time with other people. Being in social settings helps them feel energized. In friendships and other relationships, people typically describe ENFJs as supportive and fun to be around. They are particularly good at relating to others and are known to help bring out the best in the people with whom they spend their time. Career Paths ENFJs often do best in careers where they get to help other people and spend a great deal of time interacting with others.  Because of their strong communication and organizational skills, ENFJs can make great leaders and managers. They are good at organizing activities, helping each group member achieve their potential and resolving interpersonal conflicts. They strive to create harmony in all situations, and always seem to know what to do to ease tensions and minimize disagreements. Popular ENFJ Careers CounselorTeacherPsychologistSocial workerHuman resources managerSales representativeManager Tips for Interacting With ENFJs Friendships One of the best ways to be a good friend to an ENFJ is to accept the care and support that they naturally offer. People with this personality type enjoy helping their friends, and it is important to show that you accept and appreciate what they have to offer. However, it is also important that you offer your support in return. ENFJs are not always good at asking for help when they need it. In many cases, simply being willing to listen to whatever they have to share can be very helpful. Parenting Children of ENFJs might find it difficult to live up to their parents high exceptions. At times, the ENFJ parents hands-on approach to parenting can be stifling and make it difficult for kids to explore the world on their own terms. Parents of ENFJ children should recognize that their children are extremely empathetic, sometimes to the point that they may feel overwhelmed by the strong emotions that other people evoke. These children are giving and caring but may find it difficult to burden others with their own struggles. Parents should encourage their children to care for others, while still taking care of their own emotional well-being. Relationships Because ENFJs are so sensitive to the feelings of others, your happiness is critical to your partners happiness. Remember that your partner may even put their own needs last in order to ensure that your needs are met. Let your ENFJ partner know how much you appreciate all the support and care that they offer and be willing to provide the same support in return â€" even if he or she struggles to ask for help.

Friday, May 22, 2020

Internet Banking System - Free Essay Example

Sample details Pages: 10 Words: 3149 Downloads: 6 Date added: 2017/06/26 Category Finance Essay Type Narrative essay Did you like this example? Internet banking system has become widely popular and used among many consumers. There is much debate as to whether internet banking system is secure. This essay argues that client, data transport and banks server are important players in terms of internet banking security. This essay demonstrates some vulnerability of these sections and shows successful solutions. This essay concludes that risks of using internet banking system can be restricted. Introduction Don’t waste time! Our writers will create an original "Internet Banking System" essay for you Create order There has been much discussion on the issue of whether banks systems are able to prevent the risks of using the internet that offer to consumers the opportunity to interact with their banking activities. In addition, whether banks customers are ready to start using the internet to access to their banking records. Online Electronic banking systems give customers the opportunity to interact with their banking records. Customers can easily access their banking records and make some activities such as money transfers between users account, retrieving an account balance, retrieving an account history, bills payment, stock market transactions and other activities. As with any other system, E-banking evolves, whereas it starts with Automated Teller Machine (ATM), the first well-known system, which allows the customers to deal with banking services via friendly graphical user interface. The next step, the customers have been managed their accounts by using phone banking. Then, the internet has been provided a new way to both banks systems and customers to interact together by using friendly interface browser. Currently, mobile phones can be used to perform Electronic banking. Hole et al (2006) point out that banks encourage their customers to use online banking to save cost and reduce their employees. He suggests that banks customers seem to believe that internet banking is safe because their banks told them that. However, Claessens et al (2002) estimated that money saving is not the case for banks, while offer 24 hours 7 days online services to the customer with level of security standards is banks trend. This essay attempts to investigate whether online banking has been developing to be generally secure. This essay will argue that in terms of internet banking security, there are three sections play an important role which are client side, data transport (the communication between client and server) and server side. If these sections or one of them have any weaknesses then the data is insecure. However, there is always risk even though these sections are generally secure. In order to demonstrate this, this essay will first describe client side problems and how to overcome these problems. Then the security of the communication between client and server has been discussed. Finally, the essay has been addressed server issues and how these issues are avoided. 1. Client side issues: This section attempts to identify some particular problems in client side security. In order to highlight these problems the internet banking structure is defined. Then, some problems might face users and some solutions to resolve these problems are addressed. In this essay, the term user refers to a physical person while the term client refers to a machine and software for the user. 1.1 Internet banking structure it is clear that there are two parts with respect to internet banking structure: the user and the bank. Once the user has a PC and network connection the most common way to connect with banks server is Web browser, although some banks are offered alternative application, more secure and reliable, to communicate with their clients customers which called stand-alone client/server application (Claessens et al, 2002). He has commented that to avoid clients Web browser problems and vulnerable security, banks often deploy a Java applet so that can be downloaded from banks website. It is widely believed that this applet is a small software code that executes in clients browser and provides extra security. Another advantage of download Java applet is that clients are able to download automatically a new updates of the software (Claessens et al, 2002). In other words, Banks do not need to deploy new updates in old-fashioned way. The standard protocol for communication between the browser and the banks web server that often used is Hypertext Transfer Protocol Secure (HTTPS). Claessens et al (2002) have noted that this protocol is used either in stand-alone application or ordinary clients browser to provide security. However, (Hole et at, 2006) point out that there is a weak link between clients browser and Java applet. He has suggested that this weak link might allow attackers or fraudsters to steal users banking account details. Nonetheless, Java applet has been developing to fix vulnerabilities by Netscape lab (Netscape Lab, 2008). Moreover, users often have been advised to install firewall and anti-virus software in their PCs and make sure their anti-virus and firewall are up-to-date. However, there is always risk even thought anti-virus and firewall has been installed such as phishing email scams, Keylogger program and other hazards. Therefore, it seems that Java applet or stand-alone application presents some hazards in internet banking system. 1.2 Phishing email scams and Keylogger programmes Phishing email is a fraudulent email that users are received and ask them to confirm information such as internet banking user ID and password (Hole et al, 2006). The aim of such this email to take the users log in details, either the email is replied log on details by the user or is directed the user to spoof websites and then someone else can access to the user account. Hole et al (2006) point out that this issue subject to controversies between to some who are against using internet banking and others with using internet banking. Another problem that supports people who are against using internet banking is Keylogger programmes (Loscocco, 1998). It can be identified the Keylogger programmes as a virus that can record any presses on the users keyboard. As a result, an attacker can exploit this type of programs to obtain sensitive information. However, it seems reasonable to suggest that frauds exist even in real life not only in the cyber world. Moreover, users can protect themselves against phishing by following the instructions that are given by their banks (Ghosh, 2000). Nonetheless, it is clear that phishing email scams and Keylogger programmes are considered as a serious problem; therefore, it can be affect the security of client. 1.3 Attraction versus security Another problem of internet banking security is that banks systems normally provide minimum levels of security for client side and rely on clients software that is already available (Hole et al, 2006). Hole et al (2006) has also suggested that this makes the internet banking service more attractive, but it might affect the levels of security that this service is offered. Another problem in terms of internet banking security is that typical client platforms are often very vulnerable (Loscocco, 1989). He, therefore, suggests that vulnerable client platform subject to attack more than server platform due to it is the weak link. As, however, is mentioned above up-to-date Java applet or stand-alone application is downloaded from banks website seems to provide extra security. Moreover, hazards of using internet banking should be explained to users. Nonetheless, there is always risk but if security in place can be overcome to a certain extent. 2. Data transport issues This section focuses on the security of the communication between the client and the banks server as an important part in terms of internet banking security. Secure Sockets Layer (SSL) technology in this section is presented. Some other issues such as spoofed web site, Certificate Authority and other issues related to the communication security between the client and the banks server are addressed. 2.1 Secure Sockets Layer (SSL) The communication between a client and a server in World Wide Web is inherently insecure (Ghosh, 2000). He has explained that when a message (or packet) travels from source to destination through the internet, it is directed by a number of unknown intermediate sites. Consequently, any invisible intermediary can read, destroy or modify the packet. He has shown that the most common protocol that often used to transfer data is Internet Protocol (IP) and Transport Control protocol (TCP). Moreover, a combination of TCP/IP is inherently insecure and gives hackers a chance to read datas transmissions between source and destination. Furthermore, TCP/IP does not support data integrity, privacy, confidentiality and non-repudiation. He has estimated that TCP/IP was designed in a simple way to make as sure as possible that it is consistent with most hardware and software which exist in the internet. It provides reliable communication of packets but does not provide security (Ghosh, 2000). Confid ential data should not be sent unless a secure channel is established (Ghosh, 2000). However, Claessens (2002) has demonstrated that Netscape Lab has been working to institute SSL protocol to establish a secure channel for transferred data between Web clients and Web servers. He also shows that SSL is simply another protocol stack which rides on the top of the TCP/IP stack to provide secure communication, authentication of the server and data integrity of the packet. Ghosh (2000) has shown that SSL provides the security by encrypting the data that is sent between a Web client and Web server. He also shows that SSL protocol is attached to the protocol stack to secure the packet against hacking that may occur when the packet is traveling through the internet. He also demonstrates that although any intermediary may be able to see the packet in transmission, the encryption will mix up the data so that cannot be noticed. Nonetheless, SSL provides a secure channel with regard to data communication between client and server but does not secure data that are placed on client and server (Ghosh, 2000). Therefore, although SSL protocol has not been presented a perfect solution, it can prevent the most risks that might be occurred when a data in transmission. 2.2 Certificate Authority In addition to securing the channel between Web client and Web server via encryption, SSL provides servers authentication. This means that when a user hit a banks website, the Web client browser is guaranteed that the server has been certified by a Certification Authority (CA). Claessens et al (2002) has shown certificates are usually built-in with the Web browsers installation. It is clear that the CA approves the identity of the Web server. This means that a user can be sure of the identity of the Web site (or Web server) which they interact with. Ghosh (2000) has demonstrated that in order to support connection security, trust and authentication, a Web site must register with a certification authority that exists on the CAs list in the users browser. Once a Web site is registered and the identity is defined with a CA, the CA then establishes the identity of the web site and private key (Ghosh, 2000). However, Ghosh (2002) has shown that CA endorses only the identity of the Web site and not the content. It is possible that a Web site might be registered with a CA under one name and address whereas it presents itself as another in the content (Ghosh, 2002). To explain more, assume a Web site that registered with a CA under the URL www.hscb.org. A user visiting this site, seeing the banner for HSCB bank and seeing a secure session was established with authentication (e.g. Lock Icon); assume that the Web site is the official HSBC site (www.hscb.com) while the site may be created by an attacker organisation (Ghosh,2000). Ghosh (2002) has demonstrated that although such situations are rarely occurred, it has occurred in practice. Therefore, the hazards are exist in terms of the communication security even though CA attempts to limit it. 2.3 Web spoofing It is possible to use spoofed web site to fool the user (Ghosh, 2000). He has identified that a spoofed web site is a fraudulent web site is designed to appear similar to a legal web site. He also shows that it is usually created by an attacker organisation for the reason that users may visit their web sites by mistake or by mistyping the address. He has also shown another type of Web spoofing that attackers occasionally attempt to attack a banks web site and forward its internet traffic to their own web sites. These web sites are very similar to the official bank web site and then they attempt to take the users banking details. Ghosh (2000) has demonstrated that an attacker organisation has the ability to capture, modify or drop Web requests because Web requests and returned Web pages might be managed by the attacker organisations web sites (see section 2.1). Consequently, all Web requests from a users browser might be watched and altered. Ghosh (2000) has illustrated how the users can be accessed into a shadowy web site as follow: First step, an attacker attempts to attract a user to hit the attacker organisations web site. Once the user has been accessed to attackers Web site, every web site access from the attackers page then can be traced during the same session. However, it seems that users can distinguish this kind of Web spoofing attack by checking the certificate of the Web site. Moreover, users always pay attention to the URLs when they connect with Web sites. Furthermore, banks often make users aware of spoofed Web sites. Nonetheless it seems reasonable to suggest that inexperience user might log on in spoofed web site. Therefore, it is clear that spoofed web site also bring another risk for using internet banking system. 3. Server issues This section focuses especially on the security issues of the banks server as an important player in internet banking system. The methods that use to verify the identity of a client to provide extra security in internet banking service in this section are presented. The banks server problems that may be faced such as Denial-of-Service attack, Distributed Denial-of-service (DDoS) attack and Brute-force attack are discussed. 3.1 Authentication mechanism The authentication methods that use to authenticate banks server are presented (see section 2.2). However, it seems clear that banks server should also make sure that received data is real and from an authorised client. Ghosh (2000) has shown the two techniques, either one of them or all of them, which are used by banks server to authenticate the client. He has suggested that most banks servers depend on IP address and client host name method to verify the identity of the client. It is widely believed that using IP address and client host name one of the most basic techniques that used to make sure of the identity of client. Ghosh (2000) has shown that banks server can use IP address and client host name to make sure that requests are received from an authorized client by using the Domain Name Services (DNS). The DNS can be used by banks server in order to check that the clients IP address and clients host name that have been sent are identical (Ghosh, 2000). It is often argued that banks server, to provide more authentication, can use DNS table to check that clients IP address agree with clients host name. However, it seems that there is a particular problem in using IP address and client host name technique which can affect the security of banks server as well as it does not present a good level of authentication. The problem, acco rding to Claessens (2002), is that attackers can create a fake host name to fool the banks server. Then, it is possible that banks server allows the attacker to access a sensitive Web page as a trust client. Therefore, this flaw of using IP address and host name technique can cause a significant problem that might affect the security of banks server. Nonetheless, it is clear that banks servers are overcome this problem by using SSL protocol. Claessens (2002) has shown another technique can be used by banks server to verify the clients identity which is user name and password. It can be said that most banks systems rely on user name and password method in order to authenticate the clients identity as well as confirm clients requests. User authentication will start first by creating a database file for authorized users with their user name and password (Ghosh, 2002). He has also shown that in most cases this file is stored in the banks Web server with user names and encrypted passwords to keep it away from an unauthorized user. Moreover, clients user names often are established by internet banking system administrators and then they are allowed their client to choose their secret passwords. However, there are some particular problems in using user name and password method which can affect the security of the internet banking system particularly in terms of the authentication of client. One of these problems is that many us ers often tend to select a password that easy to remember as well as easy to guess such as their mothers name, their middles name or their date of birth (Ghosh, 2002). He has also suggested another problem of using user name and password method which is, a cracker first can create a small software code to hack the banks server for capturing the database file that include the user names and encrypted passwords, and then the cracker can run a password guessing software that use to attempt to guess any users password. It can be suggested that once any passwords are guessed, it can be used to access an banks customer account, what are probably, change the password or even worse transfer money to an unknown party. Nonetheless, it is often argued that users are often advised to pick a complicated password that might contain a mixture of numbers and character which is hard to be guessed. Conclusion In conclusion, this essay has argued that despite the security problems and hazards it has been presented of using the internet to perform banking transactions, users, banks and computer security experts have significantly involved to practice security methods against the people who look behind the shoulder. As with any system, internet banking system has developed to meet security requirements despite the difficulties it faces. Therefore, it is clear that although practicing sensitive activities through the internet such as internet banking activities might bring many risks to banks and users, these risks can be limited to a certain extent. Issues of internet security have long been a problem for governments, organisations and even individuals as it is a mouse and cat game between legal organisations and illegal organisations. However, it is clear that this game will not finish until a great solution is presented in the future. References [1] Claessens, J Dem, V De Cock, D 2002 , On the Security of Todays: Online Electronic Banking Systems. [2] Ghosh, K 2000, E-Commerce Security: Weak Links, Best Defenses. [3] Hole, J Moen, V Tjostheim, T 2007 , Case Study: Online Banking Security. [4] Loscocco, A 1998 , The Flawed Assumption of Security in Modern Computing Environment. [5] Netscape Lab 2008 , www.netscape.com [6] Smith, D 2006 , Exploring Security and comfort issues associated with online banking.

Friday, May 8, 2020

Human Resource Planning Essay - 1303 Words

When most people think of Human Resource Planning, the first thing that usually comes to mind is the internal environment of the organization. There is, however; the external environment which is just as important. The external environment consists of governmental policies, condition of the economy, demographics, technology, international influences, competitors, and a changing labor force (Greer, Peters Youngblood, 1998). Neglecting the external environment can have devastating effects on an organization. Entire civilizations have vanished for failing to address external environmental factors and the need to adapt in an ever-changing environment. You may ask what extinct cultures have to do with HR planning and the external†¦show more content†¦Environmental scanning consists of six phases. The first phase is to figure out which elements of the external environment to analyze and being able to report findings. The second phase is to compile data and deciding what data is used. The third phase is to map out trends from the data collected. Trending makes the data easier to analyze and read. The fourth phase is to try and figure out what effects the trends will have on the organization. The fifth phase is to figure out which issues are the most relevant. The sixth phase is to ascertain which relevant issues are the most important. If used correctly, environmental scanning can be instrumental in HR planning (Greer, Peters Youngblood, 1998). Changing Demographics Demographics are one of the most important elements in the workforce. Immigration, age, and a declining birthrate have negatively affected the ability to fill positions. A smaller, younger workforce has incited many companies to seek out ways to retain the aging baby boomer segment. As these baby boomers retire, it is imperative to ensure younger workers are mentored so the knowledge of the older workers is not lost. Diversity in the labor pool is also another important factor to consider in HR planning. As baby boomers retire, the labor pool of skilled workers shrinks more and more. Unfortunately, HR managers are not doing enough to tap into the ever-growing labor pool of skilled immigrant workers. In order toShow MoreRelatedHuman Resources Planning And Human Resource Planning1603 Words   |  7 PagesHuman resource handle administrative functions in an organisation and Human resource planning expand strategies for relating the skills and size of manpower to enterprise needs. In simple words the planning system makes recruitment, gives training and restructures the staff requirement to meet the organisational goals and changes within the environment. Human resource planning is a paramount component of Human resource management. B.J Smith (1992) describes that Human resource planning is the legalRead MoreHuman Resources Planning : Human Resource Planning Essay1436 Words   |  6 Pages Human Resource planning Name: Institution: Human Resource planning I am Juanita Espinosa, a young professional practising the human resource profession in an administrative capacity for the first time. The organisation that I am working with now is a non- profit one whose mission is to ‘stamp out hunger among the young and elderly in our lifetime.’ I am faced with several challenges at my new posting with the organization at the point of closure. I have the responsibility of identifyingRead MoreHuman Resource Planning : Strategic Human Resources Planning1487 Words   |  6 PagesQuestion #1: Define and explain the significance of the term ‘derived demand’ as it applies to Strategic Human Resources Planning. (5 marks) The term ‘derived demand’ is used to describes how the changes in demand for one product could either increase or decrease the demand for another product. An example of this occurring could be within the automotive industry. If the demand of vehicles increase so does the raw materials to make them and vice versa. This happens because the demand of vehiclesRead MoreHuman Resource Planning And Human Resources2006 Words   |  9 Pagesdevelopment of human resource planning firm employees to find is very important. Aim to achieve the organization in this way it should be internal or external supply to assess whether labor supply. With the needs of the firm s main specialty AD-workers describe the job analysis, there should be. Today s executives of particular concern for the effective and acurate in human resource planning for the needs of internal and external supply of labor. Human Resource planning is the planning which canRead MoreHuman Resource Planning595 Words   |  3 PagesHuman Resource Planning The function that I will explore in depth is Marks and Spencer human resource planning primarily concerned with the organisation possessing sufficient numbers of employees and of the right standard. The four main purposes of the human resource planning function are:  · Marks and Spencer establish clear links between organisational objectives and human resource plans so that successful co-ordination of the two can be set out.  · To giveRead MoreHuman Resource Planning1429 Words   |  6 Pages1. What is Human resource planning? Human resource planning links people management to the organization, mission, vision, goals, and objectives as well as its strategies plan and budgetary resources. A key goals of HRP is to get the right number of people with the right skills, experiences and competencies in the right jobs at the right time at the right cost. 2. What is strategic planning? Strategic planning is the process of taking inputs (information), organizing and making sense of thatRead MoreHuman Resource Planning3781 Words   |  16 PagesHuman Resource Planning (3rd Class) Definition: The ongoing process of systematic planning to achieve optimum use of an organizations most valuable asset - its human resources. The objective of human resource (HR) planning is to ensure the best fit between employees and jobs, while avoiding manpower shortages or surpluses. The three key elements of the HR planning process are forecasting labor demand, analyzing present labor supply, and balancing projected labor demand and supply. RigorousRead MoreHuman Resource Management And Human Resources Planning930 Words   |  4 PagesThe career path I chose was that of human resources the reason I chose this is because I really enjoy helping with their problems while also being able to help the big picture. This is meaningful to me besides the fact with being able to help people with their problems. Depending on the place that you work for you can also make a nice bit of money and be able to travel throughout the country. I personally do not have any experiences in working in this career field but I have helped my mother withRead MoreHuman Resource Planning Process For Human Resources804 Words   |  4 Pagesfor this assignment covered human resource management. Items discussed in this chapter were the importance of human resource management in an organization, the planning process for human resources, how a manager needs to be familiar with U.S. federal laws and regulations, the steps in the employment process, and current issues faced by human resources. According to Dunlap Garvin (2010), good employees can be the key to success in an organization. A human resources department has several importantRead MoreHuman Resource Planning2071 Words   |  9 PagesPrevious decades have seen considerable changes within implementation of human resource planning. The following report has been devised in order to analyse occurrence and reasoning of these changes. The following points shall be reviewed: • Identification of the different drivers which affect organisational management. • Analysis of the changes in human resource management implementation consequential of the above stated changes. • Explanation of adaptations of the recruitment and selection

Wednesday, May 6, 2020

Part Two Chapter VI Free Essays

string(116) " by the plain Jawanda daughter, whose name Howard did not know, and a mouse-haired boy with violently erupted skin\." VI ‘The fuck have you done to your face? Come off the bike again?’ asked Fats. ‘No,’ said Andrew. ‘Si-Pie hit me. We will write a custom essay sample on Part Two Chapter VI or any similar topic only for you Order Now I was trying to tell the stupid cunt he’d got it wrong about Fairbrother.’ He and his father had been in the woodshed, filling the baskets that sat on either side of the wood-burner in the sitting room. Simon had hit Andrew around the head with a log, knocking him into the pile of wood, grazing his acne-covered cheek. D’you think you know more about what goes on than I do, you spotty little shit? If I hear you’ve breathed a word of what goes on in this house – I haven’t – I’ll fucking skin you alive, d’you hear me? How do you know Fairbrother wasn’t on the fiddle too, eh? And the other fucker was the only one dumb enough to get caught? And then, whether out of pride or defiance, or because his fantasies of easy money had taken too strong a hold on his imagination to become dislodged by facts, Simon had sent in his application forms. Humiliation, for which the whole family would surely pay, was a certainty. Sabotage. Andrew brooded on the word. He wanted to bring his father crashing down from the heights to which his dreams of easy money had raised him, and he wanted to do it, if at all possible (for he preferred glory without death), in such a way that Simon would never know whose manoeuvrings had brought his ambitions to rubble. He confided in nobody, not even Fats. He told Fats nearly everything, but the few omissions were the vast topics, the ones that occupied nearly all his interior space. It was one thing to sit in Fats’ room with hard-ons and look up ‘girl-on-girl action’ on the internet: quite another to confess how obsessively he pondered ways of engaging Gaia Bawden in conversation. Likewise, it was easy to sit in the Cubby Hole and call his father a cunt, but never would he have told how Simon’s rages turned his hands cold and his stomach queasy. But then came the hour that changed everything. It started with nothing more than a yearning for nicotine and beauty. The rain had passed off at last, and the pale spring sun shone brightly on the fish-scale dirt on the school-bus windows as it jerked and lurched through the narrow streets of Pagford. Andrew was sitting near the back, unable to see Gaia, who was hemmed in at the front by Sukhvinder and the fatherless Fairbrother girls, newly returned to school. He had barely seen Gaia all day and faced a barren evening with only stale Facebook pictures to console him. As the bus approached Hope Street, it struck Andrew that neither of his parents was at home to notice his absence. Three cigarettes that Fats had given him resided in his inside pocket; and Gaia was getting up, holding tightly to the bar on the back of the seat, readying herself to descend, still talking to Sukhvinder Jawanda. Why not? Why not? So he got up too, swung his bag over his shoulder, and when the bus stopped walked briskly up the aisle after the two girls as they got out. ‘See you at home,’ he threw out to a startled Paul as he passed. He reached the sunny pavement and the bus rumbled away. Lighting up, he watched Gaia and Sukhvinder over the top of his cupped hands. They were not heading towards Gaia’s house in Hope Street, but ambling up towards the Square. Smoking and scowling slightly in unconscious imitation of the most unself-conscious person he knew – Fats – Andrew followed them, his eyes feasting on Gaia’s copper-brown hair as it bounced on her shoulder blades, the swing of her skirt as her hips swayed beneath it. The two girls slowed down as they approached the Square, advancing towards Mollison and Lowe, which had the most impressive fa;ade of them all: blue and gold lettering across the front and four hanging baskets. Andrew hung back. The girls paused to examine a small white sign pasted to the window of the new cafe, then disappeared into the delicatessen. Andrew walked once around the Square, past the Black Canon and the George Hotel, and stopped at the sign. It was a hand-lettered advertisement for weekend staff. Hyperconscious of his acne, which was particularly virulent at the moment, he knocked out the end of his cigarette, put the long stub back into his pocket and followed Gaia and Sukhvinder inside. The girls were standing beside a little table piled high with boxed oatcakes and crackers, watching the enormous man in the deerstalker behind the counter talking to an elderly customer. Gaia looked around when the bell over the door tinkled. ‘Hi,’ Andrew said, his mouth dry. ‘Hi,’ she replied. Blinded by his own daring, Andrew walked nearer, and the school bag over his shoulder bumped into the revolving stand of guides to Pagford and Traditional West Country Cooking. He seized the stand and steadied it, then hastily lowered his bag. ‘You after a job?’ Gaia asked him quietly, in her miraculous London accent. ‘Yeah,’ he said. ‘You?’ She nodded. ‘Flag it up on the suggestion page, Eddie,’ Howard was booming at the customer. ‘Post it on the website, and I’ll get it on the agenda for you. Pagford Parish Council – all one word – dot co, dot UK, slash, Suggestion Page. Or follow the link. Pagford †¦Ã¢â‚¬â„¢ He reiterated slowly, as the man pulled out paper and a pen with a quivering hand ‘†¦ Parish †¦Ã¢â‚¬â„¢ Howard’s eyes flicked over the three teenagers waiting quietly beside the savoury biscuits. They were wearing the half-hearted uniform of Winterdown, which permitted so much laxity and variation that it was barely a uniform at all (unlike that of St Anne’s, which comprised a neat tartan skirt and a blazer). For all that, the white girl was stunning; a precision-cut diamond set off by the plain Jawanda daughter, whose name Howard did not know, and a mouse-haired boy with violently erupted skin. You read "Part Two Chapter VI" in category "Essay examples" The customer creaked out of the shop, the bell tinkled. ‘Can I help you?’ Howard asked, his eyes on Gaia. ‘Yeah,’ she said, moving forwards. ‘Um. About the jobs.’ She pointed at the small sign in the window. ‘Ah, yes,’ said Howard, beaming. His new weekend waiter had let him down a few days previously; thrown over the cafe for Yarvil and a supermarket job. ‘Yes, yes. Fancy waitressing, do you? We’re offering minimum wage – nine to half-past five, Saturdays – twelve to half-past five, Sundays. Opening two weeks from today; training provided. How old are you, my love?’ She was perfect, perfect, exactly what he had been imagining: fresh-faced and curvy; he could just imagine her in a figure-hugging black dress with a lace-edged white apron. He would teach her to use the till, and show her around the stockroom; there would be a bit of banter, and perhaps a little bonus on days when the takings were up. Howard sidled out from behind the counter and, ignoring Sukhvinder and Andrew, took Gaia by the upper arm, and led her through the arch in the dividing wall. There were no tables and chairs there yet, but the counter had been installed and so had a tiled black and cream mural on the wall behind it, which showed the Square in Yesteryear. Crinolined women and men in top hats swarmed everywhere; a brougham carriage had drawn up outside a clearly marked Mollison and Lowe, and beside it was the little cafe, The Copper Kettle. The artist had improvised an ornamental pump instead of the war memorial. Andrew and Sukhvinder were left behind, awkward and vaguely antagonistic to each other. ‘Yes? Can I help you?’ A stooping woman with a jet-black bouffant had emerged from out of a back room. Andrew and Sukhvinder muttered that they were waiting, and then Howard and Gaia reappeared in the archway. When he saw Maureen, Howard dropped Gaia’s arm, which he had been holding absent-mindedly while he explained to her what a waitress’s duties would be. ‘I might have found us some more help for the Kettle, Mo,’ he said. ‘Oh, yes?’ said Maureen, switching her hungry gaze to Gaia. ‘Have you got experience?’ But Howard boomed over her, telling Gaia all about the delicatessen and how he liked to think it was a bit of a Pagford institution, a bit of a landmark. ‘Thirty-five years, it’s been,’ said Howard, with a majestic disdain of his own mural. ‘The young lady’s new to town, Mo,’ he added. ‘And you two are after jobs as well, are you?’ Maureen asked Sukhvinder and Andrew. Sukhvinder shook her head; Andrew made an equivocal movement with his shoulders; but Gaia said, with her eyes on the girl, ‘Go on. You said you might.’ Howard considered Sukhvinder, who would most certainly not appear to advantage in a tight black dress and frilly apron; but his fertile and flexible mind was firing in all directions. A compliment to her father – something of a hold over her mother – an unasked favour granted; there were matters beyond the purely aesthetic that ought, perhaps, to be considered here. ‘Well, if we get the business we’re expecting, we could probably do with two,’ he said, scratching his chins with his eyes on Sukhvinder, who had blushed unattractively. ‘I don’t †¦Ã¢â‚¬â„¢ she said, but Gaia urged her. ‘Go on. Together.’ Sukhvinder was flushed, and her eyes were watering. ‘I †¦Ã¢â‚¬â„¢ ‘Go on,’ whispered Gaia. ‘I †¦ all right.’ ‘We’ll give you a trial, then, Miss Jawanda,’ said Howard. Doused in fear, Sukhvinder could hardly breathe. What would her mother say? ‘And I suppose you’re wanting to be potboy, are you?’ Howard boomed at Andrew. Potboy? ‘It’s heavy lifting we need, my friend,’ said Howard, while Andrew blinked at him nonplussed: he had only read the large type at the top of the sign. ‘Pallets into the stockroom, crates of milk up from the cellar and rubbish bagged up at the back. Proper manual labour. Do you think you can handle that?’ ‘Yeah,’ said Andrew. Would he be there when Gaia was there? That was all that mattered. ‘We’ll need you early. Eight o’clock, probably. We’ll say eight till three, and see how it goes. Trial period of two weeks.’ ‘Yeah, fine,’ said Andrew. ‘What’s your name?’ When Howard heard it, he raised his eyebrows. ‘Is your father Simon? Simon Price?’ ‘Yeah.’ Andrew was unnerved. Nobody knew who his father was, usually. Howard told the two girls to come back on Sunday afternoon, when the till was to be delivered, and he would be at liberty to instruct them; then, though he showed an inclination to keep Gaia in conversation, a customer entered, and the teenagers took their chance to slip outside. Andrew could think of nothing to say once they found themselves on the other side of the tinkling glass door; but before he could marshal his thoughts, Gaia threw him a careless ‘bye’, and walked away with Sukhvinder. Andrew lit up the second of Fats’ three fags (this was no time for a half-smoked stub), which gave him an excuse to remain stationary while he watched her walk away into the lengthening shadows. ‘Why do they call him â€Å"Peanut†, that boy?’ Gaia asked Sukhvinder, once they were out of earshot of Andrew. ‘He’s allergic,’ said Sukhvinder. She was horrified at the prospect of telling Parminder what she had done. Her voice sounded like somebody else’s. ‘He nearly died at St Thomas’s; somebody gave him one hidden in a marshmallow.’ ‘Oh,’ said Gaia. ‘I thought it might be because he had a tiny dick.’ She laughed, and so did Sukhvinder, forcing herself, as though jokes about penises were all she heard, day in, day out. Andrew saw them both glance back at him as they laughed, and knew that they were talking about him. The giggling might be a hopeful sign; he knew that much about girls, anyway. Grinning at nothing but the cooling air, he walked off, school bag over his shoulder, cigarette in his hand, across the Square towards Church Row, and thence to forty minutes of steep climbing up out of town to Hilltop House. The hedgerows were ghostly pale with white blossom in the dusk, blackthorn blooming on either side of him, celandine fringing the lane with tiny, glossy heart-shaped leaves. The smell of the flowers, the deep pleasure of the cigarette and the promise of weekends with Gaia; everything blended together into a glorious symphony of elation and beauty as Andrew puffed up the hill. The next time Simon said ‘got a job, Pizza Face?’ he would be able to say ‘yes’. He was going to be Gaia Bawden’s weekend workmate. And, to cap it all, he knew at last exactly how he might plunge an anonymous dagger straight between his father’s shoulder blades. How to cite Part Two Chapter VI, Essay examples

Tuesday, April 28, 2020

Pepsi Supply Chain Essay Example

Pepsi Supply Chain Essay Supply Chain Management Adel Abou Heneidy Learning objectives To develop understanding of the following key areas and their interrelationships: * Basic concepts of logistics and supply chain management * The strategic role of a supply chain * The key strategic drivers of supply chain performance * Analytic methodologies for supply chain analysis 2 Supply Chain Management Adel Abou Heneidy Highlights: †¢ †¢ †¢ †¢ †¢ †¢ †¢ Understanding the Supply Chain Supply Chain performance: achieving strategic fit and scope Supply Chain Drivers and obstacles Designing the distribution network in a Supply Chain Network Design in the Supply Chain Network design in uncertainty environment Total cost of SCM Aggregate planning in Supply Chain References: References: th Introduction to materials management: J. R Tony Arnold ; ;Stephen N. Chapman ––55thedition edition Introduction to materials management: J. R Tony Arnold Stephen N. Chapman Supply Chain-Logistics management: Donald J. Bowersox; David J. Closs; M. Bixby Cooper Supply Chain-Logistics management: Donald J. Bowersox; David J. Closs; M. Bixby Cooper Strategic logistics management: Lambert Stock Strategic logistics management: Lambert Stock Operations management: Stevenson Operations management: Stevenson Supply Chain Management: Sunil Chopra Peter Meindl Supply Chain Management: Sunil Chopra Peter Meindl Supply Chain Management 3 Chapter 1 Understanding the Supply Chain 4 Supply Chain Management Adel Abou Heneidy Supply-chain is a term that describes how organizations (suppliers, manufacturers, distributors, and customers) are linked together †¢ What is Supply Chain (Value) Management? â€Å" SCM is a set of approaches utilized to efficiently integrate suppliers, manufacturers, warehouses, and stores, so that merchandise is produced and distributed at the right quantities, to the right locations, and at the right time, in order to minimize systemwide costs while satisfying service level requirements†. Supply Chain Management Adel Abou Heneidy 5 Another definition of SCM design, planning, execution, control, and monitoring of supply chain activities with the objective of creating net value, building a competitive infrastructure, leveraging worldwide logistics, synchronizing supply with demand, and measuring performance globally. â€Å" As per APICS Dictionary Supply Chain Management Adel Abou Heneidy 6 The Chain from Original Supply to Final Consumption INFORMATION FLOW Transfer T ransfer Transfer Transfer Transfer Transfer Transfer Transfer Supplier Manufacturing Distribution Retail Outlet Consumer CASH FLOW Supply Chain Optimization We will write a custom essay sample on Pepsi Supply Chain specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Pepsi Supply Chain specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Pepsi Supply Chain specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Highest level of customer responsiveness at lowest cost Forward Supply Chain –Supply by customer ends Chain Management ? SAP AG 1998 CPSAP_e February ‘98 /13 7 Adel Abou Heneidy What’s the Supply Chain IT Logistics Supply Chain Management Supply Chain Management Adel Abou Heneidy 8 Main Functions and Activities in SC †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ Forecasting Purchasing Inventory management Information management Quality assurance Scheduling Production and delivery Customer service Supply Chain Management Adel Abou Heneidy 9 Difference between SCM Logistics In definition, Logistics usually refers to interface activities that occur in a single organization and typically include processes such as procurement, inventory, storage and distribution. †¢ Supply chain management (SCM) is the process of planning, implementing, and controlling the operations of the supply chain as efficiently as possible. Supply Chain Management spans a ll movement and storage of raw materials, work-inprocess inventory, and finished goods from point-of-origin to point-of-consumption †¢ I would say logistics is just a part of supply chain Supply Chain Management Adel Abou Heneidy 10 The Logistics/SCM Mission †¢ Getting the right goods or services to the right place, at the right time, and in the desired condition at the lowest cost and highest return on investment. Supply Chain Management Adel Abou Heneidy 11 The concept of Logistics †¢ The concept of logistics covers all activities relating to procurement, transport, and storage of goods to, from, and between members of a supply chain. It includes: – Order processing – Pick pack – Shipping Transport – Customs clearance (and documentation) – Distribution – Warehousing inventory management – Reverse logistics (Returns anagement) Supply Chain Management Adel Abou Heneidy 12 Reverse Logistics †¢ Reverse logistics – the backward flow of goods returned to the supply chain †¢ Reverse logistics is the process of moving goods from their typical final destination for the purpose of capturing value, or proper disposal. †¢ Processing return ed goods – Sorting, examining/testing, restocking, repairing – Reconditioning, recycling, disposing †¢ Gate keeping – screening goods to prevent incorrect acceptance of goods †¢ Avoidance – finding ways to minimize the number of items that are returned Supply Chain Management Adel Abou Heneidy 13 Closed-Loop Supply Chain †¢ Closed-loop SC includes traditional forward supply chain activities, and the additional activities of reverse SC. †¢ These activities include: 1) Product acquisition to obtain products from the end-users. 2) Reverse logistics to move the product from points of use to points of disposition. 3) Refurbishing 4) Recycling Supply Chain Management Adel Abou Heneidy 14 Traditional Scope of the Supply Chain Business logistics Physical supply (Materials management) Sources of supply Plants/ operations †¢ Transportation †¢ Inventory management †¢ Order processing †¢ Acquisition †¢ Protective packaging †¢ Warehousing †¢ Materials handling †¢ Information management Physical distribution Customers †¢ Transportation †¢ Inventory management †¢ Order processing †¢ Product scheduling †¢ Protective packaging †¢ Warehousing †¢ Materials handling †¢ Information management Internal supply chain 15 Supply Chain Management Problems Supply chain management must address the following problems: †¢ Distribution Network Configuration †¢ Distribution Strategy †¢ Information †¢ Inventory Management †¢ Trade-Offs in Logistical Activities †¢ Cash-Flow Supply Chain Management Adel Abou Heneidy 16 The Importance of SCM †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ Millions of dollars at stake! Excess Inventory costs Excess freight charges Lost sales / Stock outages Wasted time and energy Extra staff Listings / Delistings Customer dissatisfaction Capital costs Real Estate Costs Supply Chain Management Adel Abou Heneidy 17 Benefits of Supply Chain Management †¢ †¢ †¢ †¢ †¢ †¢ Lower inventories Higher productivity Greater agility Shorter lead times Higher profits Greater customer loyalty Integrates separate organizations into a cohesive operating system Supply Chain Management Adel Abou Heneidy 18 SCM Decision Variables †¢ â₠¬ ¢ †¢ †¢ †¢ †¢ †¢ Number and location of facilities Number and location of suppliers Number and location of warehouses Product stocking locations Modes of transportation Communications network configuration Information system configuration Supply Chain Management Adel Abou Heneidy 19 Key SCM Issues †¢ Distribution network design Determine plant and warehouse locations, capacities, and production/storage levels †¢ Inventory Control – The purpose of inventory is to avoid interrupting a supply process, be it production or end customer demand – How can we avoid such disruptions at the minimum total cost? – Must rely on forecasts Supply Chain Management Adel Abou Heneidy 20 Key SCM Issues †¢ Distribution strategy – Where to hold inventory and how to efficiently transport it to customers? †¢ Ship directly from plant to customers in full truckloads? †¢ Maintain stocks in regional warehouses and distribute locall y? Integration and strategic partnerships – How involved should a firm be with suppliers of both materials and services? – What level of information sharing is appropriate? Supply Chain Management Adel Abou Heneidy 21 Key SCM Issues †¢ Product design issues – Tradeoffs between design changes and logistics savings? – Can design strategies buffer against demand uncertainties? †¢ Information technology – What significant data is critical for sharing with partners? – What is the role of the Internet/e-Commerce in all of this? †¢ Customer value – How does SCM contribute to customer value? Supply Chain Management Adel Abou Heneidy 22 Supply Chain Uncertainty †¢ †¢ †¢ †¢ †¢ †¢ †¢ Poor forecasts Production problems Late deliveries Poor quality Canceled orders Erroneous information Political uncertainty Supply Chain Management Adel Abou Heneidy 23 Conflicting SCM Objectives †¢ Manufacturing and Transportation – Desire economies of scale – Long production runs – Full truckload shipments †¢ Marketing and Sales – Desire flexibility and product variety – Increased inventory for better service †¢ Trade-off s – Service levels – Inventory levels Supply Chain Management Adel Abou Heneidy 24 SCM Features †¢ Multiple entities – Geographically diverse – Different ownership †¢ Conflicting objectives †¢ Random demands †¢ Distributed inventory †¢ Lead times – Manufacturing – Distribution †¢ Different information Supply Chain Management Adel Abou Heneidy 25 The value the SC generates †¢ The objective of SC is to maximize the overall value generated. †¢ The value a supply chain generates is the difference between what the final product is worth to the customer and the effort the SC expends in filling the customer’s request. SC profitability is the total profit to be shared across all SC stages. †¢ SC success should be measured in terms of SC profitability and not in terms of the profit at an individual stage Supply Chain Management Adel Abou Heneidy 26 Elements of Supply Chain Management Element Customers Forecasting Design Processing Inventory Purchasing Suppliers Location Logistics Typical Issues Determining what customers want Predicting quantity and timing of demand Incorporating customer wants, mfg. and time Controlling quality, scheduling work Meeting demand while managing inventory costs Evaluating suppliers and supporting operations Monitoring supplier quality, delivery, and relations Determining location of facilities Deciding how to best move and store materials Supply Chain Management Adel Abou Heneidy 27 Effective Supply Chain †¢ Requires linking the market, distribution channels processes, and suppliers †¢ Supply chain should enable members to: – Share forecasts – Determine the status of orders in real time – Access inventory data of partners Supply Chain Management Adel Abou Heneidy 28 Successful Supply Chain Trust among trading partners †¢ Effective communications †¢ Supply chain visibility †¢ Event-management capability – The ability to detect and respond to unplan ned events †¢ Performance metrics (KPIs) Supply Chain Management Adel Abou Heneidy 29 Decision phases in a Supply Chain †¢ Supply Chain decision phases may be categorized as: 1) SC strategy or design structure of SC over the next several years How resources will be allocated locations / capacities Modes of transportation will be used 2) SC planning Forecasting for the coming periods Which markets will be supplied from which locations ? Inventory policies,†¦ 3) SC operation How the day to day business will be handled ? Supply Chain Management Adel Abou Heneidy 30 Process view of a Supply Chain †¢ A Supply Chain is a sequence of processes and flows that takes place within and between different stages and combine to fill a customer need for a product. There are two different ways to view the processes performed in SC: †¢ 1) Cycle view: Customer order cycle Replenishment cycle Manufacturing cycle Procurement cycle Supply Chain Management Adel Abou Hen eidy 31 Process view of a Supply Chain Customer order cycle: It occurs at the customer / retailer interface Customer arrival Customer order receiving Customer order entry Customer order fulfillment Supply Chain Management Adel Abou Heneidy 32 Process view of a Supply Chain Replenishment cycle: It occurs at the retailer / distributor interface Retail order trigger Retail order receiving Retail order entry Retail order fulfillment Supply Chain Management Adel Abou Heneidy 33 Process view of a Supply Chain Manufacturing cycle: It occurs at the distributor / manufacturer interface Order arrival Receiving Production scheduling Manufacturing shipping Supply Chain Management Adel Abou Heneidy 34 Process view of a Supply Chain Procurement cycle: It occurs at the manufacturer / supplier interface Order based on manufacturer’s Production schedule or supplier stocking needs Receiving at manufacturer Supplier production scheduling Component manufacturing and shipping Supply Chain Management Adel Abou Heneidy 35 Process view of a Supply Chain 2) Push / Pull view: Pull processes are initiated by a customer order. Push processes are initiated and performed in anticipation of customer orders (forecasted). Customer order cycle Customer order manufacturing cycle PULL Customer order arrives Procurement cycle Procurement, manufacturing, replenishment cycles Supply Chain Management Adel Abou Heneidy PUSH L. L Beans SC Dell SC 36 Supply Chain macro processes in a firm SRM Supplier relationship management Source Negotiate Buy Design collaboration Supply collaboration ISCM Internal supply chain management Strategic planning Demand planning Supply planning Fulfillment Field service CRM Customer relationship management Market Sell Call center Order management Supply Chain Management Adel Abou Heneidy 37 Key points: †¢ A cycle view of the SC clearly defines the processes involved and the owners of each process. It specifies the roles and responsibilities of each member of SC and the desired outcomes for each process. †¢ A push / pull view of the SC categorizes processes based on whether they are initiated in response to a customer order (Pull), or in anticipation of a customer order (Push). This view is very useful when considering strategic decisions relating to SC. †¢ Within a firm, all SC activities belong to one of three macro processes: CRM ISCM SRM Integration between the three macro processes is crucial for successful SC. Supply Chain Management Adel Abou Heneidy 38 Chapter 2 Supply Chain Performance: Achieving strategic fit and scope Supply Chain Management Adel Abou Heneidy 39 Competitive and Supply Chain Strategies †¢ Competitive strategy: defines the set of customer needs a firm seeks to satisfy through its products and services †¢ Product development strategy: specifies the portfolio of new products that the company will try to develop †¢ Marketing and sales strategy: specifies how the market will be segmented and product positioned, priced, and promoted Supply Chain Management Adel Abou Heneidy 40 Competitive and Supply Chain Strategies †¢ Supply chain strategy: – determines the nature of material procurement, transportation of materials, manufacture of product or creation of service, distribution of product – In other words, it addresses your warehouse or distribution center network, inventory stocking strategy, facility layout and processes, staffing, technology, systems and related costs is critical to maintaining a competitive advantage. – Consistency and support between supply chain strategy, competitive strategy, and other functional strategies is important Supply Chain Management Adel Abou Heneidy 41 The Value Chain: Linking Supply Chain and Business Strategy Business Strategy New Product Marketing Strategy Strategy Supply Chain Strategy New Product Development Marketing and Operations Distribution Sales Service Supply Chain Management Adel Abou Heneidy 42 Framework for Supply Chain Strategy Business Objectives Supply Chain Objectives Business Strategy Supply Chain Strategy Management Processes Supply Chain Processes Importance to Top Management Focus of Top Management Supply Chain Management Adel Abou Heneidy 43 Aligning Supply Chain Strategy with Business Strategy Business Objectives Supply Chain Objectives Business Strategy Supply Chain Strategy Supply Chain Processes Management Processes Importance to Top Management Focus of Top Management Supply Chain Management Adel Abou Heneidy 44 Value Chain Analysis †¢ †¢ †¢ Value Chain Analysis describes the activities that take place in a business and relates them to an analysis of the competitive strength of the business. Primary Activities those that are directly concerned with creating and delivering a product (e. g. component assembly). Support Activities, which whilst they are not directly involved in production, may increase effectiveness or efficiency (e. g. uman resource management). It is rare for a business to undertake all primary and support activities. Value Chain Analysis is one way of identifying which activities are best undertaken by a business and which are best provided by others (out sourced). †¢ Supply Chain Management Adel Abou Heneidy 45 Competitive Strategies Competitive Strategies Competitive Advant age Lower Cost Differentiation Broad Target Competitive Scope Narrow Target Cost Leadership Differentiation Cost Focus Focused Differentiation Supply Chain Management Adel Abou Heneidy 46 Strategies, Forces, and Tactics in Competitive Markets Cost leadership †¢ based on efficient operations †¢ based on effective operations †¢ economies of scale – become a low cost producer – market segmentation (niche) – Focused differentiation †¢ Market niche – Cost focus †¢ narrow market low cost Supply Chain Management Adel Abou Heneidy 47 Value Chain with Typical Strategic IS Value Chain with Typical Strategic IS Mapped onto it Mapped onto it EDI-Based Purchasing System Inbound Logistics ComputerIntegrated Mftg. Operations Automated Ordering System Outbound Logistics Expert Systems for Salespeople Marketing and Sales Telemaintenance Expert Systems Service Upstream Chains of Suppliers Downstream Chains of Customers Supply Chain Management Adel Abou Heneidy 48 Steps in Value Chain Analysis †¢ Value chain analysis can be broken down into a three sequential steps: (1) Break down a market/organization into its key activities under each of the major headings in the model; (2) Assess the potential for adding value via cost advantage or differentiation, or identify current activities where a business appears to be at a competitive disadvantage; (3) Determine strategies built around focusing on activities where competitive advantage can be Supply Chain Management Adel Abou Heneidy 49 Achieving Strategic Fit †¢ Strategic fit: – Consistency between customer priorities of competitive strategy and supply chain capabilities specified by the supply chain strategy – Competitive and supply chain strategies have the same goals †¢ A company may fail because of a lack of strategic fit or because its processes and resources do not provide the capabilities to execute the desired strategy Supply Chain Management Adel Abou Heneidy 50 Steps in achieving strategic fit †¢ Step 1: Understanding the customer’s needs and supply chain uncertainty †¢ Step 2: Understanding the supply chain †¢ Step 3: Achieving strategic fit Supply Chain Management Adel Abou Heneidy 51 Understanding the Supply Chain: Cost-Responsiveness Efficient Frontier Responsiveness High A The SC of â€Å"A† has high responsiveness, but with high cost, which means with low efficiency. The SC of â€Å"B† has low B responsiveness, but with low cost, which means with high efficiency Low Cost High Supply Chain Management Adel Abou Heneidy Low 52 Step 1: Understanding the Customer and Supply Chain Uncertainty †¢ †¢ †¢ †¢ †¢ †¢ †¢ Identify the needs (attributes of demand) of the customer segment being served Quantity of product needed in each lot Response time customers will tolerate Variety of products needed Service level required Price of the product Desired rate of innovation in the product Supply Chain Management Adel Abou Heneidy 53 Step 1: Understanding the Customer and Supply Chain Uncertainty †¢ †¢ †¢ Overall attribute of customer demand Demand uncertainty: uncertainty of customer demand for a product Implied demand uncertainty: reflects uncertainty for the supply chain given the portion of the demand the supply chain must handle and attributes the customer desires Understand customers by mapping their demand on the implied uncertainty spectrum †¢ Supply Chain Management Adel Abou Heneidy 54 Achieving Strategic Fit †¢ Understanding the Customer – – – – – – Lot size Response time/ Lead time Service level Product variety Price (sensitivity to) Innovation Supply Chain Management Adel Abou Heneidy Implied Demand Uncertainty 55 Impact of Customer Needs on Implied Demand Uncertainty Customer Need Range of quantity increases Lead time decreases Variety of products required increases Number of channels increases Rate of innovation increases Required service level increases Causes implied demand uncertainty to increase because †¦ Wider range of quantity implies greater variance in demand Less time to react to orders Demand per product becomes more disaggregated Total customer demand is now disaggregated over more channels New products tend to have more uncertain demand Firm now has to handle unusual surges in demand Supply Chain Management Adel Abou Heneidy 56 Step 2: Understanding the Supply Chain †¢ How does the firm best meet demand? Dimension describing the supply chain is supply chain responsiveness †¢ Supply chain responsiveness ability to: – respond to wide ranges of quantities demanded – meet short lead times – handle a large variety of products – build highly innovative products – meet a very high service level Supply Chain Management Adel Abou Heneidy 57 Step 2: Understanding the Supply Chain †¢ There is a cost to achieving responsiveness †¢ Supply chain efficiency: cost of making an d delivering the product to the customer †¢ Increasing responsiveness results in higher costs that lower efficiency Supply Chain Management Adel Abou Heneidy 58 Step 3: Achieving Strategic Fit †¢ All functions in the value chain must support the competitive strategy to achieve strategic fit †¢ Two extremes: Efficient supply chains and responsive supply chains Supply Chain Management Adel Abou Heneidy 59 Achieving Strategic Fit Shown on the Uncertainty/Responsiveness Map Responsive supply chain Responsiveness spectrum of it e on gic F Z e t ra St Efficient supply chain Certain demand 60 Implied uncertainty spectrum Uncertain demand Comparison of Efficient and Responsive SC Efficient Primary goal Product design strategy Pricing strategy Mfg strategy Inventory strategy Lead time strategy Supplier selection strategy Transportation strategy Lowest cost Min product cost Lower margins High utilization Minimize inventory Reduce but not at expense of greater cost Cost and low quality Greater reliance on low cost modes Supply Chain Management Adel Abou Heneidy Responsive Quick response Modularity to allow postponement Higher margins Capacity flexibility Buffer inventory Aggressively reduce even if costs are significant Speed, flexibility, quality Greater reliance on responsive (fast) modes 61 Multiple Products and Customer Segments †¢ Firms sell different products to different customer segments (with different implied demand uncertainty) †¢ The supply chain has to be able to balance efficiency and responsiveness given its portfolio of products and customer segments †¢ Two approaches: – Different supply chains – Tailor supply chain to best meet the needs of each product’s demand Supply Chain Management Adel Abou Heneidy 62 Product Life Cycle The demand characteristics of a product and the needs of a customer segment change as a product goes through its life cycle †¢ Supply chain strategy must evolve throughout the life cycle †¢ Early: uncertain demand, high margins (time is important), product availability is most important, cost is secondary †¢ Late: predictable demand, lower margins, price is important Supply Chain Management Adel Abou Heneidy 63 Product Life Cycle †¢ As the product goes through the life cycle, the supply chain changes from one emphasizing responsiveness to one emphasizing efficiency Supply Chain Management Adel Abou Heneidy 64 Competitive Changes Over Time †¢ Competitive pressures can change over time †¢ More competitors may result in an increased emphasis on variety at a reasonable price †¢ Changes in technology can make it easier to offer a wide variety of products †¢ The supply chain must change to meet these changing competitive conditions Supply Chain Management Adel Abou Heneidy 65 Key points: †¢ To achieve a strategic fit, a company must: 1) Understand customers needs, the uncertainty of the SC, and to identify the implied uncertainty. ) Understand the SC’s capabilities in terms of â€Å"Efficiency† â€Å"Responsiveness† The key to strategic fit is ensuring the SC responsiveness is consistent with customer needs, supply capabilities, and the resulting implied uncertainty. When the scope of strategic fit is narrow, individual functions try to optimize their performance based on their own goals, which leads to: 1) Conflicting actions 2) Reducing SC surplus As the scope of strategic fit is enlarged to include the entire SC, actions are evaluated based on their impact on overall SC performance, which helps increase SC surplus. Supply Chain Management Adel Abou Heneidy 66 Chapter 3 Supply Chain Drivers and obstacles Supply Chain Management Adel Abou Heneidy 67 Drivers of Supply Chain Performance Drivers determine supply chain performance. For each driver, managers must make tradeoffs between efficiency (cost) and responsiveness. †¢ †¢ †¢ †¢ Inventory Transportation Facilities Information Drivers (4 enablers) of SC Price People Discuss ! Supply Chain Management Adel Abou Heneidy 68 Inventory All of the raw materials, work in process (WIP), and finished goods within the supply chain. Inventory policies can dramatically alter a supply chain’s efficiency and responsiveness. Why hold inventory? Unexpected changes in customer demand (always hard to predict, and uncertainty is growing) * Short product life cycles * Product proliferation (spreading) Supply Chain Management Adel Abou Heneidy 69 Why hold inventory? Unexpected changes in customer demand (always hard to predict, and uncertainty is growing) * Short product life cycles * Product proliferation (spreading) * Uncertain supply: Quantity / Quality / Costs / Delivery time What if there was no uncertainty in supply or demand—would it still be necessary to hold inventory? Supply Chain Management Adel Abou Heneidy 70 Inventory’s Impact Inventory can increase amount of demand that can be met by increasing product availability. Inventory can reduce costs by exploiting economies of scale in production, transportation, and purchasing. Inventory can be used to support a firm’s competitive strategy. More inventory increases responsiveness, less inventory increases efficiency (reduces cost). Inventory can significantly affect material flow/cycle/ throughput time. In other words: If you move your inventory faster, you don’t need as much inventory (inventory velocity) 71 Types of Inventory Needed †¢ Cycle Inventory – The average amount of inventory used to meet demand between replenishments. †¢ Seasonal Inventory – Inventory that is built up to meet predictable variation in demand. – Amount of seasonal inventory depends on how quickly and inexpensively a firm can change its rate of production. Supply Chain Management Adel Abou Heneidy 72 Types of Inventory †¢ Safety Inventory – Random, unpredictable, unexpected Inventory held to counter uncertainty in demand or supply (â€Å"just-in-case† inventory). †¢ Pipeline Inventory – Work-in process of transit †¢ Inventory held to do business. Supply Chain Management Adel Abou Heneidy 73 Transportation †¢ Modes and routes for moving inventory throughout the supply chain. Transportation’s Impact Transportation’s I mpact Faster transportation allows a supply chain to be more responsive but generally less efficient. Less than full truckloads allows a supply chain to be more responsive but generally less efficient. Transportation can be used to support a firm’s competitive strategy. Customers may demand and be willing to pay for a high level of responsiveness. Supply Chain Management Adel Abou Heneidy 74 Transportation Decisions Mode of transportation is the manner in which a product is moved (air, truck, rail, ship, pipeline, electronic). Each mode differs with respect to speed, size of shipments, cost, and flexibility. Routes are paths along which a product can be shipped. In house or outsource the transportation function. Many companies use third-party logistics providers (3PL) to perform some or all of their transportation activities Supply Chain Management Adel Abou Heneidy 75 Facilities †¢ Places within the supply chain where inventory is stored, assembled, or fabricated. †¢ Decisions on location, capacity, and flexibility of facilities have a significant impact on performance. †¢ †¢ †¢ †¢ †¢ †¢ Warehouses Factories Processing centers Distribution centers Retail outlets Offices Supply Chain Management Adel Abou Heneidy 76 Facilities Impact Facilities either store inventory between supply chain stages (warehouses, distribution centers, retailers) or transform inventory into another state (fabrication or assembly plants). Centralization of facilities uses economies of scale to increase supply chain efficiency (fewer locations and less inventory) usually at the expense of responsiveness (distance from customer). Supply Chain Management Adel Abou Heneidy 77 Facility Decisions Location. Centralize to gain economies of scale or decentralize to be more responsive. Other issues include quality and cost of workers, cost of facility, infrastructure, taxes (duties), quality of life, etc. Capacity. Excess capacity allows a company to be more responsive to changes in the level of demand, but at the expensive of efficiency. Manufacturing Methodology. Decisions between a product or functional focus, between flexible or dedicated capacity. Warehousing Methodology. Chose between SKU storage (stores all of one type of product together), Job lot storage (stores different products together to satisfy a particular customer or job), or cross-docking. Supply Chain Management Adel Abou Heneidy 78 †¢ How Toyota Honda use facilities decisions to be more responsive to their customers? 1) By opening manufacturing facilities in every major market that they enter to be near of the customers. ) Also, by opening local facilities they protect themselves from currency fluctuation and trade barriers. Supply Chain Management Adel Abou Heneidy 79 Information Data and analysis regarding inventory, transportation, facilities, and customers throughout the supply chain. It is potentially the biggest driver since it affects all the other drivers. Information’s Role †¢ †¢ †¢ †¢ Information connects various supply chain stages and allows them to coordinate activities. Information is crucial to the daily operations of each stage of the supply chain. An information system can enable a firm to get a high variety of customized products to customers rapidly. An information system can enable a firm to understand changing consumer needs more quickly Supply Chain Management Adel Abou Heneidy 80 Information Decision Components Push versus Pull. Push systems (like MRP) need information on anticipated demand to create production and purchasing schedules. Pull system (like JIT) need accurate and quick information on actual demand to move inventory and schedule production in the chain. Coordination and Information Sharing. How will the goal of maximizing supply chain profitability be achieved through the coordination of activities and sharing of appropriate information? Forecasting and Aggregate Planning. How will future demand and market conditions be forecast, and to what extent will collaborative forecasting be used? How will aggregate planning be used to meet forecasted demand and to what extent will it be shared throughout the supply chain? Enabling Technologies. Which information technologies will be used and integrated throughout the supply chain? lectronic data interchange (EDI), the Internet, enterprise resource planning (ERP) systems, supply chain management (SCM) software. 81 Major Obstacles to Achieving Fit †¢ SCM is big: – Variety of products and services – Spoiled/ demanding customers – Multiple owners (procurement, production, inventory, marketing) / multiple objectives – Globalization Local optimization and lack of global fit Supply Chain Management Adel Abou Heneidy 82 Major Obstacles to Achieving Fit †¢ Instability and Randomness: – Increasing product variety – Shrinking life cycle – Customer fragmentation Increasing implied uncertainty Supply Chain Management Adel Abou Heneidy 83 Major Obstacle / Chall