Week 4 Discussion
Week 4 eActivity
· Visit eLearning in a Virtual World and read “The Role of a Chief Learning Officer in a Private Sector Organization.” Be prepared to discuss.
"Employee Training”
1. Explain how the role of a Chief Learning Officer (CLO) adds value to the human resources organization.
2. Describe two different training methods, and list one advantage and one disadvantage of using these methods to train employees.
"Effects of Talent Management"
3. Describe the talent management practices that you have experienced in your career and their effects on your sense of your well-being based upon this type of organizational commitment.
4. Imagine you ran into your CEO going to a budget meeting. She asked you to explain the importance of adding more funding to the organization’s talent management program. You have two minutes of her time to convince her that your ideas would add value. Briefly outline the key points to your strategy.
Holley, W. H., Jr., Jennings, K. M., Mathis, R. L., & Jackson, J. H. (2012). Employment Labor & Relations. (2nd ed.). Mason, OH: South-Western Cengage Learning.
Intel’s Pentium Chip Crisis: An Ethical Analysis
Cindy Williams
Abstract—In October 1994 a mathematics professor informed
the Intel Corporation that its Pentium chip had a flaw which
caused mathematical errors. Intel’s response to the professor and
its customers created a backlash of anger and a public relations
crisis. By analyzing Intel’s actions using the work of two relevant
ethical philosophies, this article shows that some of the company’s
errors in public relations were also ethical errors. However, it also
points out that Intel has made improvements which will help it
avoid future problems and which could set an ethical precedent
for the semiconductor industry.
Index Terms— Communication ethics, Intel, Kantian ethics,
Pentim, public relations, utilitarianism.
Question: How many Pentium designers does it take to screw
in a light bulb?
Answer: 1.999 042 740 17. That’s close enough for nontechnical
people [1, p. 11].
AWORST CASE scenario for any business is to have
its credibility fall so low that it becomes the subject
of jokes among its customers and the general public. This
nightmare came true for one large company which has literally
millions of customers: Intel Corporation, a leading computer
chip manufacturer. Intel’s chip designs are inside 80% of
personal computers [2]. Intel’s nightmare began when one of
its chips, the Pentium processor, was found to have a flaw in
the portion that does math computations. While the actual math
errors affected a small segment of Pentium users, including
scientists, engineers, bankers, and the like, Intel’s response
to its customers’ concerns about the chip affected many
others, the majority of whom are “nontechnical people.” These
customers expected a perfectly working chip; Intel insisted that
perfection was not necessary. The media got involved and
Intel finally relented, but not .
Intel has been the dominant force in computer chip manufacturing for over 40 years. They strive for innovation and have pushed processor capabilities, though there is room for improvement in backwards compatibility and price-performance ratio. While Intel faces competition from AMD, their greatest strength is the large capital required to enter the CPU market as a new competitor. To improve its market share, Intel should focus on backwards compatibility to reduce upgrade costs for consumers and increase its competitiveness in international emerging markets.
Lab 9 In the browser, type the URL httpwww.bluelock.comblog.docxcroysierkathey
Lab 9
In the browser, type the URL http://www.bluelock.com/blog/rpo-rto-pto-and-raas-disaster-recovery-explained/ and press Enter to open the Web site.
7. Read the article titled “RPO, RTO, PTO and RaaS: Disaster recovery explained.”
8. In the browser type the URL http://www.computerweekly.com/feature/How-to-write-a-disaster-recovery-plan-and-define-disaster-recovery-strategies/ and press Enter to open the Web site.
9. Read the article regarding disaster recovery strategies.
10. Make a backup of any Lab Assessment Worksheets you may have completed from this lab manual. If this is the only lab you’ve worked on, then make a mock Lab Assessment Worksheet using the worksheet from this lab and back that one up instead.
11. Attach the file(s) to an e-mail to your personal e-mail address. You may need to send multiple e-mails depending on your e-mail’s size limitations.
Note: At this point, ask yourself questions from the perspective of recovering from a disaster: Would I be able to access this e-mail from an offsite computer? Where is the e-mail stored? If I were incapacitated, is someone else able to proceed without me? This is the mindset of someone crafting business continuity plans.
12. Verify receipt of the e-mail message(s), and then open and verify file integrity for each attachment.
13. In your Lab Report file, write the backup procedures and recovery procedures you used.
Note: Arguably, the most important section of any business continuity plan is the Procedures section. A business can plan disaster recovery scenarios extensively, carefully weighing all possible risk likelihood and impacts. However, without detailed procedures with which to execute the recovery, a business will not resume operations efficiently, if at all. And this is especially true in times of near-panic and extreme “executive oversight” immediately following a disaster. The key source for documenting accurate and helpful recovery procedures is testing.
14. In your Lab Report file, describe your personal procedures in terms of your RTO as
explained in Web sites visited earlier in this lab.
15. Test your backup and recovery procedures per your RTO.
16. In your Lab Report file, describe ways you can lower the RTO.
Lab 10
Review the Mock IT infrastructure for a health care IT infrastructure servicing patients with life-threatening conditions (see Figure 1).
Figure 1 Mock IT infrastructure
4. Identify and then document the security controls and security countermeasures you can implement throughout Figure 1 to help mitigate risk from unauthorized access and access to intellectual property or customer privacy data.
5. Review the steps for creating a CIRT plan as outlined in the following table:
Step - Description of Step
Preparation - What tools, applications, laptops, and communication devices are needed to address computer/security incident response for this specific breach?
Identification - When an incident is reported, it must be identified, classified, and document ...
Autonomic Computing: Vision or RealityIvo Neskovic
Autonomic computing is a new computing paradigm which combines multiple disciplines of computer science with the sole aim of developing self-managing computer systems. Dating from early 2001, it is one of the most recent paradigm shifts, and as such it is still in a research-only phase, however, attracting a lot of business investors in the process.
The following survey presents in a clear and appropriately detailed manner the problem of computer science which autonomic computing tries to solve, the details of the proposed solution, together with the some of the immediate and long-term benefits it will provide. Moreover, the survey outlines the basic principles which define a system as an autonomic one, and presents a novel method of designing autonomic systems. Closing the survey are two sections which briefly outline the most prominent research projects on autonomic computing, together with a distiled summary of the major challenges which will be faced by businesses in the process of adopting autonomic systems.
Compare And Contrast Essay Conclusion ExamplSamantha Reed
This document discusses a recent UFO sighting that was captured on video at Jack's Ranch and uploaded to YouTube. It describes the appearance of the UFO as resembling a robotic humanoid jellyfish. While some view it as evidence of alien contact, others theorize it could have been a secret NASA experiment. The popularity of UFO videos on YouTube has increased sightings and speculation. However, the legitimacy of sightings is difficult to determine and some suggest what was seen could actually have been a human in a jet pack, given Jack's history of purported UFO sightings at his ranch.
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docxnormanibarber20063
- Global stock markets have risen sharply in January 2018, with the S&P 500 up 7.5% for its best start to a year since 1987. Other indexes like the Hang Seng and Nikkei 225 are also up double-digits.
- Strong corporate earnings and economic growth are fueling the gains. However, some investors are nervous that stock valuations appear expensive by historical standards.
- The strong gains have intensified concerns about high prices in a bull market that is almost 9 years old, and comparisons are being drawn to the 2000 tech bubble. Overall, markets are displaying their most bullish positioning on record.
Intel has been the dominant force in computer chip manufacturing for over 40 years. They strive for innovation and have pushed processor capabilities, though there is room for improvement in backwards compatibility and price-performance ratio. While Intel faces competition from AMD, their greatest strength is the large capital required to enter the CPU market as a new competitor. To improve its market share, Intel should focus on backwards compatibility to reduce upgrade costs for consumers and increase its competitiveness in international emerging markets.
Lab 9 In the browser, type the URL httpwww.bluelock.comblog.docxcroysierkathey
Lab 9
In the browser, type the URL http://www.bluelock.com/blog/rpo-rto-pto-and-raas-disaster-recovery-explained/ and press Enter to open the Web site.
7. Read the article titled “RPO, RTO, PTO and RaaS: Disaster recovery explained.”
8. In the browser type the URL http://www.computerweekly.com/feature/How-to-write-a-disaster-recovery-plan-and-define-disaster-recovery-strategies/ and press Enter to open the Web site.
9. Read the article regarding disaster recovery strategies.
10. Make a backup of any Lab Assessment Worksheets you may have completed from this lab manual. If this is the only lab you’ve worked on, then make a mock Lab Assessment Worksheet using the worksheet from this lab and back that one up instead.
11. Attach the file(s) to an e-mail to your personal e-mail address. You may need to send multiple e-mails depending on your e-mail’s size limitations.
Note: At this point, ask yourself questions from the perspective of recovering from a disaster: Would I be able to access this e-mail from an offsite computer? Where is the e-mail stored? If I were incapacitated, is someone else able to proceed without me? This is the mindset of someone crafting business continuity plans.
12. Verify receipt of the e-mail message(s), and then open and verify file integrity for each attachment.
13. In your Lab Report file, write the backup procedures and recovery procedures you used.
Note: Arguably, the most important section of any business continuity plan is the Procedures section. A business can plan disaster recovery scenarios extensively, carefully weighing all possible risk likelihood and impacts. However, without detailed procedures with which to execute the recovery, a business will not resume operations efficiently, if at all. And this is especially true in times of near-panic and extreme “executive oversight” immediately following a disaster. The key source for documenting accurate and helpful recovery procedures is testing.
14. In your Lab Report file, describe your personal procedures in terms of your RTO as
explained in Web sites visited earlier in this lab.
15. Test your backup and recovery procedures per your RTO.
16. In your Lab Report file, describe ways you can lower the RTO.
Lab 10
Review the Mock IT infrastructure for a health care IT infrastructure servicing patients with life-threatening conditions (see Figure 1).
Figure 1 Mock IT infrastructure
4. Identify and then document the security controls and security countermeasures you can implement throughout Figure 1 to help mitigate risk from unauthorized access and access to intellectual property or customer privacy data.
5. Review the steps for creating a CIRT plan as outlined in the following table:
Step - Description of Step
Preparation - What tools, applications, laptops, and communication devices are needed to address computer/security incident response for this specific breach?
Identification - When an incident is reported, it must be identified, classified, and document ...
Autonomic Computing: Vision or RealityIvo Neskovic
Autonomic computing is a new computing paradigm which combines multiple disciplines of computer science with the sole aim of developing self-managing computer systems. Dating from early 2001, it is one of the most recent paradigm shifts, and as such it is still in a research-only phase, however, attracting a lot of business investors in the process.
The following survey presents in a clear and appropriately detailed manner the problem of computer science which autonomic computing tries to solve, the details of the proposed solution, together with the some of the immediate and long-term benefits it will provide. Moreover, the survey outlines the basic principles which define a system as an autonomic one, and presents a novel method of designing autonomic systems. Closing the survey are two sections which briefly outline the most prominent research projects on autonomic computing, together with a distiled summary of the major challenges which will be faced by businesses in the process of adopting autonomic systems.
Compare And Contrast Essay Conclusion ExamplSamantha Reed
This document discusses a recent UFO sighting that was captured on video at Jack's Ranch and uploaded to YouTube. It describes the appearance of the UFO as resembling a robotic humanoid jellyfish. While some view it as evidence of alien contact, others theorize it could have been a secret NASA experiment. The popularity of UFO videos on YouTube has increased sightings and speculation. However, the legitimacy of sightings is difficult to determine and some suggest what was seen could actually have been a human in a jet pack, given Jack's history of purported UFO sightings at his ranch.
Intel Warned Chinese Companies of Chip Flaws Before U.S. Governmen.docxnormanibarber20063
- Global stock markets have risen sharply in January 2018, with the S&P 500 up 7.5% for its best start to a year since 1987. Other indexes like the Hang Seng and Nikkei 225 are also up double-digits.
- Strong corporate earnings and economic growth are fueling the gains. However, some investors are nervous that stock valuations appear expensive by historical standards.
- The strong gains have intensified concerns about high prices in a bull market that is almost 9 years old, and comparisons are being drawn to the 2000 tech bubble. Overall, markets are displaying their most bullish positioning on record.
The document discusses Deloitte Consulting LLP's Enterprise Science offering which employs techniques such as machine learning, data science and advanced algorithms to create solutions for clients. It provides three types of cognitive services: cognitive automation which uses natural language processing to automate processes; cognitive engagement which applies machine learning to personalize customer interactions; and cognitive insight which uses data science and machine learning to detect patterns and support business performance. The document provides contact information for two individuals, Plamen Petrov and Rajeev Ronanki, for more details on Enterprise Science.
CS 1010, Computer Essentials 1
Course Learning Outcomes for Unit I
Upon completion of this unit, students should be able to:
1. Explain the relationship between digital basics and computer hardware.
1.1 Discuss the significance of digitization and its impact on the digital revolution in reference to
data representation, processing, and security.
1.2 Describe the difference between system software, an operating system, application software,
and a computer program.
1.3 Describe personal computer basics, microprocessors and memory, storage devices, input and
output devices, and hardware security.
Reading Assignment
Chapter 1:
Computer and Digital Basics
Chapter 2:
Computer Hardware
Unit Lesson
Today we live in a highly digitized society, which affects our economy, privacy, freedom and democracy, and
intellectual property. The digital revolution consists of four phases, which are identified as data processing,
personal computing, network computing, and cloud computing. Technology has changed as the revolution
has progressed. As users, we expect information to be available 24/7, and most of the time it is just a click
away. Parsons and Ajo (2014) stated that “the digital revolution is an ongoing process of social, political, and
economic change brought about by digital technology, such as computers and the Internet” (p. 4). It has been
said that the digital revolution actually started during World War II. The Internet was developed as a military
project that society relies heavily on today. Without the Internet, where would we be today? Commercial
concerns, academic entities, and research facilities rely heavily on the Internet.
e-Commerce is a product of the digital revolution; some of the popular websites associated with e-commerce
are Amazon and eBay. What a great way to shop by using e-commerce in the comfort of one’s own home.
You do not have to go out and fight the Christmas crowds on Black Friday; you can shop Black Monday
instead online.
Computerized medical health records are another product of the digital revolution. Many doctors use
electronic records and patients can get accounts to view their own information. Social media is another facet
of the digital revolution (e.g., Facebook, Twitter, LinkedIn, and Myspace). Cell phones are a product of this
revolution, also. Cell phones were originally huge devices, unlike how they look today. Today cell phones
have the capability of little computers.
The data processing phase of the digital revolution consisted of big corporate and government computers,
custom applications, Citizens Band Radio (CB) radios, Advanced Research Projects Agency Network
(ARPANET), and arcade games.
Phase two of the revolution consisted of personal computers, including small standalone computers powered
by local software. Other characteristics of personal computing include desktop computers, standalone
applications, dial-up Internet access, Ameri ...
This document is an honors thesis that examines how the nature of work is changing due to technological advances. It provides 3 anecdotes as examples of this change: 1) Software that can replace project managers by automating task assignment. 2) GPS technology in tractors that decreases labor needs for farming. 3) A company that analyzes job postings finding an increased demand for computer/software skills. The document will discuss the history of classifying jobs and propose updates to better reflect how interacting with technology has converged many job types.
Please read the information and give me a brief respondThe mo.docxmattjtoni51554
Please read the information and give me a brief respond:
The most important concepts for me begin with the differences in certain Philosophies, and understanding that just as their are differences in each individual there is diversity in their methods and strategies when doing business. To accept the different choices also gives you an idea of which type of people and organization you will work well with and those you decide not to work with. When making decisions that involve my community and family I need you to have similar values and good moral standings that encourage you to put others first. To be aware of the harm you may cause if not considerate of everyone. I will not work with those that have a different agenda orthat cannot leave their self interest behind.
Social responsibility will come into play with every decision that I make. We are not alone in this world and to respect the people the laws and environment is a substantial commitment. I would expect everyone to live with morals and decent values in whatever capacity of employment that you are involved in and everywhere you travel. I would also hope that this generation will be more accepting of individuals with disabilities and challenges that they are not familiar with.
Environmental awareness will be my strong point in establishing a service that supports the air, land and water, We need to preserve our elements for our future generations to come. In whatever feild you choose to be employed in there will always be some method of preservation, because it begins at home.
The most difficult ethical issues of the future in my opinion will be preservation of privacy and identy saving. With so many methods of communication and gadgets in technology , there will always be individuals trying to hack into a data system , if no more than to prove that it can bedone. Most gadgets require passwords and personal information just to sign on to them. Stealing private information and details will continue to get more difficult to contain.
Case study 1- Microsoft
Microsoft is the world’s most successful software company. The company was founded by Bill Gates and Paul Allen in 1975 with the original mission of having “a computer on every desk and in every home, running Microsoft software.” Since then, Microsoft has grown to become the third most valuable brand in the world through strategic marketing and aggressive growth tactics.
Microsoft’s first significant success occurred in the early 1980s with the creation of the DOS operating system for IBM computers. The company used this initial success with IBM to sell software to other manufacturers, quickly making Microsoft a major player in the industry. Initial advertising efforts focused on communicating the company’s range of products from DOS to the launch of Excel and Windows—all under a unified “Microsoft” look.
Microsoft went public in 1986 and grew tremendously over the next decade as the Windows operating system and Microsoft O.
Timothy Warner argues that information technology may be a competitive burden if a company's existing production system has not already been restructured for maximum efficiency using conventional means. He analyzes four areas - design for manufacturability, group technology, manufacturing cells, and just-in-time systems - and finds that conventional approaches provided more benefits than information technology in late 1980s contexts. However, the paper acknowledges that information technology could play a proper role once internal inefficiencies are addressed. It also discusses the need to link IT strategies to competitive strategies.
Crisis Communications in the YouTube Age (updated)Julian Matthews
1. The document discusses several case studies of companies experiencing crises related to product issues that were publicized on the internet, such as a Kryptonite bike lock vulnerability and exploding laptop batteries.
2. It provides examples of how Dell and Sony responded to their battery recall crises through actions like setting up recall websites and determining the root causes.
3. The key lessons emphasized are the power of social media to amplify issues virally, and the importance for companies to be transparent, accept responsibility, and quickly address public safety concerns in a crisis situation.
1. Dell responded quickly to the laptop battery crisis, notifying customers of the recall and setting up a website for safe replacements.
2. It worked with safety authorities to monitor the situation and assured customers of the products' safety to maintain trust.
3. Sony took longer to acknowledge the problem and execute a large global recall, hurting its reputation and profits in the process.
Historical social & economic context of computingBurhan Ahmed
Historical social & economic context of computing.
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
This document discusses the early success of Google and key factors that contributed to it, including its simple and easy to use search engine interface. It also examines whether the search business will become more concentrated over time and if search is a winner-take-all market. The document considers Google's search deals with AOL and how its maximum bid compared to Microsoft's. It evaluates options for Google to expand into new arenas like building a portal, targeting Microsoft's desktop dominance, or becoming an e-commerce player. Overall, the document provides an overview and analysis of Google's business strategy and opportunities for growth beyond its core search product.
INSOLVENCY PREDICTION ANALYSIS OF ITALIAN SMALL FIRMS BY DEEP LEARNINGIJDKP
To improve credit risk management, there is a lot of interest in bankruptcy predictive models. Academic
research has mainly used traditional statistical techniques, but interest in the capability of machine
learning methods is growing. This Italian case study pursues the goal of developing a commercial firms
insolvency prediction model. In compliance with the Basel II Accords, the major objective of the model is
an estimation of the probability of default over a given time horizon, typically one year.
Crisis Communications in the YouTube Age (Updated Aug 2009) MICCI MalaccaJulian Matthews
The document discusses three PR disasters and how they were handled:
1) The Nissan vs Nissan.com domain name dispute escalated online criticism against Nissan Motors before they lost the legal case.
2) Dell's slow response to their exploding laptop batteries crisis allowed the problem to spread widely before a costly global recall.
3) A video exposed flaws in Kryptonite bike locks, but the company's initial silence cost an estimated $10 million to replace affected locks. The document advises being ready to respond quickly online through blogs and social media.
Billions of computers that can sense and communicate from anywhere are coming online. What will it mean for business?
MIT TECHNOLOGY REVIEW
JULY/AUGUST 2014
INSOLVENCY PREDICTION ANALYSIS OF ITALIAN SMALL FIRMS BY DEEP LEARNINGIJDKP
To improve credit risk management, there is a lot of interest in bankruptcy predictive models. Academic research has mainly used traditional statistical techniques, but interest in the capability of machine learning methods is growing. This Italian case study pursues the goal of developing a commercial firms insolvency prediction model. In compliance with the Basel II Accords, the major objective of the model is an estimation of the probability of default over a given time horizon, typically one year.
Running Head: ETHICS
ETHICS 2
Ethical Issues in Business
Brianna Baldwin
Grand Canyon University- BUS-340
Professor Nguyen
Company Background: Summarize relevant information regarding the business and its history
The company in question is Microsoft Company which is a multinational company located in the United States of America. The company came to existence way back in 1975 the 4th day of April and has ever since grown to become what it is currently. Initially the company was founded by Bill Gates alongside his partner called Paul Allen. Microsoft Company is currently regarded as the best software company that has enjoyed a wide market base in almost every part of the world. The company boasts of very many best-selling products such as the Windows operating system, Microsoft office, Xbox and a series of entertainment products such as games, video as well as music. The company also deal in search engines as part of its products. Since 1975, the company has not only and grown and developed but has also been subject to different ethical and legal issues. The following paper will address one crisis that took place in this company, and conclude by explaining the different ethical issues that were involved.
Crisis Details: Summarize the ethical crisis details. What stakeholders were involved? What actions did they take? What were the results of those actions?
The crisis came in the year 1998 whereby the federal government of the United States alongside other 20 states came together and accused Microsoft of practicing monopoly with respect to its computer software business. Under this allegation, there were three main issues that were raised. The first issue was with respect to shoving their browser ‘Internet Explorer’ with windows 98, which was the main operating system built by the company at that time. The second issue outlined was that the company used cross-promotional deals with certain internet providers so that it could extend its monopolistic status. The third major issue brought up was that the company prevented other personal computer makers from customizing the opening screen which shows Microsoft in an illegal manner. In the 8th month of the same year, deposition of the management of this company began. The CEO, who was Bill Gates was placed for 30 hours under a camera but failed to answer several questions which were asked about the company. From this act, it seemed as if Bill Gates was not worried nor concerned of the trial awaiting him and the entire company (Schmalensee, 2000).
The trials began in October the same year whereby Bill Gates and his company was indicted for illegal bullying, intimidation as well as predatory pricing with an aim of undermining its main competitor which by then was Netscap ...
The document provides instructions for creating an account and submitting an assignment request on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions if needed, with HelpWriting.net providing original, high-quality work or a full refund.
Pin On Sop For MBA Sample. Online assignment writing service.Tiffany Carpenter
The document outlines a project proposal for improving City Year by addressing issues corps members face. It notes that corps members work 50+ hours per week but the compensation does not equal the effort required. As a former corps member, the author found it difficult to live on the stipend. The proposal suggests increasing stipends to match living expenses and provide more support for corps members' well-being and development. It also recommends learning from similar organizations like Teach for America that offer higher compensation.
`Do assignments as detailed outNO WIKI for referncesPlease m.docxmelbruce90096
`Do assignments as detailed out
NO WIKI for refernces
Please make sure that ALL REFERNCES ARE APA CITED
TB BOOK CITATION:
Dyer, W. G., Jr., Dyer, J. H., & Dyer, W. G. (2013). Team building: Proven strategies for improving team performance (5th ed.). San Francisco, CA: Jossey-Bass.
.
_____1.On July 9, Sheb Company sells goods on credit to .docxmelbruce90096
_____1.
On July 9, Sheb Company sells goods on credit to Wooley Company for $5,000, terms 1/10, n/60. Sheb receives payment on July 18. The entry by Sheb on July 18 is:
A)
Cash
5,000
Accounts Receivable
5,000
B)
Cash
5,000
Sales Discounts
50
Accounts Receivable
4,950
C)
Cash
4,950
Sales Discounts
50
Accounts Receivable
5,000
D)
Cash
5,050
Sales Discounts
50
Accounts Receivable
5,000
_____2.
The collection of a $1,000 account after the 2 percent discount period will result in a
A)
debit to Cash for $980.
B)
credit to Accounts Receivable for $1,000.
C)
credit to Cash for $1,000.
D)
debit to Sales Discounts for $20.
_____3.
Gross profit does
not
appear
A)
on a multiple-step income statement.
B)
on a single-step income statement.
C)
to be relevant in analyzing the operation of a merchandiser.
D)
on the income statement if the periodic inventory system is used because it cannot be calculated.
_____4.
During 2014, Parker Enterprises generated revenues of $90,000. The company's expenses were as follows: cost of goods sold of $45,000, operating expenses of $18,000 and a loss on the sale of equipment of $3,000.
Parker's gross profit is
A)
$24,000.
B)
$27,000.
C)
$45,000.
D)
$90,000.
_____5.
At the beginning of September, 2014, Stella Company reported Inventory of $8,000. During the month, the company made purchases of $35,600. At September 30, 2014, a physical count of inventory reported $8,400 on hand. Cost of goods sold for the month is
A)
$35,200.
B)
$35,600.
C)
$36,000.
D)
$43,600.
_____6.
The Freight-In account
A)
increases the cost of merchandise purchased.
B)
is contra to the Purchases account.
C)
is a permanent account.
D)
has a normal credit balance.
______7.
A company purchased inventory as follows:
150 units at $5
350 units at $6
The average unit cost for inventory is
A)
$5.00.
B)
$5.50.
C)
$5.70.
D)
$6.00.
______8.
A company just starting business made the following four inventory purchases in June:
June
1
150 units
$
390
June
10
200 units
585
June
15
200 units
630
June
28
150 units
510
$2,115
A physical count of merchandise inventory on June 30 reveals that there are 250 units on hand. Using the FIFO inventory method, the amount allocated to cost of goods sold for June is
A)
$683.
B)
$825.
C)
$1,290.
D)
$1,432.
PART II — BASIC INVENTORY COMPUTATIONS
(18 points)
9.
Joe Poultry uses a
periodic
inventory system. Its beginning inventory on May 1 consisted of 300 units of Product A at a cost of $6.25 per unit. During May, the following purchases and sales were made.
Purchases
Sales
May
6
300
units at $7.20
May
4
275
units
14
400
units at $9.10
8
300
units
21
100
units at $11.50
22
400
units
28
500
units at $11.80
24
225
units
1,300
1,200
Instructions:
Compute the May 31 ending inventory and May cost of goods sold under (a) Average Cost, (b) FIFO, and (c) LIFO. Provide appropriate supporting ca.
[removed]eltomate Son rojos y se sirven (they are serv.docxmelbruce90096
[removed]
el
tomate
: Son rojos y se sirven (
they are served
) en las ensaladas.
[removed]
los
entremeses
: Se come (
It is eaten
) antes del plato principal; es líquida y caliente (
hot
).
[removed]
la
zanahoria
: Son unas verduras anaranjadas, largas y delgadas
.
[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docxmelbruce90096
[u07d2] Unit 7 Discussion 2
Conflict and Change
Resources
Discussion and Participation Scoring Guide
.
Change is part of our lives. Change is viewed as positive and negative. It is accompanied with excitement and confidence, opportunity, progress, growth, innovation, fear and anxiety, upheaval, threat, and unpredictability. People react to change differently.
Based on the assigned readings, briefly answer the following questions.
List and explain the three approaches to change.
Explain the dynamics of change as you see it.
.
More Related Content
Similar to Week 4 DiscussionWeek 4 eActivity · Visit eLearning in a Vir.docx
The document discusses Deloitte Consulting LLP's Enterprise Science offering which employs techniques such as machine learning, data science and advanced algorithms to create solutions for clients. It provides three types of cognitive services: cognitive automation which uses natural language processing to automate processes; cognitive engagement which applies machine learning to personalize customer interactions; and cognitive insight which uses data science and machine learning to detect patterns and support business performance. The document provides contact information for two individuals, Plamen Petrov and Rajeev Ronanki, for more details on Enterprise Science.
CS 1010, Computer Essentials 1
Course Learning Outcomes for Unit I
Upon completion of this unit, students should be able to:
1. Explain the relationship between digital basics and computer hardware.
1.1 Discuss the significance of digitization and its impact on the digital revolution in reference to
data representation, processing, and security.
1.2 Describe the difference between system software, an operating system, application software,
and a computer program.
1.3 Describe personal computer basics, microprocessors and memory, storage devices, input and
output devices, and hardware security.
Reading Assignment
Chapter 1:
Computer and Digital Basics
Chapter 2:
Computer Hardware
Unit Lesson
Today we live in a highly digitized society, which affects our economy, privacy, freedom and democracy, and
intellectual property. The digital revolution consists of four phases, which are identified as data processing,
personal computing, network computing, and cloud computing. Technology has changed as the revolution
has progressed. As users, we expect information to be available 24/7, and most of the time it is just a click
away. Parsons and Ajo (2014) stated that “the digital revolution is an ongoing process of social, political, and
economic change brought about by digital technology, such as computers and the Internet” (p. 4). It has been
said that the digital revolution actually started during World War II. The Internet was developed as a military
project that society relies heavily on today. Without the Internet, where would we be today? Commercial
concerns, academic entities, and research facilities rely heavily on the Internet.
e-Commerce is a product of the digital revolution; some of the popular websites associated with e-commerce
are Amazon and eBay. What a great way to shop by using e-commerce in the comfort of one’s own home.
You do not have to go out and fight the Christmas crowds on Black Friday; you can shop Black Monday
instead online.
Computerized medical health records are another product of the digital revolution. Many doctors use
electronic records and patients can get accounts to view their own information. Social media is another facet
of the digital revolution (e.g., Facebook, Twitter, LinkedIn, and Myspace). Cell phones are a product of this
revolution, also. Cell phones were originally huge devices, unlike how they look today. Today cell phones
have the capability of little computers.
The data processing phase of the digital revolution consisted of big corporate and government computers,
custom applications, Citizens Band Radio (CB) radios, Advanced Research Projects Agency Network
(ARPANET), and arcade games.
Phase two of the revolution consisted of personal computers, including small standalone computers powered
by local software. Other characteristics of personal computing include desktop computers, standalone
applications, dial-up Internet access, Ameri ...
This document is an honors thesis that examines how the nature of work is changing due to technological advances. It provides 3 anecdotes as examples of this change: 1) Software that can replace project managers by automating task assignment. 2) GPS technology in tractors that decreases labor needs for farming. 3) A company that analyzes job postings finding an increased demand for computer/software skills. The document will discuss the history of classifying jobs and propose updates to better reflect how interacting with technology has converged many job types.
Please read the information and give me a brief respondThe mo.docxmattjtoni51554
Please read the information and give me a brief respond:
The most important concepts for me begin with the differences in certain Philosophies, and understanding that just as their are differences in each individual there is diversity in their methods and strategies when doing business. To accept the different choices also gives you an idea of which type of people and organization you will work well with and those you decide not to work with. When making decisions that involve my community and family I need you to have similar values and good moral standings that encourage you to put others first. To be aware of the harm you may cause if not considerate of everyone. I will not work with those that have a different agenda orthat cannot leave their self interest behind.
Social responsibility will come into play with every decision that I make. We are not alone in this world and to respect the people the laws and environment is a substantial commitment. I would expect everyone to live with morals and decent values in whatever capacity of employment that you are involved in and everywhere you travel. I would also hope that this generation will be more accepting of individuals with disabilities and challenges that they are not familiar with.
Environmental awareness will be my strong point in establishing a service that supports the air, land and water, We need to preserve our elements for our future generations to come. In whatever feild you choose to be employed in there will always be some method of preservation, because it begins at home.
The most difficult ethical issues of the future in my opinion will be preservation of privacy and identy saving. With so many methods of communication and gadgets in technology , there will always be individuals trying to hack into a data system , if no more than to prove that it can bedone. Most gadgets require passwords and personal information just to sign on to them. Stealing private information and details will continue to get more difficult to contain.
Case study 1- Microsoft
Microsoft is the world’s most successful software company. The company was founded by Bill Gates and Paul Allen in 1975 with the original mission of having “a computer on every desk and in every home, running Microsoft software.” Since then, Microsoft has grown to become the third most valuable brand in the world through strategic marketing and aggressive growth tactics.
Microsoft’s first significant success occurred in the early 1980s with the creation of the DOS operating system for IBM computers. The company used this initial success with IBM to sell software to other manufacturers, quickly making Microsoft a major player in the industry. Initial advertising efforts focused on communicating the company’s range of products from DOS to the launch of Excel and Windows—all under a unified “Microsoft” look.
Microsoft went public in 1986 and grew tremendously over the next decade as the Windows operating system and Microsoft O.
Timothy Warner argues that information technology may be a competitive burden if a company's existing production system has not already been restructured for maximum efficiency using conventional means. He analyzes four areas - design for manufacturability, group technology, manufacturing cells, and just-in-time systems - and finds that conventional approaches provided more benefits than information technology in late 1980s contexts. However, the paper acknowledges that information technology could play a proper role once internal inefficiencies are addressed. It also discusses the need to link IT strategies to competitive strategies.
Crisis Communications in the YouTube Age (updated)Julian Matthews
1. The document discusses several case studies of companies experiencing crises related to product issues that were publicized on the internet, such as a Kryptonite bike lock vulnerability and exploding laptop batteries.
2. It provides examples of how Dell and Sony responded to their battery recall crises through actions like setting up recall websites and determining the root causes.
3. The key lessons emphasized are the power of social media to amplify issues virally, and the importance for companies to be transparent, accept responsibility, and quickly address public safety concerns in a crisis situation.
1. Dell responded quickly to the laptop battery crisis, notifying customers of the recall and setting up a website for safe replacements.
2. It worked with safety authorities to monitor the situation and assured customers of the products' safety to maintain trust.
3. Sony took longer to acknowledge the problem and execute a large global recall, hurting its reputation and profits in the process.
Historical social & economic context of computingBurhan Ahmed
Historical social & economic context of computing.
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
This document discusses the early success of Google and key factors that contributed to it, including its simple and easy to use search engine interface. It also examines whether the search business will become more concentrated over time and if search is a winner-take-all market. The document considers Google's search deals with AOL and how its maximum bid compared to Microsoft's. It evaluates options for Google to expand into new arenas like building a portal, targeting Microsoft's desktop dominance, or becoming an e-commerce player. Overall, the document provides an overview and analysis of Google's business strategy and opportunities for growth beyond its core search product.
INSOLVENCY PREDICTION ANALYSIS OF ITALIAN SMALL FIRMS BY DEEP LEARNINGIJDKP
To improve credit risk management, there is a lot of interest in bankruptcy predictive models. Academic
research has mainly used traditional statistical techniques, but interest in the capability of machine
learning methods is growing. This Italian case study pursues the goal of developing a commercial firms
insolvency prediction model. In compliance with the Basel II Accords, the major objective of the model is
an estimation of the probability of default over a given time horizon, typically one year.
Crisis Communications in the YouTube Age (Updated Aug 2009) MICCI MalaccaJulian Matthews
The document discusses three PR disasters and how they were handled:
1) The Nissan vs Nissan.com domain name dispute escalated online criticism against Nissan Motors before they lost the legal case.
2) Dell's slow response to their exploding laptop batteries crisis allowed the problem to spread widely before a costly global recall.
3) A video exposed flaws in Kryptonite bike locks, but the company's initial silence cost an estimated $10 million to replace affected locks. The document advises being ready to respond quickly online through blogs and social media.
Billions of computers that can sense and communicate from anywhere are coming online. What will it mean for business?
MIT TECHNOLOGY REVIEW
JULY/AUGUST 2014
INSOLVENCY PREDICTION ANALYSIS OF ITALIAN SMALL FIRMS BY DEEP LEARNINGIJDKP
To improve credit risk management, there is a lot of interest in bankruptcy predictive models. Academic research has mainly used traditional statistical techniques, but interest in the capability of machine learning methods is growing. This Italian case study pursues the goal of developing a commercial firms insolvency prediction model. In compliance with the Basel II Accords, the major objective of the model is an estimation of the probability of default over a given time horizon, typically one year.
Running Head: ETHICS
ETHICS 2
Ethical Issues in Business
Brianna Baldwin
Grand Canyon University- BUS-340
Professor Nguyen
Company Background: Summarize relevant information regarding the business and its history
The company in question is Microsoft Company which is a multinational company located in the United States of America. The company came to existence way back in 1975 the 4th day of April and has ever since grown to become what it is currently. Initially the company was founded by Bill Gates alongside his partner called Paul Allen. Microsoft Company is currently regarded as the best software company that has enjoyed a wide market base in almost every part of the world. The company boasts of very many best-selling products such as the Windows operating system, Microsoft office, Xbox and a series of entertainment products such as games, video as well as music. The company also deal in search engines as part of its products. Since 1975, the company has not only and grown and developed but has also been subject to different ethical and legal issues. The following paper will address one crisis that took place in this company, and conclude by explaining the different ethical issues that were involved.
Crisis Details: Summarize the ethical crisis details. What stakeholders were involved? What actions did they take? What were the results of those actions?
The crisis came in the year 1998 whereby the federal government of the United States alongside other 20 states came together and accused Microsoft of practicing monopoly with respect to its computer software business. Under this allegation, there were three main issues that were raised. The first issue was with respect to shoving their browser ‘Internet Explorer’ with windows 98, which was the main operating system built by the company at that time. The second issue outlined was that the company used cross-promotional deals with certain internet providers so that it could extend its monopolistic status. The third major issue brought up was that the company prevented other personal computer makers from customizing the opening screen which shows Microsoft in an illegal manner. In the 8th month of the same year, deposition of the management of this company began. The CEO, who was Bill Gates was placed for 30 hours under a camera but failed to answer several questions which were asked about the company. From this act, it seemed as if Bill Gates was not worried nor concerned of the trial awaiting him and the entire company (Schmalensee, 2000).
The trials began in October the same year whereby Bill Gates and his company was indicted for illegal bullying, intimidation as well as predatory pricing with an aim of undermining its main competitor which by then was Netscap ...
The document provides instructions for creating an account and submitting an assignment request on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions if needed, with HelpWriting.net providing original, high-quality work or a full refund.
Pin On Sop For MBA Sample. Online assignment writing service.Tiffany Carpenter
The document outlines a project proposal for improving City Year by addressing issues corps members face. It notes that corps members work 50+ hours per week but the compensation does not equal the effort required. As a former corps member, the author found it difficult to live on the stipend. The proposal suggests increasing stipends to match living expenses and provide more support for corps members' well-being and development. It also recommends learning from similar organizations like Teach for America that offer higher compensation.
Similar to Week 4 DiscussionWeek 4 eActivity · Visit eLearning in a Vir.docx (18)
`Do assignments as detailed outNO WIKI for referncesPlease m.docxmelbruce90096
`Do assignments as detailed out
NO WIKI for refernces
Please make sure that ALL REFERNCES ARE APA CITED
TB BOOK CITATION:
Dyer, W. G., Jr., Dyer, J. H., & Dyer, W. G. (2013). Team building: Proven strategies for improving team performance (5th ed.). San Francisco, CA: Jossey-Bass.
.
_____1.On July 9, Sheb Company sells goods on credit to .docxmelbruce90096
_____1.
On July 9, Sheb Company sells goods on credit to Wooley Company for $5,000, terms 1/10, n/60. Sheb receives payment on July 18. The entry by Sheb on July 18 is:
A)
Cash
5,000
Accounts Receivable
5,000
B)
Cash
5,000
Sales Discounts
50
Accounts Receivable
4,950
C)
Cash
4,950
Sales Discounts
50
Accounts Receivable
5,000
D)
Cash
5,050
Sales Discounts
50
Accounts Receivable
5,000
_____2.
The collection of a $1,000 account after the 2 percent discount period will result in a
A)
debit to Cash for $980.
B)
credit to Accounts Receivable for $1,000.
C)
credit to Cash for $1,000.
D)
debit to Sales Discounts for $20.
_____3.
Gross profit does
not
appear
A)
on a multiple-step income statement.
B)
on a single-step income statement.
C)
to be relevant in analyzing the operation of a merchandiser.
D)
on the income statement if the periodic inventory system is used because it cannot be calculated.
_____4.
During 2014, Parker Enterprises generated revenues of $90,000. The company's expenses were as follows: cost of goods sold of $45,000, operating expenses of $18,000 and a loss on the sale of equipment of $3,000.
Parker's gross profit is
A)
$24,000.
B)
$27,000.
C)
$45,000.
D)
$90,000.
_____5.
At the beginning of September, 2014, Stella Company reported Inventory of $8,000. During the month, the company made purchases of $35,600. At September 30, 2014, a physical count of inventory reported $8,400 on hand. Cost of goods sold for the month is
A)
$35,200.
B)
$35,600.
C)
$36,000.
D)
$43,600.
_____6.
The Freight-In account
A)
increases the cost of merchandise purchased.
B)
is contra to the Purchases account.
C)
is a permanent account.
D)
has a normal credit balance.
______7.
A company purchased inventory as follows:
150 units at $5
350 units at $6
The average unit cost for inventory is
A)
$5.00.
B)
$5.50.
C)
$5.70.
D)
$6.00.
______8.
A company just starting business made the following four inventory purchases in June:
June
1
150 units
$
390
June
10
200 units
585
June
15
200 units
630
June
28
150 units
510
$2,115
A physical count of merchandise inventory on June 30 reveals that there are 250 units on hand. Using the FIFO inventory method, the amount allocated to cost of goods sold for June is
A)
$683.
B)
$825.
C)
$1,290.
D)
$1,432.
PART II — BASIC INVENTORY COMPUTATIONS
(18 points)
9.
Joe Poultry uses a
periodic
inventory system. Its beginning inventory on May 1 consisted of 300 units of Product A at a cost of $6.25 per unit. During May, the following purchases and sales were made.
Purchases
Sales
May
6
300
units at $7.20
May
4
275
units
14
400
units at $9.10
8
300
units
21
100
units at $11.50
22
400
units
28
500
units at $11.80
24
225
units
1,300
1,200
Instructions:
Compute the May 31 ending inventory and May cost of goods sold under (a) Average Cost, (b) FIFO, and (c) LIFO. Provide appropriate supporting ca.
[removed]eltomate Son rojos y se sirven (they are serv.docxmelbruce90096
[removed]
el
tomate
: Son rojos y se sirven (
they are served
) en las ensaladas.
[removed]
los
entremeses
: Se come (
It is eaten
) antes del plato principal; es líquida y caliente (
hot
).
[removed]
la
zanahoria
: Son unas verduras anaranjadas, largas y delgadas
.
[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docxmelbruce90096
[u07d2] Unit 7 Discussion 2
Conflict and Change
Resources
Discussion and Participation Scoring Guide
.
Change is part of our lives. Change is viewed as positive and negative. It is accompanied with excitement and confidence, opportunity, progress, growth, innovation, fear and anxiety, upheaval, threat, and unpredictability. People react to change differently.
Based on the assigned readings, briefly answer the following questions.
List and explain the three approaches to change.
Explain the dynamics of change as you see it.
.
[removed]1.Which of the following processes addresses when to sp.docxmelbruce90096
The document appears to be a set of multiple choice questions related to public speaking concepts. It includes questions about processes of speech organization, types of supporting materials, enhancing voice volume, maintaining audience attention, outlining techniques, audience analysis methods, speech delivery elements, and other topics related to public speaking best practices.
Your paper should be a literary essay in which you present a combina.docxmelbruce90096
Your paper should be a literary essay in which you present a combination of primary and secondary research. Use MLA style for formatting (margins, spacing, numbering pages, heading, title etc.) and citing sources (parenthetical notes and works cited page)
Choose an English Romantic writer (William Wordsworth)
Choose a work by that writer as the focus of your research (Tintern Abbey)
Analyze and interpret the work to plan our approach to it and do some preliminary reading to evaluate the topic.
8 pages 4 secondary sources
.
[removed]1.Photographs are an important source of data because t.docxmelbruce90096
[removed]
1.
Photographs are an important source of data because they:
a.
b.
c.
d.
2.
The Ju/'hoansi are best described as a band because:
a.
b.
c.
d.
3.
A bifurcate kinship system is one where:
a.
b.
c.
d.
4.
The "honeymoon" phase in anthropological fieldwork can be described as a:
a.
b.
c.
d.
5.
Theoretical models in anthropology are:
a.
b.
c.
d.
6.
If your informant describes how her peers treat her differently because her father is an important film star, this is termed her __________ status.
a.
b.
c.
d.
7.
Rank societies are those where individuals gain prestige and wealth by using:
a.
b.
c.
d.
8.
Agriculturally based societies are primarily associated with which of the following economic institution(s)?
a.
b.
c.
d.
9.
An anthropologist that includes his or her thoughts about what he or she sees as well as quotations from his or her informants is presenting what type of ethnography?
a.
b.
c.
d.
10.
Anthropological interest in sexuality can be traced back to which of the following anthropologists?
a.
b.
c.
d.
11.
Which of the following chromosomal pairs shows that an individual is male?
a.
b.
c.
d.
12.
A key informant is selected using a:
a.
b.
c.
d.
13.
Which of the following situations is considered a suitable fieldwork setting for an anthropologist?
a.
b.
c.
d.
14.
The most common kinship system in North America today consists of __________ descent groups known as __________.
a.
b.
c.
d.
15.
Members of the Yurok, Karuk, Hupa, and Tolowa use valued items such as obsidian blades, white deer skins, and elaborately carved paddles and spoons to:
a.
b.
c.
d.
16.
The production maximization model of intensive agriculture strives to maximize production through:
a.
b.
c.
d.
17.
Forensic anthropologists apply their knowledge to legal issues by studying what materials?
a.
b.
c.
d.
18.
The Zuni recognize the berdache gender person as being:
a.
b.
c.
d.
19.
The Zuni recognize the berdache gender person as being:
a.
b.
c.
d.
20.
Initial attempts by AID to bring about reforestation in Haiti failed because:
a.
b.
c.
d.
21.
What type of evidence is used to analyze the evolutionary model of human cultural adaptations?
a.
b.
c.
d.
22.
The four fields of anthropology are:
a.
b.
c.
d.
23.
The description of a single society based on fieldwork is called a(n):
a.
b.
c.
d.
24.
A societal type common in foraging groups and marked by egalitarian social structure and lack of specialization is a:
a.
b.
c.
d.
25.
Among the New Zealand Maori, facial tattoos communicated all of the following, EXCEPT:
a.
b.
c.
d.
26.
The advantages of polygyny across cultures include all of the following, EXCEPT:
a.
b.
c.
d.
27.
Every aspect of culture influences every other aspect of that culture. Thus culture is:
a.
b.
c.
d.
28.
An informant tells a fieldworker that the preferred marriage custom in his culture is for a man to marry his mother's brot.
Your paper should address the following questionsWhen you hear th.docxmelbruce90096
Your paper should address the following questions:
When you hear the word “scientist” what do you envision? Which famous people or characters from the media come into your mind? What characteristics do they have in common? Discuss at least three characteristics of your vision of a scientist.
Has your image of what a scientist does and how they look changed over time? If so, how has this changed and what influenced you?
Are fictional scientists usually the heroes, villains, or a combination of the two? Provide at least two detailed examples to support your position.
How is science portrayed in fictional media (television shows, movies, music, books, etc.)? Is it seen as a positive, negative, or neutral force in the world? Give specific examples supporting your position.
Do you think the portrayal of scientists in the various forms of media influences how society views people in this profession? Why, or why not?
Can the portrayal of science in media influence how certain research and technology is viewed, and accepted, by the general public (e.g., cloning)?
Your Final Project should be written in an essay format, with an introduction and conclusion. The paper will require you to include details from research including the course materials and sources you locate on your own. Use APA format to cite your sources of information, both within parenthetical citations and also within a reference page at the end of the project.
Basic Writing Expectations:
A minimum of 1,500 words, not counting the title or reference pages
At least 3 academic resources utilized
Include a title page, double space, font size 10 or 12
Include a highly developed viewpoint/thesis, purpose, and exceptional content
Demonstrate superior organization: use logic
Free of grammar and spelling errors
No evidence of plagiarism.
Note:
no more than 10% of your paper should be direct quotes
Use the APA style for all in-text citations, references, and body of paper
.
Your Final Project from this course will enable you to compare cultu.docxmelbruce90096
Your Final Project from this course will enable you to compare cultural viewpoints toward death and dying in Western society to those in other parts of the world.
Final Project Information
Overview
Your Final Project will be a medium-length essay in which you address the cultural viewpoints toward death and dying in Western society and compare these to the perspectives toward death and dying in other parts the world. As the course content will point out, much about the Western response to death and dying amplifies the process of grief and bereavement, perhaps unnecessarily. In the West, death is something that is denied and, in many ways, is something that people seem ill-equipped to deal with once the event occurs or is imminent. Your job in this paper will be to put on your social scientist cap and offer “cultural solutions” to the way that death and dying is dealt with in Western society.
Assignment
Based on your own independent research in which you compare the cultural beliefs toward death and dying in Western societies to those in Eastern societies such as China, Vietnam, Japan, and so forth, write an essay that addresses the following points:
Describe in detail the major differences between the Western viewpoint toward death and dying and those in these Eastern societies (you may focus on one country, such as China, or talk about Eastern societies more generally). Be sure to describe the rituals involved with the process of death and dying, the various technologies, or anything that helps explain these differences.
Give one specific example of a famous case of death and dying in Western society that demonstrates some of the problems or dysfunctions of the Western viewpoint (examining cases in the media, for example, will be a great place to start!).
Finally, conclude your final paper with a detailed commentary about what we can do to change the cultural beliefs toward death and dying in Western societies in a way that makes us less afraid of the dying process. Be very specific in your commentary.
.
Your Final Paper is to be a comprehensive research study on one of t.docxmelbruce90096
Your Final Paper is to be a comprehensive research study on one of the following public policy topics:
Environmental Concerns
Immigration
Health Care
Primary and Secondary Public Education
Social Security
Welfare
Your analysis of the topic will include:
The scope and nature of the public policy problem.
How the problem came to public and political awareness.
The evolution of related public policy.
Level of government and the actors involved.
The intergovernmental structure and political concerns.
Conflicting public opinion and impact on policy solutions.
The approaches to policy formulation, adoption, and evaluation.
The suggested policy direction (continuation, change or termination) and future impact.
Writing the Final Paper
The Final Paper:
Must be eight to ten double-spaced pages in length (including title and reference pages), and formatted according to APA style as outlined in the Ashford Writing Center.
Must include a title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must begin with an introductory paragraph that has a succinct thesis statement.
Must address the topic of the paper with critical thought.
Must end with a conclusion that reaffirms your thesis.
Must use at six to ten scholarly sources, including a minimum of four from the Ashford University Library.
Must document all sources in APA style, as outlined in the Ashford Writing Center.
Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center
.
Your director is not aware of the involvement of the Department of H.docxmelbruce90096
Your director is not aware of the involvement of the Department of Homeland Security (DHS) with private enterprise and has requested an information paper that provides her with an explanation about why this is important and how the DHS engages private enterprise in the protection of critical infrastructure and key resources (CIKR). Provide at least 1 example of each program that addresses state, local, tribal, and territorial (SLTT) governments, private enterprises, and individuals in the following DHS mission areas:
Prevention
Response
Recovery
.
YOull need to know The purpose of this research is to focus atte.docxmelbruce90096
YOu'll need to know:
The purpose of this research is to focus attention on how to help newly brought children adapt to the new environment at the child care, given that the children have never been to such environments before.
Content Expectations
Forms of Data (1.5 Points
): In two-to-three paragraphs, describe the multiple forms of data that you will collect (observations, interviews, artifacts, etc.) and how this information will inform your research.
Value of Data (2.5 Points):
In two-to-three paragraphs, explain the value of the selected forms of data and how this information will inform the focus and research questions.
.
Your draft should establish and develop a single thesis [or co.docxmelbruce90096
Your draft should establish and develop a single thesis [or controlling idea], develop in parts. You may also write from the earlier handout on an author you haven’t yet written about.
Gandhi’s “Economic and Moral Progress” suggests that morality and economic prosperity do not go hand in hand. In fact, he argues, oftentimes, one loses one’s morality when one becomes wealthy. Do you agree with Gandhi? Does wealth correlate with immorality? Yes or no. Explain by referring to passages from the essay.
Compare David Suzuki’s understanding of interdependence [interconnectedness] with Ricard and Thuan’s.
Discuss the ways in which Gandhi supports his argument—first with historical examples, then with famous people, then by using the writing of a famous scientist. Is his essay more effective as he adds this type of support?
Desmond Tutu describes South Africa’s decision to seek a middle path between two extremes. What are these extremes and what is this middle path? Is Tutu right in arguing for this road down the middle?
Compare Desmond Tutu’s “middle path” with the teachings of Lao Tzu. Does Lao Tzu advocate a similar position? You might include other famous historical figures who’ve argued a similar position.
David Suzuki’s “The Sacred Balance” appears to be in two parts: first, he identifies the problem in three parts, then he identifies the solution in three parts. What is the essential problem and what is Suzuki’s solution?
Tom Shadyac’s film, “I Am” has a central thesis and advocates a certain solution. What is the basic thesis of the film and what is the solution or solution[s] he advocates? What’s the basic problem and what’s the answer? And how does he convince the audience of these truths?
Kenzaburo Oe develops a very smart and very controversial thesis. What is his thesis and what exactly does he refer to in an attempt to develop, support that thesis.
Kenzaburo Oe discusses the Great Flood [Noah] at the end of his essay and identifies something very troubling about the Western mind. What is this thing he is identifying here? How does it relate to the overall theme of the essay [man’s inhumanity to man]?
Rachel Carson’s “Obligation to Endure” identifies large increases in human populations that create conditions in which insects and other forms of life must be controlled. Name a few of these patterns of behavior that cause an increase in the amount of insects among us.
Identify Rachel Carson’s thesis and her solution. What’s the problem she outlines and what does she propose we do?
How do Carson’s ideas seem to influence David Suzuki? Are they on to the same problems? How are they similar or different?
Plato’s Gorgias is a discussion of the problem of rhetoric and the need for conversation. What is rhetoric, according to Plato, and why is it so dangerous? Does he convince the reader that discourse [words] can be used inappropriately and in dangerous ways?
Discuss any of the questions that follow the readings [Understa.
Your company has just hired your foreign friend to work in a middle-.docxmelbruce90096
Your company has just hired your foreign friend to work in a middle-management position. Since you have lived in the United States for many years, your friend believes that you understand job coaching for a traditional American company. She wants to work with you and has many questions—some of which concern the manner in which cultural nuances related to religious customs, verbal and nonverbal communication, etc. may affect leadership roles.
Write a five to seven (5-7) page paper in which you:
Recommend whether or not your friend should insert herself as a coach from the beginning. Provide a rationale for your response.
Determine two (2) conflicts that could possibly arise as a result of asking people to work on days of religious significance. Propose concrete solutions for these two (2) possible conflicts.
Determine whether or not cultural quirks could restrain the foreign manager from expressing his or her ideas readily. Provide a rationale for your response.
Determine two (2) actions that you can take in order to prepare yourself and your friend to become multicultural leaders. Provide two (2) examples to support your response.
Predict two (2) major conflicts that may arise out of nonverbal communication misunderstandings (e.g., words misinterpreted, hand gestures, looks, shoulder shrugs, names of objects, etc.). Suggest two (2) actions that your friend could take in order to diffuse these types of misunderstandings and thus make the workplace more harmonious. Justify your response.
Use at least five (5) quality academic resources in this assignment. Note: Wikipedia does not qualify as an academic resource.
Please DO NOT use "I, me, you, us, or we" in the research paper.
Please include a introduction paragraph.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
.
Your boss has asked you to write a Project Management Plan. Your pla.docxmelbruce90096
Your boss has asked you to write a Project Management Plan. Your plan should contain the following sections:
Initiating
Planning
Executing
Monitoring and Controlling
Closing
In addition, your plan should touch upon the following components:
Integration
Cost
Human resources
Stakeholder management
Scope
Quality
Communications
Time
Procurement
Risk management
.
Your boss has chosen you to give a presentation to a number of forei.docxmelbruce90096
Your boss has chosen you to give a presentation to a number of foreign officials (We have Chosen Italy) regarding the United States Federal Reserve System. These officials are very interested in doing business in the United States, but they would like to learn more about the Federal Reserve and how it operates as compared to the official's home country.
*
Your instructor will provide a list of countries from which you may select as the home country of the "foreign officials".
Develop
a 3- to 4-slide Microsoft
®
PowerPoint
®
presentation including detailed speaker notes.
Incorporate
any feedback from peer review discussion.
Address
the following questions and include a notes page which contains the write-up portion to each question:
How does monetary policy aim to avoid inflation?
How does monetary policy control the money supply?
How does a stimulus program (through the money multiplier) affect the money supply?
Format
consistent with APA guidelines including a reference slide.
.
your assignment is to submit a presentation on Native-American liter.docxmelbruce90096
your assignment is to submit a presentation on Native-American literature. You may choose ONE of the stories below..
"The Shawl"
"The Years of My Birth"
Here are the specifications for the assignment:
1. Please submit your presentation to the Presentation Drop Box under Module 4 Hispanic-American Literature. The deadline is 12/05.
2. Your presentation will consist of a PowerPoint or Prezi. The format MUST allow for video clips to be incorporated. In order to fulfill the oral communication component of this course, you will videotape yourself speaking onto a camera or record yourself speaking. Please submit an mp3 file, not a wave file, and include this video or audio clip in your presentation. Audio is required.
3. The presentation should include:
A. First slide with your name and the story or poem you selected for your presentation.
B. Slides that show your research of a minimum of 3 facts or statistics that help enhance our understanding of Native American/ Hispanic/ African-American literature, culture, history, or traditions (depending on your last name, you will focus on one of these types of literature. Please see above). Please explain HOW these 3 facts relate to the story or poem you chose to discuss. Please provide MLA citation regarding where the facts and statistics came from (URL or article you found).
B. Please include one video clip of the author and/or historic event related to the poem or story you are presenting on.
C. Please present 2 ways in which the story or poem you chose relates to ONE literary criticism theory.
(Please see Introduction to Literary Analysis Folder under Content.) You can do this orally in video and/or audio.
D. Please audiotape yourself for 5 minutes speaking to us about the literary theory that applies to the story or poem you have chosen for your presentation. This video or audio clip should be included with your presentation or prezi.
F. On the video of yourself, please ask one question you have about the story or poem and provide a possible answer.
This presentation will be graded on:
-- complete information required
-- clarity of oral presentation
-- use of video and/or audio
-- research and explanation of literary theoy
-- analysis of story or poem.
.
Your assignment is to report on TWO cultural experience visits y.docxmelbruce90096
Your assignment is to report on TWO "cultural experience" visits you make during this term. After each visit, write a 500-800 word report about the visit and what you learned.
Your instructor may modify this assignment.
Instructions
For your two reports, attend two different venues from this list.
art museum or sculpture garden
significant or notable architectural site (if there is explanatory material there to help you understand it)
music concert
theater play
poetry reading or spoken word performance
dance performance
religious service, ceremony or ritual for a religion very different from yours, if you practice (for instance, if you are Christian, you may not go to another Christian denomination's service)
other displays or performances may be acceptable. Check with your instructor for approval beforehand.
Restrictions: The experience should be done in person. If this is impossible, contact the instructor to arrange for alternatives. You may not report on a cultural experience from prior to this class.
Write a report after each cultural experience (Cultural Experience Report #1 and #2).
Each report should include the following information. Include photos or links that help convey the information. As always, be sure to document all sources you consult in preparing your work.
Name and location of the museum, site, or performance event. If there is on-line information about the site or performance, include a link.
Type of museum, site or event. For example, is it a portrait museum, a poetry slam, an outdoor Shakespeare festival performance? If you attended a performance, name the performer or the piece. Be specific about what you attended, when, and where.
Briefly describe the general setting.
Describe at least one aspect of the experience that you found especially interesting. For example, you might write about a particular work of art, cultural artifact, song, dance section, scene in a play, costumes or lighting, a particular actor or vocalist, etc. Explain what impressed you, and why. Your reaction can be positive or negative, as long as you offer an explanation.
Identify and use at least two things you've learned in class in your essay. For example, if you visit a museum, you might point out the architectural style, discuss an artist you've learned about in the course, or tie your experience to a class discussion.
Reflect on the relevance--if any--of your experience to your everyday life. How did the experience engage your feelings or emotions, if at all? What does this tell you about human culture, or about yourself?
.
your article must be a research article You can tell it is a researc.docxmelbruce90096
your article must be a research article You can tell it is a research journal article, and not just an editorial article, because a research article will have the
7 parts of a research article
(i.e.
Title, Abstract, Introduction, Methods, Results, Discussion, References
). Once you have chosen your research journal article, then write up a 3-4 page analysis of your chosen research article answering the questions in the
“Reading a Research Article”
(attached to this page)
.
.
Your administrator has come to you for information for a present.docxmelbruce90096
Your administrator has come to you for information for a presentation regarding electronic health records to the Board of Directors at your facility. Your administrator wants you to explain what the difference between ICD-9/ICD-10 and SNOMed as related to the EHRs. What would you tell them and what 2 primary points would you want to identify and why?
.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
Week 4 DiscussionWeek 4 eActivity · Visit eLearning in a Vir.docx
1. Week 4 Discussion
Week 4 eActivity
· Visit eLearning in a Virtual World and read “The Role of a
Chief Learning Officer in a Private Sector Organization.” Be
prepared to discuss.
"Employee Training”
1. Explain how the role of a Chief Learning Officer (CLO) adds
value to the human resources organization.
2. Describe two different training methods, and list one
advantage and one disadvantage of using these methods to train
employees.
"Effects of Talent Management"
3. Describe the talent management practices that you have
experienced in your career and their effects on your sense of
your well-being based upon this type of organizational
commitment.
4. Imagine you ran into your CEO going to a budget meeting.
She asked you to explain the importance of adding more funding
to the organization’s talent management program. You have two
minutes of her time to convince her that your ideas would add
value. Briefly outline the key points to your strategy.
2. Holley, W. H., Jr., Jennings, K. M., Mathis, R. L., & Jackson,
J. H. (2012). Employment Labor & Relations. (2nd ed.). Mason,
OH: South-Western Cengage Learning.
Intel’s Pentium Chip Crisis: An Ethical Analysis
Cindy Williams
Abstract—In October 1994 a mathematics professor informed
the Intel Corporation that its Pentium chip had a flaw which
caused mathematical errors. Intel’s response to the professor
and
its customers created a backlash of anger and a public relations
crisis. By analyzing Intel’s actions using the work of two
relevant
ethical philosophies, this article shows that some of the
company’s
errors in public relations were also ethical errors. However, it
also
points out that Intel has made improvements which will help it
avoid future problems and which could set an ethical precedent
for the semiconductor industry.
Index Terms— Communication ethics, Intel, Kantian ethics,
Pentim, public relations, utilitarianism.
Question: How many Pentium designers does it take to screw
in a light bulb?
Answer: 1.999 042 740 17. That’s close enough for
nontechnical
people [1, p. 11].
AWORST CASE scenario for any business is to have
its credibility fall so low that it becomes the subject
of jokes among its customers and the general public. This
nightmare came true for one large company which has literally
millions of customers: Intel Corporation, a leading computer
chip manufacturer. Intel’s chip designs are inside 80% of
personal computers [2]. Intel’s nightmare began when one of
its chips, the Pentium processor, was found to have a flaw in
the portion that does math computations. While the actual math
3. errors affected a small segment of Pentium users, including
scientists, engineers, bankers, and the like, Intel’s response
to its customers’ concerns about the chip affected many
others, the majority of whom are “nontechnical people.” These
customers expected a perfectly working chip; Intel insisted that
perfection was not necessary. The media got involved and
Intel finally relented, but not before jokes like the one quoted
above about the Pentium’s mathematical inaccuracy and the
company’s unresponsive attitude began to appear.
Most accounts of the chip crisis describe Intel’s actions from
a public relations perspective. Press articles frequently quote
crisis management and public relations experts in their analyses.
A public relations journal analyzed Intel’s PR decisions
alongside McDonald’s responses to that company’s hot coffee
crisis [3], and an article in a business journal described the
Pentium ordeal as a “public relations problem” [4, p. 152].
This account will analyze Intel’s actions from a different
perspective—an ethical perspective. Relatively few published
responses to Intel’s crisis dealt with the ethics implications.
Manuscript received March 1996; revised October 1996.
The author is with Boise State University, Boise, ID 83725
USA.
Publisher Item Identifier S 0361-1434(97)01826-2.
One commentator stated, “The thing Intel seems to have
missed is the ethical issues involved. Intel’s responsibilities
to its customers and its customers’ customers are real and
profound” [5, p. 26]. The company’s ethics were also alluded
to by an analyst who said that “ customers with a problem
ought to be accorded respect” [6, p. 67] and by a consumer
who complained on the Internet, “Intel has no right telling me
or anyone else what I need” [7, p. 14].
As these statements point out, Intel should have considered
its ethical obligations to its customers. But what, according
to ethical philosophy, were its obligations, and what effort did
Intel make to fulfill them? How well did Intel communicate its
efforts to its customers? By applying some ethical principles
4. relevant to this case, along with some corresponding public
relations principles, I will consider how some of Intel’s
problems could have been avoided and what changes the
company has made to prevent future problems. I will also look
at the way Intel communicated with customers, or sometimes
did not communicate with them, and how this affected their
ethical image during the crisis. Finally, I will consider some
of the broader ethical implications the crisis could have for
the computer industry.
BACKGROUND
One June day in 1994, Thomas R. Nicely, a mathematics
professor at Lynchburg College in Virginia, was working on a
project regarding prime numbers. Four of the five computers
he was using calculated the same answer. The answer from one
of the computers, however, was different, beginning with the
ninth digit to the right of the decimal. The computer with the
different answer was the only computer containing a Pentium
chip [8].
Professor Nicely worked and reworked his numbers for four
more months until he was sure that the problem was with the
Pentium chip. Finally, late in October 1994, he called Intel to
report his findings but was “brushed off” [8, p. A17]. Nicely
then communicated with other Pentium-user scientists over
the Internet, asking them to run some calculations to verify
his findings. They too found that their Pentiums created math
errors [8].
On November 7, 1994, the trade publication Electrical
Engineering
Times described Nicely’s findings [9]. Intel admitted
sometime around this date [9] that its own engineers had also
discovered the Pentium’s math problems during the summer,
but the company had decided that since encountering the error
was so unlikely, it would not need to notify Pentium customers
[10]. Intel believed that “an average spreadsheet user could
encounter this subtle flaw of reduced precision once in every
27 000 years of use” [11, p. 18]. In Internet discussion groups,
5. 0361–1434/97$10.00 ã 1997 IEEE
Authorized licensed use limited to: IE Xplore. Downloaded on
May 13,2010 at 1:5:19 UTC from IE Xplore. Restrictions aply.
www..DoownnllooaaddPPaappeerr..iirr
14 IEEE TRANSACTIONS ON PROFESSIONAL
COMMUNICATION, VOL. 40, NO. 1, MARCH 1997
Pentium customers complained among themselves about the
chip’s glitch and Intel’s failure to disclose it [12].
Then the mass media picked up on the story. CNN broadcast
an account of the Pentium chip’s flaw on November 22.
The New York Times and the Boston Globe contained articles
concerning the problem that same week [9]. The Thanksgiving
holiday found the CEO of Intel, Andrew Grove, and his senior
management team around a conference table, discussing the
escalating crisis [13].
Some at the conference table suggested a no-questionsasked
return policy. But Grove “disagreed because of the
consequences” [14, p. B1]. So, Intel decided upon a qualitative
return policy. If a customer wanted a replacement chip, he or
she would have to talk to people at Intel who would decide
whether the customer really needed one [10].
The company communicated its policy by first addressing
the disgruntled Internet customers [13]. Grove composed an
Internet message at home apologizing for “the anxiety created
among you” by the Pentium chip’s problem [15, p. B6]
and explaining the conditional return policy [13]. Grove was
unable to send the message from his home, however, so an
Intel scientist sent it for him, and since the message did
not originate from Grove’s Internet address, some recipients
questioned its authenticity [9]. Intel then had its press staff
communicate the policy to media reporters and had field
representatives contact its major business accounts [13].
Intel also set up an “800” telephone line so that customers
could call to voice concerns and/or request a new chip. Within
about two weeks of the Internet apology, calls to the hotline
had declined. But then a second wave in the crisis hit. On
6. Monday, December 12, IBM announced that it was halting
shipments of its computers containing Pentium chips [9]. IBM
had run some tests of its own and discovered that typical
spreadsheet users might encounter a division error every
24 days, rather than every 27 000 years as Intel predicted
[16]. Grove was astonished at IBM’s decision because the
company had given him no advance warning. Worried Pentium
customers began overloading the long-distance carrier lines
with calls to the hotline [9].
The following weekend, Grove read a commentary in the
San Francisco Examiner written by Nicely in which the
professor said he would have to inform his students that
Pentium machines were less than perfect. At this point, the
magnitude of the crisis hit Grove. The NewYork Times quoted
him: “I didn’t know the scope of the problem. I didn’t know
until the end what the real objection was” [9, p. D6].
On Monday, December 19, 1994, the crisis team at Intel
decided, after an all-day meeting, to rescind its conditional
replacement policy and offer replacement chips to anyone
requesting one. Grove stated: “Finally we decided, ‘This is
the right thing to do, both morally and ethically”’ [9, p. D6].
On Wednesday, December 21, 1994, Intel ran a full-page
ad in the Wall Street Journal and several other national
publications. It read as follows:
To owners of PentiumTM processor-based computers and
the PC community:
We at Intel wish to sincerely apologize for our handling
of the recently publicized Pentium processor flaw.
The Intel Insideâ symbol means that your computer
has a microprocessor second to none in quality and
performance. Thousands of Intel employees work very
hard to ensure that this is true. But no microprocessor
is ever perfect.
What Intel continues to believe is technically an extremely
minor problem has taken on a life of its own.
Although Intel firmly stands behind the quality of the
7. current version of the Pentium processor, we recognize
that many users have concerns.
We want to resolve these concerns.
Intel will exchange the current version of the Pentium
processor for an updated version, in which this floatingpoint
divide flaw is corrected, for any owner who
requests it, free of charge anytime during the life of
their computer. Just call 1-800-628-8686.
The ad was signed by Andrew S. Grove, Craig R. Barrett,
and Gordon E. Moore, President, Vice President, and
Chairman of the Board, respectively, of Intel [17, p. A7].
On the same date that the ad ran, Grove expressed his
uneasiness about the precedent that the new policy would set.
He said that it had “big implications for the company and the
industry” and that “if we live by an uncompromising standard
that demands perfection, it will be bad for everybody” [14,
p. B7]. However, in order to re-establish its credibility and
image, the company proactively supported the new policy.
In January 1995, Intel began operating hundreds of replacement
centers in conjunction with corporations who already
provided technical services. It also began collaborating with
computer vendors such as IBM and Compaq to replace chips
in their customers’ machines. To communicate directly with
the public, Intel established many more toll-free hotlines for
customers to use. And Intel assigned employees to work in
retail stores during the weeks before Christmas [18].
Finally, Intel announced that any flaws it found in the future
it would document, and Intel would inform others of how to
obtain the information on its home page on the Internet World
Wide Web. Also, Intel said that it would put identification on
future chips so that if a flaw were discovered, companies and
users could more easily identify affected chips [19].
During the last quarter of 1994, Intel’s profits were affected
by its having to set aside $475 million for chip replacements;
the company reported a profit of $372 million on sales of $3.23
billion. During the first quarter of 1995, however, it reported
8. profits of $889 million on sales of $3.55 billion. By April of
1995, fewer than 10% of the people who owned Pentium-based
computers had asked for a chip replacement [20].
RATIONALE FOR ETHICAL ANALYSIS
Andrew Grove’s statement that the unconditional replacement
policy was “the right thing to do, both morally and
ethically” implies that Intel wanted to act ethically. It also
implies that its earlier policy was not the “right thing to
Authorized licensed use limited to: IE Xplore. Downloaded on
May 13,2010 at 1:5:19 UTC from IE Xplore. Restrictions aply.
www..DoownnllooaaddPPaappeerr..iirr
WILLIAMS: INTEL’S PENTIUM CHIP CRISIS: AN ETHICAL
ANALYSIS 15
do” and that the new replacement policy would fix that
lapse. Intel’s subsequent actions reflected their recognition
that ethical practices and policies promote the long-term, best
interests of a business.
The role that ethics plays in business success is recognized
by many prominent companies. The Business Roundtable
organization published an ethics report using information it
had gathered from 100 member companies. In the summary,
the report states that “ there is no conflict between ethical
practices and acceptable profits. Indeed, the first is a
necessary precondition for the second” [21, p. 9]. The same
report detailed the ethical philosophies and practices of 10
large companies. The following statements from some of the
detailed reports explain why the companies emphasize ethics
and the advantages of doing so:
ethical aspiration and consumer acceptance are two
ideas of one coin rather than in conflict.—General Mills
[22, p. 42]
Most employees interviewed believed that there is ultimately
a positive correlation between ethics and social
responsibility on the one hand and profitability on the
other.—Xerox [23, p. 138]
During the two nightmare incidents of TYLENOL poisonings
9. and in the subsequent press reports of the
product’s stunning recovery, the J & J Credo was
frequently referred to as the contributing factor in the
Company’s exemplary behavior.—Johnson & Johnson
[24, p. 78]
The continuing success of these companies attests to the fact
that “business ethics” is not an oxymoron. As an executive of
Levi Strauss & Co. said in a recent speech: “Doing the right
thing from day one helps avoid future setbacks and regrets.
Addressing ethical dilemmas when they arise may save your
business from serious financial or reputational harm” [25, p.
507].
Since adopting ethical policies and practices is in the best
interest of a company, a company must be able to determine
whether its actions are, or would be, ethical. It must be able to
measure its behavior against accepted ethical standards. Ethical
philosophers have long described standards of acceptable
ethical behavior. Cavanaugh, Moberg, and Velasquez divide
systems of ethical philosophy into three main categories:
utilitarian theories (which evaluate behavior in terms
of its social consequences), theories of rights (which
emphasize the entitlements of individuals), and theories
of justice (which focus on the distributional effects of
actions or policies) [26, p. 365].
During the early stages of the Pentium chip crisis, Intel
appears to have based its actions on ethical standards derived
from a partial, sometimes flawed, application of utilitarian
theory.
The crisis worsened when the company violated some of
the ethical principles derived from rights theories. Fortunately,
Intel took several steps to end the crisis that exemplified a
much better application of both utilitarian and rights principles.
The remainder of this article focuses on the ethics of the
major decision-maker in the Pentium chip crisis, Intel
Corporation.
Obviously the company was not the only participant
10. in the crisis, however, and one could question the ethics
demonstrated by the actions of some of the other players.
For instance, some have suggested that Internet surfers and
the media unfairly exaggerated the Pentium chip’s problems
[27]. Some distributors expressed support for Intel regarding
its conditional return policy [28]. The crisis was a complicated
mix of ethical and unethical actions by a variety of people, but
Intel was always the central character.
ETHICAL ANALYSIS
The following discussions of utilitarianism and Kantian
rights explain the relevance that each of these ethical
philosophies
has to the problems Intel faced during its Pentium chip
crisis.
Utilitarianism
John Stuart Mill, one of the most well-known utilitarian
philosophers, wrote: “The creed which accepts as the foundation
of morals, Utility, or the Greatest Happiness Principle,
holds that actions are right in proportion as they tend to
promote happiness, wrong as they tend to produce the reverse
of happiness” [29, p. 157]. Utilitarianism is commonly
summarized as being the promotion of “the greatest good
for the greatest number” [30, p. 62]. Promoting the greatest
good, according to Mill, “ includes not solely the pursuit
of happiness, but the prevention or mitigation of unhappiness”
[29, p. 164].
Utility is not a simple standard. Knowing how to promote
happiness for a group of people, such as customers, can be
difficult. But a business must keep its customers happy to
succeed. Philip Crosby, an expert in quality management and
author of Quality is Free puts it this way: “You have to
understand what they need and learn how to give it to them
It’s a full-time job figuring out what your customer wants”
[31, p. 14]. Pentium users’ anger at Intel’s actions indicates
that the company may not have understood its customers well
enough to figure out what they wanted and expected, and this
11. lack of understanding created an ethical problem. If customers
expect a certain level of quality and are disappointed in the
final product, their happiness is diminished. Moreover, if the
company promotes the product in a way that creates that
quality expectation, the company acts unfairly by delivering a
lesser quality product. Mill says: “ it is confessedly unjust
to break faith with anyone: to violate an engagement, either
express or implied, or disappoint expectations raised by our
own conduct, at least if we have raised those expectations
knowingly and voluntarily” [29, p. 204].
Intel may not have realized that its customers expected a
chip that worked perfectly. But its “Intel Inside” advertising
implies that you have the best when you have Intel inside your
machine. A flawed chip is less than the best. As one
commentator
stated, “Even technological neophytes understand that a
computer chip is supposed to get math questions right” [32, p.
16]. Intel needed to realize the expectations it had raised and
live up to its reputation. As a San Francisco public relations
executive stated, “They have a good, solid reputation that they
Authorized licensed use limited to: IE Xplore. Downloaded on
May 13,2010 at 1:5:19 UTC from IE Xplore. Restrictions aply.
www..DoownnllooaaddPPaappeerr..iirr
16 IEEE TRANSACTIONS ON PROFESSIONAL
COMMUNICATION, VOL. 40, NO. 1, MARCH 1997
have spent years and millions of dollars to develop. That’s the
equity they have to protect” [16, p. D3].
Intel probably also did not realize the potential for harm
that the Pentium’s flaw held. According to the ethics of
utility, Intel was obligated to try to prevent harming others,
and mathematical errors might have caused harm to some
of its customers. The inaccuracy could have directly affected
such customers as scientists, bankers, and technologists [33].
However, it would have indirectly harmed others if it had
caused people to reach wrong conclusions during, for example,
drug testing or securities valuations [34]. If Intel had realized
12. the danger, it surely would not have kept the flaw a secret.
Besides understanding its customers in order to make ethical
decisions a company must also weigh the pros and cons
of alternative decisions and choose the one that will create
the greatest good. A business must compare the happiness
to be derived from one decision against the happiness to be
derived from other decisions. All alternative decisions need to
be evaluated this way [30]. Intel may have overlooked some
important factors as it weighed its alternatives.
One of the primary ways a business measures “happiness”
is through monetary costs. A business measures how much
happiness customers derive from its product by how much
they are willing to pay for it compared to how much they are
willing to pay for other products [35]. The company must be
able to offer the product at that price and still pay its suppliers
and employees. If it can, this is good for the customers, who
have what they want at a price they want; for the company,
which stays in business; and for its suppliers and employees,
who derive a paycheck. The company creates the greatest
overall good at the point of profit maximization. At this point,
it is producing the greatest quantity of product that its limited
resources allow; it is working most efficiently [36]. Efficiency
and profit maximization are based on the utilitarian concept of
creating the greatest good for the greatest number [35].
As the discussion above shows, a company must consider
monetary costs when evaluating its alternatives in a situation.
A change in the company’s resources can change how much
it can produce, how much it can pay its employees, and
sometimes its ability to stay in business. These things affect
people’s lives and happiness—the key elements of utility.
However, as we shall see, a company must consider other
costs besides just monetary ones as it looks at its alternatives.
One way that companies frequently evaluate alternative
decisions is by doing a cost/benefit analysis. They evaluate
the costs of a course of action to see if the costs outweigh
the benefits to be derived from that action. When Intel first
13. decided to keep the chip flaw a secret and then decided against
a full replacement policy “because of the consequences,” it
apparently compared the costs of replacing thousands of chips
with the benefit of solving such an “extremely minor problem”
by full replacement, and it concluded that the costs outweighed
the benefits. In terms of monetary costs, the decision may have
been right. A $475 million cost is certainly significant. And
Intel was convinced that it would benefit only a few customers.
Indeed, in the end it seemed to benefit only 10% of them.
When an action that will cost a great deal is for the good
of only a few, it may seem like the wrong action to take.
Tom Sorell makes this argument in his article, “The Customer
is Not Always Right.” Sorell contends that a business is
justified in asking: “Is deference to the customer likely to
cause business failure or significant loss of profitability while
preventing at most minor harm to the customer?” [37, p.
917]. If the answer is “yes,” the company may be forgiven
for declining to meet its customers’ demands. He cites as
a case in point the 1988 salmonella health scare in Britain
that devastated many egg producers. The media reported a
government agency’s suggestion that eggs posed a health risk,
but it turns out that the evidence was shaky. Sorell contends
that egg producers, had they had the chance, would have been
under no moral obligation to issue warnings or otherwise incur
costs in preventing a problem that might never occur [37].
In Intel’s case, the egg producers’ case, and other similar
cases, however, the question is really not “Will this cost us?”
but “How much will this cost us and in what ways?” For
no matter what decisions a business makes, and no matter
how unfairly it may be forced to make them, it incurs costs
in either monetary or nonmonetary ways. And sometimes the
nonmonetary costs can be very high.
Two nonmonetary costs that Intel needed to consider were
external failure costs and opportunity costs. External failure
costs are those that a company incurs when a product fails
once it reaches the customer. They include costs that can be
14. measured, such as returns, recalls, complaint handling, and
warranty servicing, as well as costs that cannot be measured,
such as a loss in future market share because of customer
dissatisfaction [38]. These costs may be very high for a
company
because in competitive markets (chip markets certainly
qualify), a company can quickly lose market share if its
products do not conform to its customers’ quality expectations
[39]. So even though Intel was the only game in town for
Pentium chips, as soon as an alternative became available,
it would be in danger of losing its customers. IBM was one
customer that was apparently willing to wait for an alternative.
Intel was fortunate that it changed its policy before one came
along.
Another cost that is hard to measure but that a business
must consider in any decision is opportunity cost. When a
company expends resources to take advantage of one
opportunity,
the same resources are then unavailable to pursue another
opportunity. So the opportunity costs of a decision are all the
other opportunities that the company foregoes in making that
decision [36]. In terms of external costs, whatever a company
spends to fix the problems caused by a substandard product
is then unavailable to spend on new product development,
advertising, other customer services, or anything else. The time
and money that Intel spent to conduct emergency meetings,
communicate over the Internet, operate the hotlines, put extra
staff in stores, respond to the media, and finally replace the
product could have been used for many other more productive
purposes. When Intel chose to distribute the flawed chips, to
keep the flaw a secret, and to deny its customers a replacement,
Intel missed three chances to lower its opportunity costs.
If Intel considered the external failure and opportunity costs
of its original policy decision, it underestimated them. One
cannot really fault Intel, however, if it tried to consider these
Authorized licensed use limited to: IE Xplore. Downloaded on
15. May 13,2010 at 1:5:19 UTC from IE Xplore. Restrictions aply.
www..DoownnllooaaddPPaappeerr..iirr
WILLIAMS: INTEL’S PENTIUM CHIP CRISIS: AN ETHICAL
ANALYSIS 17
costs but just did not have enough information to realize them.
Grove’s admission that he “didn’t know until the end what the
real objection was” indicates that lack of information probably
kept Intel from effectively applying utilitarian principles. If
this is the case, then while Intel initially made a wrong
decision, it did not have unethical motives [36].
The principles of rights theories require less information
to apply. These theories are based upon our duties to one
another. Companies frequently apply both utilitarian and rights
principles to come to ethical decisions, because the theories
complement each other by filling in considerations that the
other seems to miss [35]. Intel eventually recognized its
customers’ rights, and this recognition plus some further
utilitarian considerations helped the company solve its crisis.
Kantian Ethics: The Customers’ Rights
Grove’s statement of “the right thing” suggests that some
concept of goodness—some standard—may exist which is
not dependent upon a “greatest good” outcome. Perhaps it
was Intel’s duty to regard issues other than those of costs
vs. benefits. If the company had a duty to act some way in
response to the Pentium problem, its customers had a right to
expect that they would be the recipients of this action.
Ethical standards which are based upon our duties toward
one another may be explained by the philosophy of Immanuel
Kant. Kantian ethics are based upon two different variations of
Kant’s famous Categorical Imperative. He writes, “Therefore
there is only one categorical imperative, namely this: Act only
on a maxim by which you can will that it, at the same time,
should become a general law” [40, p. 170]. Within this principle
are the concepts of reversibility and universalizability.
Reversibility requires that behavior determined to be morally
right be moral whether it is directed toward yourself or toward
16. someone else. It “requires that you not make an exception of
yourself” [35, p. 19]. Stealing is easily recognized as immoral
with this test. Universalizability is similar but expanded. An
action is moral only if you and I and everyone could do it
and still have a desirable society. Lying is discouraged by this
test. If everyone lied to everyone, no one could ever know
who was telling the truth, and this would create an undesirable
society [35]. According to these principles, Intel needed to ask:
If we decide to disregard our customers’ concerns, would it
be all right for them to disregard ours? and, If we choose
to withhold information regarding product quality from our
customers, would it be all right for everyone (such as our
suppliers) to do the same to us? [30].
A company needs little information in order to ask these
questions and apply Kant’s principle. In fact, the principle is
almost intuitive. Kant says, “The common reason of men in
their practical judgments agrees perfectly with this and always
has in view the principle suggested here” [40, p. 150]. And
later: “Therefore, I do not need any sharp acumen to discern
what I have to do in order that my will may be morally
good. [As I am] inexperienced in the course of the world
and incapable of being prepared for all its contingencies, I
can only ask myself: ‘Can you will that your maxim should
also be a general law?”’ [40, p. 151]. Even without “being
prepared for all contingencies,” Intel could have thought about
fairness, which would have required that the company treat its
customers only as it would want or expect to be treated by
others. This was its duty; customers had a right to be given
this consideration.
Kant varies the categorical imperative to include the concept
of respect for the “will of a rationale being” [40, p. 175]
by writing: “Accordingly, the practical imperative will be as
follows: Act so as to treat man, in your own person as well
as in that of anyone else, always as an end, never merely as a
means” [40, p. 178]. In other words, people should be treated
as people, not as things or merely as the means to achieve
17. things. Velasquez gives a good explanation:
For Kant this means two things: 1) respecting each person’s
freedom by treating people only as they have freely
consented to be treated beforehand and 2) developing
each person’s capacity to freely choose for him or herself
the aims he or she will pursue. On the other hand, to
treat a person only as a means is to use the person
only as an instrument for advancing my own interests
and involves neither respect for, nor development of,
the person’s capacity to choose freely [30, p. 81].
As with utility, applying the principles of treating customers
fairly and valuing them as people apart from being the means
to an economic end is not easy. It can be expensive for a
company. For example, most of us are familiar with Johnson
& Johnson’s TYLENOL crisis. But that was not the only time
the company incurred a high cost to put its customers first.
Before the harmful effects of sun rays were widely known, J
& J began an ad campaign to market baby oil as suntan oil.
The ads were very successful, but when management at J &
J learned of the possible health hazard, they discontinued the
campaign, which resulted in a $5 million drop in sales [24].
But it did not destroy the company. J & J shifted its resources
into another opportunity and kept going [24]. The company
met both the Kantian imperative to treat its customers as ends
and the utilitarian standard of mitigating unhappiness.
Intel too needed to apply Kantian principles to deal fairly
with customers regarding the Pentium chip. For example, Intel
erred when it acted paternalistically toward its customers.
Intel’s policy of deciding who needed a new chip and who
did not demonstrated a “father knows best” attitude [28, p.
18]. Andrew Grove admitted that, “we got caught between
our mindset, which is a fact-based, analysis-based engineer’s
mindset, and customers’ mindset, which is not so much
emotional but accustomed to making their own choice” [14,
p. B7].
This angered consumers because they felt that they were not
18. getting what they had bargained for. The Wall Street Journal
quoted an Internet message from a customer in North Carolina:
“I’m mad as hell at the suggestion that Intel would ask me for
proof of what I’m using the chip for before offering to replace
it. I paid out my hard-earned dollars for a chip and I want
it to operate 100 percent or I want my money back” [12, p.
B4]. An Internet user quoted in Computerworld said, “Intel
should replace anyone’s chip that wants a new chip. The folks
paid for an IEEE floating point unit, and the current Pentium
does not meet that specification. Intel has no right telling me
Authorized licensed use limited to: IE Xplore. Downloaded on
May 13,2010 at 1:5:19 UTC from IE Xplore. Restrictions aply.
www..DoownnllooaaddPPaappeerr..iirr
18 IEEE TRANSACTIONS ON PROFESSIONAL
COMMUNICATION, VOL. 40, NO. 1, MARCH 1997
or anyone else what I need. It’s my money, not theirs. I buy
what I want” [7, p. 14].
Intel’s customers had a right to have what they paid for.
In order to obtain a Pentium chip, the customer had to meet
a price expectation. Likewise, in order to obtain a customer’s
money, Intel was assumed to meet a quality expectation. This
coincides with the previous utilitarian discussion about living
up to expectations that a company creates. When Intel failed
to do this, it failed to live up to the bargain. It did not respect
the right the consumer had to a chip that would “operate 100
percent.” Kant wrote, “Here there is no question of inclination,
only of the rights of others. It is not their needs that count in
this connexion, but their rights ” [41, p. 193]. Intel was
wrong to base chip replacement on its own definition of need.
It indeed owed a new chip to any customer that wanted one.
Intel corrected its error in implementing a by-request
replacement
policy. Also, it decided to disclose future flaws
and let the consumer make his/her own decision regarding
quality. These policies were what Intel’s customers wanted all
along [4]. As evidenced by how few people actually requested
19. replacement chips, the real desire of its customers was to
“make their own choice.”
Intel needed to apply Kantian principles to its communication
with customers during the crisis as well. If we were
to review all of Intel’s communication errors, we would find
that several caused public relations problems. For example, in
response to Grove’s “electronic faux pas” [42, p. 1] of posting
his Internet apology from a different address, an article in
Advertising Age’s Business Marketing sports the embarrassing
headline “Intel wipes out surfing the ‘Net’” [42, p. 1]. If we
narrow our focus to the communication errors that caused
ethical problems, we can see instances where Intel could have
avoided the problems by applying the principles of respecting
the customer’s rights to be treated fairly and to make informed
choices.
The first communication error Intel made was deciding at
the outset to withhold information about the Pentium chip’s
problem. This decision was unethical based on the notions
of reversibility and universalizability. As well, withholding
the information denied its customers free choice. InfoWorld
states that the company usually “meticulously” documented
chip errors on errata sheets but chose not to with the Pentium’s
flaw [43, p. 18]. It should have followed its usual procedure
and documented the error, letting its customers decide how
significant the error would be to their applications. By coming
around to a full disclosure policy, Intel has taken action to
avoid this error in the future.
Another communication error involved Intel’s use of technical
and statistical arguments. Intel based many of its early
crisis management decisions on the statistical probability that
the Pentium’s flaw would be encountered only once every
27 000 years. Even as Intel apologized in national newspapers,
it maintained that the Pentium chip’s problem was “extremely
minor” and that its processors were “second to none.” It had
faith in its technology.
The company tried to use its technical expertise to deal
20. with the crisis. When Intel first established its “800” phone
line, it staffed the line with technologists to explain things
to customers and to determine who would qualify for a
replacement chip [13]. This created both public relations and
ethical problems as explained by Ian K. Mitroff, director of
the USC Center for Crisis Management: “This assumes that
everyone is a scientist or a statistician; numbers do not treat
people as humans and therefore alienate them even further”
[44, p. B7]. As we saw from Kant’s practical imperative, it is
important ethically that people be treated as humans. Barraging
people with numbers does not promote this principle. It is also
poor public relations.
INDUSTRY IMPLICATIONS
As a whole, the computer industry does not have a very
good record for delivering perfectly working products to its
customers. T. R. Reid, a Washington Post columnist, originally
tried to defend Intel’s conditional replacement policy, but later
understood his readers’ frustrations after being inundated with
letters from them. He explains the industry problem well: “The
underlying problem is that the PC business has developed
a tolerance for subpar products Flawed products are so
common that the computer magazines run regular columns
listing recently discovered bugs in best selling products [32,
p. 16]. Note that even in its apology letter, Intel said that “no
microprocessor is ever perfect.” And the man who blew the
whistle on the Pentium chip, Professor Nicely, has said, “All
chips have bugs. The chips we’re using now are some of the
most complicated we’ve every produced and I think they’ve
reached a level of complexity such that you can’t completely
debug them. You not only can’t eliminate all the errors, I
don’t even think in the lifetime of a chip it would be possible
to catalogue all the errors” [8, p. A16].
Will Intel’s experience change all of this? No, because insofar
as Nicely is right that it is impossible to eliminate all bugs,
we as consumers will still encounter them. However, Andrew
Grove’s prediction of “big implications for the company and
21. the industry” could still come true. Industry sources have said
that this is likely in the following ways:
• Intel’s full disclosure policy will cause others in the
industry, such as those who manufacture software and
computer-related items, to reveal bugs in their products
too [45]. While a product may not be error-free, consumers
will at least be able to decide for themselves which
errors are important to them. In May 1995, just following
Intel’s crisis, Hewlett-Packard announced that it had
found a flaw in some of the computer equipment it had
recently sold, and the company made this announcement
before it had received any customer complaints about the
problem [46]. This type of disclosure exemplifies what
could become a new industry standard.
• Companies in the industry will take the customers’ views
more seriously. This crisis has shown how indignant
customers can create, as Ed Foster, editor of InfoWorld
calls it, a “very big hammer, one that no company is too
powerful to ignore” [27, p. 52]. Consumers have proven
that they can force themselves to be heard by companies
who do not listen to their concerns. As one analyst stated,
Authorized licensed use limited to: IE Xplore. Downloaded on
May 13,2010 at 1:5:19 UTC from IE Xplore. Restrictions aply.
www..DoownnllooaaddPPaappeerr..iirr
WILLIAMS: INTEL’S PENTIUM CHIP CRISIS: AN ETHICAL
ANALYSIS 19
“There’s much to be learned from the Pentium problem,
but most important of all is that the consumer is boss,
like it or not” [28, p. 18].
CONCLUSION
Acting ethically is in Intel’s, or any company’s best interests.
Intel made some ethical errors by not respecting the rights
of its customers. The company also made utilitarian errors,
some of which were probably caused by lack of information.
The most basic information can be obtained, however, by
asking questions based on Kantian principles, such as, “If I
22. act this way toward my customers, would it be all right if
they (and others) act the same way toward me?” The answer
would have prompted Intel to respect its customers’ rights and
to implement its final policy at the start.
To its credit, Intel finally came around to respecting its
customers’ rights, which correspondingly promoted their
happiness.
When it decided to give a new chip to anyone who
requested one, to disclose all future chip flaws, and to
communicate
its concern and solutions to the public, Intel reflected
the ethical principles of fairness and the pursuit of the “greatest
good.” And if the Pentium chip crisis serves to promote these
principles industry wide, this will increase happiness for all of
us, “nontechnical people” and “technical people” alike.
REFERENCES
[1] “Take my Pentium chip. Please,” New York Times, sec. 3, p.
11, Dec.
18, 1994.
[2] S. K. Yoder, “Technology: The Pentium proposition: To buy
or not to
buy,” Wall Street J., p. B1, Dec. 14, 1994.
[3] A. Gonzalez-Herrero and C. B. Pratt, “How to manage a
crisis before—
or whenever—it hits,” Public Relations Quart., vol. 40, no. 1,
pp.
25–29, Spring 1995.
[4] N. R. Augustine, “Managing the crisis you tried to prevent,”
Harvard
Bus. Rev., vol. 73, iss. 6, pp. 147–158, Nov.–Dec. 1995.
[5] M. Gibbs, “Intel Inside: An unknown quality,” Network
World, p. 26,
Dec. 5, 1994.
[6] H. Beh, “Lessons in the price of arrogance,” Asian Bus., p.
67, Mar.
1995.
23. [7] J. Vijayan, “Intel miscalculates Pentium user backlash,”
Computerworld,
pp. 1+, Dec. 5, 1994.
[8] P. Baker, “Hello, Mr. Chips: Va. teacher who found Intel’s
flaw,”
Washington Post, pp. A1+, Dec. 16, 1994.
[9] J. Markoff, “Intel’s crash course on consumers,” New York
Times, pp.
D1+, Dec. 21, 1994.
[10] , “The chip on Intel’s shoulder,” New York Times, sec. 4,
p. 6,
Dec. 18, 1994.
[11] B. Crothers, “Pentium woes continue: Faulty FPU flubs
math in certain
equations,” InfoWorld, pp. 1+, Nov. 28, 1994.
[12] D. Clark, “Some scientists are angry over flaw in Pentium
chip, and
Intel’s response,” Wall Street J., p. B4, Nov. 25, 1994.
[13] E. Corcoran, “The glitch that stole Intel Corp.’s
Christmas,” Washington
Post, pp. A1+, Dec. 19, 1994
[14] J. Carlton and S. K. Yoder, “Humble pie: Intel to replace
its Pentium
chips,” Wall Street J., p. B1+, Dec. 21, 1994.
[15] D. Clark, “Intel’s Grove airs apology for Pentium over the
Internet,”
Wall Street J., p. B6, Nov. 29, 1994.
[16] L. Helm, “Intel’s handling of the Pentium defect chips at
its image,”
Los Angeles Times, pp. D1+, Dec. 13, 1994.
[17] Intel Corp. Advertisement, Wall Street J., p. A7, Dec. 21,
1994.
[18] K. Bertrand, “Intel starts to rebuild,” Advertising Age’s
Business Marketing,
pp. 1+, Feb. 1995.
[19] B. Crothers, “Intel learns from Pentium problem, changes
24. policy on chip
flaws,” InfoWorld, p. 37, Feb. 6, 1995.
[20] T. Quinlan, “Intel recovers from Pentium woes with record
profits,”
InfoWorld, p. 12, Apr. 24, 1995.
[21] The Business Roundtable, “The challenge is being
addressed; The effort
must continue,” in Corporate Ethics: A Prime Business Asset, a
compiled
report, Feb. 1988, pp. 3–10.
[22] K. R. Andrews, “Ethics in policy and practice at General
Mills,” in
Corporate Ethics: A Prime Business Asset, a compiled report,
Feb. 1988,
pp. 41–52.
[23] The Ethics Resource Center, Inc., “Xerox programs in
business ethics
and corporate responsibility,” in Corporate Ethics: A Prime
Business
Asset, a compiled report, Feb. 1988, pp. 131–138.
[24] L. L. Nash, “Johnson & Johnson’s credo,” in Corporate
Ethics: A Prime
Business Asset, a compiled report, Feb. 1988, pp. 77–104.
[25] R. D. Haas, “Ethics–A global business challenge,” Vital
Speeches of
The Day, pp. 506–509.
[26] G. Cavanagh, D. Moberg, and M. Velasquez, “The ethics of
organizational
politics,” Academy of Management Rev., vol. 6, no. 3, pp.
363–374, 1981.
[27] E. Foster, “Customers’ victory over Intel gives rise to a
new sense of
hope” (Editorial), InfoWorld, p. 52, Jan. 16, 1995.
[28] A. Stanton, “Pentium brouhaha a marketing lesson,”
Advertising Age,
p. 18, Feb. 20, 1995.
25. [29] J. S. Mill, “Utilitarianism,” in John Stuart Mill A Selection
of His Works,
J. M. Robson Ed. New York: Odyssey Press, 1966, pp. 150–228.
[30] M. G. Velasquez, Business Ethics: Concepts and Cases, 3rd
ed. Englewood
Cliffs, NJ: Prentice-Hall, 1992.
[31] T. Stevens, “Quality is still free” (interview with Philip
Crosby),
Industry Week, pp. 13–14, June 19, 1995.
[32] T. R. Reid, “Doing penance for defending the Pentium
chip,” Washington
Post, sec. WBIZ, p. 16, Feb. 6, 1995.
[33] L. Flynn, “Some companies report Pentium problem,” New
York Times,
pp. D1+, Dec. 19, 1994.
[34] L. Helm, “Pentium chip flaw could leave Intel liable for
damages,” Los
Angeles Times, pp. D1+, Dec. 16, 1994.
[35] T. L. Beauchamp and N. E. Bowie, “Ethical theory and its
application
to business” in Ethical Theory and Business, T. L. Beauchamp
and N.
E. Bowie, Eds. Englewood Cliffs, NJ: Prentice-Hall, 1979, pp.
1–28.
[36] P. Primeaux and J. Stieber, “Profit maximization: The
ethical mandate
of business.” J. Business Ethics, vol. 13, iss. 4, pp. 287–294.
Apr. 1994.
[37] T. Sorell, “The customer is not always right,” J. Business
Ethics, vol.
13, iss. 11, pp. 913–918, Nov. 1994.
[38] K. G. Rust, “Measuring the costs of quality, Management
Accounting,
pp. 33–37, Aug. 1995.
[39] A. Diallo, Z. Khan, and C. Vail, “Cost of quality in the
new manufacturing
26. environment,” Management Accounting, pp. 20–25, Aug.
1995.
[40] I. Kant, Metaphysical Foundations of Morals in The
Philosophy of Kant:
Immanuel Kant’s Moral and Political Writings, C. J. Friedrich,
transl.
and ed. New York: Random House, 1949, pp. 140–208.
[41] , “Ethics: duties toward others” in Lectures on Ethics, L.
Infiel,
transl. Indianapolis, IN: Hacket, 1963, pp. 191–200.
[42] J. G. Kimball, “Intel wipes out surfing the ‘Net’,”
Advertising Age’s
Business Marketing, pp. 1+, Jan. 1995.
[43] B. Crothers, “Vendors fail users’ trust,” InfoWorld, pp. 1+,
Dec. 19,
1994.
[44] I. K. Mitroff. “Inside Intel: A perception problem”
(commentary), Los
Angeles Times, p. B7, Dec. 22, 1994.
[45] B. Johnson, “Will ‘95 be the year of the Pentium?”
Advertising Age, p.
23, Jan. 30, 1995.
[46] J. Schwartz, “Newly released HP gear may be flawed,”
Communications
Week, p. 78, May 1, 1995.
CindyWilliams is attending classes in the Technical
Communication Master’s
program at Boise State University. She has not been employed
“officially” as
a technical writer, but has written many technical documents
throughout her
business career. This is her first published article.
Authorized licensed use limited to: IE Xplore. Downloaded on
May 13,2010 at 1:5:19 UTC from IE Xplore. Restrictions aply.
Assignment 8
27. As an up-and-coming middle manager, you have been tasked
with conducting a presentation on organizational integrity and
social responsibility at an upcoming middle and senior
management retreat. Knowing that you have just completed this
course, this is your opportunity to shine. However, your
company has had its share of issues with problematic products
and services. You want to promote ethical practices but not at
the expense of pointing fingers at your own organization. You
instead decide to use course concepts through an example of
other companies’ unethical practices to identify potential issues
and promote ethical integrity within your own organization.
You decide to use Intel as the example company within your
presentation at the retreat. Prepare a PowerPoint presentation in
which you validate the key flaws in Intel’s five-point plan. In
your presentation, be certain to address the following important
concepts:
· Ethical integrity and why it is important;
· The role of ethics in business;
· The advantages of corporate social responsibility;
· Ethics and company culture; and
· Employees, technology and ethical responsibilities.
· Then, include brief examples of three additional companies
who fell prey to the same types of pressures – thus illustrating
how Intel is clearly not alone.
· Conclude with a list of general actions for an organization so
as to avoid the decision-making pitfalls to which Intel and
others had succumbed.
Incorporate appropriate animations, transitions, and graphics as
well as “speaker notes” for each slide. The speaker notes may
be comprised of brief paragraphs or bulleted lists.
Support your paper with a minimum of five (5) scholarly
resources in addition to your text. In addition to these specified
resources, other appropriate scholarly resources, including older
28. articles, may be included.
Length: 15-20 slides (with a separate reference slide)
Notes Length: 150-200 words for each slide
Be sure to include citations for quotations and paraphrases with
references in APA format and style where appropriate.
Save the file as PPT with the correct course code information.
Upload your assignment using the Upload Assignment button
below.