Marketing Management, Case study analyses

CASE ANALYSES:Cases are useful learning tools. They allow you to analyze an actual business situation and to consider real marketing problems. The purpose of the case analysis is to define the problem facing the firm, generate alternative solutions, and suggest the best solution based on market place conditions and the firm’s resources. Your analysis and recommendations will be richer if you spend time trying to discern and then employ the appropriate set of theoretical frameworks and analytical tools that you have been exposed to thus far.Even though these are real business situations, you should not be concerned in your analysis about the actual decisions of the firms (some of the cases are old enough that decisions have been made and results are obvious). First, there are always many options available to managers, and you should not assume the managers made the optimal decision. Second, sometimes cases are simplified, the time frame shrunk and/or only a portion of the situation is presented to you. Therefore, the real situation may have been more complex or even slightly different from the case presentation, to make your task easier. Third, even if a firm made a “good” decision, it is likely that other effective alternatives were available. Therefore, there will be no grading criterion which includes the firm’s actual decisions, and you should NOT spend time trying to locate the “real” decisions at the expense of thoughtful, original analysis. The use of background data (as the ?Internal Consultants? and “Management” teams ? the two case teams) will typically not be needed as the case packet provides the relevant and requisite information. However, recent theories, analytical tools and marketing frameworks to analyze the industry, the product, the market, the consumers, the competitors, etc., can be used to structure your analysis.ALL INFORMATION NOT DIRECTLY REFERENCED IN THE CASE MUST BE PROPERLY CITED. If you are unsure about how to cite any type of source, see the instructor for guidance.HONOR CODE: In this course that entails that you are additionally NOT allowed to consult any past work done on these Harvard cases (whether from other students or from Internet sources) unless you have specific permission from the instructor.CRITERIA: While There Are No “Correct” Solutions To Cases, There Are Clearly ?Wrong? Or ?Bad? Decisions. Therefore, each case analysis is judged on the recommendations it makes based on the available facts, combined with the sophisticated use of marketing theory, analysis, and clarity of logic.You will do a 1-page write-up outlining the pertinent issues and your recommendations.

Nurs 6521: advanced pharmacology walden university | NURS 6521 – Advanced Pharmacology | Walden University

ÿ
Assignment: Pharmacotherapy for Cardiovascular Disorders
…heart disease remains the No. 1 killer in America; nearly half of all Americans have high blood pressure, high cholesterol, or smoke?some of the leading risk factors for heart disease?
?Murphy et al., 2018
Despite the high mortality rates associated with cardiovascular disorders, improved treatment options do exist that can help address those risk factors that afflict the majority of the population today. ÿ
As an advanced practice nurse, it is your responsibility to recommend appropriate treatment options for patients with cardiovascular disorders. To ensure the safety and effectiveness of drug therapy, advanced practice nurses must consider aspects that might influence pharmacokinetic and pharmacodynamic processes such as medical history, other drugs currently prescribed, and individual patient factors.
Reference: Murphy, S. L., Xu, J., Kochanek, K. D., & Arias, E. (2018). Mortality in the United States, 2017. Retrieved from https://www.cdc.gov/nchs/products/databriefs/db328.htm
To Prepare

Review the Resources for this module and consider the impact of potential pharmacotherapeutics for cardiovascular disorders introduced in the media piece.
Review the case study assigned by your Instructor for this Assignment.
Select one the following factors: genetics, gender, ethnicity, age, or behavior factors.
Reflect on how the factor you selected might influence the patient?s pharmacokinetic and pharmacodynamic processes.
Consider how changes in the pharmacokinetic and pharmacodynamic processes might impact the patient?s recommended drug therapy.
Think about how you might improve the patient?s drug therapy plan based on the pharmacokinetic and pharmacodynamic changes. Reflect on whether you would modify the current drug treatment or provide an alternative treatment option for the patient.

Due Friday by 2200pm March 12,2021
Write 3-4 page paper that addresses the following:

Explain how the factor you selected might influence the pharmacokinetic and pharmacodynamic processes in the patient from the case study you were assigned.
Describe how changes in the processes might impact the patient?s recommended drug therapy. Be specific and provide examples.
Explain how you might improve the patient?s drug therapy plan and explain why you would make these recommended improvements.

Reminder: The College of Nursing requires that all papers submitted include a title page, introduction, summary, and references. The College of Nursing Writing Template with Instructions provided at the Walden Writing Center offers an example of those required elements (available at https://academicguides.waldenu.edu/writingcenter/templates/general#s-lg-box-20293632). All papers submitted must use this formatting.Case Study:
Patient HM has a history of atrial fibrillation and a transient ischemic attack (TIA). The patient has been diagnosed with type 2 diabetes, hypertension, hyperlipidemia, andÿischemic heart disease. Drugs currently prescribed include the following:

Warfarin 5 mg daily MWF and 2.5 mg daily T, TH, Sat, Sun
Aspirin 81 mg daily
Metformin 1000 mg po bid
Glyburide 10 mg bid
Atenolol 100 mg po daily
Motrin 200 mg 1?3 tablets every 6 hours as needed for pain

Please make sure to review the side effects of the medications and also education points

FIN 3310 FC Economics Difference in Risks to The Bank Questions

1. a. Identify and briefly explain the three major tools that the Federal Reserve can use to implement monetary policy. b. Identify which on of these tools is the most effective and why? c. Indicate how the mechanism(s) described in part b. above be used to stimulate (expand or grow) or to contract (slow down) the economy?2.Commercial Banks both issue (as liabilities) and invest in (as assets) different Money Market instruments. a. Identify TWO of the money market instruments that are commonly used by Commercial Banks. For each instrument, indicate whether Commercial Banks issue them as liabilities or invest in them as assets.b. What are the characteristics of these instruments that make them useful and attractive to Commercial Banks?3. A woman is buying a house in which she expects to live for at least until her retirement twenty years from now. The house is appraised at $400,000 and she asks her Commercial Bank for a 30-year mortgage loan to finance $300,000. The bank?s loan officer offers two types of mortgages. One is a fixed rate mortgage (FRM), the other is an adjustable rate mortgage (ARM). Each has a different interest rate that will be in effect at loan origination. The FRM has a higher rate but that rate will not change for the thirty years needed to fully amortize the mortgage. The ARM has a lower initial rate but it is subject to a change in rate. a. The bank offers these two types of mortgages with different initial loan rates. What are the differences in risks to the bank that justify this? b. Which choice do you think will be more attractive to this borrower ? and why4.The five largest banks (Too Big to Fail) in the U.S. are very different from the more numerous but much smaller community banks. a. Discuss two significant differences between them on their Balance Sheetand Income Statement. b. Discuss why U.S. regulators and consumers should be concerned about the relative size of these five U.S. largest banks compared to community banks.5.There are several ways to evaluate a Commercial Bank?s financial performance, risk profile, and financial strength. One approach that regulators use are bank examinations based on the CAMELS system, which evaluates Capital, Asset quality, Management strength, Earnings, Liquidity, and Sensitivity to Markets. Select ONE of these six components and discuss an approach to measure and evaluate that component.6. Choose one type of Bank regulation from the following list. Describe what is meant by that type of regulation and provide ONE examples of regulations that are in that type and why they are in that type.A. Safety & SoundnessB. Monetary PolicyC. Credit AllocationD. Consumer ProtectionE. Entry & Chartering

Project – simple vending machine fsm

Project – Simple Vending Machine FSM
Objective
ÿ
The objective of this project is to implement, in VHDL, a Finite State Machine, using the main clock of the Digilent Board to drive the state machine. The finite state machine will control a vending machine to dispense soda cans that are worth 50›. Since this project will require several modules, consider using a mixed schematic/VHDL design, where you can use a schematic as the top level module, and have each sub-module defined in VHDL.
ÿ
The vending machine has three inputs:
ÿ
QUARTER: a signal that goes high and then low when a quarter has been deposited
CLOCK: a clock that will drive the FSM
RESET: a signal that will reset the FSM to its initial state
ÿ
The vending machine has two outputs:
ÿ
COUNT: a signal that goes high when a single quarter has been accepted. This signal should remain high for one clock cycle.
DISPENSE: a signal that goes high when the soda has been dispensed
Part I
Create a clock divider module to divide the master clock (at 50MHz) to a 1Hz clock. You may also need to create a switch debouncer for the QUARTER input to avoid confusing the FSM.
Part 2
Create your state diagram that you will use to implement the FSM VHDL module. The vending machine behaves as follows:
úÿÿÿÿÿÿ If the RESET input is asserted, the FSM will go to the initialization state (S_init) immediately. All of the outputs should be zero in this state.
úÿÿÿÿÿÿ From the initialization state S_init, the FSM will unconditionally go to the wait state (S_wait)
úÿÿÿÿÿÿ From the wait state S_wait, the FSM waits for the QUARTER switch to be activated.
úÿÿÿÿÿÿ If QUARTER is asserted, the FSM goes to state S_Q1. In this state, the COUNT output is set to 1, indicating that a quarter has been accepted. The FSM will stay in this state until the QUARTER input is de-asserted. When this occurs, the FSM goes to state S_QW1, then unconditionally to state S_QW2 and the COUNT output is set to 0. The FSM waits for the QUARTER switch to be activated.
úÿÿÿÿÿÿ If QUARTER is asserted while the FSM is in S_QW2, then the state machine goes to state S_Q2. In this state, the COUNT output is again set to 1. The FSM will stay in this state until the QUARTER input is de-asserted. When this occurs, the FSM goes to S_QW3, and then unconditionally to state S_dispense, the COUNT output is set to 0, and the DISPENSE output is set to 1.
úÿÿÿÿÿÿ From state S_dispense, the FSM unconditionally goes to state S_init.
Your VHDL MUST have two process: a next-state process to determine the change of states, and a output_logic process, to determine the outputs. Please include a state diagram and test bench outputs in your report. Put all VHDL code, including test benches in the appendix.
ÿ
ÿ
A labreport is needed and build the machineÿ

Project Part 1 & 2

Project Part 1: Current Security Threats ScenarioIt is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the University is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Marymount University.The Universities administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students? laptops may run Windows or macOS. The college?s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.Tasks You have been given the responsibility to determine the top five threats that Marymount University faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:Your supervisor has also asked you to consider the following questions as you shortlist the threats:With these considerations in mind, write a summary report of the top five threats to Marymount University’s President Dr. Irma Becerra. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.Submission RequirementsFormat: Microsoft Word (or compatible)Font: Times New Roman, size 12, double-spaceCitation Style: APALength: 2 to 3 pages (without citations)ScenarioMarymount University has been the target of focused attacks from a variety of attackers. Your manager, Professor Pendleton has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.Required ResourcesAccess to the InternetText sheet: Zenmap Intense Scan Results Tasks1. Analyze the results of the Zenmap scan. Your report must answer the following questions:What are the first five open ports as identified by the Zenmap scan?Include the port numberInclude the service namenclude a brief description of how each is used2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database.Include the name and a brief description of each vulnerability.3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.Submission RequirementsFormat: Microsoft Word (or compatible)Font: Times New Roam, size 12, double-spaceCitation Style: APALength: 2 to 4 pages

Cultural anthropology: mini ethnography paper | cultural anthropology | Santa Fe College

1) Write your ethnography on a reality show like Jersey Shore, Shahs of Sunset, the Kardashians, Big Brother.ÿ You’ll want to write about the general culture of the people or you could focus more specifically on a social dynamic – language, gender, ethnicity, etc. Are there power differences between the cast? Do people dress a certain way? If so, why? Is the show targeted for a certain gender/class/race demographic? If you choose this option, in the conclusion, you must reflect on whether you think the show is exploitative and what it says about our culture that so many people follow these shows. You’ll probably need to watch several episodes to get a full picture. You don’t need to watch more than a season.
* 6 page paper
* 12 point font, Times New Roman, 1″ margins
* At least 2 peer reviewed sources (instructions in announcements)ÿ
ÿ 1. 6 pages double-spaced, Times New Roman, 12 point font, 1-inch margins, page numbers on the bottom right of each page.

References Cited page that is not included in the page limit.
At least 2 peer reviewed academic references in your review of the literature.

Peer reviewed academic references are found through the Santa Fe Library database. Websites like NASA or National Geographic do not count. Ask a librarian if you don?t know what a peer reviewed scholarly article is or if you need help finding one.

Your paper must have a strong and clear thesis statement (your main argument). Your thesis should drive your entire paper. You will need to complete your research and data analysis before you begin your paper because that is the only way to establish your thesis. You cannot start writing your paper before knowing the main argument you are trying to make. The thesis could be that countries have different success rates with the coronaviruses because they have safer culturally informed practices. Or, it could be that women of the Real Housewives of Orange County are deliberately mean to each other to garner attention.ÿ
You must give your paper a catchy, creative title, as if it were an ethnographic book. ?A Mini-ethnography on the Santa Fe Baseball Team? does not draw the reader in as much as ?Homeruns to Havana: An ethnography of Cuban American culture among Santa Fe College baseball players?. Have fun with the title.
A word of caution: I will submit each of your papers to Turnitin to check for plagiarism. All un-cited scholarship will be considered plagiarism and you will earn you a zero on the assignment.
Please note that you will not be able to complete this assignment the night before it?s due. Ethnography is a lot of work. You need a great deal of observational, interview or survey data to make an insightful analysis. In other words, you can?t slack on this paper and hope that I don?t notice. I am an ethnographer. I will notice.

PreviousNext

How to Use Internet Discussion

Reply:What security tips that you learned in this course will be the most useful for your future computer related activities? Why are these tips useful for you?I learned a lot in the past 8 weeks taking this course! I am super happy I took it and glad to learn a lot more about the safety of my computer and using social media. When I was younger I was very careless when it came to computer and didn’t pay a lot of attention to things like viruses and spam because I didn’t realize the harm they could do. I was also a lot more careless when it came to my social media sites as well, accepting anyone and putting my information out there. This class taught me a whole lot more on the dangers of putting a lot of information on the internet and not taking precautions when it came to my security and privacy. I think that’s one of the biggest tips I learned, was to always be paying attention and to make sure to check my security and privacy settings to make sure I am protecting myself from any potential harm. Back when I had Myspace you would find probably all my personal information on display because I didn’t realize how dangerous that could be. Now that I am older and wiser I make sure to try and keep all my social media sites private and display as little information as possible. I have spent many days going over many of my social media sites, looking over the different privacy and security settings and getting them where I wanna be. I also learned the importance of taking better care of my computer and making sure my software is up to date and that it is protected. In the past I would have never really cared much and been downloading tons of things and never updating anything. I think everything I learned in this class was very important and useful information that I can take with me always and I also think it is something everyone should be aware of. Learning about viruses and how they can affect your computer or anyone else’s is a big deal and I think everyone, especially those that work places where they have a lot of others information should be fully trained on how to handle a situation where their computer was attacked. Cyber attacks are becoming more and more popular, and I think it’s because so may people are so relaxed when it comes to the internet social media and they aren’t aware just how easily it could happen to them. I think many of us live with the mentality that “oh it won’t happen to me” and that’s not good. If more people took classes like this and learned more about the dangers out there and how they could protect themselves more we would be in better shape. 

Project Legal Ethical Scenarios South University-Savannah Project: Legal & Ethical Scenarios

Legal and Ethical ScenariosSelect two of the scenarios provided below. Analyze the facts in the scenarios and develop appropriate arguments/resolutions and recommendations. Support your responses with appropriate cases, laws and other relevant examples by using at least one scholarly source from the SUO Library in addition to your textbook for each scenario. Do not copy the scenarios into the paper. Cite your sources in APA format on a separate page. Submit the paper to the Submissions Area by the due date assigned.Scenario I: Courts and Alternative Dispute ResolutionAlana Mendes suffered from Alzheimer?s, and was admitted to the Bay Pines Rehabilitation Center. Because of her mental condition, Alana?s daughter, Juanita, completed the admissions paperwork and signed the admissions agreement. The admissions documents included a clause that required parties to submit any disputes for arbitration. When Alana was released from the center four months later, she sued for negligent treatment and malpractice during her stay. Bay Pines moved to require arbitration.Scenario II: Due Process and ADRIn 2016, a report found extremely high rates of obvious plagiarism in the theses of graduate students in the MBA program in the College of Business at Western State University. Two full-time faculty members and three adjuncts were identified for ignoring their ethical responsibilities and contributing to negligence toward issues of academic misconduct. Assistant Professor Mark Day was one of the five professors identified in the report. The findings were published during a press conference in May 2016. The dean of the College of Business, Derrick Dawson, removed Day’s responsibilities for advising graduate students and scheduled him for undergraduate courses for the next semester. Day filed suit in a federal district court against Dawson, the university, and others for violating his due process rights by publicizing accusations about his role in plagiarism without providing him with a meaningful opportunity to clear his name in public.Scenario III: Regulatory Agencies and EthicsJessica Smith is the vice president of new drug development at Generic Phama, Inc, a pharmaceutical research company in Boston, Massachusetts. One year ago, she filed an application with the Food and Drug Administration (FDA) to obtain approval of a new drug for treating cancer. Smith met Joe Spencer at a convention three months ago and invited him to her room at the hotel. The two parted ways. Spencer worked as the director for approval of new drugs at the FDA. Two weeks later, Spencer wrote Smith a letter on FDA letterhead stating, ?It was nice to see your name cross my desk on our company?s application for approval of the new cancer drug. I?d really like to see you again. Why don?t you come visit me in Washington this weekend??Smith considered requesting that the petition be referred to another director at the FDA. However, she is concerned that the transfer would delay the approval process for at least a year. Smith?s chief scientist advised her that a key competitor plans to introduce a similar drug on the market in three months.

Government discussion board and replying to one student

THE DISCUSSION BOARD IS THE PICTURE .THE INFORMATION BELOW IS HOW IT SHOULD BE DONE . To get started with the discussion forums, first, click on the word “thread” to begin a new post. After your post, reply to one of your classmates by clicking on their discussion link and hitting the reply button.Discussion Board Participation- ?Meet and Greet? and ?Thought Sessions? (1 @ 40 Points and 2 @ 20 points each = 80 points) Read Carefully!You are required to participate in three online discussion board forums. The first ?Meet and Greet? session, where you introduce yourself to the class, is worth 40 points. The other two are ?thought sessions? that will be centered on a particular theme and are worth up to 20 points each (40 total points), depending on quality and length of the required posts. Participation in the thought sessions includes an initial posting by students specifically answering the question posed and at least one secondary post making a critical response to at least one other student?s post. The response to another student can indicate agreement or disagreement or other comment but must be substantive in explaining the reasons for the comments. The initial post and secondary response post will be weighted equally (up to 10 points each, for a total of 20 points) when grades are assigned. Therefore, to receive full credit for participation on each Thought Session, you must make two posts at a minimum, each post worth up to 10 points. The first post (your initial post) must respond to the original question, while the second post must respond to at least one of your classmate?s postings on the topic by the due date.Consider each post as a ?micro? essay of several (two or more) thoughtful paragraphs including at least 5 or 6 sentences each. This is the bare minimum for any credit, however, and it does not guarantee full credit or even a passing grade. You may earn only minimal credit even if you meet this minimum quantity requirement, because quality is more important than quantity. However, any post consisting of less than 5 or 6 sentences in a single post will receive no credit at all. This applies to any reply posts as well as your initial post. Please check the Discussion guidelines and directions under Course Information tab. There you will find additional information, instructions, the grading rubric that will be used to score your posts, and examples of model posts from prior course participants who received full credit. Save your work before posting on discussion board. If for technical reasons your posts are lost, you can simply copy and paste your saved work to the discussion board again.Warning: For other students to have time to respond to your post, your initial must be made 48 hours before the due date. Because ?thought Sessions? require an initial post and a response post by the due date, late discussion board postings cannot be accepted and will not be graded.

GCU Issue of Abortion Discussion

********please respond to the discussion question below add citations and references ;)******I have a strong belief that every person is naturally good-hearted and willing to love and care for others. It is upbringing that may alter this thinking. Every single person has a value and can contribute to society. This can be made difficult based on how a person is raised, and the circumstances in which they must live their life. Choices must be made every day. As children, we cannot help the environment in which we are raised. While a person may be naturally good-hearted and loving, if they are brought up in a harsh or cruel environment, they may begin to have a more negative outlook on life and others around them.According to Kirsten (2018), the main issue that comes about with abortions is the question of whether or not the fetus should be considered a person, and at which point do we consider the fetus a person. I do not feel that it is my place to tell another person that they should not have an abortion. Every situation is different. I cannot imagine the horrors that a woman must face if they are raped and then forced to have a child that they cannot care for. I do not believe that it should be a regular form of birth control, however. I have known persons in my experience that regularly get abortions instead of taking birth control. I do not feel that this is right either, however, who am I to judge. As a nurse, it is my duty to care for patients in a compassionate way, and I will do that, no matter my beliefs on their decisions as far as treatment. I can, however, educate the patient about birth control, which may be more cost-effective and less damaging to the body.Designer babies are another subject in which I feel that it is not my place to judge. Is it something that I would do? Probably not. However, can you imagine being able to eliminate the potential for disability or genetic disease for your child? Everyone wants what is best for their children, so it is no surprise that people would want to choose what they believe to be the best life for their children.Meilaender (2013) points out that we should always consider bioethics in our patient care and ?to ignore it is to ignore the just claims of others upon our attention and our care? (p. 2). While I do not choose to share my own beliefs with my patients, it is something to always take into consideration for sure. These issues are controversial, yes. However, my job as a nurse is not to pass judgement on these issues. I must provide compassionate care. I must make sure that my patients are receiving the best care possible, and to make sure that their needs are being met.References:Kirsten, J. (2018). Top 15 bioethical issues in biological advancements. Retrieved from Meilaender, G. (2013). Bioethics: A primer for Christians (3rd ed.). Cambridge, UK: William B. Eerdmans Publishing Company.

× How can I help you?