What would have to be true for this to be a bad investment?

  The estimated purchase price for the equipment required to move the operation in-house would be $750,000. Additional net working capital to support production (in the form of cash used in Inventory, AR net of AP) would be needed in the amount of $35,000 per year starting in year 0 and through all years of the project to support production as raw materials will be required in year o and all years to run the new equipment and produce components to replace those purchased from the vendor..• The current spending on this component (i.e. annual spend pool) is $1,200,000. The estimated cash flow savings of bringing the process in-house is 20% or annual savings of $240,000. This includes the additional labor and overhead costs required.• Finally, the equipment required is anticipated to have a somewhat short useful life, as a new wave of technology is on the horizon. Therefore, it is anticipated that the equipment will be sold after the end of the project (the last year of generated cash flow) for $50,000. (i.e. the terminal value).In this assignment, you will take on the role of a senior member of the finance team assigned to lead the investment committee of a medium-sized telecommunications equipment manufacturer. Your team is evaluating a “make-versus-buy” decision that has the potential to improve the company’s competitiveness, but which requires a significant capital investment in new equipment. The assignment is organized into two parts:Part A: Data calculations based on the information in the scenarios Part B: Recommendations based on the calculationsOpportunity DetailsThe new equipment would allow your company to manufacture a critical component in-house instead of buying it from a supplier. This capability would help you stabilize your supply chain (which has suffered from some irregularities and quality issues in the past). It could also have a positive impact on profitability through the absorption of fixed costs since this new machine will have plenty of excess capacity. There may even be a possibility that the company could leverage this capability to create a new external revenue stream by providing services to other companies.The company has been growing steadily over the past 5 years, and the financials and future prospects look good. Your CEO has asked you to run the numbers. After doing some digging into the business, you have gathered information on the following:JWI 530: Financial Management IAs part of your research, you have sought input from a number of stakeholders. Each has raised important points to consider in your analysis and recommendation. Some of the points and assumptions are purely financial. Others touch on additional concerns and opportunities.1. Andrew, your colleague from Accounting, recommends using the base assumptions above: 5-year project life, flat annual savings, and 10% discount rate. Andrew does not feel the equipment will have any terminal value due to advancements in technology.2. Stanley from Sales is convinced that this capability would create a new revenue stream that could significantly offset operating expenses. He recommends savings that grow each year: 5-year project life, 10% discount rate, and a 10% annual savings growth in years 2 through 5. In other words, instead of assuming savings stay flat, assume that they will grow by 10%% in year 2, and then grow another 10% over year 2 in year 3, and so on. Stanley feels that the stated terminal value is reasonable and used it in his calculations.3. Eva from Engineering believes we use a higher Discount Rate because of the risk of this type of project. As such, she is recommending a 5-year project life and flat annual savings. Eva suggests that even though the equipment is brand new, the updated production process could have a negative impact on other parts of the overall manufacturing costs. She argues that, while it is difficult to quantify the potential negative impacts, to account for the risk, a 12% discount rate should be used. Being an engineer, Eva feels that the stated terminal value is low based on her experience, and is recommending a $75,000 terminal value,4. Paul, the Product Manager, is convinced the new capability will allow better control of quality and on-time delivery, and that it will last longer than 5 years. He recommends using a 7 Year Equipment Life (which means a 7-year project and that savings will continue for 7 years), flat annual savings, and 10% discount rate. In other words, assume that the machine will last 2 more years and deliver 2 more years of savings. Paul also feels the equipment will have an estimated terminal value of $25,000 at the end of its 7- year useful life as it will be utilized longer thus having less value at the end of the project and savings.5. Olivia, the head of Operations, is concerned that instead of stabilizing the supply chain, it will just add another process to be managed, and will distract from the core competencies the company currently has. She feels the company should focus on improving communication and supply chain management with its current vendor, and she feels confident he can negotiate a discount of 4% off of the annual outsourcing cost of $1,200,000 if she lets it be known they are considering taking over this step of the process. As there is little risk associated with Olivia’s proposal due to no upfront capital requirements, a lower risk-free discount rate of 7% would be appropriate. Oliva feels that any price reductions from the current vendor will last for five years. (NOTE: because there is no “investment”, the Payback and IRR metrics are not meaningful. Simply provide the NPV of the Savings cash flows).PART A: Data CalculationsUsing the data presented above (and ignoring the extraneous information), for this profit and supply chain improvement project, calculate each of the following (where applicable):• Nominal Payback• Discounted Payback• Net Present Value• Internal Rate of ReturnScenario Nominal Payback Discounted Payback Net Present Value Internal Rate of Return#1: Andrew#2: Stanley#3: Eva#4: Paul#5: OliviaN/AN/AN/ASubmission RequirementsPresent your calculations and results either in an Excel Spreadsheet or in Word (using tables and headers to organize the information in a way that is clear and easy to read). Be sure to show your detailed calculations. If you get something wrong, you may still be able to get partial credit.Part B: RecommendationsAfter completing the calculations for all scenarios, create a brief memo to the CEO outlining your committee’s recommendations. You may organize the memo as you see fit, but it must include the following:• A clear opening statement of your recommendation for or against the project.• A brief synopsis of the processes and factors that led to your recommendations.o What information did you gather, and how did you get it?o From whom did you seek input, and why?• A summary of the strategic benefits and risks in pursuing (or not pursuing) this project, including:o Highlights of the main data points that support your positiono Acknowledgement of the data points that oppose your argumento Identification of open/unresolved items• An identification of the scenario that, from a purely financial perspective, represents the most accurate estimate of the anticipated results and your rationale as to why.• An identification of non-financial elements that need to be considered for the recommended scenario.• Any assumptions in project economics can have a significant impact on the result. Identify 3 financial elements/assumptions in your analysis that would make this project financially unattractive. Be as transparent and candid with your BOD as possible. What would have to be true for this to be a bad investment?• A summary restating your recommendation and key action items.Submission Requirements• Your memo should be no more than 2 pages, single-spaced, using 10- or 12-point font.• Focus on the rationale for your recommendations. Include key numbers to support your recommendations but do no re-present all your calculations.e required metrics 3. Analyzed the investment opportunity leveraging the supplied data sets, and provided clear, well-reasoned recommendation s to the CEO. Weight: 40%Did not submit, or incompletely analyzed the investment options and did not address the key questions or explain recommendations.Provided minimal, basic analysis and recommendations addressing 3 or fewer of the required memo components and options.Provided good analysis and recommendations addressing at least 4 of the required memo components and options.Provided excellent analysis and recommendations addressing all required memo components and all 5 options.

Identify factors contributing to a winner vs. failure proposals

  Purpose:  Start developing your term project ideas by learning from the winner and failure proposals. What you’ll learn:  1. Identify factors contributing to a winner vs. failure proposals2. Observer what questions being asked by the venture capitalists and how the entrepreneurs respond3. Analyze market potential, consumer needs, technology feasibility…etc.4. Think strategically to form your argument from different perspectives.Instruction: Choose one of your favorite winner and failure entrepreneurial proposal from Shark Tank, Dragons Den, KickStarter, Indiegogo,…. or any other business proposal competition site. 

Describe the process of coaching and explain why is it important for managers to be effective coaches.

  Review the following conversation:Marcy:  Dana, can I talk to you for a couple of minutes? We’ve been roommates for two years and I think I have a time management problem. I just don’t get enough done in a day. What do you think?Dana:  Tell me more. How did you decide that you have a problem?Marcy:  I never get everything done on my to-do list. The more I get done, the more I end up adding to the list. Dana:  What would solving the problem look like to you?Marcy:  Well, I’d get everything done on my list.Dana:  Is that realistic?Marcy:  It’s not, but what else am I going to do?Dana:  What else can you do that will help? Can you work with an advisor? Use a scheduling program?This is an example of coaching. Describe the process of coaching and explain why is it important for managers to be effective coaches.

identify challenges, including remedies, other organizations have faced in implementing a key management system.

Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.The following are the deliverables for this project:There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.”When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.Review these authentication resources to learn about authentication and the characteristics of key management.Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.Read these resources on data at rest, data in use, and data in motion.Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.Review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization.Incorporate this information in your key management plan.In the next step, you will consider key management capabilities.In the previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks.Propose solutions organizations may use to address these gaps and identify necessary components of these solutions.Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system.Include this information in your enterprise key management plan.Provide a summary table of the information within your key management plan.Incorporate this information in your implementation plan.You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the CISO.Incorporate this information in your implementation plan.In the next step, you will provide information on different cryptographic systems for the CISO.In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring. Independently research commercially available enterprise key management system products, discuss at least two systems and recommend a system for Superior Health Care.Describe the cryptographic system, its effectiveness and efficiencies.Provide an analysis of the trade-offs of different cryptographic systems.Review and include information learned from conducting independent research on the following topics:Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic.Incorporate this information in your implementation plan.In the next step, you will begin final work on the enterprise key management plan.In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan.In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections.A possible outline could be:The following are the deliverables for this segment of the project:Submit your plan to the Assignments folder.After submission, complete the final step of writing the enterprise key management policy.The final step in this project requires you to use the information from the previous steps to develop the Enterprise Key Management Policy. The policy governs the processes, procedures, rules of behavior, and training for users and administrators of the enterprise key management system.Research similar policy documents used by other organizations and adapt an appropriate example to create your policy.Review and discuss the following within the policy:Discuss different scenarios and hypothetical situations. For example, the policy could require that when employees leave the company, their digital certificates must be revoked within 24 hours. Another could require that employees must receive initial and annual security training.Include at least three scenarios and provide policy standards, guidance, and procedures that would be invoked by the enterprise key management policy. Each statement should be short and should define what someone would have to do to comply with the policy.

suggest and discuss solutions to (1) overcome the challenges and manage the risks associated with the event/issue, and (2) improve the efficiency, sustainability and ethics of the management of the event/issue.

  The report should demonstrate your understanding of good project management and health and safety management as appropriate within the context of your chosen project and event.The report will present the context/background of the chosen project, describe the project, and present student’s critical reflection and thoughts on the management of one particular event/issue of project. The impacts of the event/issue on (1) people, (2) cost, (3) time, (4) health and safety, (5) sustainability, and (6) Ethics will be explored. Using the theory and tools presented in the lectures across the module as well as their own independent research, students should suggest and discuss solutions to (1) overcome the challenges and manage the risks associated with the event/issue, and (2) improve the efficiency, sustainability and ethics of the management of the event/issue.Appendices and references must be used to demonstrate study that has been undertaken and to provide sources for points made in the body of the report. This will include copies of any individual or group student work undertaken during the module.The student should refer to the learning materials and readings provided across the module, but are also recommended to give appropriate regard to any additional useful material available online in terms of theory and practice.

identify and discuss at least three ways in which attackers and/or criminals use encryption and cryptography to further their goals and objectives.

  CMIT 425 Week 3200-400 words APAYour task: You have been asked to give a presentation to the Chief Technology Officer’s (CTO’s) staff for their monthly “brown bag”; luncheons. The subject of this session is: Use and Misuse of Encryption.Background: Cryptographic algorithms provide the underlying tools to most security protocols used to implement encryption in enterprises and critical infrastructures. The choice of which type of algorithm to implement depends on the goal that you are trying to accomplish, e.g. ensuring data privacy or ensuring integrity of software or data. Cryptographic algorithms fall into two main categories: symmetric key and asymmetric key cryptography.In the first part of your briefing to CTO Staff, please identify and discuss the strengths and weaknesses ofFor each type of cryptographic algorithm, you should provide an example of where this type of cryptography would be used within the software and services that the enterprise depends upon and the type of resource to be protected (e.g. passwords stored in hashed format).In the second part of your briefing, identify and discuss at least three ways in which attackers and/or criminals use encryption and cryptography to further their goals and objectives. These could include using encrypted chat to avoid wiretaps or surveillance or using encryption to deny legitimate users access to data or systems (e.g. ransomware). If countermeasures are available, describe and discuss them.Format: This week, the format for your deliverable (posting) will be.Talking Points. Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (slide titles followed by 3 to 5 supporting points for each. Remember to put enough information into the talking points that your peer reviewers can understand what you intend to cover in each section of your briefing. Remember to introduce the topic at the beginning, present your analysis, and then close your briefing with an appropriate summary. Include a list of sources (3 or more) which attendees could refer to if they wish to fact check your work. 

explore the relevance (or lack thereof) for understanding the article

Summary below**This assignment has four parts, total length between 13 – 16 pages. It will all be in one Microsoft Word document. A minimum of 3 – 5 reference is required. The format needs to be in APA style, with a title page, subheadings, in-text citations and a reference page. Please read the details for each part. Part 1: Summary and AnalysisUse the following link to read the article and provide a two-page summary and analysis that addresses the questions listed in the instructions.https://www.wrtv.com/news/working-for-you/dangerous-new-tiktok-trend-encourages-teens-to-diagnose-themselves-with-rare-personality-disorders  Part 2: Research Article ApplicationUsing the attached article (labeled as Part 2 Article), write a three-page summary, analysis, and application of the journal article that addresses the following questions listed in the instructions.   Part 3: Connection to Personality TheoryThe third step is to analyze the article from Part 1 in relation to the three listed psychodynamic theories in the instructions. For each theory, you will want to explore the relevance (or lack thereof) for understanding the article from Part 1. One & two pages for each theory.  Part 4: Personal RelevanceThe last step is to reflect upon the article, research, and personality theory in relation to your own life.Write a three-page reflection and analysis that addresses the questions listed in the instructions.

In patients aged 65 and older (P), how does the use of the Covid-19 vaccine (I) compared to not receiving the vaccine (C) influence the risk of developing adverse reaction (O) within the first week of administration?

   Covid-19 Vaccine and the Risk Involved in the Vaccine  PICO Question: In patients aged 65 and older (P), how does the use of the Covid-19 vaccine (I) compared to not receiving the vaccine (C) influence the risk of developing adverse reaction (O) within the first week of administration?IntroductionThe research proposal should:1 page