The American Stock Exchange; WidePoint Corporation

The American Stock Exchange
   The American Stock Exchange

The American Stock Exchange; WidePoint Corporation

Order Instructions:

Select an industrial or commercial U.S. based company that is listed on one of the major stock exchanges in the United States. Each student should select a different company. Avoid selecting an insurance company or a bank—the financial ratios for insurance companies and banks are different. Write a seven- to eight-page double-spaced paper about your selected company answering the questions posted under the Week 2 Minicase assignment posted in Doc Sharing. This Minicase paper should be submitted to the Week 2 Minicase Dropbox.

SAMPLE ANSWER

Introduction

The American Stock Exchange comes third after NYSE and NASDAQ of all stock exchanges in America. It is estimated to handle around ten percent of all trades in America. It lists companies from all over America. These companies are of different sizes and deal with different goods and services. It is famous for having the least requirements in terms of minimum requirements for the listing companies. As a result, it has listed many small companies who find the other exchanges too harsh. The American Stock Exchange trades in small cap stocks, exchange trades funds, and other options (World Bank, 2010).

WidePoint Corporation is based in McLean, Virginia in the United States of America. The company provides products that are closely linked with technology. It targets both the US government and commercial American markets. WidePoint Corporation has established itself as a top provider of managed cyber security solutions mobility services, and telecom lifecycle management. It offers information technology solutions, which are cloud-based, secure and wide in terms of enterprises targeted. Such solutions are necessary for both government and companies to comply fully with advanced system requirements and the government-mandated regulations on information technology(World Bank, 2010). WidePoint has a high discount due to its position currently. It is in a trend of growing further. The reason behind its bright future is that it is in a position to acquire a growth trend that can be both inorganic and organic. Looking at the revenue figures and the expenses incurred by the company, a price point for the next few months can be estimated (Heisterberg & Verma, 2014). A figure of between two and five is reasonable as a price point for the company is the aforementioned period. Widepoint Corp received a financial boost from Homeland Security as fierce court battle. The financial blanket has helped it cushion it capital debt and is thus less volatile. There are positive estimates for the foreseen revenue to be generated. Most of America’s powerful brands have reached their level of success through long-term campaigns that have great visibility. These campaigns are marked a consistent recital or trumpeting of a simple message for the masses. This move proves a strategy of high economic demands through vigorous promotions. However, some brands that have emerged do not follow the vigorous marketing strategies. They instead focus on quiet behind the scenes approach instead of promoting sales for their products (Mergent, 2009).  Widepoint Corp falls in the first category.

The company has endured a rough period being near bankruptcy, but it pulled through. The Widepoint Corp has gone through an amazing graduation and growth in the last couple of decades. These changes have brought forward demand for its products worldwide an objective of many managers. These numerous changes in competition in a highly attractive motorcycle industry and the brands extended reach for much-untapped business have resulted in the brand’s success. The company is now enjoying many sales and gaining lots of profit after reinventing itself as both a brand and a company(Heisterberg & Verma, 2014)..

Widepoint Corp indicates a beta of 1.61.  This beta value shows that its volatility is higher than of its market. If the company did not have any long-term debts then it would be less volatile (Mergent, 2009). Within the structure of its capital, the beta would be less than one. This beta value would mean that Widepoint Corp is less volatile while compared to the market.

The company’s financial statements show a marginal tax rate of 34% for statutory federal income and 4.9% of state income tax. These figures lead to a cost of debt of 13,281,134 dollars before interests and tax, 3.6 million dollars of interest expenses and 4.5 million income tax expenses. The results are 141,302, 128 dollars after tax debt.  There is a long-term debt to equity ratio of 3.71. The total shareholder’s equity sums up to 34.9 million dollars. The average earning per share is -0.11 down from -0.08. As such, the cash dividend yield went down with an average sale of shares at 0.73 getting an operating profit of -0.6 with a working capital and tangible books values of 0.15 each. The average capital expenditure of Widepoint Corp is 0.1. The price earnings of the shares stand at 5,209,890 up from 3,410,322.

Preferred Stock can be defined as special security for equity. It possesses properties of the debt and the equity. WidePoint Corp’s preferred stock for the last quarter was averaged at €0.00 Million. The market value of common stocks has to be added to that of preferred stocks to get an enterprise value. WidePoint Corp gained an enterprise value for that quarter of €-6.88 Million. WidePoint Corp’s book value per share for the same period was €0.38 with its diluted earnings per share being €-0.02 million (World Bank, 2010).

The calculations are listed below:

The Enterprise Value = Market Cap +Preferred Stock + Long-Term Debt + Short-Term Debt +    Minority Interest – Cash and Cash Equivalents

= 0 + 0 + 0.833110576495 + 0.916867147821 + 0 – 8.63138198343 = -6.88

Book Value per Share = (Total Shareholders’ Equity – Preferred Stock) / Total Shares Outstanding

= (31.1004187829 – 0) / 82.48 = 0.38

Earnings per Share (Diluted = (Net Income –    Preferred Dividends) /Shares Outstanding (Diluted)

= (-1.2563485699 – 0)    / 82.125 = -0.02

It is important to note that all numbers are in millions except for the ratio and the per share data. The numbers are also represented in their representative currencies.

A group of senior managers reacquired the company after it had been acquired by an American organization AMF. While under AMF, The Widepoint Corp suffered huge losses as it tried to cope with competition from similar companies. One chief manager suggested a change of strategy to deal with the collapse of Widepoint Corp market. He suggested going back to the details in the IT solutions. This decision was because the business key was in knowing both the clients and the business environment. The rebuilding of the Widepoint Corp involved considering the already existing corporate culture beliefs in restructuring its brand image. This strategy was based on the basic American main principles of being adventurous free and an individual (Graham et al., 2010). Widepoint Corp’s Management ideology and the plan were aimed to control innovation and its penetration to the international markets. It also aimed to adapt to differences in culture and beliefs while at the same time maintaining the brand image(World Bank, 2010).

A transformational leadership style that was stirred by customers and employees focus on more than themselves was quickly utilized by the company (Heisterberg & Verma, 2014). Widepoint’s management team was actively involved by participating in activities like following their trading online and attending promotional rallies. A policy of not selling transportation but rather a transformation was important to their marketing (Graham et al., 2010).

The company has had an up and down tent in the stock market. The last two years , however, have resulted in a tremendous increase in its shares turnover. The company has thus enjoyed a successful trend over the last couple of years. It is ranked as an aggressive competitor when compared to all the stock exchanges in America (Smith, 2012). By these observations the companies risk structure is tolerant to many risks both financial and operating. Widepoint Corp has a debt to capitalization ratio of 9.28.

Investing in the company would be beneficial, as the company has made plans to remain relevant and competitive in America and globally. In controlling the external business environment, Widepoint Corp has defined a new strategy that focuses on marketing and advertising. This strategy mainly looked at the odds involved in the setup of relations with stock consumers. A big portion of their market today consists of members from the professional sector such as the legal officers, physicians, accountants and teachers(World Bank, 2010).  The management team understands they have to shift focus to their efforts of knowing their customers to grow a better customer loyalty foundation. Some key factors were considered by the management team when trying to decide on where to expand. They first had to understand the culture of the new clients they were targeting. They also had to study critically demographics on average client size and annual or monthly income. This data would guide them in segmenting the market (Mergent, 2009).

The company also has a good corporate and clientele handling culture. As thus, it is likely to maintain its market share. Widepoint Corp realized that people needed to have a vision that is shared with the company values. This move was aimed at knowing the customer and the business. It also had an objective to look closely at the details on the products and consumer preferences. This unique and bright management style gave Widepoint Corp the chance to move away from a self-managed style to a more customer-based approach. The strategy was to get the company to braid its customer support base(Koller et al., 2010)and (Wasserman et al., 2009).By employing a theory on acquired needs, its management used the need to achieve a theory focused on motivation with the need to overcome its challenges in a better and more efficient way. Some of these problems were changing the corporate structure, brand and marketing to produce and sustain its offerings and supply of products. Another way was to monitor closely customer needs and detail on products and the market. Widepoint Corp management had learned of the importance of these relationships with workers and clients. Developing these relationships was a major part of the company’s corporate culture. These values and strategies make it an ideal company to invest (Heisterberg & Verma, 2014).

Conclusion

The Widepoint Corp has made tremendous efforts in selling technology solutions in the US and other markets abroad. It has overcome very many problems since it was established. This success can be attributed to the development of serious management strategies by the company’s management team. Some of these strategies like the focus on detail and consumer demands were developed after the company had incurred huge losses. However, these strategies emerged as the turnaround points for the company’s success. The management team that has been in charge over the years have done a great deal of work in raising the company to where it is today. It now has a large shareholder backing making its capital base to be un-marched amongst its competitors.

References

Graham, J. R., Smart, S. B., &Megginson, W. L. (2010). Corporate finance: [linking theory to what companies do]. Mason, OH: South-WesternCengage Learning

Heisterberg, R. J., & Verma, A. (2014).Creating business agility: How convergence of cloud, social, mobile, video, and big data enables competitive advantage.

Koller, T., Goedhart, M. H., Wessels, D., & Copeland, T. E. (2010). Valuation: Measuring and managing the value of companies. Hoboken, N.J: John Wiley & Sons, Inc.

Mergent, Inc. (2009). Mergent OTC unlisted manual.New York: Mergent.

Smith, R. C., Walter, I., & DeLong, G. (2012). Global banking. Oxford: Oxford University Press.

Wasserman, P., McLean, J. W., & Gale Research Company. (2009). Consultants and consulting organizations directory. Detroit, Mich: Gale Research Co.

World Bank.(2010). World development indicators 2010. Washington, D.C: World Bank

We can write this or a similar paper for you! Simply fill the order form!

Resume Writing Services Available Here

Resume
                                Resume

Resume

Order Instructions:

SEE ATTACHED FILE

 

SAMPLE ANSWER

RESUME

Kiran Bala

1/10 High St /Werribee – 3030

0478 125 748

kiran.bala90@hotmail.com

Summary

I am an ambitious and dedicated graduate nurse aspiring to acquire more experience, practice and improve my professional skills to the betterment of healthcare in the nursing care industry.  I aspire to improve health care of the community through a collaborative approach to ensuring quality care. Ethical and honest employee who is also a team player and has excellent communication and interpersonal skills.

Objective

  • Perseverance and hard work are the foremost input to triumph
  • I held a leadership position or excelled in an endeavour in some way that would help me grow better in the given responsibility.

Education:

  • Bachelor of Nursing; Australian Catholic University- (Finishing in November 2015).
  • Diploma in Hospitality & Management; Oxford College.

Clinical Experience

840 total clinical hours

  • 200 hours- Royal Melbourne hospital 2015, oncology, bone marrow Transplant, (November, 2015).
  • 120 hours- John Fawkner Hospital, Peri Operative Ward  (August 2015).
  • 160 hours- Royal Melbourne Hospital 2015, Orthopaedics Ward, (April 2015).
  • 120 hours- Barwon Health Mental Health, Mental Health Ward, (September 2013).
  • 120 hours- Edenhope Memorial Hospital, General Ward, (May 2013).
  • 120 hours- St. Vincent Hospital, Rehabilitation Ward, (December 2012).

Professional Skills and Attributes

  •  Able to reflectively listen and communicate both verbally and non-verbally with clients in a manner that ensures confidentiality, privacy and sensitivity as established through clinical placements.
  • Skilled in conducting physical examinations, Psych and mental health care proficiency.
  • Sterilization techniques, wound cleaning and care expertise, IV drug therapy management.

Communication and Interpersonal Skills

  • Interacted with customers of different nationalities, accents and backgrounds.
  • Have elevated level advanced computer skills.
  •  I am empathetic towards customers.
  • Motivational factors and can adapt in any situation.

Analytical and Assessment

  • Developed competency through clinical placements in monitoring health of individuals, groups and communities
  • Highly competent in comparing assessment findings with what is expected for the condition and include or exclude alternative diagnoses as developed through clinical rotations
  • Proven ability to comply with relevant documentation requirements, including maintenance of client records and discharge planning. developed through clinical placements

Related Work Experience

  1. Healthcare Australia 2013-present.

Personal care worker.

Responsibilities:

  • Analysed customer’s needs to provide them with appropriate products
  • Provided consistently high level customer service to clients
  1. Malvern nursing agency 2014-present.

Personal care worker.

Responsibilities:

  • Analysed customer’s needs to provide them with appropriate products
  • Provided consistently high level customer service to clients.

Referees  

  1. Simone King

John Fawkner Hospital

Clinical educator

Email: simone.king@healthscope.com.au

Tel: 0439371533

  1. Carolyn Middleton

Edenhope & District memorial hospital

Tel: 03 55859800

References

Dillard, D. (2011). Research Guides: EMPLOYMENT: Career Selection and Planning Research Guide: Resume Skills from Books and Websites.

Innes, J. (2012). The Cover Letter Book: Your definitive guide to writing the perfect cover letter. Pearson UK.

Pennington, R., Delano, M., & Scott, R. (2014). Improving cover‐letter writing skills of individuals with intellectual disabilities. Journal of applied behavior analysis, 47(1), 204-208.

We can write this or a similar paper for you! Simply fill the order form!

Physical Health Considerations Prior to Further Assessments

Physical Health Considerations Prior to Further Assessments
     Physical Health Considerations Prior to                           Further Assessments

Physical Health Considerations Prior to Further Assessments

Order Instructions:

You need to respond to following case study and provide a 1000 word medication management plan for the individual.

CASE STUDY 2: Rebecca
Rebecca is a 30 year old woman who is married with twelve month old daughter. Rebecca has had two (2) previous admissions to the mental health unit after attempting suicide, this is her third admission. Her husband Paul rang the triage team expressing concern that Rebecca was relapsing, he reported that she had been staying in bed saying she was tired all the time, crying and unable to care for their daughter. Rebecca’s husband reports their relationship is under strain. Both sets of parents are helping with the care of their child.
Family History
Rebecca is the youngest child of three siblings with two older brothers aged 39 and 36 years; her parents are very supportive and have a good relationship with Rebecca and her husband. Rebecca’s maternal grandmother and her aunt have a diagnosis of major depression. Rebecca and Paul live in the same suburb as her parents. Rebecca’s parents are active members of the carer’s group run by the local Mental Health service. Rebecca is to be discharged next week.

Medical History
– Nil physical problems

Psychiatric History
Rebecca was first diagnosed with Major Depressive Disorder at the age of 25 and has had three admissions to inpatient care in the past 5 years. Rebecca is currently being managed on mianserin hydrochloride – 120mg PO daily.

Current Mental State Examination Appearance & Behaviour:
– Looks stated age of 30
– Average height and weight
– Black hair, unkempt
– Dressed appropriate to weather, slightly dishevelled
– Has scars on both wrists
– Reluctant to be involved in conversation with intermittent eye contact

Cognition:
-Orientated to time, place and person. Not able to maintain concentration throughout interview.

Mood:
– Rebecca says she is very sad and tired

Affect:
– Congruent when discussing events leading to admission

Speech:
– Slow with monosyllabic responses

Form of thought:
– Logical and sequential

Content of thought:
– Believes that her husband and daughter would have a better life if she wasn’t
around. She states that she is not a good mother.

Perception:
– No perceptual disturbances elicited

Insight:
– Moderate insight into illness, states she knows she has depression and will take medication but doesn’t believe that it will do any good.

Judgement:
– Judgement is poor, however, she is willing to take medication, and try to stay well. – Is accepting of the need for case-management, has agreed to attend counselling
with her husband.

Please do NOT seek out medication management plan templates from the web. The assignment is to be presented in a question/answer format, No dot points and not as and essay (i.e. no introduction or conclusion). Each answer must be supported with citations.

You will need to reference according to APA referencing.(valid in Australia only articles and journals minimum 10. )

These are the question

Q1. What physical health considerations should be undertaken prior to giving this medication to the consumer?
Q2. Provide rationales for the use of this medication in this consumer.
Q3. What are the side effects / adverse effects of this medication? Indicate the management strategies that would be used to deal with these effects?
Q4. Discuss the relationship between medication management and recovery principles in mental health.

I AM ATTACHING THE MARKING GUIDE PLEASE FOLLOW THAT OR ESSAY WILL BE RETURNED TO FIX.

SAMPLE ANSWER

Physical Health Considerations Prior to Further Assessments

Despite the fact that physical and mental health conditions may be deemed as separate, research has proved that they are indeed interrelated and that the treatment of one may exacerbate the extent of severity in the other. The reverse is also true (NICE, 2009). The statement, therefore, explicitly suggests that in patients that have been diagnosed with both physical and mental problems, a great risk emanating from assessment and treatment of depression exists (Collinwood, 2013).

Therefore, treatment of depression disorders cannot be done in absentia. For instance, a study carried out by Moy et al., (2009) found that about 22% of patients diagnosed with Severe Chronic Pulmonary Disease had some form of mild depression. The treatment for depression may come under strain considering that some forms of antidepressant medications may or may not be effective depending on the type of physical complications present or the extent of it (Goldberg, 2010). Therefore, it may be impossible to rank the effectiveness of one antidepressant drug over another.

Rebecca’s case is one that meets the current diagnosis for depression threshold by satisfying both ICD-10 and DSM-IV systems. These symptoms include her constant complaints of lack of energy, loss of interest, low moods, poor judgment, being disheveled, and loss of self-worth—to the extent of making a third attempt at suicide. The fact that her condition is not linked to any physical problems makes it far easier to diagnose. However, her treatment alternatives implore the consideration of her past family history of depression as both her maternal grandmother and Aunt were previously diagnosed with depression at some point in their lives.

Rationale for Antidepressant Use on Rebecca

As is standard, medical guidelines implore for a thorough and comprehensive background assessment on patients to be performed so as to arrive at the best alternative for depression management. According to the National Institute for Health and Care Excellence (2009), a general practitioner must carry out case identification and recognition to ascertain the current state of the patient. The specificities that entail of this stage includes the identification of possible comorbid diseases that may act as risk factors preceding the occurrence of depression. However, because Rebecca had no prior physical ailments, it was imperative to go-on to the next stage.

The next stage of diagnosis as is, is to assess the risk factors such as ascertaining past first-degree relatives histories of previous cases of depression diagnosis. As was the finding, Rebecca’s relatives—her maternal grandmother and Aunt—had previous histories of psychotic disorders. Lastly, the assessment must factor in the extent to which this psychotic disorder was recurrent. In Rebecca, the rate of recurrence of depression is quite evident. She had had two previous admissions to the mental health unit following failed suicide attempts.

According to Gelenberg et al., (2010), the prescription of antidepressants must be within the confines of the patient’s profile as well a complete analysis of therapeutic response from prescription. Also, the prescription must not be in conflict with other prescription drugs; Selective Serotonin Reuptake Inhibitors (SSRIs) have been proven to raise the risks involved when administered in the presence of other drugs (Fournier et al., 2010). It has been shown that this puts patients at greater risks of complications such as gastrointestinal bleeding in analgesics and increase in plasma concentration of procyclidine in antimuscarinics among others (USPSTF, 2010).

The Side Effects of Prescription Drug and Management Strategies

Currently, Rebecca is being managed on Mianserin Hydrochloride and is on a dosage of 120mg PO daily. While these medications may offer therapeutic aid to the patient with regards to depression management, these prescriptions may breed other side effects. The extent of effects may depend on the actual prescription administered i.e. Tricyclic, Selective Serotonin Reuptake Inhibitors (SSRIs), Serotonin and Noradrenaline Reuptake Inhibitors (SNRIs), Reversible Inhibitors of Monoamine Oxidase A (RIMA’s), and Monoamine Oxidase Inhibitors (MAOIs) (ASHSP, 2009).

These side effects may range from: nausea, diarrhea, headaches, insomnia, weight gain, withdrawal symptoms, sexual dysfunctions, tremors, diabetes, and serotonin syndrome (Anderson, 2009; Sweitzer and Maguire, 2009). The continued use of SSRIs such as Mianserin Hydrochloride may lead to the occurrence of heightened suicidal tendencies amongst drug users. The most common methods that can be employed to manage these symptoms include for cases such as insomnia, adding small doses of trazodone may ease the side effects; for Akathesia inclusion of clonazepam; for sexual dysfunction considering the use of Bupropion. All these are included to act as panaceas for these side effects. However, this must be done considerately of the fact that certain drugs may conflict with the antidepressant prescribed.

Relationship between Medication Management and Recovery Principles in Mental Health

It has been shown that recovery from mental illnesses varies from different unique experiences of each individual (Richard, 2011). Therefore, there have to be different recovery management plans to satisfy unique individualistic needs. And with such, cases such as relapsing are avoided. Adherence to the principles of mental health management ensures efforts channeled to treatment, with regards to medication administration, complement each other. These principles extend to changing attitudes in mental patients, evaluating other forms of medication through constant reviewing of current medication plans and ensuring social interaction by building support systems around these patients (Anthony and Farkas, 2011)). In Rebecca’s case; therefore, a constant review of her medical progress ought to be reviewed periodically as well as encouraging her and her family to build stronger support systems to aid in her recovery.

References

American Society of Health-System Pharmacists. (2009). “Medline Plus. Drugs, Supplements and Herbal Information.” Retrieved from https://www.nim.nih.gov/medlineplus/druginformation.html

Andersohn, F., Schade, R., Suissa, S. & Garbe, E. (2009). Long-term use of antidepressants for depressive disorders and the risk of diabetes mellitus. The American Journal of Psychiatry, 155 (5), 591-598

Anthony, W. & Farkas, M. (2011). The Essential Guide to Psychiatric Rehabilitation Practice. Boston: Boston University Center for Psychiatric Rehabilitation.

Collingwood, J. (2013). “The Relationship between Mental and Physical Health.” Retrieved from: http://psychcentral.com/lib/the-relationship-between-mental-and-physical-health/

Fournier JC, DeRubeis RJ, Hollon SD, Dimidjian S, Amsterdam J.D., Shelton, R.C., Fawcett, J. (2010) Antidepressant drug effects and depression severity: a patient-level meta-analysis. JAMA, 303:47–53 [E]

Gelenberg AJ, Freeman MP, Markowitz JC, et al. (2010). Practice guideline for the treatment of patients with major depressive disorder. American Journal of Psychiatry, 167.

Goldberg D. (2010). The Detection and Treatment of Depression in the Physically Ill. World Psychiatry, Vol. 9, February 2010, pp. 16-20.

National Institute for Health and Care Excellence. (2009). Depression in Adults with A Chronic Physical Health Problem Treatment and Management. Retrieved from: https://guidance.nice.org.uk/cg91

Schweitzer, I., Maguire, K. & Ng, C. (2009). Sexual side effects of contemporary antidepressants: review. Australian and New Zealand Journal of Psychiatry, 43, 795-808.

United States Preventive Services Task Force. (2009). Screening For Depression in Adults. Annals of Internal Medicine, 2009; 151:784-792.

Richard, D. (2011). Prevalence and Clinical Course of Depression: A Review. Clinical Psychology Review, Vol. 31 (7) 1117.

Moy, M. L. et al. (2009). Multivariate Models of Determinants of Health-Related Quality Of Life in Severe Chronic Obstructive Pulmonary Disease. The Journal of Rehabilitation Research and Development, Vol. 46, 2009, pp. 643-54.

We can write this or a similar paper for you! Simply fill the order form!

FireEye Cyber Security Essay Paper Assignment

FireEye Cyber Security
              FireEye Cyber Security

FireEye Cyber Security

Order Instructions:

see attached file
DAY TO DAY OPERATIONS OF INFORMATION SECURITY FIRMS

THE SECOND TAB IN THE EXCEL SPREADSHEET

SAMPLE ANSWER

FireEye Cyber Security

Introduction and Background

FireEye Cyber Security is an information technology security firm that deals in combating advanced persistent threats; providing security that is far beyond the usual firewalls, antivirus and sandbox tools. FireEye assists over 2,200 organizations in 60 countries in storage, protection and management of vital information. The company’s vision is to ensure that the clients’ most valuable information is protected and runs by the mantle ‘Security Reimagined’. FireEye aims at investing in the best technology to detect and fix malware; in such a way that its innovation strategies are as quick as attackers.

The main activities at FireEye include information technology security, aimed at protecting clients’ data from malicious possession including hacking; protection from cyber attacks; resolving data security issues; information technology risk assessment; debugging of information systems; data back up; and installation and provision of technical support for information security systems.

Process flows

On typical day, engineers at FireEye spend their day doing surveillance on client systems to detect any bugs, threats, potential attacks and hacks on client data. The aim is to move from ‘alert to fix’ in the shortest time possible through timely detection, analysis and threat elimination. Brewer (2015) notes that in the current in the face of rising cyber criminal activities, companies providing data security services should aim at reducing the time period between detection and response to reduce damage; an aspect that FireEye uses to maintain its current niche in the market. The figure below is an illustration of FireEye’s approach to managing IT security.

Once a threat has been detected, the team goes ahead to launch an investigation and eventually clear the threat to save the clients data. A flow chart showing how an information breach is addressed is shown by the diagram below:

The process begins by detection of an incident, followed by a notification to the owner.  The team then goes ahead to investigate whether to quarantine the hosts that have been compromised. In the event that the hosts are in the white list, the team requests the system owner to contain the incident using predesigned plans. The incident handler then goes on to recover the data once it has been identified not to be of high criticality. Data with high criticality and restricted data have to go through the critical incident response; a process that involves a series of investigations and corrective measures including confiscation of hardware, up to the point where data breach is confirmed. The critical incidence flow is illustrated as follows:

Besides solving data breach issues, employees at FireEye must ensure that the clients’ needs are addressed as far as information management is concerned. Activities at FireEye on a day to day basis can therefore be summarized as follows:

  1. Risk assessment and tactical planning to ensure protection of data
  2. Evaluation of system bug reports
  3. Incidence preparedness including initial set up of systems to support security of information such as virus detection systems, software licenses, content filtering systems and firewall among others
  4. Review of security exploit reports, system bug reports and security alerts in systems and mails
  5. Information security program management
  6. Management of projects meant to respond to unexpected breaches of information security.
  7. Provision of technical support and consultancy for clients on matters related to information security
  8. Email and data backup services

Responsibilities and Interfaces

FireEye’s activities are mostly executed by data handlers, who consist of engineers and IT specialists, under the authority of the chief technology officer. Data handlers can be considered the ‘ground men’, whose role is to capture all threat signals and re-direct them to the right channels to ensure they are resolved as soon as possible. The chief technology officer and chief information work together, to ensure continuous investment in research to promote the company’s ability to resolve data threats.

FireEye data handlers take attack notification as the input to begin investigating the process. The user and the system are at the same time prompted to manage process execution by checking the possibility of dealing with the attack using the installed security programs. The system at this juncture may invoke external applications and other predesigned programs with the possibility of blocking the attack. The data handlers and chief information officer continue to monitor the process to establish the need for further action if the attack is not automatically managed by the system. These interfaces are outlined in the diagram as below:

Equipment and logistics

Being a service company, FireEye interacts directly with customers and therefore employs over 2000 staff to ensure that the needs of clients are well addressed. The company does not advocate for outsourcing because the management believes in providing first hand service to clients and thus assure quality service delivery. This philosophy can be explained by Parliament of Australia (2015), who notes that the use of intermediaries in the service sector to a large extent distort the quality of service, hence the relevance of direct service.

Servers and computers remain the most equipment in managing IT security. Servers can be described as computers whose primary role is to provide a location for shared storage. A single server can connect several computers in a network, allowing authorized persons to access available information. FireEye’s high capacity servers ensure that data handlers, IT security manages and other IT security staff can access client files and thus easily detect and correct any attacks on data.

FireEye has invested in both cable and wireless internet to ensure that data is always accessible when needed and that attacks can be remotely accessed at any time. The company also ensures that the clients have reliable internet connection as this helps in sending signals to FireEye’s server whenever there is an information threat on their side (Castelluccio, 2015). In consideration of how important internet connection is, FireEye has a team of engineers whose role is to ensure that all servers and rooters are connected and that any mishap disconnection is addressed immediately before it can compromise client data.

Quality control

In a field that is highly competitive, quality assurance cannot be underestimated (Sherry, 2014). In this regard, FireEye seek to maintain the highest possible standards through investing in the most current technology. FireEye aims at providing clients with the best value for their money and thus constantly engages in research to identify new trends in information technology management. FireEye has invested in winning technologies to ensure that threats are detected and blocked in a matter of minutes. Engineers and IT specialists are trained to be vigilant and move in the same speed or even faster than attackers to ensure that they can manage any kind of new threat. This to a large extent reduces the need to physically deal with the malware or visit client offices, except during installation; thus saving time and increasing customer satisfaction. Borrett, Carter and Wespi (2013) notes that investing in innovative technology should be the main concern for IT security companies that seek to succeed and FireEye has been successful in achieving this. Sherry (2014) further maintains that organizations must now be vigilant in identifying new threat intelligence to promote detection of  cyber threats.

References

Borrett, M., Carter, R., & Wespi, A. (2013). How is cyber threat evolving and what do organisations need to consider? Journal of Business Continuity & Emergency Planning, 7(2), 163-171. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=d0818f10-b671-44bf-9e03-6e37c54a7683%40sessionmgr4002&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=94779805&db=bth

Brewer, R. (2015). Cyber threats: reducing the time to detection and response. Network Security, 2015(5), 5-8. doi:10.1016/S1353-4858(15)30037-4. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=668fa877-1bd4-479a-9453-7df590d4da7a%40sessionmgr4004&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bth&AN=102880763

Castelluccio, M. (2015). Emerging Cyber Threats. Strategic Finance, 97(4), 55-56. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=8eb5bc86-174b-4c03-b883-dc7e26044cd0%40sessionmgr4004&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=101901017&db=bth

Parliament of Australia. (2015). Outsourcing for and against. Retrieved on September 8, 2015 from http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/Publications_Archive/CIB/cib0001/01CIB18

Sherry, J. D. (2014). How Can Threat Intelligence Help the Battle Against Cyber Attacks. Financial Executive, 30(4), 93-94. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=e340779d-e268-40c7-965c-bf4b50e5366e%40sessionmgr4001&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=99862939&db=bth

Wang, S., Liu, J., Shon, T., Vaidya, B., & Chen, Y. (2015). Security and privacy information technologies and applications for wireless pervasive computing environments. Information Sciences, 321147-149. doi:10.1016/j.ins.2015.07.037

We can write this or a similar paper for you! Simply fill the order form!

Biography Writing Services Available

Biography
Biography

Biography

Order Instructions:

The writer must follow the instructions indicated hear below to complete this Bio, it is critical that he/she read the resume and job descriptions provided to be able to complete this Bio. They are 4 important points hear below that needs to be clearly address in different paragraphs. Please let the writer read the job descriptions and the resume of the customer and be able to match both to properly create a good Bio base on this descriptions below. Grammar and sentence structure is critical as I see he is trying to impress a potential employer. Please is something is not clear get back to me rather than deliver something bad.

Biography

Please provide a detailed bio that clearly represents your relevant work experience as it relates to the Instructional Designer/Trainer position. Bios must include the following:

•Description of current position’s roles and responsibilities (discuss details of the job that are specific to what’s being required in the job description)

•Description of public health experience relevant to the SOW/job description (what have you done that is similar to what is being required in the job description?)

•Description of educational background (what degree(s) do you have that are applicable to the job; how do/does the degree(s) enhance your ability to do the job?)

•Description of relevant certifications (must be relevant to position)

I will send the resume, job description and a sample Bio so that the writer can have a better idea of what is require. Please let the writer follow the instructions carefully, including all details that are required in the Bio as highlighted above.
No references are needed hear for this Bio

SAMPLE ANSWER

Biography

The proposed candidate for the Instructional Designer/Trainer with SciMetrika has a solid background in community institutionalized training through research promotion and knowledge management. He currently holds Master’s Degree qualification in Public Health with a concentration in Community Health Education and Promotion from the Benedictine University, Lisle: Illinois. He is also a Baccalaureate conferral holder from the University of Florence, Florence: Italy. The candidate further holds recognized training programs

With five years’ experience in his field, we believe that our candidate is well-primed to take on new tasks and produce exemplary results. Currently, he is engaged as a Community Support Worker with the Contemporary Family Services, Inc. in New Orleans. Among his requirements are to provide Psychiatric Rehabilitation Training to individuals by customizing their very needs in their unique nature. We believe that the candidate suits and matches all criteria advertised for owing to his exemplary track record.

For starters, the candidate is well-versed in the French language amongst others including Italian and English. He is quite knowledgeable in designing strategies aimed at capacity building in institutions through the promotion of research by channeling concerted efforts alongside Subject Matter Experts, at not only Regional and District levels, but both at the GHSS and national levels. In fact, the level of coordination and exemplary performance was rated GS-13. The candidate has also worked alongside Directors in the Health Ministry to develop, implement, and aid the establishment of key projects in Cameroon by employing his leadership skills to project managers ensuring that projects run unhindered and smoothly at minimal expenses.

It is noteworthy, that of all the aspects that this candidates possesses, the core and almost rare trait stems from the fact that he has taken the time to empower adults through educating them on the wider issues of concern contexts. He has also reinforced the continuity and usefulness of this information by inculcating instructional design in education delivery to make its impact felt and last longer. The candidate carried out a series of research and provided educational training at both the district and global levels in public health systems, community healthcare delivery systems, national health information systems, community health development specialist programs, and community-based disease surveillance and prevention systems in September, 2010.

Also, he was at the helm in steering design and implementation of community outreach and training activities on topics regarding their health, better sanitation at a district level in Cameroon. He further included an extension of the Extended Program on Immunization (EPI) of WHO to eradicate polio and realize favorable maternal health outcomes. Moreover, the candidate provided HIV/AIDS and STI education to participants and encouraged screening amongst individuals. He also did avail his services to diverse groups and public health partners on the Sister to Sister project to educate on sensitive topics, topics that may border on immorality perceptions or may elicit mixed feelings amongst members of the society. These items were geared at empowering women on some of the behaviors that may put them at greater risk of contracting STDs, such as HIV

This candidate has also made his contribution to the development of guidelines for Field Epidemiology programs felt through his contribution as a technical advisor to the Ministry of Health in immunization programs. He advised on safety equipment and procedures, delivery of vaccines and related supplies, enhancing and encouraging capacity building, and training of the human resource. He has also enabled the tightening of epidemiological surveillance systems to control and stop the onset of certain diseases such as poliomyelitis that can be vaccinated. He also coordinated an impactful National Program on disease surveillance as well as implementing the International Health Regulations (IHR). He also provided many insights to victims of HIV/AIDS and STDs through conducting individualized sessions.

The candidate is also a believer in the creation of a unison force through team-building. He led a team that provided technical support to the Health Ministry (MOH) of Cameroon in the gathering, processing, and explicit detailing of their findings (SMLTA) across Africa. He also develops and maintains tracking systems for training and logistical processes to provide consultation and guidance to overall management problems, avoiding/solving problems almost as they occur so as to increase the overall effectiveness of administration

The candidate is also conversant with current quality standards that are needed to maximize customer satisfaction. For instance, our candidate handled drafting Statements of Work (SOW), budgeting for surveillance purposes in DRC-Congo in the year 2010/2011. He also identified contract needs, generated ensuing solicitations such as requests for proposals (RFP) prepared by the current team and provided administration for those established.

Last but not least, some implicit aspects of the candidate’s nature are conveyed hinting out that the candidate is not only skilled Instructional Designer/Trainer but also an inherently hardworking person, a team player, and generally a good problem solver. For starters, a mean GPA of 3.68 is by all means, no joke and paints the candidate as a studious individual who cherishes education to change and challenge retrogressive norms. Furthermore, the candidate is quite conversant with office skills, highly organized and both as a good orator and writer. Every hawk-eyed employer will have now noticed the potential and an invaluable asset that stands before them

We can write this or a similar paper for you! Simply fill the order form!

The Christian and the Old Testament Law

The Christian and the Old Testament Law
The Christian and the Old Testament Law

The Christian and the Old Testament Law

Order Instructions:

This forum focuses on the role of the Mosaic Law in the life of a Christian. The New Testament teaches the law is eternal and will never pass away (Matt 5:17), but that believers in Christ are “no longer under the law” (Romans 7; Galatians 3–4). For this assignment, read the article “Applying the Old Testament Law Today” by J. Daniel Hays and then write a 400-word reflection on what this article has contributed to your understanding of the Christian’s relationship to the Mosaic Law. You may discuss areas of agreement or disagreement, and/or specific issues raised in the article. Does the article help in showing how the Christian uses the law as an ethical and moral guide? Why or why not? This is a reflection on the article, not a summary of its argument, but you must deal with the specific ideas and issues raised in the article.

For the second part of the assignment, write a 250-word explanation of how you would take one of the following passages from the OT law and apply it to your life. In your explanation, your application must reflect what you have taken away from the article and/or what you have learned about ways the New Testament itself applies the commands of the Mosaic Law to New Covenant believers. Be clear and specific in relating how this particular part of the law applies to believers today and make sure that you reflect the basis and reasons for your application.

SAMPLE ANSWER

The Christian and the Old Testament Law

Throughout the ages, the Old Testament (OT) Law has actually caused a lot of interpretive problems for Christians. This paper provides a reflection on what Applying the Old Testament Law Today by J. Daniel Hays has contributed to my understanding of the Christian’s relationship to the Mosaic Law. Areas of disagreement or agreement are discussed, and/or particular issues that Daniel Hay has raised in this article.

Part 1: Reflection on Applying the Old Testament Law Today by J. Daniel Hay

In the article, the author clearly sums up the traditional approach to OT Law that many evangelical scholars and Christians use. Hays’ separation of the Old Testament Law into ceremonial, civil and moral categorizations is a clear and understandable summary, and captures what I have actually observed and read on applying the OT Law to current life. All in all, the article tries to answer the question: How should Christian believers apply the OT law? The answer of Hays to this question is (i) for Christians to follow his own 5-step intricate procedure referred to as principalism; that is, an alternative approach to applying the Old Testament law. (ii) To establish which perpetual moral principle is beneath every single Old Covenant Law; and (iii) to bring that eternal moral principle into the New Covenant.[1] This supposes that (1) each OT Law certainly has a perpetual moral principle beneath it; (2) The Lord expects every Christian to be able to carry out the research needed to objectively perform the task; and (3) each OT Law has to be brought into the New Covenant in such a way.[2]

Contrary to the Dispensation hermeneutic, Hays maintains that every Christian has to apply that which The Lord has specifically restated and reiterated to the Church – the Dispensational hermeneutic – and also that which he believes has to underlie each single law.[3] This task is impracticable and monumental for average Christians who lack a theological degree. In addition, it may discourage Bible study as demanding too much.

This article helps in showing how the Christian makes use of the law as an ethical and moral guide. This is because, as Hays pointed out, a lot of Christians choose to obey some of the laws and disregard others by deciding which ones are relevant or valid and which ones are not. I agree with David Hays that Christians breach the Old Testament Law with some regularity. The OT Laws commonly overlooked by Christians include Leviticus 19: 32: Rise in the presence of the elderly; Deuteronomy 22: 5: A man must not wear clothing of women and a woman should not wear clothing of men; and Deuteronomy 14: 8: Pig is unclean as it does not chew cud though its hoof is split, and their carcasses should not be touched, nor their meat eaten.[4] I agree with Hays that Christians actually comply with some laws and disregard others. For instance, they obey the following laws properly: Exodus 20: 13: do not commit murder; and Leviticus 19:18: love your neighbour as yourself.[5]

Nonetheless, Hays chooses to focus on what Christian believers breach rather than what they actually practice. This way, Hays invites readers to engage in a process of self-justification instead of true examination in the mirror of The Lord’s law.

Part 2: Application of one Old Testament (OT) Law: Leviticus 17: 10 – 14

Leviticus 17: 10 – 14 is essentially a law against eating blood. In this passage, the Old Testament Law stipulates that if any Israelite or strangers in Israel eat any blood, then The Lord would set his face against him or her, and He will cut that person off from amongst his or her people. Blood must not be eaten since the life of the flesh is actually within the blood, and blood is used in making atonement, on account of the life. This passage clearly spells out that any person who hunts any bird or beast that could be eaten has to pour out the blood of that bird or beast and then cover the blood with earth.[6]

Given that mankind has domination over every other creature on this earth, and since blood denoted life, the blood of any animal was to be reserved only for sacrifice to God, the Author of Life.[7] In every circumstance, an animal’s blood was spilled on the alter and offered to The Lord. This way, the taking of the life of an animal meant a turning from self to God, and God’s mercy and providence in caring for mankind. I would apply this law into my own life by avoiding consuming blood whatsoever. Eating animal blood would signify a turning to self; a participation in sin and worldliness; a rebuff of the life that God gave. The people who breached the proscription amongst the people of Israel and consumed animal blood were cut off from other persons. By eating blood, I would not just be made impure by my actions, but I would also become outcast from the people. As such, I will never eat blood.

References

Catholics United for the Faith. The Biblical Prohibition of Eating Blood. Steubenville, OH: Emmaus Road Publishing. 2010.

Hays, Daniel. “Applying the Old Testament Law Today,” in Bibliotheca Sacra, 158, No. 629 (2001): 21-35.

Kelly, Russell Earl. Hermeneutics: Reply to J Daniel Hays. Steubenville, OH: Emmaus Road Publishing. 2011.

Mangrum, Rick. Old Testament Law and Modern Lives. London, England: Thomas Nelson Publishers. 2010.

[1] Daniel Hays. “Applying the Old Testament Law Today,” in (Bibliotheca Sacra, 158, No. 629, 2001), 22

[2] Russell Earl Kelly. Hermeneutics: Reply to J Daniel Hays. (Steubenville, OH: Emmaus Road Publishing), 10.

[3] Daniel Hays. “Applying the Old Testament Law Today,” in (Bibliotheca Sacra, 158, No. 629, 2001), 26

[4] Ibid, 21

[5] Ibid, 21

[6] Rick Mangrum. Old Testament Law and Modern Lives. (London, England: Thomas Nelson Publishers. 2010), 76.

[7]  Catholics United for the Faith. The Biblical Prohibition of Eating Blood. (Steubenville, OH: Emmaus Road Publishing. 2010), 3.

We can write this or a similar paper for you! Simply fill the order form!

The Threat of OTT Players Essay Assignment

The Threat of OTT Players
The Threat of OTT Players

The Threat of OTT Players

Order Instructions:

hi all,
Reference to the order number 113311 please add for me around 300 words discussing the strategies followed by the telecom operators to face the OTT providers threat.

Please use recent journal articles and mention three examples of telecom companies that applied strategies to face this threat.

SAMPLE ANSWER

The Threat of OTT Players

Almossawi (2012) give that strategies to avert the situation include the telecom industry engaging in rebranding. The telecom companies need to rebrand their products such that they provide products that are competitive to those of the players. In 2010, Everything Everywhere rebranded itself EE to maintain its competitive advantageous in the British market. Another strategy related to the above one is to adapt to the changing customer preferences for current services (Jho, 2013). For instance, bundling has been used by telecom industry to cut the fierce competition from the players. This strategy involves employing new mobile tariffs that are speedy, plentiful, and has SMS that have no extra costs. For instance, the mobile operators are able to provide pay-TV bundles and fixed broadband bundles. Mobile operators are sure that when they give their customer bundling services, they considers it cheaper and can hardly change like those with single services Another strategy to avert the situation is to collaborate with the OTT players. For instance, Vodafone collaborated by YouTube to raise revenues from sporting events. This was observed in 2010 world cup in Brazil. Almossawi (2012) argues that telecom companies merging with OTT players as third parties to cut cost of production. For example, Orange merged with T-Mobile to form Everything Everywhere to cut down operational costs. Leah (2014) gives that the best strategy to deal with competition from OTT players is by reviving the previous relationship between the companies and customers (Kreutzer & Land 2014). The industry has to confirm that it can still give the services it used to give before the OTT players invaded the telecom market.  For instance, in 2013, Vodafone instituted a campaign to remind its customers that its services have been added by announcing offers and bonuses.

References

ALMOSSAWI, M.M., (2012). Customer Satisfaction In The Mobile Telecom Industry In Bahrain: Antecedents And Consequences. International Journal Of Marketing Studies, 4(6), Pp. 139-156.

JHO, W. (2013). Building Telecom Markets: Evolution Of Governance In The Korean Mobile             Telecommunication Market.

Http://Dx.Doi.Org/10.1007/978-1-4614-7888-1.

LEAH, M. (2014). The EU Approach To Net Neutrality: Network Operators And Over-The-Top Players, Friends Or Foes. Computer Law & Security Review, 30(5), 508-520.

KREUTZER, R., & LAND, K.-H. (2014). Digital Darwinism: Branding And Business Models In Jeopardy.

SHEEHAN, M. (2010). Why Is Ramsey Pricing: The Case Of Telecommunications Regulation. Journal Of Economic Issues (Association For Evolutionary Economics). Vol. 25(1), P21-32.

We can write this or a similar paper for you! Simply fill the order form!

The effects of OTT players on the mobile operators

The effects of OTT players on the mobile operators
The effects of OTT players on the mobile                                     operators

The effects of OTT players on the mobile operators

Order Instructions:

Dear all,

Reference to the on going project we are working on:

Please refer to the order number:
113162 for the project proposal
113311 for the literature review

Now i want you Please to start working on the introduction or the chapter one, please make sure to use the same references you used in the proposal and the literature review, as soon as this part will be ready we will start the last chapter for the methodology and the data collection.

– Please find below the instructions for this chapter:

1- we need to show couple of diagrams in the introduction.
2- Introduction should cover the literature review.
3- the research questions will as follows:
a) What are the OTT players/ providers.
b) How they are affecting the mobile operators?
c) what are the strategies applies by the Mobile operators?
4- what is my hypothesis?
5- the methodology used will be qualitative through interviews top management in couple of the mobile operators, quantitative survey for the consumer on using the OTT rather than the service from the operators.

PLEASE CONTACT ME FOR ANY CLARIFICATION AND HELP ME TO PASS THIS SO THAT WE CAN START THE THIRD PART.

SAMPLE ANSWER

Abstract

OTT players have been considered a potential threat to the telecom companies. Mehrotra & Kumar (2014, p.169) argue that the OTT players have the tendency to provide services across all IP networks. The mobile operators find that it is hard to compete with the actors because they provide services that are value added. With the development of technology such as adoption of tablet computers and smartphones, the players have become more advanced than their counterparts’ telecom mobile operators. The OTT players include Internet-based alternatives such as WhatsApp and Skype (Tsai, Lee & Yu 2009, P.210). The OTT players also include third-party content and social networking firms such as Facebook and YouTube. Their effects are alarming as there is a considerable fall in revenues on the side of the mobile operators (shown in diagram 1). Usually, their (OTT players) operations are not under the administrative control of the content of the service giver. The players have drastically affected conventional telecom services, particularly SMS and voice. OTT messaging is projected by Adejuwon (2013, p.51) to surpass SMS in 2012 (shown in diagram 2). The effects have caused the mobile operators to work ineffectively. For instance, the players have started to use data to supplement loss.

Park, Jung & Noh (2014) and Sheehan (2010) argue that the mobile operators are in a ferocious cycle of confusion. The mobile operators are viciously engaging in investing much of their considerable money and time searching how to provide similar web services models for the altered telecom customers. Noticeably, the business models used by mobile operators and OTT players are quite different. Observably, the OTT players generate their income from advertising and the sale of the content or services they provide. Martinaitis & Rogoža (2015) argue that the revues from advertising are satisfactory to the players since they tend to have a larger churning subscriber base. This is apparent because the customers can switch between products whenever they want. Therefore, the client has a direct correlation with the OTT players and is free to contact subscriptions from any place, at any given time, and using any available technology.

Research background

The literature review gives that the mobile operators have been devising the mechanism to decrease the competition from the players. The mobile operators have been focusing on leveraging their primary business of selling data, thereby projecting to increase their walled market share (Kreutzer & Land 2014). The mechanism used in leveraging is by decreasing the content and service to those subscribers who use their products (Smith 2014). In addition, the leveraging takes the shape of offering the best quality of service to its customers. This method is mostly defensive.

One of the strategies to be improved to lessen the deep scars of OTT players on the mobile operators is by developing new ecosystems. Nelder (2011, p.204) and Stage & Wells (2013, p.6) argue that the mobile operators can facilitate new ecosystems and advances. This is possible because the operators can use the network infrastructure to expose APIs (application programming interfaces) correlated to their pieces of equipment (Keefe 2009). The net effects will be that the mobile operators will create innovative services that could connect into multifaceted infrastructure. In addition, the operators will be able to provide value-added services to communications (Leah 2014). Commendably, the operators will also be able to give application-based communication services.

The next strategy is to ensure that their (mobile operators) products are of high quality and have service reliability (Star 2014, p.239). Relating that the operators enjoy the ownership and control of the network, it can be able to ensure that it services meets reliability and quality for its respective subscribers. Observably, the mobile operators own as well as control the billing correlation (Jimenez-Castillo & Sanchez-Perez 2013, p.19). Therefore, it can use this opportunity to charge subscribers for the use of OTT services. This process can be affected through the monthly subscription or based on the per-event basis (JHO 2013). Furthermore, the operators can take advantage of the market by comprising free access to these OTT players as a component of a serving price plan, which will comprehensively include SMS, data, and voice minutes. Deregulation of markets can be enhanced to make sure mobile operators operate efficiently (Harris 2009, p.208). Apparently, the performance of mobile operators is retarded by rigid regulations in most countries. Therefore, they are unable to flex their innovations to compete with the OTT players. In addition, going digital can be enhanced to make sure that they use the most sophisticated methods to compete in the digital market (Adejuwon 2013, p.56). Going digital imply the adoption of technological advancements that can have equal or more production to those of OTT players.

Diagram 1: how share traffic volume is shared in LTE networks (Gates, Milgrom & Robert 2009, p.427)

Diagram 2: The percentage usage of the application mobile data traffic by a device type in 2012 (Dowling, Boulton & Elliott 2010, p.208)

Research aim statement

The purpose of this research is to examine how the mobile operators in the telecom industry can address the effects of OTT players.

Research Objectives

The following research seeks to achieve the following:

  1. Determine the effects of OTT players on the mobile operators
  2. The strategies the mobile operators have been using to counteract effects from OTT players

III.       Find out the best solution to handling the effects of OTT players

Significance of the research

The study aims at finding the extent at which the OTT players have affected mobile operators. Research also aims at giving the appropriate solutions on how to handle the effects of the OTT players (Carlson, Vincent, Hardesty & Bearden 2009, p.864). This is because the pieces of the literature failed to provide the best solution to deal with effects of the OTT players. There is a call in the literature review for further research to investigate how the mobile operators can strategize itself to weather the storms of OTT players non-defensively (Car, Pilepić & Šimunić 2014, p.207). This is because the pieces of literature appeared to concentrate much on the defensive strategies to deal with the situation. The defensive strategies include limiting access to the network and other mechanisms (Azzara 2010). The research will aim to find how non-defensive strategies such as collaboration can make the mobile operators rejuvenate their sales.

Delimitation

The research aims at studying two hundred and thirty top management persons in the couple of the mobile operators (Almossawi 2012, p.139).

Research methodology

The methodology used will be qualitative through interviews top management in couple of the mobile operators, quantitative survey for the consumer on using the OTT rather than the service from the operators (Mitchell & Jolley, 2010). The quantitative research will be an impact to give the exact figure the OTT players has affected with the mobile operators Zachariadis, Susan & Michael 2013).

References

Adejuwon, O 2013, ‘Sources of Organizational Legitimacy in the Nigerian telecommunications Industry,’ African Journal of Business & Economic Research, Vol. 8 Issue 2/3, p51-83 retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

ALMOSSAWI, M.M., (2012). Customer Satisfaction In The Mobile Telecom Industry In Bahrain: Antecedents And Consequences. International Journal Of Marketing  Studies, 4(6), Pp. 139-156, retrieved from EBSCOhost Database: Business                         Source Complete on 07.09-2015.

Azzara, C. V. (2010). Questionnaire design for business research: Beyond linear thinking–an interactive approach. Mustang, OK: Tate Pub & Enterprises Llc.

Car, T, Pilepić, L, Šimunić, M 2014, ‘MOBILE TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT – LESSONS FOR THE HOSPITALITY INDUSTRY,’ Tourism &       Hospitality Management, Vol. 20 Issue 2, p207-219, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

CARLSON, J, VINCENT, L, HARDESTY, M, BEARDEN, O 2009, ‘Objective and Subjective Knowledge Relationships: A Quantitative Analysis of Consumer Research   Findings’,  Journal of Consumer Research, Vol. 35 Issue 5, p864-876.

Dowling, M, Boulton, W, & Elliott, S 2010, ‘Strategies for Change in the Service Sector: The Global Telecommunications Industry,’ California Management Review, Vol. 36 Issue 3, p57-88.

Gates, S, Milgrom, P, Robert, J 2009, ‘Deterring Predation in Telecommunications: Are    Line-of-business Restraints Needed?’,  Managerial & Decision Economics, Vol. 16   Issue 4, p427-438, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Harris, R 2009, ‘Telecommunications Policy in Japan: Lessons for the U.S.,   California Management Review, Vol. 31 Issue 3, p113-131, retrieved from EBSCOhost      Database: Business Source Complete on 07.09-2015.

JHO, W. (2013). Building Telecom Markets: Evolution Of Governance In The Korean Mobile Telecommunication Market, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Jimenez-Castillo, D, & Sanchez-Perez, M 2013, ‘Integrated market-related internal communication: development of the construct’, International Journal of Market Research, Vol. 55 Issue 4, p2-19. 18

Http://Dx.Doi.Org/10.1007/978-1-4614-7888-1.

LEAH, M. (2014). The EU Approach To Net Neutrality: Network Operators And Over-The-Top Players, Friends Or Foes. Computer Law & Security Review, 30(5), 508-520, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

KEEFE, H. (2009). Is Digital Technology Reshaping Employment Systems In The U.S. Telecommunications Network Services? Industrial & Labor Relations Review, 63(1), P42-59, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

KREUTZER, R., & LAND, K.-H. (2014). Digital Darwinism: Branding And Business Models In Jeopardy, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Martinaitis, V, Rogoža, R 2015, ‘Quantitative estimation of improvements in the efficiency of district heating substation control system’, Building Services Engineering Research & Technology, Vol. 36 Issue 4, p455-468, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

MEHROTRA, R. and KUMAR, S., (2014). A Comparative Study Of Customer Relationship      Management In Telecom Industry In Rajasthan. Asia Pacific Journal Of Management & Entrepreneurship Research, 3(1), Pp. 169-178, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Mitchell, M. L., & Jolley, J. M. (2010). Research design explained. Australia: Wadsworth.

Nelder, J 2011, ‘Quantitative In Context’,  Journal of Advertising Research, Vol. 51, p204-206, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Park, K, Jung, K, & Noh, K 2014, ‘Strategic action and customer mobility: Antecedents and  consequences of strategic actions in the Korean mobile telecommunication service  industry, Asia Pacific Journal of Management. Mar2014, Vol. 31 Issue 1, p171-193,retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

SHEEHAN, M. (2010). Why Is Ramsey Pricing: The Case Of Telecommunications Regulation. Journal Of Economic Issues (Association For Evolutionary Economics). Vol. 25(1), P21-32, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Stage, F, Wells, S 2013, ‘Critical Quantitative Inquiry in Context’, New Directions for Institutional Research, Vol. 2013 Issue 158, p1-7, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Star, M. (2014). Qualitative and mixed methods research in economics: surprising growth, promising future. Journal of economic survey, 28(2), 238-264, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Smith, T 2014, ‘Testing Theory And Related Factors For Influencing Proficiency In Quantitative Research’, Academy of Educational Leadership Journal, Vol. 18 Issue 4, p117-128, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

TSAI, H., LEE, H., & YU, H. (2009). Developing The Digital Content Industry In Taiwan. Review Of Policy Research, 25(2), P169-188, retrieved from EBSCOhost Database:Business Source Complete on 07.09-2015.

Zachariadis, M., Susan, S., & Michael, B. (2013). Methodological implications of critical realism for mixed-methods research, MIS Quarterly, 37(3), 855-879., retrieved from   EBSCOhost Database: Business Source Complete on 07.09-2015.

We can write this or a similar paper for you! Simply fill the order form!

Building a comprehensive health history 

Building a comprehensive health history 
Building a comprehensive health history

Building a comprehensive health history

Order Instructions:

Take the role of a clinician who is building a health history for one of the following new patients.

pre-school aged white female living in a rural community

With the information presented in chapter 1 of Ball et al. 2015) do the following:

1) How would your communication and interview techniques for building a health history differ with each patient?

2) How might you target your questions for building a health history based on the patient’s age, gender, ethnicity, or environment?

3) What risk assessment instruments would be appropriate to use with each patient?

4) What questions would you ask each patient to assess his or her health risks?

5) focus your discussion on patient above (pre-school aged white female in rural community)

6) Identify any potential health-related risks based upon the patient’s age, gender, ethnicity, or environmental setting that should be taken into consideration.

7) Select one to the risk assessment instruments presented in chapter one or 26 of the course text, or another tool with which you are familiar, related to selected patient.

8) Develop at least 5 targeted questions you would ask your selected patient to assess his or her health risks and begin building a health history.

***ONE REFERENCE HAS TO BE THIS ONE AND YOU MAY SELECT 2 MORE*********

1) Ball, J.W., Dains, J.E., Flynn, J.A., Solomon,B.S., & Stewart, R.W. (2015). Seidel’s gude to physical examination (8th ed.). St. Louis, MO: Elsevier Mosby.

SAMPLE ANSWER

Building a comprehensive health history 

The interview technique and communication will be selected cautiously because the patient is a child and from rural community. The interview technique applied is oral interview skills using open-ended communication. Additionally, purposeful silence, and active listening will be applied. This will help building a trustful patient-physician relation, thereby improving communication. The target questions will be assessed to avoid misinterpretation and miscommunication especially when dealing with concepts such as the patient age, gender, ethnic background and the environment. These include patient’s age, gender, medical history and their environment (Ball et al., 2015).

The risk assessment instruments that is appropriate for this patient is the AHRQ clinical care tools, particularly the Put Prevention into Practice (PPIP). This tool is chosen because it captures patient’s experiences as well as their lifestyles. This facilitates the assessment of the patient’s health condition. The five-targeted questions for this patient (pre-school aged white woman from a rural community) will mainly be addressed to the parent, as the child cannot express herself appropriately (Keeton, Soleimanpour, & Brindis, 2012). These include;

  1. What are the child’s name, age, and ethnic background?
  2. What are your child’s basic meals?
  3. Is the child exposed to smoking?
  4. Has the parent noticed any lost of interest to things that the child enjoyed in the recent past?
  5. Has the child been hospitalized for any health reasons in the last three months? Explain the reason.

From the analysis, the following potential health related risk factors are identified; the first risk factor is obesity. The child is lives a sedentary life, and her diet is mainly fast food with high fat content. The child is also likely to suffer from respiratory disorders and cardiovascular disorders such as asthma and hypertension respectively.

References

Ball, J.W., Dains, J.E., Flynn, J.A., Solomon,B.S., & Stewart, R.W. (2015). Seidel’s gude to physical examination (8th ed.). St. Louis, MO: Elsevier Mosby.

Keeton, V., Soleimanpour, S., & Brindis, C. (2012). School-Based Health Centers in an Era of Health Care Reform: Building on History. Current Problems In Pediatric And Adolescent Health Care, 42(6), 132-156. https://www.doi:10.1016/j.cppeds.2012.03.002

We can write this or a similar paper for you! Simply fill the order form!

Leadership and learning Essay Paper

Leadership and learning
Leadership and learning

Leadership and learning

Order Instructions:

This is a good opportunity to learn from your fellow students. The identification of learning needs takes place in many different forms, and the approach taken will depend on the size and sector of the specific organisation so there should be plenty of examples of different types of organisational practice. Remember that even if you work in a small organisation with no formal process for identifying needs, that process will still unfold in an informal and unstructured way. Your responses to the questions posed may take a little longer than those of students whose organisations have formal performance appraisal systems or competency frameworks.

Consider your own experience. Think of the methods and techniques of identifying learning needs used by your organisation or an organisation with which you are familiar.

SAMPLE ANSWER

Leadership and learning

TM.COLL.W4

Organisations regardless of their size or their sector have to identify their learning needs to adjust for them to achieve their goals. Many methods for identifying learning needs are available for different organisations to help them understand their operations. This paper deliberates on the method and techniques used to identify learning needs in my organisation.

One of the methods used to identify learning needs is through document research. The organisation on various occasions analyses different documents such as business plans, budget documents, quality control documents, appraisals, evaluation reports, goal statements, work reviews, personal development plans, scheduling and staffing reports, customer complaints, critical incidence reports and other business documents among others. Through this research, the organisation is able to identify gaps and areas of strength hence, enables it to strategies on improving its operations (Cipd.co.uk. 2006).

The organisation also use interviews to identify learning needs of parties involved. Interviews take on different forms such as open communication between various people such as managers, supervisors, subject matter experts, colleagues, and other employees. These interviews help in eliciting mixed opinions and information that allows the organisation to identify areas that require improvement. When conducting interviews, it is however important to put to consideration, the cultural diversity of interviewees and to communicate clearly (Cipd.co.uk. 2006). Listening is also a key skill required during interviews to ensure success.

The organisation as well uses observations to identify learning needs. The managers and supervisors watch the way certain tasks or jobs are performed and through this, they learn something that may require adjustment. However, this is unreliable method because the parties being watched may tend to adjust the way they behave especially when they know they are under watch or scrutiny by another person (Augustine-Shaw, 2015).

The organisation as well use surveys to identify its learning needs. The organisation usually sends questionnaires to employees on various occasions asking them different questions pertaining to how they view the operations of the organisation and what they need to be improved (Defence. Gov. au. (2015). The questions as well can be on what the employees feel their learning need among many others. Using questionnaires is cost effective and it allows many people to participate in identifying learning needs.

Experts are as well utilized in identifying learning needs. These experts have in-depth knowledge and skills on functioning of the organisation and performance evaluation. They therefore, help the organisation to establish areas that require urgent attention (Stuebing, Fletcher & Branum-Martin, 2014). The organisation also embraces group discussions in identifying learning needs. Employees together with their supervisors form groups that deliberate on the various aspects that affect them as well as areas they perceive require adjustments. Group discussions are appropriate since they enable employees to raise their issues affecting them (Hr. guide. com., 2015).

Other techniques that the organisation utilizes include,  review of work samples, focus groups, and consultations with people in key positions and use of information boxes designated in various strategic positions in the organisation. These methods and techniques play a critical role in conveying information that helps to identify different learning needs.

In conclusion, organisations face many issues and challenges. Due to changing trends and way of lives, they must always remain abreast with the changes. Therefore, it is prudent to adopt suitable methods and techniques to identify their learning needs to remain competitive. These methods are appropriate but should be utilized on various occasions and situations as deems appropriate to ensure achievement of their goals and objectives.

References

Augustine-Shaw, D. (2015). Leadership and Learning: Identifying an Effective Design for Mentoring New Building Leaders.  Delta Kappa Gamma Bulletin, 8192), 21-30.

Cipd.co.uk. (2006). 4 identifying learning needs in organisations. Retrieved from:             http://www.cipd.co.uk/NR/rdonlyres/BAE22874-1D3C-4912-BBD9-            1C14803E8A44/0/1843981645sc.pdf

Defence. Gov. au. (2015). Chapter 13 Part 1 Section 2 – Methods for Identifying Learning and      Development Needs. Retrieved from:           http://www.defence.gov.au/dpe/pac/DWRM/DW_13_01_02_ln_identify.htm

Hr. guide. com.(2015). Needs Analysis: How to determine training needs. Retrieved from:             http://www.hr-guide.com/data/G510.htm

Stuebing, K., Fletcher, J., & Branum-Martin, L. (2014). Evaluation of the Technical Adequacy     of Three Methods for Identifying Specific Learning Disabilities Based on Cognitive   Discrepancies. School Psychology Review, 41(1) 3-22.

We can write this or a similar paper for you! Simply fill the order form!