Monday, December 23, 2019

Finance Minicase - 1062 Words

MINI CASE For your job as the business reporter for a local newspaper, you are asked to put together a series of articles on multinational finance and the international currency markets for your readers. Much recent local press coverage has been given to losses in the foreign exchange markets by JGAR, a local firm that is the subsidiary of Daedlufetarg, a large German manufacturing firm. Your editor would like you to address several specific questions dealing with multinational finance. Prepare a response to the following memorandum from your editor: To: Business Reporter From: Perry White, Editor, Daily Planet Re: Upcoming Series on Multinational Finance In your upcoming series on multinational finance, I would like†¦show more content†¦The indirect quote indicates the number of units of a foreign currency that can be bought for one unit of the home currency. Indirect quote = foreign currency / home currency |Contract |S/ foreign | |Spot |.8450 | |30 days |.8415 | |90 days |.8390 | |Indirect quote |[pic] |$ | |Spot |[pic] = |1.1834 | |Forward | | | |30 days |[pic] = |1.1883 | |90 days |[pic]= |1.1918 | h. You own $10,000. The dollar rate in Tokyo is 216.6752. The yen rate in New York is given in the preceding table. Are arbitrage profits possible? Set up an arbitrage scheme with your capital. What is the gain (loss) in dollars? Data ââ€" ª $10,000 dollars ââ€" ª Dollar rate in Tokyo is $216.6752 yen per dollar ââ€" ª Yen rate inShow MoreRelatedMr. Old Alfred Road763 Words   |  4 PagesMr. Old Alfred Road Page 1 Mr. Old Alfred Road Minicase Leek-Nunoo November 3, 2012 Mr. Old Alfred Road Page2 Abstract Old Alfred Road, who is well-known to drivers on the Maine Turn-pike, has reached his seventieth birthday and is ready to retire. Mr. Road has no formal training in finance but has saved his money and invested carefully. Mr. Road owns his home—the mortgage is paid off—and does not want to move. He is a widower, and he wants to bequeath the house and any remainingRead MoreStrategic Human Resource Practices2550 Words   |  10 Pageskind of business strategy. If the business is to be successful, or Strategic, human resources professionals will have to be the ones that must recognize the business of their organization and also communicate the language of both the finance and business finance. Whenever this is done right, human resources professionals will have the knowledge to establish a strategy together and then make arrangements consistent with business needs. Moreover, some of strategy is the capability to acquire buyRead MoreInformation Technology Project Management ,31215 Words   |  125 PagesWrite a one- to two-page paper summarizing who the key stakeholders were for the project and how they influenced the outcome. 5. Write a one- to two-page summary of an article about the importance of top management support for project success. MINICASE You have been part of your company’s Information Technology Department for three years. You have learned a lot about the company and about many new technologies in your latest assignment—developing applications for your corporate intranet. SinceRead MoreInvestment Chapter 11 Answer3404 Words   |  14 Pagesto find a bond issue with approximately 10 years until maturity (as of January, 2007) for Bear Stearns. Luckily, Bear Stearns has quite a few outstanding bond issues to choose from, and we can access the information on these issues on the Yahoo! Finance page. Go to http://finance.yahoo.com/ and start by clicking on â€Å"Investing† and then â€Å"Bonds† as shown to the right: Then enter Bear Stearns in the â€Å"Bond Lookup† box and click on â€Å"Search† as shown below: You’ll be presented with a list of BearRead MoreImpacts of Information Technology on Individuals, Organizations and Societies21097 Words   |  85 PagesManagerial Issues Discuss the impacts of information technology on the quality of life and interpersonal relationships. Recognize the legal, ethical, and moral issues that become particularly critical due to proliferation of information technology. Minicases: 1. Megachurches 2. RFID for Consumer Products Integrating IT ACC FIN MKT POM HRM IS SVC 663 MOVIE PIRACY The Problem Generations of moviegoers went to movie theaters to enjoy the latest films. They accepted the idea of paying for theirRead MoreProject Managemant29326 Words   |  118 Pagesdeveloping a method for measuring the true benefits of ResNet before making major financial investments in new reservations systems. This project cost about $500,000. The ResNet Phase I project, also called ResNet 1995, was approved by NWA’s finance committee in November of 1994. This project involved installing personal computers in the call centers in Baltimore and Tampa and the international portion of the Minneapolis/St. Paul reservations offices. It also involved developing ResNet softwareRead MoreSolution Manual, Test Bank and Instructor Manuals34836 Words   |  140 Pages7th Edition International Student Version_Ken Black (SM+TB +Cases) Applied Calculus, 6th Edition_Geoffrey C. Berresford, Andrew M. Rockett (TB) Applied Calculus, Brief, 6th Edition_Geoffrey C. Berresford, Andrew M. Rockett (TB) Applied Corporate Finance, 3rd Edition_Aswath Damodaran (SM+Instructor Manuals + Derivatives and Discussions) Applied Management Science Modeling, Spreadsheet Analysis, and Communication for Decision Making, 2nd Edition_John A. Lawrence, Barry A. Pasternack (SM+TB) AppliedRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 PagesCourse: MBA−10 General Management California College for Health Sciences MBA Program McGraw-Hill/Irwin abc McGraw−Hill Primis ISBN: 0−390−58539−4 Text: Effective Behavior in Organizations, Seventh Edition Cohen Harvard Business Review Finance Articles The Power of Management Capital Feigenbaum−Feigenbaum International Management, Sixth Edition Hodgetts−Luthans−Doh Contemporary Management, Fourth Edition Jones−George Driving Shareholder Value Morin−Jarrell Leadership, Fifth EditionRead MoreLibrary Management204752 Words   |  820 Pageswell as reemphasized those that had stood the test of time. This seventh edition uses contemporary examples to illustrate discussions on such themes as strategic planning, marketing, measurements, and human resources management. Thought-provoking minicases and other activities have been incorporated to elicit discussion of points being made. The volume has been rethought, reworked, and reedited, indeed renewed, to reflect recent changes and new issues in the information services environment. Citations

Sunday, December 15, 2019

Why Was Stalin Able to Become Leader of Russia by 1926 Free Essays

Why was Stalin able to become leader of Russia by 1926? (7) In January 1924, Lenin, the Leader of the Russian communist party died. Trotsky, the leader of the Red army seemed like Lenin’s successor at the time as he played a major role in the civil war. Meanwhile, Stalin held two positions: People’s commissar for Nationalities (responsible for the different nationalities in the Soviet empire) and General Secretary (responsible for the day to day running of the party. We will write a custom essay sample on Why Was Stalin Able to Become Leader of Russia by 1926? or any similar topic only for you Order Now He was also a member of the Politburo, the party leaders who ran the country after Lenin’s death. They consist of Stalin, Trotsky, Zinoviev, Kamenev, Bukharin, Rykov and Tomsky. As Lenin’s funeral was organized by Stalin since he was regarded as the party’s administrator because of his position as General Secretary, Stalin was able to deliver the oration. This enabled him to portray himself as the chief mourner, and heir to Lenin. Stalin also telegrammed Trotsky the wrong date. Many saw Trotsky’s absent as disrespect for Lenin who had assumed a God-like status so his reputation was damaged. As a result, Lenin’s funeral gained Stalin support and made Trotsky unpopular, contributing to his success in being the leader of Russia. Apart from that, the fact that the Politburo decided not to publish Lenin’s Testament which contains criticisms of them also contributes to Stalin’s success. This is because in his testament, Lenin had wanted Stalin removed from his position. Members of the party may not have supported Stalin if they had read the testament containing criticisms of him. They would probably support Lenin’s desire for Stalin to be removed from his position. Apart from enabling Stalin to gain support during Lenin’s funeral, his position as General Secretary also contributes to his success in becoming Russia’s leader in many ways. As it enabled him to access personal files of party members, Stalin gained information which he could use against his rivals. Furthermore, it also gave him the right to appoint new party members so he appointed his supporters. During Lenin Enrolment between 1923-5, over half a million new members joined the party as it gave them privileges. This made them loyal to Stalin as he had allowed them into the party. New members could easily identify with Stalin because of his humble, peasant background and support for Stalin grew. On the other hand, Trotsky was unpopular. He came from a wealthy Jewish background and had a late conversion to Bolshevism. He was an intellectual who appeared arrogant. He also did not cultivate support but worked alone. This could be because of his poor judgment regarding other people. Trotsky also believed in the ‘Permanent Revolution’ but in contrast, Stalin promoted ‘Socialism in one country’. Many feared that Trotsky’s idea of world revolution would ruin Russia so support increased for Stalin. In 1924, Trotsky said the party’s bureaucracy was too big and was working for its own benefit. He was isolated by Stalin as Stalin had joined with Zinoviev and Kamenev to form the ‘Triumvirate’. This happened before Lenin’s death and the aim of this alliance is to prevent Trotsky from being the next party leader. They campaigned against Trotsky by publishing his disagreement s with Lenin during 1903-7. They also used Stalin’s position as General Secretary and the 1921 ban against factions to remove Trotsky’s supporters from their influential positions. This led to Trotsky being constantly isolated and outvoted. In 1925, Trotsky was forced to resign from his position of Commissar for War. Stalin, as a member of the ‘Triumvirate’ has partly defeated the Left Opposition. However, In April 1926, Zinoviev and Kamenev realized that Stalin is exploiting his position as he used it to appoint his supporters into the party. They joined forces with Trotsky to form the United Opposition. They planned to restore Party and Soviet democracy and end the NEP (New Economic Policy). They were defeated in 1926 at the central committee meeting because Stalin called in his support and banned them from speaking. He also used his control of Party Congresses and elections to outvote them. They worked secretly but were then accused of factionalism (breaking the party) and were expelled from the party. The United Opposition was successfully defeated by Stalin and the party is now full of his supporters. As a conclusion, Stalin’s political schemes with the aid which his position as General Secretary offered enabled him to remove his rivals, gain support and power so he was able to become leader of Russia by 1926. Beatrice 11. 1 How to cite Why Was Stalin Able to Become Leader of Russia by 1926?, Essay examples

Saturday, December 7, 2019

Security Planning for Global Data Organization

Question: Discuss about the Security Planning for Global Data Organization. Answer: Introduction The report includes the security planning of the network structure designed for Global Data in Australia. The project is already partially implemented as per the checklists and relevant IP allocation process (Aldribi, Traore and Letourneau 2015). The network architecture requires a proper security planning to ensure scalable communication and data storage in Global Data. The project is incorporated with essential Gantt chart along with several activities to setup the entire project, according to the allocated timeline. The security requirements are included along with best practices of maintaining the secure data transmission (Damenu and Balakrishna 2015). The network components are identified with the network architecture following the specific IP addressing. Network Components Figure 1: Network Architecture (Source: Created by author) The network architecture is designed as per the office floor planning and basic blueprint of each store requirements. The included components are presented under the table: Components Specifications Purpose Hypervisors GDhvSRV001 Hypervisor for Primary DC and DFS1 GDhvSRV002 hypervisor for Secondary DC, VOIP, DFS2 GDhvSRV003 Hypervisor for Web GDhvSRV004 Hypervisor for Mail Server and Media Server Virtual Machines GDdc1SRV001 Primary DC GDfl1SRV002 Primary DFS GDexSRV003 Mail Server GDmdSRV004 Media Server GDdc2SRV005 Secondary DC GDvpSRV006 VOIP GDwbSRV007 Web Server GDfl2SRV008 Secondary DFS Devices GDfwRTR001 LAN, WAN, for Web server GDvSW001 Physical NIC on 192.168.1.1 Hypervisor GDvSW002 Physical NIC setting GDvSW003 Mode access GDvSW004 Mode access GDpSW001 Physical Switch with POE with 1 vLAN Workstations GDraWS001 Remote Access via Vsphere, VPN, Putty, Table 2: Network Components (Source: Created by author) Security Risks The risks that are depicted under this section are basically attached with every network component in any architecture. The inherent problem is identified as lack of operational logs in auditing trails that enables the services with shallow operation mechanisms (Kim and Jeon 2016). The mechanisms may include the hyper-calls; the enforcement of any hypervisor is very crucial and difficult work. Most of the enterprises avoid the hypervisor incorporation because of infeasible yet risk-intensive applications. In any virtual network, the penetration testing and scanning rather than only setting the physical implementation is quite difficult (Lim et al. 2015). Again, these essential and proactive functions are essential for setting a hypervisor setting. The primary focus is put forward with setting the performance and hypervisors are hardened in security aspects. The performance expectations are from physical machines without holding up the similar machine tools hosting multi-tenant services in case of scalability (Lincke 2015). The hypervisor security is relevant for remembering the security risks and vulnerabilities. The security risks are mostly in open server network with potential exploit of code flow on other platforms. Again, the mail and data servers required to be set up without sharing any default permissions (Neystadt, Fitzgerald and Verny 2015). The potential and unwanted security issues mainly the client face as stolen, lost, or corrupted files under the DC architecture. Security Planning The security planning is required to be implemented in order to serve the architecture with natural yet processed data within the region of network. The hypervisor security planning required to follow systematic steps as following: Hyper-call risks and privilege escalation issues: The exploit of security under the hyper-call setting includes the methods as buffer overflow. The exploit system calls are made from the virtual machines to the hypervisor resulting in buffer overflow (Somani, Gaur and Sanghi 2015). The virtual machines should consider the hardened security systems with preventing this vulnerability. The VMs should access the hyper-call property with preventing the necessary privilege escalation that is mitigating the attackers to gain access of it. There are certain add-ons to incorporate the hyper-call security. The network threat management is suitable process here. Segmentation of duties: The duties must be divided under the compliance requirements in Information Technology setups. The privilege escalation can be minimized with planning legitimate access to the administration domain (Bleikertz et al. 2015). The division of duties may raise some issues as conflicting the instruction / policies. The virtual machines would face such situations in terms of mis-configuration of hypervisor. Performance calibration and planning requirements: The planning requirements are important for security settings for unusual allocation of resources under the process layers of the virtualization setup (Neystadt, Fitzgerald and Verny 2015). The single-core security setup can be used for ensuring the smooth functions in security layers. Dealing with clusters: The clusters of physical addressing in virtual setup require bigger complexities with multiple risks. The multiple physical machines run with virtual environment in hypervisor (Lim et al. 2015). The security solutions may be validated with compatible clustering solutions for effective hypervisor security controls. The least security areas, most importantly the configuration of file server with proper connectivity is required (Kim and Jeon 2016). The considerable security planning steps for virtual and physical machines are to be included underneath: 1. Ensuring the physical security of the servers 2. Making schedules for the baseline security on the server operating systems and the services (Aldribi, Traore and Letourneau 2015) 3. Planning essential anti-virus or malware installation for protecting the servers 4. Setting access plan for shared and unshared files and folders including the share permissions 5. Incorporation of Encryption File System (EFS) 6. Planning for Distributed File System (DFS) and Replication Service (RS) security techniques (Damenu and Balakrishna 2015) 7. Planning for suitable audit services These are the primary security planning requirements in this context. However, most security vulnerabilities lie in password setting. Therefore, the password should be secured and long-keyword based as well. Conclusion The hypervisor security is relevant for remembering the security risks and vulnerabilities. The virtual machines should consider the hardened security systems with preventing this vulnerability. The privilege escalation can be minimized with planning legitimate access to the administration domain. The single-core security setup can be used for ensuring the smooth functions in security layers. The security solutions may be validated with compatible clustering solutions for effective hypervisor security controls. Incorporation of Encryption File System (EFS), planning for Distributed File System (DFS) and Replication Service (RS) security techniques are generally identified as most important in this report. Planning for suitable audit services are accounted in Global Data for monitoring the entire security process. References Aldribi, A., Traore, I. and Letourneau, G., 2015, August. Cloud Slicing a new architecture for cloud security monitoring. In Communications, Computers and Signal Processing (PACRIM), 2015 IEEE Pacific Rim Conference on (pp. 18-22). IEEE. Bleikertz, S., Vogel, C., Grob, T. and Modersheim, S., 2015, December. Proactive security analysis of changes in virtualized infrastructures. In Proceedings of the 31st Annual Computer Security Applications Conference (pp. 51-60). ACM. Damenu, T.K. and Balakrishna, C., 2015, September. Cloud Security Risk Management: A Critical Review. In Next Generation Mobile Applications, Services and Technologies, 2015 9th International Conference on (pp. 370-375). IEEE. Kim, J.N. and Jeon, Y.S., 2016. Implementation of Domain Separation-based Security Platform for Smart Device. International Journal of Applied Engineering Research, 11(10), pp.7017-7019. Lim, K.S., Park, S.W., Kim, J.N. and Lee, D.G., 2015. Functional considerations in military-grade security platform using a mobile hypervisor. In Computer Science and its Applications (pp. 1413-1418). Springer Berlin Heidelberg. Lincke, S., 2015. Planning for Network Security. In Security Planning (pp. 135-158). Springer International Publishing. Neystadt, J., Fitzgerald, R.E. and Verny, L., 2015. Security virtual machine for advanced auditing. U.S. Patent 8,955,108. Somani, G., Gaur, M.S. and Sanghi, D., 2015. DDoS Protection and Security Assurance in Cloud. In Guide to Security Assurance for Cloud Computing (pp. 171-191). Springer International Publishing.