Bus 4951-8 Unit VIII Project
Implementation Plan: Part 3
For the final assignment of this course, you will continue your work with the company you used in Unit 4 and Unit 6 which was Buffalo Wild Wings, Inc., 2013. For the Unit 8 Project, you will complete the final components of your implementation plan.
For Part 3, you will focus on the following points:
· internal and external issues,
· competition ,
· future outlook for the organization, and
· Implementation of tools for measuring business success.
Much of the information you will need to complete this segment can be found in the case study in the textbook. However, you are welcome to conduct further research as needed. For the future of the organization, you may be creative and add your own insight on where you see the company going.
Your project must be a minimum of three full pages in length, not including the title and reference page. Make certain to include an introductory paragraph.
Below is the information from Unit 4 and 6.
Buffalo Wild Wings, Inc., 2013
www.buffalowildwings.com , BWLD
Headquartered in Minneapolis, Minnesota, Buffalo Wild Wings (BWW) is the largest chicken wing–based sports bar in the USA. BWW offers a welcoming atmosphere, open layout catering to families, sports enthusiasts, and chicken wing lovers. The typical store offers 20 to 30 different beers on draft and tap, up to 10 projection TV screens, and up to 50 smaller TVs for people to watch sporting events.
BWW specializes in traditional bone-in chicken wings and boneless chicken wings complimented by its 16 different wing sauces. BWW also sells burgers, other finger foods, and alcoholic beverages. The typical restaurant offers a diverse selection of beers, wines, and liquor options. As of year end 2012, BWW operated 891 stores of which 381 were company-owned and 510 were franchisee-owned. The company expects to increase its total number of restaurants by 105 in 2013 and approximately by the same amount in 2014. The typical restaurant is between 4,000 and 10,000 square feet and costs around $2 million to build, including the land, building, appliances, etc. Each has 50 high-definition flat-screen TV’s and 10 large projection screen TV’s. Takeout orders comprise 14 percent of BWW sales.
In their company-owned restaurants, BWW employs 25,500 people, 2,800 full-time and 22,300 part-time, which it calls team members. Five of the top nine executives are females including the CEO, Sally J. Smith. BWW operates its 817 stores in 48 U.S. states and Canada. BWW opened five new restaurants in 2012 on the parking lots of big-box retail stores such as Home Depot. BWW expects to have 1,500 restaurants in the USA and Canada by 2016, and many of them will be in vacant space of Sears stores, parking lots, and malls.
Copyright by Fred David Books LLC. (Written by Forest R. David)
History
In 1981, James Disbrow, from Buffalo, New York, along with friend, Scott Lowery, went looking for a Buffalo-style chicken wing restaurant aro ...
Buffalo Wild Wings, Inc., 2013
www.buffalowildwings.com , BWLD
Headquartered in Minneapolis, Minnesota, Buffalo Wild Wings (BWW) is the largest chicken wing–based sports bar in the USA. BWW offers a welcoming atmosphere, open layout catering to families, sports enthusiasts, and chicken wing lovers. The typical store offers 20 to 30 different beers on draft and tap, up to 10 projection TV screens, and up to 50 smaller TVs for people to watch sporting events.
BWW specializes in traditional bone-in chicken wings and boneless chicken wings complimented by its 16 different wing sauces. BWW also sells burgers, other finger foods, and alcoholic beverages. The typical restaurant offers a diverse selection of beers, wines, and liquor options. As of year end 2012, BWW operated 891 stores of which 381 were company-owned and 510 were franchisee-owned. The company expects to increase its total number of restaurants by 105 in 2013 and approximately by the same amount in 2014. The typical restaurant is between 4,000 and 10,000 square feet and costs around $2 million to build, including the land, building, appliances, etc. Each has 50 high-definition flat-screen TV’s and 10 large projection screen TV’s. Takeout orders comprise 14 percent of BWW sales.
In their company-owned restaurants, BWW employs 25,500 people, 2,800 full-time and 22,300 part-time, which it calls team members. Five of the top nine executives are females including the CEO, Sally J. Smith. BWW operates its 817 stores in 48 U.S. states and Canada. BWW opened five new restaurants in 2012 on the parking lots of big-box retail stores such as Home Depot. BWW expects to have 1,500 restaurants in the USA and Canada by 2016, and many of them will be in vacant space of Sears stores, parking lots, and malls.
Copyright by Fred David Books LLC. (Written by Forest R. David)
History
In 1981, James Disbrow, from Buffalo, New York, along with friend, Scott Lowery, went looking for a Buffalo-style chicken wing restaurant around the campus of Kent State University in Ohio while judging a figure skating competition. Unable to find a satisfactory restaurant in the area similar to what they knew was good from back home, the concept of opening Buffalo Wild Wings and expanding this tradition of Buffalo, New York, to other areas of the country was born. The first restaurant named Buffalo Wild Wings & Weck or BW3, was opened in Columbus, Ohio, in 1982 near the campus of Ohio State University. In 1991, BWW began its franchising program and in 2003 the company completed its initial public offering.
Vision and Mission
BWW refers to its mission statement in its code of ethics, but the firm does not provide an explicit mission or vision statement on its website or its annual report. However, BWW does provide its “concept and business strategy” as follows:
· Continue to strengthen the Buffalo Wild Wings brand
· Deliver a unique guest experience
· Offer boldly-flavored menu items with broad appeal
· Create an inviting, nei ...
Kohl's is a large department store chain founded in 1962 in Wisconsin. It has grown to over 1,100 stores across the U.S., making it the largest department store by number of locations. Kohl's mission is to be a family-focused and value-oriented store offering quality brands at affordable prices in a convenient environment. The company aims to achieve this through its "Greatness Agenda" focused on amazing products, incredible savings, easy shopping experiences, personalized connections, and high-performing employees. While department stores face challenges from online retailers, Kohl's maintains profitability through strategic initiatives and remains optimistic about reaching $21 billion in sales by 2017.
This document analyzes Coca-Cola's financial statements and business strategies. It begins with an analysis of Coca-Cola's governance, including details about the CEO, board of directors, and executive compensation. It then discusses Porter's Five Forces analysis of the soda industry, finding rivalry to be high but threats of new entrants and substitutes to be medium. The document also analyzes Coca-Cola's income statements, balance sheets, profitability, and forecasts growth.
Business Plan AssignmentThe business plan is a document that proTawnaDelatorrejs
Business Plan Assignment
The business plan is a document that provides a detailed description of the critical aspects of your venture. It is not a static document and serves as a guiding document for venture launch and management. It also serves as a communication tool for potential investors and employees. For this class each major section of the business plan is assigned as the material is covered. Points are allotted for each section and for combining all the sections into a complete business plan.
Business Description/Model
· Utilizing your completed business model canvas summarize it into a 2-3 page business model section
Grading Rubric will be based on detail, completeness and clarity of the entire section. This section is worth 50 points.
Marketing Section
· Competitive Analysis
· Market Research
· Pricing Analysis
· Marketing plan
Grading Rubric will be based on detail, completeness and clarity of each of the four sections. Each section is worth 25 points for a total of 100 points.
Financials Section
· Cost Analysis Worksheet – Utilizing the worksheet posted on Blackboard complete a 3 year cost analysis.
· Revenue Projections Analysis – Using your market research data and other information forecast 3 years of sales.
· Complete pro forma income statements and balance sheets for 3 years. Examples are provided on Blackboard.
Grading Rubric: The overall points for this section is 100 points. Grading will be based on detail, completeness and clarity. Each section is worth 33.33 points.
Operations/Management Section
· Legal Structure
· Staffing,
· Location, Logistics, etc.
· Critical Risks
· Harvest Strategy
Grading Rubric: The overall points for this section is 100 points. Grading will be based on detail, completeness and clarity. Each part of this section is worth 20 points.
Business Plan Draft
· Include previously written sections and the following:
· Title page and table of contents
· Executive Summary for the beginning of the plan
· Business Model
· Marketing section
· Financial Section
· Operations/Management Section
· Appendices
Grading Rubric: The overall points for this section is 50 points. Grading will be based on detail, completeness and clarity. Grading of this assignment will be based on the student’s ability to integrate the various sections of the plan and add the front matter (title page, table of contents, executive summary) and the appendices. The goal of this assignment is to provide you with feedback on your business plan so you can improve it for the final grade. Grades will be assigned in the following manner:
Excellent = 47-50pts
High Quality = 44-46pts
Good = 40-43pts
Acceptable = 35-39pts
Needs Considerable Work = 30-34pts
Unacceptable = 0pts
Business Plan Final
Grading Rubric: The overall points for this section is 100 points. Grading will be based on detail, completeness and clarity. Grading of this assignment will be based on the student’s ability to integrate feedback from the instructor, improve det ...
Bagr september 2015 investor presentation finaldrhincorporated
This document provides an overview of Diversified Restaurant Holdings, Inc. (DRH) and its two brands: Buffalo Wild Wings and Bagger Dave's Burger Tavern. DRH is the largest franchisee of Buffalo Wild Wings with 85 total locations across its brands. It has achieved strong growth through new openings as well as acquisitions. The presentation discusses DRH's management team, financial performance, growth strategies, and unit economics. It also provides details on the Buffalo Wild Wings and Bagger Dave's concepts, including their designs, menus, and marketing approaches.
Previous Assignments for referenceBusiness_plan_financials.xlsx.docxChantellPantoja184
Previous Assignments for reference/Business_plan_financials.xlsx
Sheet1Business Plan Financials ITEMQUANTITYCOSTPERSONNEL1Full-time Project Coordinator Including on-costs. $52,500EDUCATION & TRAININGGP workshops4 @ $450$1,800Practice staff workshops Seminar for Marketing and Sales Person professionals2 @ $ 600$1,200Practice sales & marketing workshops 1 @ $1,000$1,0002 @ $550$1,100PROJECT RESOURCESReferral resource600 @ $1 per cardDesign and printing of cards x 500 Production of CD Roms x 50 ‘Guide on Depression in the Elderly’ leafletDesign and printing of leaflet x 10,00050 @ $5 per CD$600Invitation to Sales and Marketing professionals Seminar Design and printing of invitation x 500$500Additional pamphlets. Design and printing of posters x 200$250Video Editing and production of video x 100 10,000 @ 35 cents per leaflet$3,500 500 @ 50 cents per invitation$250$2,000$2,000$600$2,000$5,000200 @ $3 per poster100 @ $500PROMOTIONAdvertising 10 weeks of press advertising in 3 local papers 6 weeks of radio advertising on 3 local stations Media relationsBulk promotional rates may be availablea) Program launch – costs include venue, catering, AV, ancillary speakers costs, media packs etc. Costs estimated for 40-70 attendees. b). On-going Social Media campaign$ 3, 000$3,000$400MBC AWARENESS WEEKDisplays Coordination of volunteers10 volunteers @ $30 each$300Skits in Community Centers 10 volunteers @ 55 each550VOLUNTEER NETWORKMost of the costs will be incurred by sponsor. $6,000$6,000EVALUATIONFormative, process, impact and outcome evaluations Approx. 10% of total costsADMINISTRATIONOffice space and associated overheads (lighting, power etc)Offered by the agencyStationery, photocopying and printingMailing, telephone and faxTravel4, 5004500Documentation of Program Audit costs5,5005,500400400700700Offered by the AgencyTOTAL$93,250
Previous Assignments for reference/Mari_B_Company_Ass_1.docx
Mari Beverage Company 1
Running Head: MARI BEVERAGE COMPANY
Student Name
Business 599
Professor Name
July 19, 2015
Strayer University
Mari Beverage Company 2
Abstract
This paper will address the following:
1. Create your revised NAB company name and explain its significance.
2. Develop your revised company’s Mission Statement and provide a rationale for its components.
3. Describe the trends in the non-alcoholic beverage industry, especially the specific type of beverage category you have chosen. Justify at least three (3) reasons why you have chosen this type of non-alcoholic beverage.
4. Choose one (1) strategic position from the course text (pp. 142–143) that you believe is the best strategic position for your company. Explain the approach you will use to implement this strategic position in order to distinguish your beverage from other non-alcoholic beverages.
5. Provide an overview of your company’s distribution channels. Explain the manner in which your product will reach end.
PepsiCo is a leading food and beverage company that produces brands like Frito-Lay snacks, Pepsi, Gatorade, and Tropicana. The analyst initiates coverage with a hold recommendation and $87.57 price target. Key points are:
1) Emerging markets are a main driver of growth, with PepsiCo investing $5 billion in Mexico over 5 years.
2) EPS growth is supported by Frito-Lay, emerging markets strength, dividends, and share buybacks.
3) Healthy brands, cash flow, dividends and buybacks create shareholder value.
Buffalo Wild Wings, Inc., 2013
www.buffalowildwings.com , BWLD
Headquartered in Minneapolis, Minnesota, Buffalo Wild Wings (BWW) is the largest chicken wing–based sports bar in the USA. BWW offers a welcoming atmosphere, open layout catering to families, sports enthusiasts, and chicken wing lovers. The typical store offers 20 to 30 different beers on draft and tap, up to 10 projection TV screens, and up to 50 smaller TVs for people to watch sporting events.
BWW specializes in traditional bone-in chicken wings and boneless chicken wings complimented by its 16 different wing sauces. BWW also sells burgers, other finger foods, and alcoholic beverages. The typical restaurant offers a diverse selection of beers, wines, and liquor options. As of year end 2012, BWW operated 891 stores of which 381 were company-owned and 510 were franchisee-owned. The company expects to increase its total number of restaurants by 105 in 2013 and approximately by the same amount in 2014. The typical restaurant is between 4,000 and 10,000 square feet and costs around $2 million to build, including the land, building, appliances, etc. Each has 50 high-definition flat-screen TV’s and 10 large projection screen TV’s. Takeout orders comprise 14 percent of BWW sales.
In their company-owned restaurants, BWW employs 25,500 people, 2,800 full-time and 22,300 part-time, which it calls team members. Five of the top nine executives are females including the CEO, Sally J. Smith. BWW operates its 817 stores in 48 U.S. states and Canada. BWW opened five new restaurants in 2012 on the parking lots of big-box retail stores such as Home Depot. BWW expects to have 1,500 restaurants in the USA and Canada by 2016, and many of them will be in vacant space of Sears stores, parking lots, and malls.
Copyright by Fred David Books LLC. (Written by Forest R. David)
History
In 1981, James Disbrow, from Buffalo, New York, along with friend, Scott Lowery, went looking for a Buffalo-style chicken wing restaurant around the campus of Kent State University in Ohio while judging a figure skating competition. Unable to find a satisfactory restaurant in the area similar to what they knew was good from back home, the concept of opening Buffalo Wild Wings and expanding this tradition of Buffalo, New York, to other areas of the country was born. The first restaurant named Buffalo Wild Wings & Weck or BW3, was opened in Columbus, Ohio, in 1982 near the campus of Ohio State University. In 1991, BWW began its franchising program and in 2003 the company completed its initial public offering.
Vision and Mission
BWW refers to its mission statement in its code of ethics, but the firm does not provide an explicit mission or vision statement on its website or its annual report. However, BWW does provide its “concept and business strategy” as follows:
· Continue to strengthen the Buffalo Wild Wings brand
· Deliver a unique guest experience
· Offer boldly-flavored menu items with broad appeal
· Create an inviting, nei ...
Kohl's is a large department store chain founded in 1962 in Wisconsin. It has grown to over 1,100 stores across the U.S., making it the largest department store by number of locations. Kohl's mission is to be a family-focused and value-oriented store offering quality brands at affordable prices in a convenient environment. The company aims to achieve this through its "Greatness Agenda" focused on amazing products, incredible savings, easy shopping experiences, personalized connections, and high-performing employees. While department stores face challenges from online retailers, Kohl's maintains profitability through strategic initiatives and remains optimistic about reaching $21 billion in sales by 2017.
This document analyzes Coca-Cola's financial statements and business strategies. It begins with an analysis of Coca-Cola's governance, including details about the CEO, board of directors, and executive compensation. It then discusses Porter's Five Forces analysis of the soda industry, finding rivalry to be high but threats of new entrants and substitutes to be medium. The document also analyzes Coca-Cola's income statements, balance sheets, profitability, and forecasts growth.
Business Plan AssignmentThe business plan is a document that proTawnaDelatorrejs
Business Plan Assignment
The business plan is a document that provides a detailed description of the critical aspects of your venture. It is not a static document and serves as a guiding document for venture launch and management. It also serves as a communication tool for potential investors and employees. For this class each major section of the business plan is assigned as the material is covered. Points are allotted for each section and for combining all the sections into a complete business plan.
Business Description/Model
· Utilizing your completed business model canvas summarize it into a 2-3 page business model section
Grading Rubric will be based on detail, completeness and clarity of the entire section. This section is worth 50 points.
Marketing Section
· Competitive Analysis
· Market Research
· Pricing Analysis
· Marketing plan
Grading Rubric will be based on detail, completeness and clarity of each of the four sections. Each section is worth 25 points for a total of 100 points.
Financials Section
· Cost Analysis Worksheet – Utilizing the worksheet posted on Blackboard complete a 3 year cost analysis.
· Revenue Projections Analysis – Using your market research data and other information forecast 3 years of sales.
· Complete pro forma income statements and balance sheets for 3 years. Examples are provided on Blackboard.
Grading Rubric: The overall points for this section is 100 points. Grading will be based on detail, completeness and clarity. Each section is worth 33.33 points.
Operations/Management Section
· Legal Structure
· Staffing,
· Location, Logistics, etc.
· Critical Risks
· Harvest Strategy
Grading Rubric: The overall points for this section is 100 points. Grading will be based on detail, completeness and clarity. Each part of this section is worth 20 points.
Business Plan Draft
· Include previously written sections and the following:
· Title page and table of contents
· Executive Summary for the beginning of the plan
· Business Model
· Marketing section
· Financial Section
· Operations/Management Section
· Appendices
Grading Rubric: The overall points for this section is 50 points. Grading will be based on detail, completeness and clarity. Grading of this assignment will be based on the student’s ability to integrate the various sections of the plan and add the front matter (title page, table of contents, executive summary) and the appendices. The goal of this assignment is to provide you with feedback on your business plan so you can improve it for the final grade. Grades will be assigned in the following manner:
Excellent = 47-50pts
High Quality = 44-46pts
Good = 40-43pts
Acceptable = 35-39pts
Needs Considerable Work = 30-34pts
Unacceptable = 0pts
Business Plan Final
Grading Rubric: The overall points for this section is 100 points. Grading will be based on detail, completeness and clarity. Grading of this assignment will be based on the student’s ability to integrate feedback from the instructor, improve det ...
Bagr september 2015 investor presentation finaldrhincorporated
This document provides an overview of Diversified Restaurant Holdings, Inc. (DRH) and its two brands: Buffalo Wild Wings and Bagger Dave's Burger Tavern. DRH is the largest franchisee of Buffalo Wild Wings with 85 total locations across its brands. It has achieved strong growth through new openings as well as acquisitions. The presentation discusses DRH's management team, financial performance, growth strategies, and unit economics. It also provides details on the Buffalo Wild Wings and Bagger Dave's concepts, including their designs, menus, and marketing approaches.
Previous Assignments for referenceBusiness_plan_financials.xlsx.docxChantellPantoja184
Previous Assignments for reference/Business_plan_financials.xlsx
Sheet1Business Plan Financials ITEMQUANTITYCOSTPERSONNEL1Full-time Project Coordinator Including on-costs. $52,500EDUCATION & TRAININGGP workshops4 @ $450$1,800Practice staff workshops Seminar for Marketing and Sales Person professionals2 @ $ 600$1,200Practice sales & marketing workshops 1 @ $1,000$1,0002 @ $550$1,100PROJECT RESOURCESReferral resource600 @ $1 per cardDesign and printing of cards x 500 Production of CD Roms x 50 ‘Guide on Depression in the Elderly’ leafletDesign and printing of leaflet x 10,00050 @ $5 per CD$600Invitation to Sales and Marketing professionals Seminar Design and printing of invitation x 500$500Additional pamphlets. Design and printing of posters x 200$250Video Editing and production of video x 100 10,000 @ 35 cents per leaflet$3,500 500 @ 50 cents per invitation$250$2,000$2,000$600$2,000$5,000200 @ $3 per poster100 @ $500PROMOTIONAdvertising 10 weeks of press advertising in 3 local papers 6 weeks of radio advertising on 3 local stations Media relationsBulk promotional rates may be availablea) Program launch – costs include venue, catering, AV, ancillary speakers costs, media packs etc. Costs estimated for 40-70 attendees. b). On-going Social Media campaign$ 3, 000$3,000$400MBC AWARENESS WEEKDisplays Coordination of volunteers10 volunteers @ $30 each$300Skits in Community Centers 10 volunteers @ 55 each550VOLUNTEER NETWORKMost of the costs will be incurred by sponsor. $6,000$6,000EVALUATIONFormative, process, impact and outcome evaluations Approx. 10% of total costsADMINISTRATIONOffice space and associated overheads (lighting, power etc)Offered by the agencyStationery, photocopying and printingMailing, telephone and faxTravel4, 5004500Documentation of Program Audit costs5,5005,500400400700700Offered by the AgencyTOTAL$93,250
Previous Assignments for reference/Mari_B_Company_Ass_1.docx
Mari Beverage Company 1
Running Head: MARI BEVERAGE COMPANY
Student Name
Business 599
Professor Name
July 19, 2015
Strayer University
Mari Beverage Company 2
Abstract
This paper will address the following:
1. Create your revised NAB company name and explain its significance.
2. Develop your revised company’s Mission Statement and provide a rationale for its components.
3. Describe the trends in the non-alcoholic beverage industry, especially the specific type of beverage category you have chosen. Justify at least three (3) reasons why you have chosen this type of non-alcoholic beverage.
4. Choose one (1) strategic position from the course text (pp. 142–143) that you believe is the best strategic position for your company. Explain the approach you will use to implement this strategic position in order to distinguish your beverage from other non-alcoholic beverages.
5. Provide an overview of your company’s distribution channels. Explain the manner in which your product will reach end.
PepsiCo is a leading food and beverage company that produces brands like Frito-Lay snacks, Pepsi, Gatorade, and Tropicana. The analyst initiates coverage with a hold recommendation and $87.57 price target. Key points are:
1) Emerging markets are a main driver of growth, with PepsiCo investing $5 billion in Mexico over 5 years.
2) EPS growth is supported by Frito-Lay, emerging markets strength, dividends, and share buybacks.
3) Healthy brands, cash flow, dividends and buybacks create shareholder value.
This presentation discusses Molson Coors' strategic framework and priorities. It summarizes that Molson Coors aims to drive sustainable growth and long-term shareholder returns through brand-led profit growth, cash generation, and disciplined capital allocation with a focus on profit after capital charge. Key priorities for 2017 include integrating the MillerCoors acquisition, achieving cost savings, paying down debt, and delivering top- and bottom-line performance.
Stage 3 of the ProjectReflection Paper FINC 330U.docxwhitneyleman54422
Stage 3 of the Project
Reflection Paper
FINC 330
University of Maryland University College
ConAgra Brands Inc. is a company that deals with the manufacture of food. Like any other company, it has its financial report. The reports are not constant every year; they keep on changing each year. This is as a result of various reasons, which may cause an increase or a decrease in the financial income or expenditure. The net sales in the three years are almost constant apart from slight deviations. The cost of goods sold has shown an increment from 2014 to 2015, but in 2016, there was a decline. Regarding selling, general and administrative expenses in 2014 were high, in 2015 it decreased, but in 2016 it rose by 6%.interest expenses remained the same throughout the three years at 3%.
Additionally, asset amounts for the company have also stayed roughly the same over the past few years. On the other hand, the liabilities have decreased from 12,827.8 in 2015 to 9,595.8 in 2016. That is a decrease of 3,232 in just one year. Total assets also decreased from 2015 to 2016 with a balance starting at 17,437.8 and ending with a balance of 13,390.6. Equity, along with most other aspects of the company, has stayed within close range from year to year with a balance of 4,610 in 2015 and a balance of 3,794.8 in 2016.
From the financial statistics we have for the net income, income statement, balance sheet among others, it is evident that the company is not making a notable move. The trend seems to be downwards which means that the company is barely making profits. This could suggest that the company is operating using the same methods. To avoid the problem, it is advisable for them to focus on changing the current business models.
RECOMMENDATIONS.
For this company to improve its financial stability, the key thing is to initiate change in the way of operation. This is specifically in the business models that have a significant influence on the financial performance of a business.
Examine the lines of credit. It is hard for a company to operate without credit. Therefore borrowing funds should be done wisely. There should also be a good plan to repay the borrowed money to avoid instability. Borrowing should also be done when it is very necessary.
Review your production and overhead expenses. It is necessary to assess the level of expenses because they determine the level of profits. If the expenses are too much, it is likely that the firm will make little or no profits.
Create a cash flow budget helps to compare the income and expenditure of every month. With this, the company can know how to allocate the available funds in the most profitable way.
Inform the key employees on the effects of losses in the business. The management should make the employees aware that making losses is one of the worst things in business. This helps them to be careful enough to avoid the same.
It is also important to identify the chief customers. The company should ensure tha.
This document provides a business strategy report for Home Depot. It begins with an introduction to Home Depot's founding and operations. It then analyzes Home Depot's current performance, strategic posture including mission, vision and objectives, and current strategy which focuses on customer service, product authority, and productivity. The report also examines Home Depot's external environment using PESTLE analysis and Porter's Five Forces. It evaluates Home Depot's internal environment including corporate structure, resources, marketing, finances, and human resources. Alternative strategies are proposed and a recommended strategy of interconnected retail is provided, along with plans for implementation and contingencies.
This document is the 2015 annual report for LyondellBasell, one of the world's largest plastics, chemicals and refining companies. The summary is:
1) In 2015, LyondellBasell achieved record financial results including $8.1 billion in EBITDA and $4.4 billion in income from continuing operations, despite challenges in the energy sector.
2) Operations performed strongly with improved safety and reliability. Expansion projects in the US increased ethylene capacity and positioned the company for long-term growth.
3) The company returned over $6 billion to shareholders through dividends and share repurchases, placing it among the top performers in the S&P 500 for share
This document provides an investment recommendation and analysis of La-Z-Boy, Inc. (LZB) by John Milligan. Milligan initiates coverage of LZB with a BUY rating based on their lower cost operating model from supply chain improvements, quantifiable 4-4-5 strategy to increase retail stores and sales, and ample liquidity. Some risks include currency translation effects from a strong US dollar and supply concentration. Financial projections estimate continued revenue and profit growth through 2020. The analysis provides an industry and competitive overview of the home furnishings sector and positions LZB as the second largest US furniture manufacturer.
Abbott held its annual shareholders meeting on April 27, 2012. Chairman and CEO Miles White summarized Abbott's strong financial performance in 2011, despite economic challenges. He discussed Abbott's plan to separate into two publicly traded companies by the end of 2012 - a diversified medical products company retaining the Abbott name, and a pharmaceutical company called AbbVie. White highlighted the businesses, strategies, and leadership of the two new companies, which would build on Abbott's foundation and values.
The ABC Company manufactures and markets commercial grade fitness .docxmehek4
The ABC Company manufactures and markets commercial grade fitness equipment. The senior management team is meeting for its second annual strategic planning session. While strategic plans usually encompass 3–5 years of the planning horizon, the CEO has asked that, for now, everyone concentrate only on years 1–3.
At the conclusion of the session, staff members will begin working on their individual plans and budgets for the coming year. The accounting manager will end up compiling all the budgets for incorporation into the strategic plan book.
ABC Background and Current Situation
Company:
· ABC develops, domestically manufacturers, markets, and sells commercial-grade, strength-training fitness equipment, like that found in a health club.
· It has created a patented, revolutionary line of strength training equipment, which has clearly allowed the company to be positioned as the "innovative leader" in the market place, addressing the fitness trend of "core training."
· The company is considering adding a line of cardiovascular (CV) training equipment including treadmills and exercise bikes.
· Its entire staff is well respected in the industry.
· Although its sales are exclusively in the United States it has, from time to time, considered expanding into international sales. International market growth has historically been at a rate 5–8% faster than domestic sales
Products:
· The industry breaks its product groups into cardiovascular and strength-training products. The profitability/piece overall is greatest on the strength-training equipment although the dollar value of total industry sales is 2:1 in favor of the CV equipment. However, from a COGS perspective CV COGS is equal to strength COGS + 15%.
· While ABC has in fact developed a revolutionary line of strength equipment addressing core training, duplicating this innovation in the CV line has proven to be beyond the reach of any manufacturer in the industry in the last 10–15 years, primarily due to the very high cost of developing something truly revolutionary for a product line of relatively low-margin and high-warranty costs.
Industry:
· As the health and fitness craze continues in America and around the world, the overall market is expected to grow 5–8% a year.
· The overseas, international fitness equipment market is growing 5–8% faster than the domestic growth rate.
· There are currently seven bonafide manufacturers of this fitness equipment: the two largest offer "one stop shop" product offerings (CV and strength products) and garner the highest market share; the other five specialize only in either strength or CV only equipment. There is talk of one or more of the CV manufacturers merging with one or more of the strength manufacturers.
· The customers—primarily health clubs and YMCAs—are always seeking innovative products to help market their club as different than the one down the street and attract more new members.
· Most of the larger health clubs prefer to buy all fitness equipm ...
This paper presents the financial statement analysis of PepsiCo and Coca-Cola. The paper presents a description of the companies and an analysis of the firms’ performance using profitability ratios.
This document provides information on the top restaurant chains in the fast casual segment for 2013. It begins by highlighting Fazoli's as the #1 chain, noting their 5.1% sales increase in 2012 and longest sustained sales growth streak. McAlister's Deli comes in at #2, with plans to open 20 new locations by the end of 2013. Freebirds World Burrito is #3, having quadrupled in size since 2007 with plans for double digit growth in 2013.
Analysis of external communication media of the companyGeorgeDolezal
Wal-Mart uses various media to develop its reputation. It rates highly in visibility, transparency and consistency on its website which contains extensive company and product information. Its annual reports also score well by providing detailed financial and strategic information for shareholders. Wal-Mart aims to increase distinctiveness and transparency through targeted local TV ads and campaigns explaining its positive impact. It communicates regularly with shareholders through financial reports and investor-focused sections of its website and apps. Wal-Mart has been most successful engaging customers on Facebook and Twitter by frequently posting various content and responding to users.
Coca-Cola HBC si-a publicat recent cel de-al treilea raport integrat la nivel de grup. Acesta contine informatii referitoare la aspecte de business, dar si detalii despre performantele de sustenabilitate si guvernanta corporativa ale companiei.
O-I's acquisition of Vitro's food and beverage glass container business will expand O-I's presence in Mexico and Bolivia. The $2.15 billion all-cash deal values the target business at 7.0x its last twelve months pro forma adjusted EBITDA including synergies. The acquisition is expected to be earnings per share accretive in the first year by $0.30-$0.40, growing to around $0.50 in year three as $30 million in annual synergies are realized. Financing is fully committed and the combined company's leverage ratio is estimated to be 3.8x upon closing.
Joey New York is divided into two divisions - THE LABB, which focuses on aesthetic beauty services like Botox and fillers, and Joey New York cosmetics. There is synergy between the cosmetic products and beauty services. THE LABB aims to become a leader in aesthetic services by offering affordable injectables using advanced technologies tailored for each client. Financial projections estimate $12 million in revenue in 2017 growing to over $157 million in 2021 as THE LABB expands to multiple locations.
AssignmentInvestment Management, Fin 3720Final examAgreement By s.docxssuser562afc1
AssignmentInvestment Management, Fin 3720Final examAgreement: By submitting the complete final exam to Bb I agree that I have not given any help to another student nor has another person given help to me.Fall 20141. Only open Blackboard and Excel on your computer.2. Please save your file frequently on the computer's desktop.3. Please use the cells to the right of the data to make calculations, or you can add rows in the ss to make calculations.4. Write your comments in the folder "Written comments".5. When done rename the file to your ID number (no names) and post in Bb and email to [email protected]AssignmentWelcome to Alpha Value Investors, LLC. We are pleased you have joined our investment firm, and hope that you appreciate our approach to investing. Almost all of our clients have well-diversified, efficient portfolios. Most have a "reasonably conservative" risk profile, but are also interested in having a non-core part of their portfolios invested in individual securities.Unfortunately, Mike has been called to a meeting, but he would like your help on a recommendation to the investment committee. As a retail industry analyst, he is considering recommending one of two stocks to our clients next week. The firms are the Gap, Inc. (GPS) and Coach, Inc. (COH).In this file are analyst reports and data on the firms. Please analyze these two companies and make a recommendation of one firm to our clients to be purchased as a long-term investment. The non-core, security portion of their portfolios are balanced across sectors but additional weight in the consumer cyclical sector would improve the allocation. The investment committee meeting is in two hours and Mike will meet you out side the meeting room so please complete your analysis in this file and be prepared to share your findings with the committee and Mike.
Written commentsWritten comments:Note: Your are welcome to format this areas as you like to present the most compelling case for investing in one of the firms.
FrameworkBAGrowth70%80%Perf. Ratios70%60%Mkt. Metrics90%70%Cash flow70%65%Value Creation70%95%
B Growth Perf. Ratios Mkt. Metrics Cash flow Value Creation 0.7 0.7 0.9 0.7 0.7 A Growth Perf. Ratios Mkt. Metrics Cash flow Value Creation 0.8 0.6 0.7 0.65 0.95
FormulasFormulasSustainable growth rate gs = ROE * bInternal growth rate gi = ROE * b * (E/A)Free Cash Flow Ebit * (1-t) + depreciation - change in NWC - CapExDividend Discount Model (constant-growth)P0 = (D1 / (ke - gss))Value with non-constant growth modelsP0 = (Div1 / (1+ r)1) + (Div2 / (1+ r)2) + (Div3 / (1+ r)3) +(TV3 / (1+ r)3)Where TV3 = (Div4 / (r - gss))And, where Divn cnd be substituted for FCFnAnd, where ke is also called rAnd, where Terminal Value (TV) also called Horizontal ValueDividend Discount Model (no-growth)P0 = Div1 / keHolding period returnReturn = (D1 + (P1 - P0)) / P0CAPMke = rf + β (rm - rf), last element often referred to as "market premium"WACCWACC = ke (E / (E + D)) + kd (1 - t) (D / (E ...
- In fiscal 2004, SUPERVALU reported sales of $20.2 billion and net earnings of $280 million. It achieved its lowest debt-to-capital ratio in over a decade and return on invested capital of 14.1%.
- Key accomplishments included strong comparable store sales growth across its retail banners and completing work to accelerate growth at its Save-A-Lot format, including converting stores and opening 75 new stores.
- In distribution, it took steps to improve capacity utilization rates and implement efficiency initiatives while expanding its non-asset based logistics platform.
Running head OPERATION, TECHNOLOGY, AND MANAGEMENT PLAN1OPER.docxcharisellington63520
Running head: OPERATION, TECHNOLOGY, AND MANAGEMENT PLAN 1
OPERATION, TECHNOLOGY, AND MANAGEMENT PLAN 2
Operation, Technology, and Management Plan
Crystal Perkins
Dr. Tony Muscia
BUS 599 Strategic Management
August 24, 2015
New vision is a large-scale non- alcoholic beverage company located in the competing surroundings of New York City. The new business being on its start-up phase is propelled to penetrate new markets on the fast growing economy. Due to the increased opportunities in the market, new vision Beverage Company is looking forward to improve its competitive advantage. The company aims at ensuring their products are positioned to ensure that they offer quality service and satisfaction to the customers. The company is also focused on ensuring that it provides different types of non-alcoholic brands that match the quality and taste preferences of the customers.
In order to be able to grow, the company is looking forward to ensure that it improves its responsiveness and flexibility to customer demands. In addition, for it to achieve full potential, the company is formulating strategies that seek to improve functionality between areas of manufacturing and marketing. The company marketing strategy is majorly based on ensuring that it provides customers with the products they need. It is also serves on providing information visibility to ensure that the consumers have full knowledge of the company’s products.
Operations plan for NAB Company
The major purpose of the new vision non-alcoholic beverage company’s business plan is to raise $900,000 for the total expansion of the company. It plans to raise $100,000 from bank loan while, the other remaining amount will be raised by the company stakeholders. While planning is done, two categories of people will be taken into consideration. These include; the working class that involves portion of marketing and administrative personnel and corporate class, constituting middle and top managers who appreciate the quality non- alcoholic drinks. The company’s competitive strategies will be used on both levels to balance and improve on quality. It will also be used in meeting targets, improving the implementation process and coming up with new technological innovations. On functional level, the management will ensure that recruitment of good sales representatives is done. The management will also promote quality management and effective production processes. On the other hand, business-level strategies will serve to ensure goals, policies, procedures, mission and visions are achieved. The business level strategies will also be put in place to provide efficient processes that minimize on cost, maintain tight overhead on costs and over productions and geared towards minimizing cost of sales.
Start-up Summary
The company total expenses and capital add up to approximately $100,000. On the other hand, start-up assets required by the company including acquisition of plant ,machinery, vats.
This document is an investor presentation by Diversified Restaurant Holdings, Inc. for NASDAQ: BAGR. It provides an overview of the company, which operates Buffalo Wild Wings franchises and the Bagger Dave's Burger Tavern concept. Key highlights include recent acquisition of 18 Buffalo Wild Wings locations in St. Louis, focus on sustainable sales growth at Bagger Dave's through new menu items and marketing, and progress on margin enhancing initiatives across both brands.
Pitch Deck To Raise Private Equity From Investment Bankers PowerPoint Present...SlideTeam
Private Equity or Private Financing refers to investment funds, which are generally organized as partnerships, which buy and restructure non-publicly traded companies. This round consists of investors that directly invest in private companies or are engaged in public company purchases, resulting in the delisting of public equity. The primary purpose of private capital investments is the intention of investors to gain higher return rates by acquiring substantial or complete control over a business. The current scenario is that the company wants to raise Private Equity Investment from private sources such as from institutions and wealthy individuals and then invest that money in buying and selling businesses. This presentation provides company details such as overview and product categories, global market size, companys strategic business partnerships, marketing and advertising strategies, unique selling proposition, digital marketing objectives, shareholder structure, growth performance, business and revenue model, product revenue projections chart, pre and post capitalization tables, sources of private equity funds, SWOT analysis, exit strategies and some company related financials such as income statement and cash flow statement. The goal of a private equity funding is to invest equity or venture capital in a portfolio of private companies established and researched by the managers of private equity funds. After analyzing the current scenario, the organization raises private equity investment funds. Some of the major potential Private Equity Investors are corporate investors, private equity firms, government companies, investment banks, venture capital firms etc. https://bit.ly/2XWJvcE
Select a publicly traded, U.S. corporation with which you are fami.docxbagotjesusa
Select a publicly traded, U.S. corporation with which you are familiar or one where you currently work or have worked in the past.
Research the company via the website and download the Income Statement, Statement of Shareholders' Equity, Balance Sheet, and Statement of Cash Flows.
Develop a 700-word examination of the financial statements and include the following:
· Determine the net income for the current fiscal year (FY). Is this income up or down from the prior year?
2014 $16,022,000
2015 $16,363,000
2016 $14,694,000
As of 2014, the income has gone up and looks like it’s to succeed this year.
Walmart had a solid year in fiscal 2015 as each operating segment improved its performance as the year progressed. While net sales grew nearly 2 percent and operating income increased 1 percent, our underlying performance was actually stronger.
· Explain the relevance of changes in net income to investors.
Investors are interested in a company's past net income because it provides useful information for predicting future net income. Investors buy and sell stock based on their beliefs about a company's future performance. will be successful in the future and that this will result in a higher stock price, they will buy its stock. The income statement helps users determine if the company's operations are profitable.
Garrison, R., Noreen, E., & Brewer, P. (2015). Managerial accounting (15th ed.). New York, NY: McGraw-Hill.
· Determine the ending balance in shareholders' equity. Why would organizations such as Labor Unions be interested in this?
2014 $76,255,000
2015 $81,394,000
2016 $80,546,000
The balance sheet will also be used to evaluate the relationship between debt and stockholders' equity to determine whether the company has a satisfactory proportion of debt and common stock financing.
Financial statements play a significant role in a collective bargaining agreement (CBA), that is, a mechanism that allows employers and employees to reach an agreement regarding rights and duties of workers. For example, a labor union delegate may show available cash balance to top management and explain that the corporation may not experience liquidity needs if benefits were increased by a certain amount.
Garrison, R., Noreen, E., & Brewer, P. (2015). Managerial accounting (15th ed.). New York, NY: McGraw-Hill.
A labor union representative often may not focus on a company's statement of retained earnings because this statement only includes movements within owners' accounts. However, there are instances in which a labor union delegate may ask top management to reduce dividends paid to shareholders and increase employee salaries or benefits.
http://www.ehow.com/about_6626115_financial-statements-important-labor-unions_.html
· Determine the total value of assets.
2014 $61,185,000
2015 $63,278,000
2016 $60,239,000
· Discuss the relevance of the total value of assets to potential creditors and why this is important.
The balance sheet helps users determi.
This is a brief review of Campbell soup's 10K. It is driven by questions to help you find the most important parts in a 10K report. All the questions are answered.
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docxRAHUL126667
APPLYING ANALYTIC TECHNIQUES TO BUSINESS
1
APPLYING ANALYTIC TECHNIQUES TO BUSINESS
2Applying Analytic Techniques to Business
3/16/2020Introduction
Ford Motor is a company that has its original situation in the United States of America. The company has its core business as producing motor vehicles; the company is the Fourth highest producer in the world. The company came to existence in the year 1903, with the present state being one of the companies with a production rate of higher standards compared to its competitors. The company has produced motor vehicles not only in the United States of America but the whole world consisting of diverse brands. Throughout the years, the firm has created different development techniques planned for supporting the general target of keeping up the upper hand in the market. The organization's development is bolstered by different escalated techniques that incorporate market improvement, item advancement, and market entrance. There likewise exist conventional methodologies that steer Ford's business seriousness. Even though there have been a few nonexclusive procedures, cost administration remains the hugest power behind the automaker's prosperity.
Ford’s Operations
The Ford Motor Company has an extensive list of their products and administrations which incorporate autos and substantial business vehicles just as car financing administrations. Their engines include minimal effort vehicles that are created to pull in a more extensive client extend, extravagance autos, trucks, transports, and Motorsport vehicles. Their blend of items and administrations guarantees that the firm can contend well in the vehicle business. Through advancement, the organization has likewise added to a superior situation by creating vehicles that sudden spike in demand for less fuel, hydrogen, and power along these lines empowering the association to acquire clients in recent years.
The firm effectively executes its commitments to its outer clients who buy their vehicles just as its inward clients who comprise of staff in different divisions and who depend on various offices to encourage the smooth progression of their day by day obligations. For the outside clients, the vehicles they buy must satisfy specific guidelines dependent on the details for which they are fabricated. For example, the extravagance vehicles ought to be in a situation to give solace and security dependent on the base market models, simplicity of route, and saving money on fuel utilization. While such principles are structure qualifiers, the firm should endeavor to think of more request champs that recognize their extravagance vehicles from those of contenders. To accomplish this, ford had created a technology that aimed at producing their products with diverse differentiation compared to their competitors.
Ford prior concocted advancements that set their items apart from others. For instance, it built up the EcoBoost suite of advances that decreased the s.
More Related Content
Similar to Bus 4951-8 Unit VIII ProjectImplementation Plan Part 3For the.docx
This presentation discusses Molson Coors' strategic framework and priorities. It summarizes that Molson Coors aims to drive sustainable growth and long-term shareholder returns through brand-led profit growth, cash generation, and disciplined capital allocation with a focus on profit after capital charge. Key priorities for 2017 include integrating the MillerCoors acquisition, achieving cost savings, paying down debt, and delivering top- and bottom-line performance.
Stage 3 of the ProjectReflection Paper FINC 330U.docxwhitneyleman54422
Stage 3 of the Project
Reflection Paper
FINC 330
University of Maryland University College
ConAgra Brands Inc. is a company that deals with the manufacture of food. Like any other company, it has its financial report. The reports are not constant every year; they keep on changing each year. This is as a result of various reasons, which may cause an increase or a decrease in the financial income or expenditure. The net sales in the three years are almost constant apart from slight deviations. The cost of goods sold has shown an increment from 2014 to 2015, but in 2016, there was a decline. Regarding selling, general and administrative expenses in 2014 were high, in 2015 it decreased, but in 2016 it rose by 6%.interest expenses remained the same throughout the three years at 3%.
Additionally, asset amounts for the company have also stayed roughly the same over the past few years. On the other hand, the liabilities have decreased from 12,827.8 in 2015 to 9,595.8 in 2016. That is a decrease of 3,232 in just one year. Total assets also decreased from 2015 to 2016 with a balance starting at 17,437.8 and ending with a balance of 13,390.6. Equity, along with most other aspects of the company, has stayed within close range from year to year with a balance of 4,610 in 2015 and a balance of 3,794.8 in 2016.
From the financial statistics we have for the net income, income statement, balance sheet among others, it is evident that the company is not making a notable move. The trend seems to be downwards which means that the company is barely making profits. This could suggest that the company is operating using the same methods. To avoid the problem, it is advisable for them to focus on changing the current business models.
RECOMMENDATIONS.
For this company to improve its financial stability, the key thing is to initiate change in the way of operation. This is specifically in the business models that have a significant influence on the financial performance of a business.
Examine the lines of credit. It is hard for a company to operate without credit. Therefore borrowing funds should be done wisely. There should also be a good plan to repay the borrowed money to avoid instability. Borrowing should also be done when it is very necessary.
Review your production and overhead expenses. It is necessary to assess the level of expenses because they determine the level of profits. If the expenses are too much, it is likely that the firm will make little or no profits.
Create a cash flow budget helps to compare the income and expenditure of every month. With this, the company can know how to allocate the available funds in the most profitable way.
Inform the key employees on the effects of losses in the business. The management should make the employees aware that making losses is one of the worst things in business. This helps them to be careful enough to avoid the same.
It is also important to identify the chief customers. The company should ensure tha.
This document provides a business strategy report for Home Depot. It begins with an introduction to Home Depot's founding and operations. It then analyzes Home Depot's current performance, strategic posture including mission, vision and objectives, and current strategy which focuses on customer service, product authority, and productivity. The report also examines Home Depot's external environment using PESTLE analysis and Porter's Five Forces. It evaluates Home Depot's internal environment including corporate structure, resources, marketing, finances, and human resources. Alternative strategies are proposed and a recommended strategy of interconnected retail is provided, along with plans for implementation and contingencies.
This document is the 2015 annual report for LyondellBasell, one of the world's largest plastics, chemicals and refining companies. The summary is:
1) In 2015, LyondellBasell achieved record financial results including $8.1 billion in EBITDA and $4.4 billion in income from continuing operations, despite challenges in the energy sector.
2) Operations performed strongly with improved safety and reliability. Expansion projects in the US increased ethylene capacity and positioned the company for long-term growth.
3) The company returned over $6 billion to shareholders through dividends and share repurchases, placing it among the top performers in the S&P 500 for share
This document provides an investment recommendation and analysis of La-Z-Boy, Inc. (LZB) by John Milligan. Milligan initiates coverage of LZB with a BUY rating based on their lower cost operating model from supply chain improvements, quantifiable 4-4-5 strategy to increase retail stores and sales, and ample liquidity. Some risks include currency translation effects from a strong US dollar and supply concentration. Financial projections estimate continued revenue and profit growth through 2020. The analysis provides an industry and competitive overview of the home furnishings sector and positions LZB as the second largest US furniture manufacturer.
Abbott held its annual shareholders meeting on April 27, 2012. Chairman and CEO Miles White summarized Abbott's strong financial performance in 2011, despite economic challenges. He discussed Abbott's plan to separate into two publicly traded companies by the end of 2012 - a diversified medical products company retaining the Abbott name, and a pharmaceutical company called AbbVie. White highlighted the businesses, strategies, and leadership of the two new companies, which would build on Abbott's foundation and values.
The ABC Company manufactures and markets commercial grade fitness .docxmehek4
The ABC Company manufactures and markets commercial grade fitness equipment. The senior management team is meeting for its second annual strategic planning session. While strategic plans usually encompass 3–5 years of the planning horizon, the CEO has asked that, for now, everyone concentrate only on years 1–3.
At the conclusion of the session, staff members will begin working on their individual plans and budgets for the coming year. The accounting manager will end up compiling all the budgets for incorporation into the strategic plan book.
ABC Background and Current Situation
Company:
· ABC develops, domestically manufacturers, markets, and sells commercial-grade, strength-training fitness equipment, like that found in a health club.
· It has created a patented, revolutionary line of strength training equipment, which has clearly allowed the company to be positioned as the "innovative leader" in the market place, addressing the fitness trend of "core training."
· The company is considering adding a line of cardiovascular (CV) training equipment including treadmills and exercise bikes.
· Its entire staff is well respected in the industry.
· Although its sales are exclusively in the United States it has, from time to time, considered expanding into international sales. International market growth has historically been at a rate 5–8% faster than domestic sales
Products:
· The industry breaks its product groups into cardiovascular and strength-training products. The profitability/piece overall is greatest on the strength-training equipment although the dollar value of total industry sales is 2:1 in favor of the CV equipment. However, from a COGS perspective CV COGS is equal to strength COGS + 15%.
· While ABC has in fact developed a revolutionary line of strength equipment addressing core training, duplicating this innovation in the CV line has proven to be beyond the reach of any manufacturer in the industry in the last 10–15 years, primarily due to the very high cost of developing something truly revolutionary for a product line of relatively low-margin and high-warranty costs.
Industry:
· As the health and fitness craze continues in America and around the world, the overall market is expected to grow 5–8% a year.
· The overseas, international fitness equipment market is growing 5–8% faster than the domestic growth rate.
· There are currently seven bonafide manufacturers of this fitness equipment: the two largest offer "one stop shop" product offerings (CV and strength products) and garner the highest market share; the other five specialize only in either strength or CV only equipment. There is talk of one or more of the CV manufacturers merging with one or more of the strength manufacturers.
· The customers—primarily health clubs and YMCAs—are always seeking innovative products to help market their club as different than the one down the street and attract more new members.
· Most of the larger health clubs prefer to buy all fitness equipm ...
This paper presents the financial statement analysis of PepsiCo and Coca-Cola. The paper presents a description of the companies and an analysis of the firms’ performance using profitability ratios.
This document provides information on the top restaurant chains in the fast casual segment for 2013. It begins by highlighting Fazoli's as the #1 chain, noting their 5.1% sales increase in 2012 and longest sustained sales growth streak. McAlister's Deli comes in at #2, with plans to open 20 new locations by the end of 2013. Freebirds World Burrito is #3, having quadrupled in size since 2007 with plans for double digit growth in 2013.
Analysis of external communication media of the companyGeorgeDolezal
Wal-Mart uses various media to develop its reputation. It rates highly in visibility, transparency and consistency on its website which contains extensive company and product information. Its annual reports also score well by providing detailed financial and strategic information for shareholders. Wal-Mart aims to increase distinctiveness and transparency through targeted local TV ads and campaigns explaining its positive impact. It communicates regularly with shareholders through financial reports and investor-focused sections of its website and apps. Wal-Mart has been most successful engaging customers on Facebook and Twitter by frequently posting various content and responding to users.
Coca-Cola HBC si-a publicat recent cel de-al treilea raport integrat la nivel de grup. Acesta contine informatii referitoare la aspecte de business, dar si detalii despre performantele de sustenabilitate si guvernanta corporativa ale companiei.
O-I's acquisition of Vitro's food and beverage glass container business will expand O-I's presence in Mexico and Bolivia. The $2.15 billion all-cash deal values the target business at 7.0x its last twelve months pro forma adjusted EBITDA including synergies. The acquisition is expected to be earnings per share accretive in the first year by $0.30-$0.40, growing to around $0.50 in year three as $30 million in annual synergies are realized. Financing is fully committed and the combined company's leverage ratio is estimated to be 3.8x upon closing.
Joey New York is divided into two divisions - THE LABB, which focuses on aesthetic beauty services like Botox and fillers, and Joey New York cosmetics. There is synergy between the cosmetic products and beauty services. THE LABB aims to become a leader in aesthetic services by offering affordable injectables using advanced technologies tailored for each client. Financial projections estimate $12 million in revenue in 2017 growing to over $157 million in 2021 as THE LABB expands to multiple locations.
AssignmentInvestment Management, Fin 3720Final examAgreement By s.docxssuser562afc1
AssignmentInvestment Management, Fin 3720Final examAgreement: By submitting the complete final exam to Bb I agree that I have not given any help to another student nor has another person given help to me.Fall 20141. Only open Blackboard and Excel on your computer.2. Please save your file frequently on the computer's desktop.3. Please use the cells to the right of the data to make calculations, or you can add rows in the ss to make calculations.4. Write your comments in the folder "Written comments".5. When done rename the file to your ID number (no names) and post in Bb and email to [email protected]AssignmentWelcome to Alpha Value Investors, LLC. We are pleased you have joined our investment firm, and hope that you appreciate our approach to investing. Almost all of our clients have well-diversified, efficient portfolios. Most have a "reasonably conservative" risk profile, but are also interested in having a non-core part of their portfolios invested in individual securities.Unfortunately, Mike has been called to a meeting, but he would like your help on a recommendation to the investment committee. As a retail industry analyst, he is considering recommending one of two stocks to our clients next week. The firms are the Gap, Inc. (GPS) and Coach, Inc. (COH).In this file are analyst reports and data on the firms. Please analyze these two companies and make a recommendation of one firm to our clients to be purchased as a long-term investment. The non-core, security portion of their portfolios are balanced across sectors but additional weight in the consumer cyclical sector would improve the allocation. The investment committee meeting is in two hours and Mike will meet you out side the meeting room so please complete your analysis in this file and be prepared to share your findings with the committee and Mike.
Written commentsWritten comments:Note: Your are welcome to format this areas as you like to present the most compelling case for investing in one of the firms.
FrameworkBAGrowth70%80%Perf. Ratios70%60%Mkt. Metrics90%70%Cash flow70%65%Value Creation70%95%
B Growth Perf. Ratios Mkt. Metrics Cash flow Value Creation 0.7 0.7 0.9 0.7 0.7 A Growth Perf. Ratios Mkt. Metrics Cash flow Value Creation 0.8 0.6 0.7 0.65 0.95
FormulasFormulasSustainable growth rate gs = ROE * bInternal growth rate gi = ROE * b * (E/A)Free Cash Flow Ebit * (1-t) + depreciation - change in NWC - CapExDividend Discount Model (constant-growth)P0 = (D1 / (ke - gss))Value with non-constant growth modelsP0 = (Div1 / (1+ r)1) + (Div2 / (1+ r)2) + (Div3 / (1+ r)3) +(TV3 / (1+ r)3)Where TV3 = (Div4 / (r - gss))And, where Divn cnd be substituted for FCFnAnd, where ke is also called rAnd, where Terminal Value (TV) also called Horizontal ValueDividend Discount Model (no-growth)P0 = Div1 / keHolding period returnReturn = (D1 + (P1 - P0)) / P0CAPMke = rf + β (rm - rf), last element often referred to as "market premium"WACCWACC = ke (E / (E + D)) + kd (1 - t) (D / (E ...
- In fiscal 2004, SUPERVALU reported sales of $20.2 billion and net earnings of $280 million. It achieved its lowest debt-to-capital ratio in over a decade and return on invested capital of 14.1%.
- Key accomplishments included strong comparable store sales growth across its retail banners and completing work to accelerate growth at its Save-A-Lot format, including converting stores and opening 75 new stores.
- In distribution, it took steps to improve capacity utilization rates and implement efficiency initiatives while expanding its non-asset based logistics platform.
Running head OPERATION, TECHNOLOGY, AND MANAGEMENT PLAN1OPER.docxcharisellington63520
Running head: OPERATION, TECHNOLOGY, AND MANAGEMENT PLAN 1
OPERATION, TECHNOLOGY, AND MANAGEMENT PLAN 2
Operation, Technology, and Management Plan
Crystal Perkins
Dr. Tony Muscia
BUS 599 Strategic Management
August 24, 2015
New vision is a large-scale non- alcoholic beverage company located in the competing surroundings of New York City. The new business being on its start-up phase is propelled to penetrate new markets on the fast growing economy. Due to the increased opportunities in the market, new vision Beverage Company is looking forward to improve its competitive advantage. The company aims at ensuring their products are positioned to ensure that they offer quality service and satisfaction to the customers. The company is also focused on ensuring that it provides different types of non-alcoholic brands that match the quality and taste preferences of the customers.
In order to be able to grow, the company is looking forward to ensure that it improves its responsiveness and flexibility to customer demands. In addition, for it to achieve full potential, the company is formulating strategies that seek to improve functionality between areas of manufacturing and marketing. The company marketing strategy is majorly based on ensuring that it provides customers with the products they need. It is also serves on providing information visibility to ensure that the consumers have full knowledge of the company’s products.
Operations plan for NAB Company
The major purpose of the new vision non-alcoholic beverage company’s business plan is to raise $900,000 for the total expansion of the company. It plans to raise $100,000 from bank loan while, the other remaining amount will be raised by the company stakeholders. While planning is done, two categories of people will be taken into consideration. These include; the working class that involves portion of marketing and administrative personnel and corporate class, constituting middle and top managers who appreciate the quality non- alcoholic drinks. The company’s competitive strategies will be used on both levels to balance and improve on quality. It will also be used in meeting targets, improving the implementation process and coming up with new technological innovations. On functional level, the management will ensure that recruitment of good sales representatives is done. The management will also promote quality management and effective production processes. On the other hand, business-level strategies will serve to ensure goals, policies, procedures, mission and visions are achieved. The business level strategies will also be put in place to provide efficient processes that minimize on cost, maintain tight overhead on costs and over productions and geared towards minimizing cost of sales.
Start-up Summary
The company total expenses and capital add up to approximately $100,000. On the other hand, start-up assets required by the company including acquisition of plant ,machinery, vats.
This document is an investor presentation by Diversified Restaurant Holdings, Inc. for NASDAQ: BAGR. It provides an overview of the company, which operates Buffalo Wild Wings franchises and the Bagger Dave's Burger Tavern concept. Key highlights include recent acquisition of 18 Buffalo Wild Wings locations in St. Louis, focus on sustainable sales growth at Bagger Dave's through new menu items and marketing, and progress on margin enhancing initiatives across both brands.
Pitch Deck To Raise Private Equity From Investment Bankers PowerPoint Present...SlideTeam
Private Equity or Private Financing refers to investment funds, which are generally organized as partnerships, which buy and restructure non-publicly traded companies. This round consists of investors that directly invest in private companies or are engaged in public company purchases, resulting in the delisting of public equity. The primary purpose of private capital investments is the intention of investors to gain higher return rates by acquiring substantial or complete control over a business. The current scenario is that the company wants to raise Private Equity Investment from private sources such as from institutions and wealthy individuals and then invest that money in buying and selling businesses. This presentation provides company details such as overview and product categories, global market size, companys strategic business partnerships, marketing and advertising strategies, unique selling proposition, digital marketing objectives, shareholder structure, growth performance, business and revenue model, product revenue projections chart, pre and post capitalization tables, sources of private equity funds, SWOT analysis, exit strategies and some company related financials such as income statement and cash flow statement. The goal of a private equity funding is to invest equity or venture capital in a portfolio of private companies established and researched by the managers of private equity funds. After analyzing the current scenario, the organization raises private equity investment funds. Some of the major potential Private Equity Investors are corporate investors, private equity firms, government companies, investment banks, venture capital firms etc. https://bit.ly/2XWJvcE
Select a publicly traded, U.S. corporation with which you are fami.docxbagotjesusa
Select a publicly traded, U.S. corporation with which you are familiar or one where you currently work or have worked in the past.
Research the company via the website and download the Income Statement, Statement of Shareholders' Equity, Balance Sheet, and Statement of Cash Flows.
Develop a 700-word examination of the financial statements and include the following:
· Determine the net income for the current fiscal year (FY). Is this income up or down from the prior year?
2014 $16,022,000
2015 $16,363,000
2016 $14,694,000
As of 2014, the income has gone up and looks like it’s to succeed this year.
Walmart had a solid year in fiscal 2015 as each operating segment improved its performance as the year progressed. While net sales grew nearly 2 percent and operating income increased 1 percent, our underlying performance was actually stronger.
· Explain the relevance of changes in net income to investors.
Investors are interested in a company's past net income because it provides useful information for predicting future net income. Investors buy and sell stock based on their beliefs about a company's future performance. will be successful in the future and that this will result in a higher stock price, they will buy its stock. The income statement helps users determine if the company's operations are profitable.
Garrison, R., Noreen, E., & Brewer, P. (2015). Managerial accounting (15th ed.). New York, NY: McGraw-Hill.
· Determine the ending balance in shareholders' equity. Why would organizations such as Labor Unions be interested in this?
2014 $76,255,000
2015 $81,394,000
2016 $80,546,000
The balance sheet will also be used to evaluate the relationship between debt and stockholders' equity to determine whether the company has a satisfactory proportion of debt and common stock financing.
Financial statements play a significant role in a collective bargaining agreement (CBA), that is, a mechanism that allows employers and employees to reach an agreement regarding rights and duties of workers. For example, a labor union delegate may show available cash balance to top management and explain that the corporation may not experience liquidity needs if benefits were increased by a certain amount.
Garrison, R., Noreen, E., & Brewer, P. (2015). Managerial accounting (15th ed.). New York, NY: McGraw-Hill.
A labor union representative often may not focus on a company's statement of retained earnings because this statement only includes movements within owners' accounts. However, there are instances in which a labor union delegate may ask top management to reduce dividends paid to shareholders and increase employee salaries or benefits.
http://www.ehow.com/about_6626115_financial-statements-important-labor-unions_.html
· Determine the total value of assets.
2014 $61,185,000
2015 $63,278,000
2016 $60,239,000
· Discuss the relevance of the total value of assets to potential creditors and why this is important.
The balance sheet helps users determi.
This is a brief review of Campbell soup's 10K. It is driven by questions to help you find the most important parts in a 10K report. All the questions are answered.
Similar to Bus 4951-8 Unit VIII ProjectImplementation Plan Part 3For the.docx (20)
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docxRAHUL126667
APPLYING ANALYTIC TECHNIQUES TO BUSINESS
1
APPLYING ANALYTIC TECHNIQUES TO BUSINESS
2Applying Analytic Techniques to Business
3/16/2020Introduction
Ford Motor is a company that has its original situation in the United States of America. The company has its core business as producing motor vehicles; the company is the Fourth highest producer in the world. The company came to existence in the year 1903, with the present state being one of the companies with a production rate of higher standards compared to its competitors. The company has produced motor vehicles not only in the United States of America but the whole world consisting of diverse brands. Throughout the years, the firm has created different development techniques planned for supporting the general target of keeping up the upper hand in the market. The organization's development is bolstered by different escalated techniques that incorporate market improvement, item advancement, and market entrance. There likewise exist conventional methodologies that steer Ford's business seriousness. Even though there have been a few nonexclusive procedures, cost administration remains the hugest power behind the automaker's prosperity.
Ford’s Operations
The Ford Motor Company has an extensive list of their products and administrations which incorporate autos and substantial business vehicles just as car financing administrations. Their engines include minimal effort vehicles that are created to pull in a more extensive client extend, extravagance autos, trucks, transports, and Motorsport vehicles. Their blend of items and administrations guarantees that the firm can contend well in the vehicle business. Through advancement, the organization has likewise added to a superior situation by creating vehicles that sudden spike in demand for less fuel, hydrogen, and power along these lines empowering the association to acquire clients in recent years.
The firm effectively executes its commitments to its outer clients who buy their vehicles just as its inward clients who comprise of staff in different divisions and who depend on various offices to encourage the smooth progression of their day by day obligations. For the outside clients, the vehicles they buy must satisfy specific guidelines dependent on the details for which they are fabricated. For example, the extravagance vehicles ought to be in a situation to give solace and security dependent on the base market models, simplicity of route, and saving money on fuel utilization. While such principles are structure qualifiers, the firm should endeavor to think of more request champs that recognize their extravagance vehicles from those of contenders. To accomplish this, ford had created a technology that aimed at producing their products with diverse differentiation compared to their competitors.
Ford prior concocted advancements that set their items apart from others. For instance, it built up the EcoBoost suite of advances that decreased the s.
Apply the general overview of court structure in the United States (.docxRAHUL126667
Apply the general overview of court structure in the United States (Fig. 1.2) to your local community. (Critical Thinking Question 1)
Constitutional rights of the accused is, of course, a controversial topic. The crime control model, in particular, decries letting the obviously guilty go free on "technicalities," whereas the due process model emphasizes basic rights. What common ground do these two approaches share? Where do they disagree most?
.
Apply the Paramedic Method to the following five selections.docxRAHUL126667
Apply the Paramedic Method to the following five selections
1) As a means of providing scientists with appropriate tertiary data, the conference is intended to serve as a communication medium for everyone involved in the manipulation and dissemination of research findings.
2) The decision by the managers was that the committee for road improvement would cease its activity for the duration of the term.
3) From the beginning, the writing of this research article was marked by reluctance.
4. . If we shadows have offended,
Think but this, and all is mended,
That you have but slumber'd here
While these visions did appear.
And this weak and idle theme,
No more yielding but a dream,
5.. Four score
and seven
years ago
our fathers brought forth, upon this continent, a new nation, conceived in liberty, and dedicated to the proposition that all men are created equal. Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived, and so dedicated, can long endure.
.
Application of Standards of CareDiscuss the standard(s) of c.docxRAHUL126667
Application of Standards of Care
Discuss the standard(s) of care to which the parties will be held in this case scenario. How will the standards of care and your state’s Nurse Practice Act be applied in the courts if the case is sued?
Case Scenario
SK, age 61, went to the hospital with what she thought was a bad cold, and was admitted with a diagnosis of pneumonia. Following admission, she became increasingly feverish and short of breath, but her family’s calls for help went unanswered. In fact, her daughter was unable to find anyone when she went to the nurses’ station looking for help. The patient eventually stopped breathing, and someone finally responded to the family’s desperate and frantic calls for help. SK was successfully resuscitated, but sustained brain damage due to oxygen deprivation. She was left unable to walk, talk, or care for herself.
Because of nurse understaffing in the hospital, her assigned RN had not assessed her often enough and did not monitor her oxygen level. There were 41 other patients on this unit. Although the hospital’s own staffing standards called for five registered nurses and two licensed practical nurses to staff this unit, only three registered nurses were on duty. Records for the unit in question indicated that the hospital failed to meet its own staffing standards for 51 out of 59 days before this incident.
.
Application of the Nursing Process to Deliver Culturally Compe.docxRAHUL126667
Application of the Nursing Process to Deliver Culturally Competent Care.
Research the literature for an appropriate professional article that discusses the health care needs of your selected cultural group.
It should include 5-7 pages within the body of the paper with 3-5 references (at least two articles/book references).
Papers must follow
APA format
7th edition format, and include a title page, citations, and reference pages.
View the
APA Sample Template
APA Sample Template - Alternative Formats
.
Submit the paper in the drop box provided in Blackboard.
View
Formal Paper Rubric
for grading criteria.
Need help with Blackboard?
Review the
Submitting Assignments tutorial
.
Formal Paper Resources
Formal Paper Resources
Formal Paper Resources
Below are helpful resources to assist you with completing the Formal Paper.Click on each link to view.
Dreams from Endangered Culture
- With stunning photos and stories, National Geographic Explorer Wade Davis celebrates the extraordinary diversity of the world's indigenous cultures, which are disappearing from the planet at an alarming rate.
Photos of Endangered Cultures
- Photographer Phil Borges shows rarely seen images of people from the mountains of Dharamsala, India, and the jungles of the Ecuadorean Amazon. In documenting these endangered cultures, he intends to help preserve them.
The Danger of a Single Story
- Our lives, our cultures, are composed of many overlapping stories. Novelist Chimamanda Adichie tells the story of how she found her authentic cultural voice — and warns that if we hear only a single story about another person or country, we risk a critical misunderstanding.
Theories & Models
Cultural Competence Project
Giger and Davidhizar
Giger and Davidhizar - Alternative Formats
Madeleine M.
Leninger
- Transcultural Nursing Culture Care Theory
Resource Library
You can also revisit
U.S. Department of Health & Human Services
- Office of Minority Health
Log in and c lick on the
ToolKit - Resource Library
tab
The Resource Library has many useful descriptions and examples of models to use for your Formal Paper.
*NOTE:
Wikipedia is not a source to be used in any of the generated work; using it will result in a “zero” for the assignmen
.
Application Ware House-Application DesignAppointyAppoi.docxRAHUL126667
Application Ware House-Application Design
Appointy
Appointy allows users grow and manage their business in one and easy to use user interface.
The software helps users schedule online customers daily anywhere and at anytime,
Improve productivity and it enables business manage their staff in multiple locations.
Appointy helps organizations attract more customers through online marketing channels such as facebook and twitter.
Advantages of Saas
Accessibility SaaS can run on any OS regardless of its Mac OS, Blackberry Tablet Os,
Cost reduction and quick commissioning; due to the amount of money saved, there are no initial licensing costs.
Scalability; It is not necessary for an organization to purchase more service space or software licenses.
Updates; Saas providers update software and hardware and this has saved on time and workload for the consumer.
Saas is easily accessible and can run on any operating system regardless of its Mac OS. Besides, it is highly accessible and a user only requires an internet browser to begin their operations.
Saas providers update their software and hardware which saves on time and workload fro the consumer. The software is centrally on the server and new functions and update are implemented more frequently and efficiently.
Saas software is associated with cost reduction and quick comissioning,one of the major benefits o using Saas is the amount of money that culd be potentially saved.
3
Disadvantages of Saas
Data security risks; businesses are required to keep their information private as the provider is the one storing the company data.
Termination of service; Businesses can lose their data and files if the provider terminates their services for reasons such as lawsuits and bankruptcy.
Performance challenges; Software on local machines may run faster compared to Saas being hosted in a remote data centre.
Limited Applications; Saas relies on multiple software solutions.
Saas is associated with limited applications, a number of business that use SaaS grow daily and there are software applications that do not offer a hosted platform, the company will have to be hosted on site especially if it relies on multiple software sources.
Software in local machines are likely to run at a faster speed when compared to Saas that is hosted inn remote data centre.
Organizations are likely to face data security risks since data is stored by a provider.
4
Advantages of An in-house customized software
Users of the program will find the custom-made program more friendly.
The organization is provided with a greater control, which is crucial if the business ha some specific needs that an average commercial product can fulfill.
It also makes the interface more easy to use and provides easy accessibility to knowledgeable support.
The organization is likely obtain support from individual who have developed the software at hand.
customized software is more efficient,as it can cover every aspect of the business without the.
Application of the Belmont PrinciplesFirst, identify your .docxRAHUL126667
Application of the Belmont Principles
First, identify your research topic, including the key concepts you hope to investigate, any relationship you will look for between or among them—if anticipating a quantitative study—and who you anticipate as the target population.
RESEARCH TOPIC: Application of The Cognitive Psychology in Mental Illness or Trauma
Then, briefly identify how you would apply the three Belmont principles (beneficence, justice, and respect for persons) when you conduct your study.
Your post will be assessed based on the following:
· A thorough and high-quality post will apply one or more of the Belmont principles to all of the following elements of a research design:
o How one samples and recruits participants.
o How one collects data from those participants.
o How one manages, organizes, and conducts analyses of the data.
o How one reports the findings.
· An acceptable but lower quality post will apply at least one of the Belmont Principles to at least two of the design elements.
· A low-quality post will apply a Belmont principle to only one design element.
· An unacceptable post will not apply any Belmont principles to any design elements.
.
APPLE is only one of the multiple companies that have approved and d.docxRAHUL126667
APPLE is only one of the multiple companies that have approved and declared a stock split, the most recent one on a 4-for-1 basis last August 28, 2020. Analyze and explain:
(i) What is a stock split;
(ii) Why do you think that APPLE has approved this stock split decision;
(iii) How has that the stock split affected APPLE’s stocks’ value;
(iv) What is the APPLE’s current dividend payout ratio;
(v) How do you think that the APPLE’s dividend payout ratio may affect to the stocks’ value.
This exercise assesses the following learning outcomes:
(i) the evaluation of the dividend payout ratio,
(ii) the trade-off between paying dividends and retaining the profits within the company,
(iii) the purpose and procedure related to stock repurchases, and
(iv) the evaluation and advice on a firm going from private to a public company.
.
Appliance Warehouse Service Plan.The discussion focuses on the.docxRAHUL126667
Appliance Warehouse Service Plan.
The discussion focuses on the appliance Warehouse Service Plan that is made up of the testing plan, an implementation plan and the training plan for the sake of the bettering of services in a warehouse. The testing plan is meant to manage the systems through QA standards meeting the needs of the customers. The implementation plan elaborates and indicates whether one should use parallel, direct, phased, or pilot changeover strategies. The training plan, on the other hand, indicates what a training plan would include for affected employees, such as appointment setters, technicians, management, and the parts department.
Testing Plan
The main reason for the testing plan is to validate and verify the information from the main source or the end to end target warehouse. The two major testing plans for include program testing and acceptance testing (Lewis, 2017). The plan should verify the following, the business required documents, ETL design for the documents, sources to target on the mapping process and the data model for the source and the target schemas. The documents that are considered are meant for the ETL development process in the testing plan. The testing plan is meant further for the supervisors or the quality analysis team to confirm that the work is concerning the objective of the organization. The process of testing might also include the configuration management system and the data quality validation and verification process.
Implementation Plan
The plan for the implementation of the systems is the same as the process that is considered during the development process of the entire system to meet the goals of the organization. The steps to consider for the whole plan of the implementation include the analysis and the enhancement requests, the writing of very simplified and new programs, restructuring of the database, analysis of the program library and its cost, and the reengineering of the test program. The first phase parallels the analysis phase as the parallel strategy is considered for the entire process, which entails the analysis phase of the SDLC. The steps two to four process entails the combining and the construction activities that are done on a new system majorly on a small scale. The last step is meant to parallel the testing that is commonly done during the implementation process. The testing process ensures that the process is free of risk as a quality assurance process (Liang & Hui, 2016).
Training Plan
The training plan should be made up of a training matrix in which it will guide them to know who needs the training what they need from the training and why they want the training not forgetting when they need the training(Kwak,2016). The matrix will allow for the planning and the preparation for the training avoiding scrambling when the due date for the training comes around. The requirements are automatically updated when the employees get done with the first training before transferri.
Applicants must submit a 500 essay describing how current or future .docxRAHUL126667
Applicants must submit a 500 essay describing how current or future technologies may be used to enhance academic learning and/or stimulate student engagement in the online classroom. Essay should include a description of the technology, implementation and perceived benefits.
.
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docxRAHUL126667
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook have all been identified as companies that have accumulated substantial sums of cash. For this discussion:
Select one of these companies and review their latest Balance Sheet and Statement of Cash Flows.
Suggest at least two (2) advantages and two (2) disadvantages of companies accumulating cash hoards.
Provide a rationale for your suggestion.
.
Appcelerator Titanium was released in December 2008, and has been st.docxRAHUL126667
Appcelerator Titanium was released in December 2008, and has been steadily growing in functionality since its release. Starting with its Titanium Developer product, Appcelerator provides a single-point interface to run applications. Titanium Studio is a full-featured IDE which provides a single place to handle all steps of the development environment including a debugging solution. Titanium is not a magic bullet; however, it does include a solid framework for developing a single codebase to deploy to multiple platforms. In addition, it allows developers to use a language they are more familiar with to create apps in a domain outside of their knowledge.
What are some advantages to using Appcelerator Titanium?
Though Appcelerator is reasonably priced, why do some mobile app developers feel that the bugs don’t make it worth the effort?.
How is Appcelerator different from other mobile application developers?
- apa
- 2 pages
- zero plagiarism
.
APA Style300 words per topic2 peer reviewed resources per to.docxRAHUL126667
APA Style
300 words per topic
2 peer reviewed resources per topic
Topic 1: Communicating Research
What are some possible ways you can communicate your research findings?
Topic 2: Considering the Audience
What do you need to consider when communicating to different audiences?
.
Ape and Human Cognition What’s theDifferenceMichael To.docxRAHUL126667
Ape and Human Cognition: What’s the
Difference?
Michael Tomasello and Esther Herrmann
Max Planck Institute for Evolutionary Anthropology, Leipzig, Germany
Abstract
Humans share the vast majority of their cognitive skills with other great apes. In addition, however, humans have also evolved a
unique suite of cognitive skills and motivations—collectively referred to as shared intentionality—for living collaboratively,
learning socially, and exchanging information in cultural groups.
Keywords
apes, culture, cognition, evolution, cooperation
Surely one of the deepest and most important questions in all of
the psychological sciences is how human cognition is similar to
and different from that of other primates. The main datum is this:
Humans seemingly engage in all kinds of cognitive activities that
their nearest primate relatives do not, but at the same time there is
great variability among different cultural groups. All groups have
complex technologies but of very different types; all groups use
linguistic and other symbols but in quite different ways; all
groups have complex social institutions but very different ones.
What this suggests is that human cognition is in some way bound
up with human culture. Here we argue that this is indeed the case,
and we then try to explain this fact evolutionarily.
Similarities in Ape and Human Cognition
The five great ape species (orangutans, gorillas, chimpanzees,
bonobos, humans) share a common ancestor from about 15 mil-
lion years ago, with the last three sharing a common ancestor
from about 6 million years ago (see Fig. 1 for a picture of chim-
panzees). Since great apes are so closely related to one another
evolutionarily, it is natural that they share many perceptual,
behavioral, and cognitive skills.
Great ape cognitive worlds
Many different studies suggest that nonhuman great apes (here-
after great apes) understand the physical world in basically the
same way as humans. Like humans, apes live most basically in
a world of permanent objects (and categories and quantities of
objects) existing in a mentally represented space. Moreover,
they understand much about various kinds of events in the
world and how these events relate to one another causally (see
Tomasello & Call, 1997, for a review). Apes’ and other
primates’ cognitive skills for dealing with the physical world
almost certainly evolved in the context of foraging for food.
As compared with other mammals, primates may face special
challenges in locating their daily fare, since ripe fruits are pat-
chy resources that are irregularly distributed in space and time.
Other studies suggest that great apes understand their social
worlds in basically the same way as humans as well. Like
humans, apes live in a world of identifiable individuals with
whom they form various kinds of social relationships—for
example, in terms of dominance and ‘‘friendship’’—and they
recognize the third-party social relationships that.
Apply what you have learned about Health Promotion and Disease P.docxRAHUL126667
This document provides instructions for developing a holistic plan of care for a specific population using concepts of health promotion, disease prevention, and telehealth technologies. Students are asked to select a population based on gender, age, ethnicity, socioeconomic status, and healthcare needs. They then must develop a case study for a patient within that population, outlining a plan of care using telehealth, alternative therapies, and mobile apps to address the unique needs of and improve access to care for that group.
APA formatCite there peer-reviewed, scholarly references300 .docxRAHUL126667
APA format
Cite there peer-reviewed, scholarly references
300 - 350 words
Write a negative construct on the usefulness of decision making, leadership effectiveness, and employee morale challenges as they impact organizational change.
***Introduction and conclusion not needed***
.
APA formatCite 2 peer-reviewed reference175-265 word count.docxRAHUL126667
APA format
Cite 2 peer-reviewed reference
175-265 word count
Read
and
respond
to the following discussion posts. Be constructive and professional with your thoughts, feedback suggestions or question(s).
Respond to the following:
Crystal Irwin
12:13 PM
Hello Ms. Chimera & Class,
Everyone has different strengths and weaknesses when it comes to academics and the professional world. Thanks to my experience as a financial ops generalist, I have gained great communication skills. I am responsible for contacting vendors to address or fix any issues we may have with the service or product. I have also completed training on effective communication at my current job. This training was helpful being that I have to regularly speak with offenders family members as well. Another one of my strengths is that I am very reliable. My previous supervisor would always assign me extra duties when she had a deadline to meet because she knew that I would make sure it was done by the deadline. An academic weakness that I have is writing papers, I tend to procrastinate when it comes to having to write them. I have found that the writing center is very helpful. The university's library is helpful when having to do research. I have used the citation generator numerous times in the past to help with citations. If you have trouble with citations, this is a good resource or tool to use.
.
APA formatCite at least 1 referenceWrite a 175- to 265-w.docxRAHUL126667
APA format
Cite at least 1 reference
Write
a 175- to 265-word response to the following:
How does employee motivation impact organizational behavior? Provide details.
What do you believe has the biggest impact on employee motivation? Why?
.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Bus 4951-8 Unit VIII ProjectImplementation Plan Part 3For the.docx
1. Bus 4951-8 Unit VIII Project
Implementation Plan: Part 3
For the final assignment of this course, you will continue your
work with the company you used in Unit 4 and Unit 6 which
was Buffalo Wild Wings, Inc., 2013. For the Unit 8 Project, you
will complete the final components of your implementation
plan.
For Part 3, you will focus on the following points:
· internal and external issues,
· competition ,
· future outlook for the organization, and
· Implementation of tools for measuring business success.
Much of the information you will need to complete this segment
can be found in the case study in the textbook. However, you
are welcome to conduct further research as needed. For the
future of the organization, you may be creative and add your
own insight on where you see the company going.
Your project must be a minimum of three full pages in length,
not including the title and reference page. Make certain to
include an introductory paragraph.
Below is the information from Unit 4 and 6.
Buffalo Wild Wings, Inc., 2013
www.buffalowildwings.com , BWLD
Headquartered in Minneapolis, Minnesota, Buffalo Wild Wings
(BWW) is the largest chicken wing–based sports bar in the
USA. BWW offers a welcoming atmosphere, open layout
catering to families, sports enthusiasts, and chicken wing
lovers. The typical store offers 20 to 30 different beers on draft
and tap, up to 10 projection TV screens, and up to 50 smaller
TVs for people to watch sporting events.
BWW specializes in traditional bone-in chicken wings and
boneless chicken wings complimented by its 16 different wing
2. sauces. BWW also sells burgers, other finger foods, and
alcoholic beverages. The typical restaurant offers a diverse
selection of beers, wines, and liquor options. As of year end
2012, BWW operated 891 stores of which 381 were company-
owned and 510 were franchisee-owned. The company expects to
increase its total number of restaurants by 105 in 2013 and
approximately by the same amount in 2014. The typical
restaurant is between 4,000 and 10,000 square feet and costs
around $2 million to build, including the land, building,
appliances, etc. Each has 50 high-definition flat-screen TV’s
and 10 large projection screen TV’s. Takeout orders comprise
14 percent of BWW sales.
In their company-owned restaurants, BWW employs 25,500
people, 2,800 full-time and 22,300 part-time, which it calls
team members. Five of the top nine executives are females
including the CEO, Sally J. Smith. BWW operates its 817 stores
in 48 U.S. states and Canada. BWW opened five new restaurants
in 2012 on the parking lots of big-box retail stores such as
Home Depot. BWW expects to have 1,500 restaurants in the
USA and Canada by 2016, and many of them will be in vacant
space of Sears stores, parking lots, and malls.
Copyright by Fred David Books LLC. (Written by Forest R.
David)
History
In 1981, James Disbrow, from Buffalo, New York, along with
friend, Scott Lowery, went looking for a Buffalo-style chicken
wing restaurant around the campus of Kent State University in
Ohio while judging a figure skating competition. Unable to find
a satisfactory restaurant in the area similar to what they knew
was good from back home, the concept of opening Buffalo Wild
Wings and expanding this tradition of Buffalo, New York, to
other areas of the country was born. The first restaurant named
Buffalo Wild Wings & Weck or BW3, was opened in Columbus,
Ohio, in 1982 near the campus of Ohio State University. In
1991, BWW began its franchising program and in 2003 the
company completed its initial public offering.
3. Vision and Mission
BWW refers to its mission statement in its code of ethics, but
the firm does not provide an explicit mission or vision
statement on its website or its annual report. However, BWW
does provide its “concept and business strategy” as follows:
· Continue to strengthen the Buffalo Wild Wings brand
· Deliver a unique guest experience
· Offer boldly-flavored menu items with broad appeal
· Create an inviting, neighborhood atmosphere,
· Focus on operational excellence,
· Open restaurants in new and exciting domestic markets and
new countries and
· Increase same-store sales, average unit volumes and
profitability.
EXHIBIT 1 BWW’s Organizational Design
Source: Company documents.
Organizational Chart
As indicated in Exhibit 1, BWW appears to operate from a
divisional by geographic region structure.
Internal Issues
Statement of Ethics and Governance
BWW has two statements of ethics: one for regular employees
and one for executives. For employees, the Code of Ethics
provides an overall standard for ethical conduct in conjunction
with what is viewed today as ethical business behavior. The
statement also provides the following: (a) how to report
violations of conduct, (b) extensive personal conduct policies,
(c) conflicts of interests, (d) protecting trade secrets, (e)
disclosure of financial data, (f) environmental impact, and much
more. The executive code of ethics is similar to the document
for employees. Both codes of ethics stress doing the job to the
best of one’s ability and seeking help before making a decision
on any matters of which the employee is not sure of.
BWW provides a well-detailed corporate governance document
for view on its website. This document stresses all key issues
4. related to the governance of BWW, including but not limited to:
board size, board leadership policies, selection of new directors,
retirement, compensation, and stock ownership policies.
Business Segments
As indicated in Exhibit 2, 22 percent of BWW’s revenues come
from alcoholic beverages. Not included in the chart but
important to note is that 13 percent of BWW’s sales come from
takeout orders, an area in which BWW states it does not try to
compete on and do not consider takeout wing establishments its
primary competitors. But 13 percent is quite large and may be a
growth area for the company in the future.
Exhibit 3 reveals strong revenue growth for BWW’s company-
owned and franchised stores over the last three years. Revenue
from company-owned stores increased 34 percent in
2012. Exhibit 4reveals average revenue per store. Note that
franchised stores are outperforming company-owned stores on
average, but this is partly the result of BWW repurchasing
underper-forming franchised stores.
EXHIBIT 2 A BWW Revenue-by-Product Percentage Analysis
Traditional Wings
Boneless Wings
Alcoholic Beverages
Other Food/Beverages
Years
20%
19%
24%
37%
2011
20%
19%
22%
39%
2012
Source: Company documents.
EXHIBIT 3 BWW Revenue Analysis: Company Owned versus
5. Franchised Restaurants
2012
2011
2010
2009
Company Owned
$964M
$717M
555M
489M
Franchised
$1,510M
$1,326M
1,148M
992M
Source: Company documents.
EXHIBIT 4 BWW’s Average Revenue per Restaurant
2011
2010
2009
Company Owned
$2.25M
2.14M
2.11M
Franchised
$2.66M
2.43M
2.36M
Source: Company documents.
Strategies
BWW is currently employing both market penetration and
market development strategies and plans to have around 1,500
restaurants within the next several years, nearly double what
they currently own. BWW is considering adding locations
6. outside its current two countries: USA and Canada. The
company also expects to maintain its 60–40 split of franchised-
owned to company-owned stores. Opening new stores especially
in new countries would create additional risks, such as limited
brand awareness, supply chain issues, unknown competitors,
and much more. BWW is considering expanding into
international markets via joint ventures with an established
global brand.
Exhibit 5 reveals BWW growth over recent years. Note in 2012
the 19 percent growth in company-owned stores and 2.4 percent
for franchised stores.
Marketing and Advertising
EXHIBIT 5 BWW’s Growth: Number of Restaurants
2012
2011
2010
2009
Company-Owned
381
319
259
232
Franchised
510
498
473
420
Source: Company documents.
Since its inception in 1982, BWW has specialized in offering a
unique brand experience for guests with the wide array of 6
award-winning sauces, beer variety, conveniently located TVs, a
great social and sporting atmosphere, and though not
acknowledged by the company, sex appeal with young attractive
female waitresses. BWW instituted Tablegating at
its restaurants in 2011 to promote sporting events, good food,
7. beverages, and fellowship among fans. BWW maintains a year-
round advertising presence but increases this advertising around
its peak seasons, generally NCAA football in the fall and NCAA
basketball in the spring. Each BWW franchise pays a royalty fee
of 5.0 percent and an advertising fee of 3.5 percent of restaurant
sales.
Finance
In 2011 alone, BWW built 50 new company-owned stores and
repurchased 18 franchised stores. Exhibits 6 and 7 are the
financial statements for BWW. Note net income increased 13.6
percent from 2011 to 2012. Note on the balance sheet that BWW
currently has $32 million in goodwill, up from $17 million in
2011.
EXHIBIT 6 BWW’s Income Statements
(Amounts in thousands except per share data)
Fiscal years ended
December 30, 2012
December 25, 2011
December 26, 2010
Revenue:
Restaurant sales
$ 963,963
717,395
555,184
Franchise royalties and fees
76,567
67,083
58,072
Total revenue
1,040,530
8. 784,478
613,256
Costs and expenses:
Restaurant operating costs:
Cost of sales
303,653
203,291
160,877
Labor
289,167
215,649
167,193
Operating
141,417
109,654
88,694
Occupancy
54,147
44,005
36,501
Depreciation and amortization
67,462
49,913
39,205
General and administrative
84,149
72,689
53,996
Preopening
14,630
9. 14,564
8,398
Loss on asset disposals and store closures
3,291
1,929
2,051
Total costs and expenses
957,916
711,694
556,915
Income from operations
82,614
72,784
56,341
Investment income
754
118
684
Earnings before income taxes
83,368
72,902
57,025
Income tax expense
26,093
22,476
18,625
Net earnings
$ 57,275
50,426
38,400
Earnings per common share – basic
$ 3.08
2.75
2.11
Earnings per common share – diluted
$ 3.06
10. 2.73
2.10
Weighted average shares outstanding – basic
18,582
18,337
18,175
Weighted average shares outstanding – diluted
18,705
18,483
18,270
EXHIBIT 7 BWW’s Balance Sheets
(Dollar amounts in thousands)
December 30, 2012
December 25, 2011
ASSETS
Current assets:
Cash and cash equivalents
$ 21,340
$ 20,530
Marketable securities
9,579
39,956
Accounts receivable, net of allowance of $25
20,203
12,165
Inventory
7,820
6,311
11. Prepaid expenses
3,869
3,707
Refundable income taxes
4,122
7,561
Deferred income taxes
5,774
6,323
Restricted assets
52,829
42,692
Total current assets
125,536
139,245
Property and equipment, net
386,570
310,170
Reacquired franchise rights, net
37,370
21,028
Goodwill
32,365
17,770
Other assets
9,246
7,146
Total assets
$ 591,087
$ 495,359
LIABILITIES AND STOCKHOLDERS’ EQUITY
Current liabilities:
12. Unearned franchise fees
$ 1,763
$ 1,852
Accounts payable
36,418
30,089
Accrued compensation and benefits
39,637
30,499
Accrued expenses
11,461
7,580
System-wide payables
51,564
44,250
Total current liabilities
140,843
114,270
Long-term liabilities:
Other liabilities
1,752
1,544
Deferred income taxes
37,128
38,512
Deferred lease credits
27,992
23,047
Total liabilities
207,715
177,373
Commitments and contingencies
13. Stockholders’ equity:
Undesignated stock, 1,000,000 shares authorized, none issued
—
—
Common stock, no par value. Authorized 44,000,000 shares;
issued and outstanding 18,623,370 and 18,377,920, respectively
121,450
113,509
Retained earnings
262,047
204,772
Accumulated other comprehensive loss
(125)
(295)
Total stockholders’ equity
383,372
317,986
Total liabilities and stockholders’ equity
$ 591,087
$ 495,359
Source: 2012 Form 10K, p. 37.
Locations
BWW’s home office in Minneapolis consists of 48,000 square
feet and is under a lease that terminates in 2017 with an option
to renew for another five-year term. BWW has 891 restaurants
in 49 different U.S. states and 7 additional restaurants in
Ontario, Canada. Exhibit 8 provides the top 10 U.S. markets
ranked by total number of BWW restaurants. Note that Texas
has the most BWWs, followed by Ohio. Exhibit 9 reveals that
approximately 43 percent of all BWW restaurants are located in
Midwestern states. The Northeast, West, Canada, and other
world locations are still relatively untapped by BWW.
Restaurant Franchise Operations
Approximately 59 percent of all BWWs are franchised and
14. owned and operated by the franchisee. Franchises fees range
from $25,000 to $42,500 depending on the owner’s restaurant
experience and the number of stores he or she currently
operates. The general lease is typically for a 20-year initial term
with the possibly to renew subject on certain conditions that the
company does not specify.
In addition to the initial start-up costs, franchisees also pay
royalty fees of 5 percent on all restaurant sales, with an
additional 3.5 percent of sales revenue being attributed to
advertising. There is a provision in all contracts whereby BWW
can increase the fees by 0.5 percent once every three years. It is
unclear from company documents whether this would amount to
a 5.5 percent fee or a 5.025 percent fee. BWW does not expect
to enact this provision in the next two years.
EXHIBIT 8 BWW’s Top 10 U.S. States (Number of Stores)
2011
2012
2011
2012
2011
2012
USA
Company-Owned
Franchised
Total
Texas
37
43
51
45
88
88
Ohio
32
32
17. 107
13
Northeast
71
9
Canada
4
-
Total
817
100%
Source: Company documents.
Competitors
In the competitive restaurant industry, BWW is attracting
customers based on taste, quality, service, and ambience.
Primary competitors include Hooters, T.G.I Friday’s, Chili’s,
Applebees, and many regional and mom-and-pop sports bars
across the USA and Canada. In addition to sports bars and
chicken wing-themed establishments, BWW does not consider
quick-service restaurants (QSR), such as McDonald’s and
Kentucky Fried Chicken, as competitors, nor surprisingly quick
takeout chicken wing establishments. This corporate view is
surprising because many quick-service chicken wing stores can
offer much lower prices than BWW because its overhead is
significantly less. Recall that 13 percent of all BWW sales are
derived from takeout customers. This 13 percent can somewhat
be considered a gift because BWW does not promote its takeout
business with volume discounts, “tailgate specials,” or any
other marketing strategy.
Exhibit 10 provides a financial comparison of BWW with
DineEquity (owner of Applebees’s) and Brinker International
(owner of Chili’s). Note that BWW has the highest price-
earnings ratio but has the lowest revenues among the three.
T.G.I. Friday’s
With about 1,000 locations worldwide, T.G.I. Friday’s (often
shortened to “Friday’s” in most countries, and stylized
18. “FRiDAY’S”, or “T.G.I.s” in the United Kingdom and the
Republic of Ireland) is a U.S. restaurant chain focusing on
casual dining, similar to BWW. T.G.I is owned by the Carlson
Companies, a privately-held firm, so financial information is
difficult to obtain about T.G.I Friday’s. The company name,
however, is taken from the expression TGIF, which stands for
“Thank Goodness It’s Friday,” although some recent television
commercials for the chain have also made use of the alternative
phrase, “Thank God It’s Friday.” The company is known for its
red-striped canopies, brass railings, Tiffany lamps, and frequent
use of antiques as dècor.
Hooters
HOA Restaurant Group (Hooters), based in Atlanta, Georgia,
was founded in 1983 in Clearwater, Florida, and currently
operates more than 430 franchise restaurants in more than 27
different countries, and additionally, the company operates 160
stores. The theme and concept of Hooters has changed little
over the last 30 years and chicken wings is a main product
served. The typical Hooters restaurant experience includes the
sex appeal of female waitresses, jukebox-style music, sports on
television, and a menu that focuses around chicken wings, but
also includes seafood, salads, and sandwiches. Around 68
percent of all Hooters sales are derived from food and
nonalcoholic beverages, 28 percent from beer or other alcoholic
beverages, and 4 percent from merchandise, such as Hooters
calendars and appeal.
EXHIBIT 10 A Financial Comparison of BWW with Brinker
International and DineEquity
BWW
DineEquity
Brinker Int.
Market Capitalization
1.61B
804M
2.4B
19. Number of Employees
2.8K
640
60.3K
Revenue
1.04B
1.02B
2.81B
Gross Margin
0.26
0.40
0.18
Net Income
57.2M
72.6M
146M
EPS Ratio
2.90
4.00
1.77
P/E Ratio
29.91
10.99
18.00
EPS, earnings per share; P/E, price-to-earnings.
Source: Company documents.
Applebee’s
Founded in 1976 as the International House of Pancakes (IHOP)
and based in Glendale, California, with 640 full-time
employees, DineEquity today operates both Applebee’s
Neighborhood Grill and Bar and IHOP. As of year-end 2011, the
company operated 1,842 Applebee’s franchise restaurants in the
USA and 16 different foreign markets and 177 additional
company-owned restaurants. There were 1,535 IHOP-franchised
restaurants in the USA and 5 in foreign markets and 10
company-owned IHOP restaurants. DineEquity has experienced
20. a 40-percent decline in revenues from $1.4 billion in 2009 to
$1.0 billion in 2011.
The Applebee’s segment of DineEquity competes with BWW by
serving chicken wings, burgers, and other bar finger foods along
with alcoholic and nonalcoholic beverage items. Applebee’s
also sells steaks, its most popular item, and have begun a new
fresh menu offering new chicken, seafood, and salads in an
attempted to capitalize on a healthier-minded consumer. In
addition to the historical similarity in food times with BWW,
Applebee’s also markets itself as a neighborhood bar and grill
and provides a limited sports bar atmosphere around the bar
area during times of significant sporting events. New CEO Mike
Archer of Applebee’s is currently reducing the pop culture feel
of Applebee’s decor, adding healthier items such as its less-than
500-calorie menu, so it has yet to be determined how close of a
competitor of BWW Applebee’s will remain.
Chili’s
Founded in 1975 as Chili’s in Dallas, Texas, Brinker
International operates both Chili’s Grill & Bar and Maggianos’s
Little Italy. As of year-end 2011, Brinker operated 1,534 Chili’s
and 45 Maggiano’s. The company has restaurants in all 50 states
and in more than 30 countries. The company experienced an 18-
percent decline in revenues from $3.2 billion in 2009 to $2.7
billion in 2011. The Chili’s segment most closely competes with
BWW offering many similar food items, alcoholic beverages,
and a care-free atmosphere. However, Chili’s does not
incorporate a sports bar aspect into its stores.
External Issues
Chicken wing prices in 2012 increased 62.8 percent over the
prior year to an average price per pound of $1.97. Chicken
wings accounted for 27 percent of BWW’s cost of sales in 2012,
up from 19 percent the prior year.
Domestic Economy
Unemployment is hovering just above 8 percent and interest
rates are low but banks are not readily lending. Consumers
continue to pinch pennies. “Dining out easily can be postponed,
21. so many restaurants are a “very visible indicator” of what’s
happening in the economy,” says Malcolm Knapp, a New York-
based consultant who created the Knapp-Track Index and has
monitored the industry since 1970. “Amid declining confidence,
consumers don’t have the appetite to eat away from home as
frequently,” he said. The USA is facing more than $600 billion
in higher taxes and reductions in defense and other government
programs in 2013. U.S. retail sales are weakening, and
consumer sentiment, measured by the Bloomberg Comfort
Index, is declining. “It doesn’t feel like we’re out of a recession
for many middle-class American households,” Knapp said. In
what’s become an “allocation nation,” consumers must choose
between different categories of discretionary spending, and
dining out is “very sensitive” to changing habits.
Commodity Prices
BWW does not engage in any form of futures contracts for
purchasing wings, instead purchasing at market prices and
accepting the volatility that comes with that strategy. BWW
acknowledges this problem and is actively looking for a long-
term pricing agreement but has yet to come to agreement with
any provider of chicken wings. Also, most BWW supplies are
provided by third parties, leaving BWW with limited little
control over its supply chain. Failure to deliver chicken wings,
sauce, paper products, beverages, and such on time could
severely impact its business.
Future
BWW is one of the fastest-growing restaurant chains in the USA
and also one of the hottest stocks for investors. The company’s
strategy to focus on chicken wings, beer, sports, and attractive
waitresses continues to be a winning business model. Perhaps
the most important challenge facing BWW is with its expansion
policy. The company expects to double its total stores in the
next three to four years. CEO Sally Smith is currently faced
with continuing expansion in stronghold markets in the Midwest
and Southeast or exploring markets in the Northeast, West,
Canada, and other international markets. BWW has two
22. franchise development agreements for restaurants in the Middle
East and Puerto Rico.
BWW lacks control over its supply chain and has no real futures
contracts in place to hedge against volatile chicken wing prices.
Should CEO Smith actively establish contracts with chicken
producers to buy chicken wings on a futures contract? Are there
other backward integration strategies CEO Smith could pursue
to help protect against untimely delivery, poor quality, or
volatile pricing of supply chain products?
Another strategic issue facing BWW is its neglect of the takeout
business. Although the company focuses on selling a casual
sporty dining environment, many sports fans enjoy watching
games at home, tailgating at the event, or even just enjoying a
day at the lake or beach. Currently BWW does not offer any
type of marketing package or takeout options for this customer
group, rather it expects the customer to pay full menu dine-in
prices with little price discount for volume purchases. However,
with 13 percent of sales, and a much larger percent of food sales
because takeout typically does not include alcohol, there is an
opportunity to grow this business.
Develop a three-year strategic plan for CEO Sally Smith at
BWW.
Lab #3
Student
Teacher
Class
23. Implementing System Restore Points
1. Investigate the System Restore tool (used to manage system
restore points). To access the tool, open the System tool from
Control Panel (Control Panel > System and Security > System).
2. Then, click on System Protection (left menu).
System restore tool helps users of the operating system to
restore back the previous versions of files that were deleted
from the computer. The tool will not affect the state of the
computer in the current condition like affecting the installed
files or software. (Poulton, Bellet & Holt, 2015).
3. Identify appropriate sources of information (e.g. Windows
Help, Microsoft Technet, etc.) for instructions for using the
Windows 8.1 System Restore Point capability. Using those
sources, research the procedures required to perform the
following tasks:
a. Create a system restore point for a Windows 8.1 system
Launch the Windows Help and Support from the start menu,
then search for create restore point.
From the search results, select “create restore point.”
This will take you to the panel with the descriptions on how to
create the restore point on Windows operating system.
b. Use a system restore point to roll-back changes made to a
Windows 8.1 system
To roll-back the changes made is possible on the Windows
24. platform where there is the undo feature.
c. To access this, utilize the Windows Help and Support, after
launching the Windows Help and Support, type “undo restore
point.”
d. Select on the “undo system restore” option on the search
results. This will give the guidelines on how to undo the system
restore on the Windows operating system.
e. Remove system restore points from a Windows 8.1 system
(some and all).
It is possible to remove the restore points from Windows 8.1
platform. This action is possible through the use of the delete
restore point option in the Windows Help and Support. Search
for “delete a restore point” on the Windows Help and Support
tool. This will give a guide on whether to delete all the restore
points or some of the restore point.
Managing Programs and Features for Windows 8.1
1. Programs and Features tool
This tool is a default point in Windows operating system where
all the installed programs can be located in the computer. This
tools can act as an alternative place for uninstalling programs
from the computer. All the programs installed will be displayed
together with the necessary information regarding the specified
program like date modified, size on the disk etc (Poulton,
Bellet, & Holt, 2015).
To access, launch the control panel on Windows operating
system then under programs item, go to Program and Features
option (Poulton, Bellet, & Holt, 2015).
2. Identify appropriate sources of information (e.g. Windows
Help, Microsoft Technet, etc.) for instructions for using the
Programs and Features tool. Using those sources, research the
25. procedures required to perform the following tasks:
a. Turn Windows Features On or Off.Windows Help and
Support
To launch the windows help and support feature, access the
start menu then locate the help and support menu item. Launch
the help and support item the search help type programs and
features then press enter (Poulton, Bellet & Holt, 2015).
The list provided, contains the instruction on how to use this
feature on the Windows operating system. From the list, click
on ‘turn Windows features on or off’
This tool works best because it has documentation of windows
and all the guidelines to use the platform.
b. Modify, Repair, or uninstall a program from a Windows 8.1
system.Uninstalling a program.
Programs after being installed to the computer, can only be
deleted by uninstalling them off from the computer. Programs
can be uninstalled from the Programs and Features option on the
control panel (Poulton, Bellet, & Holt, 2015). All the installed
programs will be displayed in this area. To uninstall a program,
select on the program you want to uninstall. Then the option
will display on the top of the panel to uninstall. However, some
programs can be changed or repaired while others can only be
uninstalled. You can choose to uninstall the selected program,
change or repair it (Poulton, Bellet, & Holt, 2015).
Windows Help and Support.
Launch the Windows Help and Support from the start menu.
Type program and features then press enter. Select uninstall or
change program.
This will provide the guidelines to uninstall or change a
program on the Windows operating system.
26. c. Select and Install Updates for Windows and Windows
Applications, find an installed Update, Remove an installed
update.Find an installed update
To find Windows Updates, launch the control panel from the
start menu. Go to system and security then WindowsUupdate.
To view the installed updates, click on the update history on the
navigation panel. Then on the opened pane, click on see the
installed updates.
You can choose to remove an installed update by uninstalling
from the system.
Implementing Security Configuration Rules Using the Local
Group Policy Editor
Note: you are NOT implementing the DISA / DoD STIG in this
section. You are implementing a set of security configuration
rules that your “company” has selected from industry accepted
sources.
1. Investigate the Local Group Policy Editor tool (Windows Key
+ R then type gpedit.msc). Pay particular attention to the menu
tree in the left-hand pane (expand and review the categories of
settings which can be changed using this tool).
Security settings policies are the rules that the computer user
can configure on a single computer, or multiple computers, for
the main purpose of protecting resources that are on a computer
or network. The Security Settings extension of the Local Group
Policy Editor snap-in (Gpedit.msc) allows the computer user to
define security configurations as part of a Group Policy Object
(GPO) (Poulton, Bellet, & Holt, 2015).
This security measure operates on the software environment
where the instruction on how the computer works is based
(Poulton, Bellet, & Holt, 2015).
27. Security settings can control:
i. User authentication to the network or computer.
ii. Whether to record a user’s actions in the Event log.
iii. The resources that the computer users are permitted to
access.
iv. Membership in the group.
Logical groupsBanner group
Warning: Using Registry Editor incorrectly can cause serious,
system-wide problems that may require reinstallation of
Windows 2000 to correct them. Microsoft cannot guarantee that
any problems resulting from the use of Registry Editor can be
solved (Poulton, Bellet, & Holt, 2015).
1. Login to the domain controller machine with the
administrator account. Click on Start, Click on Administrative
Tools, Click on Group Policy Management. Under Domains,
right click your domain and click on Create a GPO in this
domain, and link it here. Create the policy of your choice.
2. Write the policy you created and click on Edit. On Group
Policy Management Editor, click on Computer Configuration,
expandPolicies, expand Windows Settings, expand Security
Settings, expand Local Policies, and click on Security Options.
3. On the right pane look for the policy Interactive Logon:
Message text for users attempting to log on.This security setting
specifies a text message that is displayed to users when they log
on. You can paste the Logon text that is to be displayed to the
users before they log in. Click on Apply and OK.
4. On the right pane look for the policy Interactive Logon:
Message title for users attempting to log on.This security
setting allows the title to appear in the title bar of the window
that contains the Interactive logon. Type the title text and click
on Apply and OK.Notification group
28. It is recommended that the system display a warning message to
users before allowing them to log on. It may be necessary to get
help with the wording of the message from the company's legal
department. The message should inform users that the system is
for authorized use only, and that they could be prosecuted if
they misuse the system (Poulton, Bellet, & Holt, 2015). For
example,
1. Log on using an administrator account.
2. Open the Active Directory Users and Computers tool.
3. Right-click the container holding the domain controller and
click Properties.
4. Click the Group Policy tab, and then click Edit to edit the
Default Domain Policy.
5. In the Group Policy window, expand Computer
Configuration, navigate to Windows Settings, to Security
Settings, and then to Local Policies.
6. Select Security Options.
7. In the details pane, double-click Message title for users
attempting to log on.
8. Check the Define this policy setting box.
9. Enter the title for the message (for example, "Warning") and
click OK.
10. Double-click Message text for users attempting to log on.
11. Check the Define this policy setting box.
12. Enter the text for the message and click OK.
13. Exit the Group Policy window.
Restart a domain client and log in to the domain to see the login
banner message.
Since this security setting is associated with the default domain
GPO, it applies to all computers in the domain. This setting will
override any local policies (defined on individual computers)
that specify this security parameter, but will not override any
OU policies that specify this value.Log on group.
29. This security option determines whether a computer can be shut
down without having to log on to Windows. When this policy is
enabled, the Shut Down command is available on the Windows
logon screen. When this policy is disabled, the option to shut
down the computer does not appear on the Windows logon
screen. In this case, users must be able to log on to the
computer successfully and have the Shut down the System user
right in order to perform a system shutdown. By default, this
option is enabled on workstations and disabled on servers in
Local Computer Policy (Poulton, Bellet, & Holt, 2015).
Disable the shutdown button on the Windows logon screen of
Domain Computers as follows:
1. Log on using an administrator account.
2. Open the Active Directory Users and Computers tool.
3. Right-click the container holding the domain controller and
click Properties.
4. Click the Group Policy tab, and then click Edit to edit the
Default Domain Policy.
5. In the Group Policy window, expand Computer
Configuration, navigate to Windows Settings, to Security
Settings, and then to Local Policies.
6. Select Security Options.
7. In the details pane, double-click Allow system to be shut
down without having to log on.
8. Check the Define this policy setting box, select Disabled and
click OK.
9. Exit the Group Policy window.
References
Poulton, D., Bellet, R., & Holt, H. (2015). MCSA 70-687 cert
guide: Configuring Microsoft Windows 8.1. Indianapolis, IN:
Pearson.
30. Kim, D., & Solomon, M. (2011). Fundamentals of information
systems security. Sudbury, MA: Jones & Bartlett Learning.
Zacker, C. (2014). Configuring Windows 8.1, exam 70-687.
Lab #2
Student
Teacher
Class
Introduction
This document provides a brief step by step procedure for
Windows 8.1 antimalware protection tools which will always
secure your system from malware. The document will count
three main antimalware tools namely Windows Defender,
Windows Firewall and Microsoft Baseline Security Analyzer
(MBSA).
All of the three tools come shipped in the Windows 8.1
operating system to help monitor the computer system by
preventing malware from affecting the Windows operating
system.
First I will discuss the configuration of Windows defender and
31. write guidelines on how it monitors malware.Windows Defender
Windows Defender came in with later version of Windows
operating system from Windows 8.1 and sooner Windows
operating system. It came to replace Microsoft security
essentials which has been used in older version of Windows for
malware protection as a standalone antivirus program than the
later embedded windows defender which comes with windows
8.1 and new version of windows.Launching windows defender
By using Windows key + S will help you type in the name of the
Windows Defender. Once done in typing the name of the search,
we can select Windows Defender and run the application
program. Because the Windows Defender is not activated by
default, we need to have a well working internet services to
activate the application for its functionality. We can also opt for
option two to make use of offline installer for Windows
Defender which we can run without need of internet services.
Once installed, we will always be needing internet connection
to allow our Windows Defender to check and download the
latest virus updates and spyware definitions always.Updating
Windows Defender
Keeping Windows Defender up to date will always make
malware detection and protection very active. Expired Windows
Defender definitions will make computer systems vulnerable to
malwares. The expired anti malware definition allows new
malwares to attack and multiply in your computer system
leading program infection and malfunction. The viruses and
Trojans become active and cannot be easily controlled. The
following diagram illustrations how Windows Defender
interface looks like and how to update the Windows Defender to
keep it up to date.
For update, Windows Defender will always display a
notification message to notify you that your Windows Defender
virus and antispyware definitions are up to date and need to be
updated as illustrated below.
The figure above is a good example of out of date Windows
32. Defender which requires internet connection fixes so as it can
update. By clicking the update button, we allow our Windows
Defender to update and the program will check for updates from
the internet. If it finds the up to date updates, it will set virus
and spyware definitions up to date.
As we can see above, the colour of our frame and error picture
symbol is yellow in colour, this means we are operating our PC
at a very severe condition which can lead to harmful effects
through investments of viruses and spywares.
On clicking update button, the following download progress bar
will be seen in the frame shown below indicating that our
Windows Defender is trying to search for any available up to
date definitions. The figure below shows progress bar of
Windows Defender searching for update definitions from online.
If no internet or in case of error in connectivity, the error
message will be displayed as shown below.
The image above shows us that there was error in internet
connection and that’s what made our Windows Defender not to
update.
Else if our Windows Defender finds the internet connection, it
downloads the updates, automatically installs the update and
sets our pc protection status as protected and we are secure from
threats and malware attack.
Figure bellows shows us an up to date Windows Defender.
As we can see above, our PC is fully protected.Using Windows
Defender to scan for malwares
Scanning for Windows against malwares is always
recommended. Although Windows Defender can allow us to set
for scheduled scans after a set interval of time, it is highly
advisable to have continuous daily scan to mitigate our
malwares which are inactive from affecting our systems. To
perform a scan, we consider using the home tab found in
Windows Defender interface as shown below.
33. Using the interface, we can be able to select which type of scan
we want to perform. As shown above, we may opt to use quick
scan which only performs shallow scan without getting deeper
into system files but only scanning the default suspected
directories and computer locations. Custom scan may be used to
scan the system locations and directories which user may
suspect are infected and not the whole system but only some
parts.
Full scan option is used to scan the whole computer system.
Scanning all memory locations, hard disks and registry of the
computer system. It is always advisable to perform full scan to
prevent any chance of having hidden malwares which might
attack the PC later.
After scanning the PC, a history of malwares is always
displayed indicating the malware type and its level of effects on
PC. The levers are either weak, moderate or severe. Whereby a
severe malware can destroy the computer files and interfere
with it completely if they are not monitored or quarantined. By
quarantine the viruses, their risk of effects is minimized.
Windows Defender has scan settings which requires user to
specify which actions to be done on the malwares. Either be
quarantined or removed. But it is highly advised to remove the
virus instead of quarantine to prevent future viral effects by
those quarantined malwares. The figure below shows malware
detected and their effect levels to the system.
The figure above shows worms and Trojan which the risk level
is very severe and can damage the operating system
applications.Setting up Windows Defender
Windows Defender contains settings that allows the user to
specify how he wants it to protect his system. The figure below
shows all possible options available for settings.
i. Starting from setting number one, we find that we can set our
Windows Defender to prevent your PC on real time. Meaning
34. that any harmful software cannot get into our computer from
any connection available. The Windows Defender will block the
software from installing itself into our computer.
ii. Using Excluded files and locations allows us to exclude some
files and locations from scans to speed up the scanning. But this
setting makes our computer to be at risk because some harmful
software may hide themselves in those locations we did exclude.
iii. This setting allows us to exclude files with certain
extensions to speed up the rate of scanning although this makes
our computer risky of some left in malwares.
iv. This setting allows us to exclude some processes from scan
but the pc will be at risk as some malwares may have infected
some the excluded processes.
v. The advanced setting allows us to set more critical settings
that can help us secure our computers more securely. The
setting includes allowing us be able to set scan for archives,
removable disks, create restore points before removing or
deleting quarantined items, allow users to view history reports,
set quarantine and malware removal interval period and even
send files automatically online to Microsoft Support when
further operations are required.
Windows Firewall
As well known, the implementation of Windows Firewall is for
filtering data packets that are sent and coming down stream in a
computer system from internet or any network. It also controls
which program to be allowed to communicate with internet or
network connections so as no malware penetrates into the
computer system.
It prevents attacks from either home, private or public network.
Turning on the Windows Firewall will give chances of malware
entering into your system especially when you connect to
unsecure networks or internet. The malware will be uploaded
into your system computer and cause harmful effects by either
acting as spyware, virus, Trojans or even worms which among
all will affect your system files. How it works
Windows Firewall must be turned on for it be fully operating
35. and preventing your system from attacks. The firewall will
always block all connections to applications which are not in
the list of allowed applications.
In case of any new network connection or any time the PC is
connected, the firewall will always notify you and block all
possible risks and any new app.
By adding any application to the allowed list applications, you
permit that application to communicate with other application
from any connection.Allowing applications and features to
communicate through firewall
Any program can be allowed to communicate through firewall to
the network connection programs. For instance, MySQL and
Apache applications are always to communicate through
firewall in case of server services. Only the allowed programs
can communicate through the connections available or through
connected networks.
To allow any application to communicate through firewall, the
following steps are followed.
Launch Windows Firewall through typing Windows Firewall by
using Windows key + S for search. Then click the link shown to
allow any program communicate through firewall as shown
below:
After clicking the highlighted text link, the below window will
be displayed to allow you select the program to allow in
communication and through which network type should the
application communicate through. The network type can be
private, guest or public network. Your choice of network will
determine how your application communicates with the other
applications via the connections.
Advanced settings in firewall for inbound and outbound rules
The inbound rules will always control which other computers
are allowed to connect into your computer especially for server
cases. For instance, adding MySQL server on port 3306 means
that any computer which requires to connect to the server can
use that port only. On the other hand, the outbound rules
36. describe which applications are allowed to connect to networks
and use internet connections for communication.
When rules are added, they can be disabled or be deleted on
users need. Below is an example illustration of inbound rules
and outbound rules respectively.
Example of adding new inbound rule
Step 1: click the new rule link shown below
Step 2: Select program
The rule that controls connection for a program as shown below:
Step 3: Click next
Browse to the program path that specifies the program file
location and provide the program path.
Step 3: Click next
Select the “allow connection if it is secure” and click next.
Step 4: Select the network profile for which the rule will apply
for.
Step 5: Click next and provide the name for your rule and some
description about the rule and click finish to complete the rule
creation. The figure below shows the naming and description.
Microsoft Baseline Security AnalyzerIntroduction
The MBSA was mainly developed to be used in windows server.
Its main work is to analyse the system for available updates to
the operating environment and scans the computer for wrong
configuration settings.Scanning using MBSA
To scan using the MBSA, we need to provide the IP Address of
the computer we want to scan. But for most cases, the scan is all
to do with scanning for all possible vulnerabilities in the
system. The figure below shows the first phase to start
scanning.
The scanning involves scanning for all possible windows
administrative vulnerabilities, weak passwords, IIS
37. administrative vulnerabilities, SQL administrative
vulnerabilities and the security updates.
While scanning, a progress bar will be shown as given below:
After a scan is complete the following deduction are made. I
just scanned my computer only:
The figure below gives warning and the error message the
MBSA encountered weak passwords and Guest accounts.
The results indicate that my 3 password usages are weak as used
in Internet Explorer. Above that, my passwords are a non-
expiring type.Results of MBSA
The following gives a result of what was scanned in the Guest
account.
The following indicates what was scanned in the local account:
The following figures shows possible solution to my weaknesses
respectively.
Guest account solution
Local account solution
Lab #1: Develop System Administration Procedures for
Windows 8.1 Security Configuration
Purpose: Develop systems administration procedures to
implement systems security configuration guidance and best
practices.
Objectives
1. Develop a Windows system restore point systems
administration procedure to implement an industry recognized
best practice for maintaining system integrity and availability.
38. 2. Develop a Windows system administration procedure to
manage programs and features.
3. Develop a systems administration procedure to implement
configuration rules from systems security technicalguidance
issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures
which can be incorporated into an organization’s security
implementation guidance and documentation. For each
procedure, you will develop, test, and document the steps
required to implement the selected best practices and security
configuration guidance (as provided in the lab instructions and
notes). You will write three separate procedures for this lab:
(a) Creating, Using, Removing System Restore Points for
Windows 8.1
(b) Managing Windows 8.1 Programs and Features
(c) Implementing Security Configuration Rules for Windows 8.1
Each procedure will have the following major sections (see
Figure 1):
· Title:
· Operating Environment:
· Description:
· Notes, Warnings, & Restrictions:
· Resources (Further Reading):
· Procedures:
Some procedures will contain a large number of steps. To make
the procedures easier to read, you should divide your
procedures into groups of related steps. Place a group heading
(e.g. Create System Restore Points) at the beginning of each
group. Each group heading should be followed by a brief
paragraph that explains the purpose of the group (e.g. This
group (or “section”) contains step by step instructions for
creating System Restore Points using the “System Restore ”
39. tool….)
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
Figure 1. Required Outline for System Administration
Procedures
InstructionsPart (a): Implementing System Restore Points
1. Investigate the System Restore tool (used to manage system
40. restore points). To access the tool, open the System tool from
Control Panel (Control Panel > System and Security > System).
Then, click on System Protection (left menu).
2. Identify appropriate sources of information (e.g. Windows
Help, Microsoft Technet, etc.) for instructions for using the
Windows 8.1 System Restore Point capability. Using those
sources, research the procedures required to perform the
following tasks:
a. Create a system restore point for a Windows 8.1 system
b. Use a system restore point to roll-back changes made to a
Windows 8.1 system
c. Remove system restore points from a Windows 8.1 system
(some and all)
Note: you will not be able to do the full rollback (item 2(b)) in
the VDA due to security restrictions. Your procedure should
contain these steps, however. Use the Microsoft “System
Restore” documentation to obtain the required information
about what happens after the system restart for the rollback.
You do not need to provide an “after” snapshot for this step.
3. Paste the procedure outline (Figure 1) into your Lab #1 file.
Make sure that you insert a page break so that the “Title”
heading appears at the top of a new page.
4. Using the required outline, develop a systems administration
procedure which can be used to perform tasks related to item #1
(management and use of system restore points).
5. Test your draft procedures using the virtual machine provided
in the online lab environment (UMUC’s VDA). Do NOT use
your personal computer or a work computer.
6. As you run your tests, collect screen snapshots to illustrate
key steps in your procedures. (Use the snipping tool on your
local PC to snapshot portions of the VDA browser or client
window.) Insert these snapshots at the appropriate points in
your procedure. The snapshots must show the procedures as run
in the VDA environment.
41. Part (b): Managing Programs and Features for Windows 8.1
1. Investigate the Programs and Features tool (used to manage
installed programs and optional features / capabilities). To
access the tool, open Programs and Features from the Windows
Control Panel.
2. Identify appropriate sources of information (e.g. Windows
Help, Microsoft Technet, etc.) for instructions for using the
Programs and Features tool. Using those sources, research the
procedures required to perform the following tasks:
a. Turn Windows Features On or Off
b. Modify, Repair, or Uninstall a program from a Windows 8.1
system
c. Select and Install Updates for Windows and Windows
Applications, Find an installed Update, Remove an installed
update
3. Paste a second blank copy of the procedure outline (from
Figure 1) at the end of your Lab #1 file. Make sure that you
insert a page break before you paste to ensure the “Title”
heading appears at the top of a new page.
4. Using the required outline, develop a systems administration
procedure which can be used to perform tasks related to item
#2. Provide examples for each of the required tasks. (Select a
specific feature, program, or update and use that as an example
in your procedure.)
5. As you run your tests, collect screen snapshots to illustrate
key steps in your procedures. (Use the snipping tool on your
local PC to snapshot portions of the VDA browser or client
window.) Insert these snapshots at the appropriate points in
your procedure. The snapshots must show the procedures as run
in the VDA environment. Part (c): Implementing Security
Configuration Rules Using the Local Group Policy Editor
Note: you are NOT implementing the DISA / DoD STIG in this
section. You are implementing a set of security configuration
rules that your “company” has selected from industry accepted
sources.
1. Investigate the Local Group Policy Editor tool (Windows Key
42. + R then type gpedit.msc). Pay particular attention to the menu
tree in the left hand pane (expand and review the categories of
settings which can be changed using this tool).
2. Research the security configuration rules listed in Table 1.
These rules were developed from the Department of Defense
Security Technical Implementation Guidance for Windows 8.1.
3. When you are ready to begin writing your procedure, paste a
blank copy of the procedure outline (from Figure 1) at the end
of your Lab #1 file. Make sure that you insert a page break
before you paste to ensure the “Title” heading appears at the top
of a new page.
4. Determine how you will group related security configuration
rules. Each group will need a “section heading” (see Figure 1)
and introductory paragraph (2 -3 sentences) which explains the
purpose of the group.
5. Next, develop a step by step procedure for each group of
rules. See the “Suggested Procedure Group” column in Table 1
for suggested categories. Your groupings should allow for
inclusion of additional, related rules at a later date. (For
example, there are two “energy saving” rules in the table; an
organization may wish to add additional rules to this category at
some point in the future.)
6. For each group of rules, develop step-by-step written
procedures for systems administrators. Your written procedures
must implement the “remediation” guidance as listed in Table
1[endnoteRef:1]. [1: Table 1 was adapted from the Department
of Defense Security Technical Implementation Guidance (STIG)
for Windows 8/8.1. Available from:
http://iasecontent.disa.mil/stigs/zip/Apr2015/U_Windows_8_an
d_8-1_V1R9_STIG.zip]
7. Test your procedures by running them in the VDA. As you
run your tests, collect screen snapshots to illustrate key steps in
your procedures. (Use the snipping tool on your local PC to
snapshot portions of the VDA browser or client window.) Insert
these snapshots at the appropriate points in your procedure. The
43. snapshots must show the procedures as run in the VDA
environment.
8. Incorporate your screen snapshots for key steps into the draft
procedures. Each snapshot should be placed UNDER (after) the
step to which it applies. Captions are not required.
9. Make any additional changes required to address issues found
during testing of the step-by-step procedures.Finalize Your
Deliverable
1. Using the grading rubric as a guide, refine your step-by-step
procedures. Your final products should be suitable for inclusion
in an organization’s Systems Administrator’s Handbook.
Remember that you are preparing multiple system
administration procedures which must be presented separately.
2. As appropriate, cite your sources using footnotes or another
appropriate citation style.
3. Use the resources section to provide information about
recommended readings and any sources that you cite. Use a
standard bibliographic format (you may wish to use APA since
this is required in other CSIA courses). Information about
sources and recommended readings, including in-text citations,
should be formatted consistently and professionally.
4. Each procedure document should be placed in the listed order
in a SINGLE FILE (see deliverables list above). Each file
should start with a title page which lists the following
information:
· Lab Title and Number
· Procedure Name
· Date
· Your Name
5. The CSIA 310 Template for Lab Deliverable.docx file is set
up to provide the required title page and three lab procedure
templates.
Additional Requirements for this Lab
1. Your target audience for these procedures will be Windows
8/8.1 SYSTEM ADMINISTRATORS. Do not write procedures
44. for home users or individuals using their own computers.
2. Your step-by-step procedures should tell the System
Administrator where to find and how to launch the systems
administration tools used to change security configuration
settings for the Windows 8.1 operating system.
3. It is not necessary to specify every step that a system
administrator must take to implement the security rules. But,
you must address each security configuration rule separately
and include enough detail that your reader will understand how
to perform the required steps to implement the security
configuration changes.
4. Use screen snapshots to cue the reader to important steps or
provide information required to complete check points for
proper completion of a step or set of steps (e.g. including a
snapshot which shows the “after” state for a group of security
settings).
5. Make sure that your snapshots will enhance the reader’s
understanding of the procedure and required configuration
changes. Too many snapshots or illustrations can make a
procedure difficult to use.
6. All snapshots must be created by you for this lab using screen
captures showing how you personally performed (tested) the
systems administration procedure as written by you. You may
not copy and paste images from help pages, manuals, or the
Internet.
7. Images (screen snapshots) should be cropped and sized
appropriately.
8. A screen snapshot belonging to a specific procedure step does
not require a caption.
9. Make sure that the sources you cite or recommend (additional
reading) are authoritative and are the best ones available.
10. Your Operating Environment section should identify the
hardware, operating system, and/or software applications to
which the procedure applies. For this lab, your procedures will
apply to:
a. Hardware: Laptop or Desktop Computers
45. b. Operating System: Windows 8.1 Professional
11. Your Notes, Warnings & Restrictions section should include
important information that is not found elsewhere in the
procedures document. For example, this section could include
information about alternatives to the selected security
configuration settings. Or, this section could include
information about related security procedures or policies. If this
procedure implements controls relevant to an external security
requirement, e.g. the HIPAA Security Rule, then that
information should be included in the notes section. Consult the
Windows 8.1 STIG to see what types of information you may
need to include in your document. This section should also
include important information about harm or risk that could
occur if the procedure is not correctly followed or implemented.
12. The procedures that you write for this lab will become part
of the final project for this course (System Administration
Manual).
Table 1 begins on the next page.
Table 1. Required Security Configuration Rules
Rule ID
Rule
Vulnerability Discussion
Remediation
Suggested Procedure Group
46. SV-48022r1_rule
The required legal notice must be configured to display before
console logon.
Failure to display the logon banner prior to a logon attempt will
negate legal proceedings resulting from unauthorized access to
system resources.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive Logon: Message text for users
attempting to log on" to the [banner text]. Note: see STIG for
DoD Warning Notice. In registry, check make sure that you
have configured the "LegalNoticeText" value for key:
HKLMSOFTWAREMicrosoftWindows
NTCurrentVersionWinlogon
Banner
SV-48049r1_rule
The Ctrl+Alt+Del security attention sequence for logons must
be enabled.
Disabling the Ctrl+Alt+Del security attention sequence can
compromise system security. Because only Windows responds
to the Ctrl+Alt+Del security sequence, you can be assured that
any passwords you enter following that sequence are sent only
to Windows. If you eliminate the sequence requirement,
malicious programs can request and receive your Windows
password. Disabling this sequence also suppresses a custom
logon banner.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive Logon: Do not require
CTRL+ALT+DEL" to "Disabled".
Banner
SV-48510r1_rule
The Windows dialog box title for the legal banner must be
configured.
Failure to display the logon banner prior to a logon attempt will
negate legal proceedings resulting from unauthorized access to
47. system resources.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive Logon: Message title for users
attempting to log on" to a site-defined warning. In registry,
check make sure that you have configured both the
"LegalNoticeCaption" value for key:
HKLMSOFTWAREMicrosoftWindows
NTCurrentVersionWinlogon
Banner
SV-48313r2_rule
The display must turn off after 20 minutes of inactivity when
the system is running on battery.
Turning off an inactive display supports energy saving
initiatives. It may also extend availability on systems running
on a battery.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Power Management ->
Video and Display Settings -> "Turn Off the Display (On
Battery)" to "Enabled" with "1200" seconds or less.
Energy Saving
SV-48314r2_rule
The display must turn off after 20 minutes of inactivity when
the system is plugged in.
Turning off an inactive display supports energy saving
initiatives.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Power Management ->
Video and Display Settings -> "Turn Off the Display (Plugged
In)" to "Enabled" with "1200" seconds or less.
Energy Saving
SV-48051r1_rule
The Smart Card removal option must be configured to Force
Logoff or Lock Workstation.
Unattended systems are susceptible to unauthorized use and
must be locked. Configuring a system to lock when a smart card
48. is removed will ensure the system is inaccessible when
unattended.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive logon: Smart card removal
behavior" to "Lock Workstation" or "Force Logoff".
Lock Screen
SV-48310r2_rule
App notifications on the lock screen must be turned off.
App notifications that are displayed on the lock screen could
display sensitive information to unauthorized personnel.
Turning off this feature will limit access to the information to a
logged on user.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Logon -> "Turn off app
notifications on the lock screen" to "Enabled".
Lock Screen
SV-55990r2_rule
Camera access from the lock screen must be disabled. (Windows
8.1)
Enabling camera access from the lock screen could allow for
unauthorized use. Requiring logon will ensure the device is only
used by authorized personnel.
This requirement is NA for the initial release of Windows 8. It
is applicable to Windows 8.1. If the device does not have a
camera, this is NA.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Prevent enabling lock screen camera" to "Enabled".
Lock Screen
SV-55991r2_rule
The display of slide shows on the lock screen must be disabled.
(Windows 8.1)
Slide shows that are displayed on the lock screen could display
sensitive information to unauthorized personnel. Turning off
49. this feature will limit access to the information to a logged on
user.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Prevent enabling lock screen slide show" to "Enabled". This
requirement is NA for the initial release of Windows 8. It is
applicable to Windows 8.1.
Lock Screen
SV-48018r1_rule
The shutdown option must be available from the logon dialog
box.
Preventing display of the shutdown button in the logon dialog
box may encourage a hard shut down with the power button.
(However, displaying the shutdown button may allow
individuals to shut down a system anonymously.)
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Shutdown: Allow system to be shutdown
without having to log on" to "Enabled".
Logon Screen
SV-48164r1_rule
The system must be configured to prevent the display of the last
username on the logon screen.
Displaying the username of the last logged on user provides half
of the userid/password equation that an unauthorized person
would need to gain access. The username of the last user to log
onto a system must not be displayed.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive logon: Do not display last user
name" to "Enabled".
Logon Screen
SV-48228r2_rule
The classic logon screen must be required for user logons.
The classic logon screen requires users to enter a logon name
and password to access a system. The simple logon screen or
50. Welcome screen displays usernames for selection, providing
part of the necessary logon information.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Logon -> "Always use
classic logon" to "Enabled". If the system is a member of a
domain, this is NA.
Logon Screen
SV-48244r2_rule
Users must be prompted for a password on resume from sleep
(on battery).
Authentication must always be required when accessing a
system. This setting ensures the user is prompted for a password
on resume from sleep (on battery).
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Power Management ->
Sleep Settings -> "Require a password when a computer wakes
(on battery)" to "Enabled".
Logon Screen
SV-48245r2_rule
The user must be prompted for a password on resume from sleep
(plugged in).
Authentication must always be required when accessing a
system. This setting ensures the user is prompted for a password
on resume from sleep (plugged in).
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Power Management ->
Sleep Settings -> "Require a password when a computer wakes
(plugged in)" to "Enabled".
Logon Screen
SV-48460r2_rule
The machine inactivity limit must be set to 15 minutes, locking
the system with the screensaver.
Unattended systems are susceptible to unauthorized use and
should be locked when unattended. The screen saver should be
set at a maximum of 15 minutes and be password protected.
This protects critical and sensitive data from exposure to
51. unauthorized personnel with physical access to the computer.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive logon: Machine inactivity
limit" to "900" seconds".
Logon Screen
SV-55993r2_rule
The network selection user interface (UI) must not be displayed
on the logon screen. (Windows 8.1)
Enabling interaction with the network selection UI allows users
to change connections to available networks without signing
into Windows.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Logon -> "Do not
display network selection UI" to "Enabled".
Logon Screen
SV-48464r2_rule
Notifications from Windows Push Network Service must be
turned off.
The Windows Push Notification Service (WNS) allows third-
party vendors to send updates for toasts, tiles, and badges.
Configure the policy value for User Configuration ->
Administrative Templates -> Start Menu and Taskbar ->
Notifications -> "Turn off notifications network usage" to
"Enabled".
Notifications
SV-48465r2_rule
Toast notifications to the lock screen must be turned off.
Toast notifications that are displayed on the lock screen could
display sensitive information to unauthorized personnel.
Turning off this feature will limit access to the information to a
logged on user.
Configure the policy value for User Configuration ->
Administrative Templates -> Start Menu and Taskbar ->
Notifications -> "Turn off toast notifications on the lock screen"
to "Enabled".
52. Notifications
SV-48240r2_rule
A system restore point must be created when a new device
driver is installed.
A system restore point allows a rollback if an issue is
encountered when a new device driver is installed.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Device Installation ->
"Prevent creation of a system restore point during device
activity that would normally prompt creation of a restore point"
to "Disabled".
Restore Point
SV-48273r2_rule
A screen saver must be enabled on the system.
Unattended systems are susceptible to unauthorized use and
must be locked when unattended. Enabling a password-protected
screen saver to engage after a specified period of time helps
protects critical and sensitive data from exposure to
unauthorized personnel with physical access to the computer.
Configure the policy value for User Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Enable Screen Saver"
to "Enabled".
Screen Saver
SV-48274r2_rule
The screen saver must be password protected.
Unattended systems are susceptible to unauthorized use and
must be locked when unattended. Enabling a password-protected
screen saver to engage after a specified period of time helps
protects critical and sensitive data from exposure to
unauthorized personnel with physical access to the computer.
Configure the policy value for User Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Password protect the screen saver" to "Enabled".
Screen Saver
SV-48461r2_rule
53. A screen saver must be defined.
Unattended systems are susceptible to unauthorized use and
must be locked when unattended. Enabling a password-protected
screen saver to engage after a specified period of time helps
protects critical and sensitive data from exposure to
unauthorized personnel with physical access to the computer.
Configure the policy value for User Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Force specific screen saver" to "Enabled" with "scrnsave.scr"
specified as the Screen saver executable name.
Screen Saver
SV-48462r2_rule
Changing the screen saver must be prevented.
Unattended systems are susceptible to unauthorized use and
must be locked. Preventing users from changing the screen
saver ensures an approved screen saver is used. This protects
critical and sensitive data from exposure to unauthorized
personnel with physical access to the computer.
Configure the policy value for User Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Prevent changing screen saver" to "Enabled".
Screen Saver
SV-48337r2_rule
The Windows SmartScreen must be turned off.
Some features may send system information to the vendor.
Turning off this capability will prevent potentially sensitive
information from being sent outside the enterprise.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> File
Explorer -> "Configure Windows SmartScreen" to "Enabled"
with "Turn off SmartScreen" selected.
Smart Screen
SV-48119r1_rule
Media Player must be configured to prevent automatic Codec
downloads.
The Windows Media Player uses software components, referred
54. to as Codecs, to play back media files. By default, when an
unknown file type is opened with the Media Player, it will
search the Internet for the appropriate Codec and automatically
download it. To ensure platform consistency and to protect
against new vulnerabilities associated with media types, all
Codecs must be installed by the System Administrator.
Configure the policy value for User Configuration ->
Administrative Templates -> Windows Components -> Windows
Media Player -> Playback -> "Prevent Codec Download" to
"Enabled".
System Integrity
SV-48218r1_rule
The system must notify antivirus when file attachments are
opened.
Attaching malicious files is a known avenue of attack. This
setting configures the system to notify antivirus programs when
a user opens a file attachment.
Configure the policy value for User Configuration ->
Administrative Templates -> Windows Components ->
Attachment Manager -> "Notify antivirus programs when
opening attachments" to "Enabled".
System Integrity
SV-48300r2_rule
Access to the Windows Store must be turned off.
Uncontrolled installation of applications can introduce various
issues, including system instability and allow access to
sensitive information. Installation of applications must be
controlled by the enterprise. Turning off access to the Windows
Store will limit access to publicly available applications.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Internet Communication
Management -> Internet Communication settings -> "Turn off
access to the Store" to "Enabled".
System Integrity
SV-48341r3_rule
Automatic download of updates from the Windows Store must
55. be turned off.
Uncontrolled system updates can introduce issues to a system.
Obtaining update components from an outside source may also
potentially allow sensitive information outside of the enterprise.
Application updates must be obtained from an internal source.
Windows 8.1 split the original policy that configures this
setting into two separate ones. Configuring either one to
"Enabled" will update the registry value as identified in the
Check section. Configure the policy value for Computer
Configuration -> Administrative Templates -> Windows
Components -> Store -> "Turn off Automatic
Download of updates on Win8 machines" or "Turn off
Automatic Download and install of updates" to "Enabled".
Windows 8:
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> Store ->
"Turn off Automatic Download of updates" to "Enabled".
System Integrity
SV-48344r2_rule
The Windows Store application must be turned off.
Uncontrolled installation of applications can introduce various
issues including system instability, and provide access to
sensitive information. Installation of applications must be
controlled by the enterprise. Turning off access to the Windows
Store will limit access to publicly available applications.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> Store ->
"Turn off the Store application" to "Enabled".
System Integrity
SV-55997r2_rule
The option to update to the latest version of Windows from the
Store must be turned off. (Windows 8.1)
Uncontrolled system updates can introduce issues into the
environment. Updates to the latest version of Windows must be
done through proper change management. This setting will
56. prevent the option to update to the latest version of Windows
from being offered through the Store.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> Store ->
"Turn off the offer to update to the latest version of Windows"
to "Enabled". This requirement is NA for the initial release of
Windows 8. It is applicable to Windows 8.1.
System Integrity