Saturday, December 28, 2019

Business Report Senior Accountant Working For Cape Tisbe...

1.0 Introduction I am a senior accountant working for Cape Tisbe International (CTI) and am writing this business report to the Board concerning the issue of a large amount of money ($4 million) that has been paid to a PNG government minister as â€Å"Consulting Fees† recently. In this report, I intend to identify the fact, the issues needed to be tackled regarding this payment, and then discuss the possible consequences derived from these â€Å"Consulting Fees†, subsequently I will offer some plausible recommendations in coping with this issue in a short and long-run global expansion, and lastly I would like to discusss the appropriate ways to handle business globally in the foreseeable future. 2.0 Background A year ago, CTI signed a contract for farm machinery, worth $25 million, with Papua New Guinea(PNG). Recently, however, when I was conducting the annual internal audit, I have discovered some financial issues associated with this signed contract. As soon as I found something wrong with the transaction records I communicated with George but his answer has not addressed my confusion and concerns. Soon after that I had a chat with my boss Gareth, and failed to gain a satisfied answer again. After the conversation with both of them, thus, I decided to dig it a bit further. Now I have discovered that the actual sales revenue of the contract was $21 million due to around $4 million that has been paid to a PNG government minister as â€Å"Consulting Fees†. Apparently, Geroge andShow MoreRelatedThe Issue Of A Great Amount Of Money $ 4 Million2269 Words   |  10 PagesIntroduction I am a senior accountant working for Cape Tisbe International (CTI) and am writing this business report concerning the issue of a great amount of money $4 million that has been paid to a PNG government minister as â€Å"Consulting Fees† recently. In this report, I would like to identify the fact , the issues needed to be tackled, and then discuss the possible consequences derived from those issues, subsequently I will offer some plausible solutions in tackling this issue in a long-runRead MoreI Am A Senior Accountant Working For Cape Tisbe International2423 Words   |  10 Pages I am a senior accountant working for Cape Tisbe International (CTI) and am writing this business report concerning the issue of a great amount of money ($4 million) that has been paid to a PNG government minister as â€Å"Consulting Fees† recently. In this report, I would like to identify the fact , the issues needed to be tackled regarding this payment, and then discuss the possible consequences derived from these â€Å"Consulting Fees†, subsequently I will offer some plausible solutions in coping with this

Thursday, December 19, 2019

Reinforcing Hit Rates With Utilization Of Customer...

Reinforcing Hit Rates with Utilization of Customer Stratification: A Review of the Literature By: William G. Castillo Introduction: Protect Controls Incorporated (PCI) is a privately owned power control building manufacturer located in Conroe, Texas and has been in business for over 40 years. Fiscal 2014 gross sales revenue figures were nearly $49 Million (USD) however the Vice President of Sales Operations has identified that the quotation-to-job (hit) rate has incrementally decreased since 2012. Unfortunately, no precise correlation has been made as to why the decrease however this literature review will present well-documented approaches and research in the fields of customer engagement, profitability modeling and customer†¦show more content†¦As the levels increase, the likelihood of the customer advocating the business’s product/service improves. Levels 3-5 are classified underneath the â€Å"engaged customer† and definitively, these types of customers actively promote the product/service and increase an organization’s opportunities for long-term growth and profit. Most importa ntly, how do we create engaged customers? The four key strategic elements to capture engagement are customer value proposition, brand, internal culture elements, and customer experience. (Alpert Roberts, 2010) The deliverance of a formidable value proposition and superior customer experience are the two propelling factors in determining customer engagement. Aligning these strategic elements with the organization’s brand and internal culture will have immense effects on engagement. First and foremost, an organization must retrieve informative customer insight to develop a distinguishable value proposition. Secondly, through brand advertising, effectively market the value proposition. Tertiary, with engaged employees within the organization, delivering upon the promise guaranteed by the value proposition must be adhered to. Lastly, fortify the cultural foundation to effectively deliver upon promises innate to the value proposition. (Alpert and Roberts, 2010) Customer engagemen t and core customers

Wednesday, December 11, 2019

Procrastination personal narratives Essay Example For Students

Procrastination personal narratives Essay Procrastination It is Monday morning and I have slept in, thanks to Thanksgiving. In fact, its twelve oclock and I am free for the afternoon. As usual, I sit in front of the television after I clean myself up, staring endlessly at the screen with my finger clicking on the remote. I realize that I have a draft due on Thursday, but I justify my procrastination with reasons like: there is still lots of time. Life is faster now, and people in the 00s are supposed to organize and plan in order to keep up; however, it seems to me that more people are procrastinating than ever before. When I ask people why they procrastinate, they often supply reasons like: this task wont take me a long time; the pressure makes me to work more efficiently; there were emergencies; and there were other important things. Some of these reasons sounds legitimate, but I think these reasons are just excuses for peoples fear of failure, fear of lost security, and need for pressure. Back high school, I had a friend, Eric, who dropped out of school because of bad grades. As his friend, I knew he was doing fine until the period of final exams. He was a smart and responsible person which laziness is not a factor of his bad grades. Eric could not pick up the books soon enough before the exam because he was afraid of failure. Since Erics older brothers had achieved excellence academic records and great careers, Eric parents expected him to follow his brothers foot step. As the result, Eric was afraid to try because he feared to fail his parents expectation. When he realized the problem, it was too late. It is two oclock in the morning. The computer is on, the coffee maker is cooking, and I am under a lot of stress. There isnt a lot of time left, I keep telling my self as I watch the blank piece of paper in front of me. I know I can do it, I keep encouraging my self while my mind generates zero ideas for my essay: which is due six hours from now. Everyone I know procrastinates, my friends, relatives, even people in government. Back in Taipei, the Mayor, Mayor Chen, delayed getting rid of gangs in the city. I am going to issue a policy that will eventually stop gangs from spreading in our community, promised Mayor Chen of Taipei during his election campaign. Mayor Chen won the election, but he didn*t do anything about the gangs for three years. He was afraid of success. If he got rid of the gangs, he would hurt the economy and if he hurt the economy, he would lose his job. Finally, pressure made him act. Mayor Chens dragnet operation has l successfully disintegrate Taiwans sinister gangs infiltration into Taiwans economy, and The successful dragnet operation will secure the Mayor Chens percentage of votes in the next months election, are the headlines in recent newspapers. This is a situation where I just start writing my term paper six hours before the date line. I was given two weeks time to complete the essay, but I could not put my mind on the assignment until I felt the stress from the time limitation pressure. I do have spare time and thoughts of writing the essay within the two weeks; however, the my tendency laziness won battle over the my sense of responsibility. I need pressure to get me working. No matter what anyone is or what anyone does, every now and then he will procrastinate. Procrastination is a tendency that substantially exists in the human nature. People can always fight procrastination with consistency or sense .u8aa634df96bae1e9bbb3fdec8aadfbde , .u8aa634df96bae1e9bbb3fdec8aadfbde .postImageUrl , .u8aa634df96bae1e9bbb3fdec8aadfbde .centered-text-area { min-height: 80px; position: relative; } .u8aa634df96bae1e9bbb3fdec8aadfbde , .u8aa634df96bae1e9bbb3fdec8aadfbde:hover , .u8aa634df96bae1e9bbb3fdec8aadfbde:visited , .u8aa634df96bae1e9bbb3fdec8aadfbde:active { border:0!important; } .u8aa634df96bae1e9bbb3fdec8aadfbde .clearfix:after { content: ""; display: table; clear: both; } .u8aa634df96bae1e9bbb3fdec8aadfbde { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u8aa634df96bae1e9bbb3fdec8aadfbde:active , .u8aa634df96bae1e9bbb3fdec8aadfbde:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u8aa634df96bae1e9bbb3fdec8aadfbde .centered-text-area { width: 100%; position: relative ; } .u8aa634df96bae1e9bbb3fdec8aadfbde .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u8aa634df96bae1e9bbb3fdec8aadfbde .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u8aa634df96bae1e9bbb3fdec8aadfbde .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u8aa634df96bae1e9bbb3fdec8aadfbde:hover .ctaButton { background-color: #34495E!important; } .u8aa634df96bae1e9bbb3fdec8aadfbde .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u8aa634df96bae1e9bbb3fdec8aadfbde .u8aa634df96bae1e9bbb3fdec8aadfbde-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u8aa634df96bae1e9bbb3fdec8aadfbde:after { content: ""; display: block; clear: both; } READ: Drug abuse Essayof responsibility but they will never win the battle. .

Wednesday, December 4, 2019

Networking Diagrams and Case Study Essay Example Essay Example

Networking Diagrams and Case Study Essay Example Paper Networking Diagrams and Case Study Essay Introduction Workstation – A computer or a dumb terminal that is connected to a network that inputs and outputs data and is often the ending point of a network, but not always. 2. IP Addresses – An IP Address is a multi-digit number assigned to each device in a network that uses the internet protocol (IP) to communicate. 3. Switch – A switch is a networking device that connects network devices. A switch is also commonly known as a network bridge that routes data at the data link layer (layer 2) of the OSI model. 4. Router – A router is a device that forwards data packets between computer networks. The router reads the address of the packet to determine where its final destination. Networking Diagrams and Case Study Essay Body Paragraphs 5. WAN/LAN – LAN is a network that connects computers in a smaller area such as a home. The difference between a LAN and a WAN are that a WAN is when two LAN’s are connected with a LEASED line that connects them. 6. Firewall – Can either be software or hardware-based and is used to help keep a network safe. Its main objective is to control the incoming and outgoing traffic as it analyzes the data packets and determining whether it should be allowed through or not. 7. Server/Proxy Server – operates on layer 7, 6, 3 of the OSI model 8. Star Network – One of the most common network topologies. A star network has one central switch/hub/computer, which sends messages to all the other connected nodes. 9. VPN – A Virtual Private Network is a secure network that can be accessed from anywhere. E.g. LJBC school portal network can be directly accessed from school and then if you enter your school username/password from home on the portal page you can al so access it. B) OSI layers: 1. Work Station – N/A 2. IP Address – Layer 3 Network Layer 3. Switch – Layer 2 Data Link Layer 4. Router – Layer 2 Data Link Layer and has access to layer 3 and 4 5. WAN/LAN – uses stuff that occurs on layers 1, 3, 4 and WAN also access layer 7 and 6. 6. Firewall – If it’s an application firewall it works on layer 7 and it has access to the network layer (layer 3) 7. Server/Proxy Server – As it can be software, it can work on the application layer (layer 7) and it also works on the transport layer (layer 4) 8. Star Network – uses stuff that occurs on layers 1, 3, 4 9. VPN – runs on the application layer (layer 7) and has access to the physical layer 2. 3. A) Possible Future needs DingoMobile: – Expanded Servers (Multiple Head/Smaller Offices). – Expansions – New Stores/Offices _ – New Workstations/Peripheral Device _ LAN – Currently, Dingo Mobile has a single store, and a head office. Each individual premise would require a network. The LAN network would allow this; we could connect all the workstations and various other devices (including servers for the Head Office). The LAN network is better described in part 2, basically being a physically connected network on each of the individual premises. Through doing this, we would be able to create a physically network that allows for an individual network, and then also allows the LAN network to interact with the other stores through the VPN. Justification – Taking into consideration the fact that most of DingoMobile’s stores will probably want to use more than one workstation, so creating a LAN network on each premise will cater for this, and then allow each of the connected workstations to also access the internet. The LAN will also allow each store to utilize other peripheral devices, such as printers, which I’d assume would be required for some activities on the premises. How LAN fulfils future needs – LAN’s are ‘relatively’ simple to set up, obviously they can utilize a ‘WLAN’ (Wireless LAN), if setup becomes a problem. The LAN will cater for any expansions each individual store/office requires; all that is needed is another cable to connect the workstation/peripheral into the LAN network. This also gives DingoMobile the reassurance that any required expansions to the network are basically a cable connection away. Considerations for the LAN – The LAN aspect of this network solution may not be as effective, if some premises find it difficult to run cables connecting all of their computers/peripherals together. This should be solved however if they can utilize a WLAN instead, however that is only a possible solution if they cannot run wires throughout the premises. _ VPN – Currently, Dingo Mobile has a single store, and a head office. They require a connection between each of the sto res/head office, allowing networking between each of the stores/head office. The VPN would allow this; we would connect each of the individual LANs to a Cable/DSL Model that would then allow connection to the internet and from that, access to the Dingo Mobile VPN. The VPN network is better described in part 2, basically being a private network utilizing public telecommunications (the internet). Through the VPN, we will be able to connect each of the store’s LANs together, allowing for wider-scale networking for the Dingo MobileCompany. Justification – Taking into consideration that Dingo Mobile desires a connection between the store and the head office, I’ve selected a VPN network to cater for this. The VPN will allow DingoMobile to create a ‘universal’ network, and allowing the potential future stores to be connected also. How VPN fulfils future needs –The VPN utilizes the internet, therefor it isn’t going to restrict the possible exp ansions that DingoMobile may require (being one of their future needs). If ever Dingo Mobile requires the sending of important data between head office/stores, the VPN will ensure that the data sent is encrypted, catering to the potential need for safety of transferred data. Considerations for the VPN –The VPN should operate fine, and should continue to do so into the future. Since the VPN is created using the internet, so obviously things such as bandwidth, speed etc., may become an issue. Measures however can be taken to speed up the VPN, so it isn’t a vital issue that needs to be worried about. _ 3b) Development Process – The existing system, from the information that I have been provided, basically includes no real networking (The information provided doesn’t indicate whether the store/office have actual networks setup individually, so I’m going to assume that they do not). Basically, DingoMobile want a networking solution to connect all of the ir store(s) and Head Office together, and I’ve explained the majority of this networking solution in the past two parts of this ‘report’. An overview of how the new system would be implemented, replacing the old system – 1. If any previous network is set up on the individual premises, I would recommend taking it apart, and starting from scratch to ensure that everything is following the new network solution. 2. Check that every workstation is clean from viruses/non-corrupted and doesn’t have data that the entire future network should have access to. 3. Set up all of the workstations/other required devices in both the store and Head Office. 4. Connect all of the devices in each premises to the router, and each router to the modem (Setting up the LAN). 5. Once both LAN networks have been established, ensure that both are also connected to the internet. 6. Now that all of the LAN networks have been set-up, it would just be a matter of creating the VPN and interconnecting the head-office and all of the stores. 7. Test the VPN to ensure that everything is working, and once this is finished. The network should be ready for use! Also set different privileges for different users, ensuring that not everybody has access to everything within the network. Also, I’m explaining a quick overview of the Business’s expansion; this includes how the network will expand. 1. Once the network has been setup for the Head Office and single store, it will then be in the state to expand upon if required. 2. Whenever a new peripheral device requires to be added into the network, it will be connected through the LAN of the premises that it is situated, then also from that will be connected to the VPN. 3. Whenever a new store is established, a similar LAN network will be created on the premises, and from there all of the software related set-up will take place that allows that LAN network to also access the DingoMobile VPN. 4. Whenever a new Office is established, it will follow the same steps as the store; however a server may also be included into the LAN setup. As you can see, it’s relatively simple for the Business to expand with the current Network Solution I have provided. 3c) Monitoring the Network – To ensure that the employees are utilizing the network for work purposes, and also to monitor what is being sent throughout the network/occurring throughout the network (including potentially malicious activity etc) is a necessity for DingoMobile. Below are some methods that can be used to monitor the network – 1. UserMonitoringSoftware–This will be a vital part of monitoring the network, the users may be inclined to utilize the network for activities that aren’t helping/causing troubles for DingoMobile, so installing software that monitors all of the employees activity (to an extent that doesn’t conflict with personal privacy) would be one way to monitor the network. 2. Use rs/Groups – It’s recommended that the users/groups of the network is monitored regularly, due to potential ‘hackers’ gaining access into the VPN and assigning their new user all of the permissions, becoming a security problem for your network. 3. FilteringcertainURL/emails – This will allow you to hopefully avoid malicious files/sites being accessed through the network. 4. Enabling Firewalls (Monitoring the Web Access at Firewalls) – This builds onto the filtering URL/certain emails/files that are sent or accessed throughout the network. It allows you to monitor exactly what is being filtered, and keep track of related activity. EvaluatingtheNetworkSystem –Methods must be utilized to also evaluate the health, speed and general performance etc. of the network, these methods will be used to evaluate the network system in periodical intervals, indicating to the business when and where maintenance must occur on the network system. 1. Bench marking – Certain programs can be used to compare the network against others in terms of performance. This would be a good indication to how DingoMobile’s network compares to other, similar networks. 2. CheckingtheNetworkUsage – There are tools that the administrators can use, such as the ping function, to measure the network usage, and also the Round Trip Time. This can be a good indication to how the network is performing. 3. Reading through related Error Logs – Reading the error logs relevant to the network will enable the reader to detect any issues, big or small, that may be occurring within the network. Checking this periodically will hopefully enable Dingo Mobile to pick up any problems occurring within the network. 4. Testing the Speed of the Network – Sending files from one premise to the other using the VPN aspect of the network can be used to test the speed of the network, and this can then highlight if there is any issues such as packet -loss that are occurring, and hopefully allows DingoMobile to then find and solve these problems. We will write a custom essay sample on Networking Diagrams and Case Study Essay Example specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Networking Diagrams and Case Study Essay Example specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Networking Diagrams and Case Study Essay Example specifically for you FOR ONLY $16.38 $13.9/page Hire Writer