A) structural element of the nuclear envelope.

A) Burkitt’s lymphoma t(8;14)(q24;q32) can be developed due to chromosomal translocations juxtaposing the c-myc gene on chromosome 8 to one of the immunoglobulin loci. This aggressive B-cell neoplasm is characterized by c-MYC gene placed near the enhancer of the heavy chain of immunoglobulin on chromosome 14, which results in overexpression of c-MYC in B cells. This type of lymphoma makes up the majority of BL (2).B) Alpha-thalassemia is an inherited blood disorder that is characterized by reduced production of hemoglobin. This pathology can be seen in individuals whose level of alpha-globin chain composing hemoglobin is decreased. Alpha-globin protein is expressed from four genes (HBA1 and HBA2 on each chromosome 16) that are under the control of a 5? regulatory element, 5?-HS40. Typically, alpha-thalassemia develops when the deletion of either the alpha-globin genes or the 5? regulatory element occurs (3).

C) Progeria (Hutchinson-Gilford Progeria Syndrome or “HGPS”) is characterized by extremely rapid, premature aging of newborns shortly after their birth. Individuals with HGPS have point mutations in the Lmna encoding lamin A and C, the A-type lamins – crucial structural element of the nuclear envelope. The most frequent HGPS mutation is located at codon 608 (G608G). This type of mutation forms a cryptic splice site within exon 11 deleting a proteolytic cleavage site within the expressed mutant lamin A. This leads to incomplete processing of prelamin A resulting in nuclear lamina abnormalities common for HGPS cells.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

A. gone an extra mile to understand

A.

Describe how you think the hotel’s management will Make sure that the way it manages the hotel is appropriate to the way it competes for business From the case analysis above, The hotel management of Penang Mutiara has adopted various methods that have enabled them to be competitive, they have realized that it’s cheaper to maintain an existing customer than looking for an new ones. They have gone an extra mile to understand that once in a while guest will come in agitate probably due to their experiences with their flights for instance losing their luggage, their have made sure that so that the guest is not agitate further for repeat guest, by the time the guest is checking in all their details are ready, “staff avoid their having to repeat the information they gave on the previous visit. Reception staff simply check to see if guests have stayed before, retrieve the information and take them straight to their room without irritating delays”, this way, the customer feels much appreciated.They have also gone an extra mile by ensuring that the customer demands are met without any delay, “A guest just should not be kept waiting. If a guest has a request, it has to be sorted out now” to do this they have to make sure that the staff are multi-skilled. The policy is making sure that restaurant staff can always do more than one job.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

It’s this kind of ?exibility which allows the hotel to maintain fast response to the customer.’ The Hotel has also ensure that they are Dependable, this is a a fundamental principle of a well-managed hotel. “We must always keep our promises”. For example, rooms are ready on time and accounts are also ready for presentation when a guest departs; this minimizes the long queues at both check in and out points.The hotel also does planning in advance and anticipation of what could go wrong, their put up mechanism of how to cope with the problems or better still prevent them from occurring in the first place.The Hotel is also flexible to the customer demand, “We never like to say NO” they ensure that what customer wants, even if they don’t have they have to go the extra mile and get it for him, if however they happen not to get it, they negotiate with the customer for an alternative.Even though Penang Mutiara has managed to maintain their competitive advantage currently, they should do a SWOT analysis and understand how their can remain competitive in the long run. This should assist Penang Mutiara to understand the areas where their should put more effortTheir should also adopt new strategies, let Penang Mutiara look for mechanism to attract new customers over and above the existing one, they should have questionnaire’s and market survey initiatives to understand the new emerging markets.

Penang Mutiara should also introduce a loyalty programme for the frequent customers. Customers should be made to understand the benefits of the loyalty points.Penang Mutiara should also have an online checking system where guests can be able to check-in in advance; in doing this the hotel should have a ready report that shows are the arrivals in a particular.a) Describe how you think the hotel’s management will Implement any change in strategy.Penang Mutiara Should have branches in as many destinations as possible, this will enhance customer brand loyalty in most regions. Considering that “There are many luxurious hotels in the South-East Asia region but few can compare with the Penang Mutiara” this means that they are already are brand to recon on and therefore no much struggling with the advertising aspect.They should also have complementary airport transfer services for their client, this will ensure that the guest are not worried as to what means they will have to use to get to the hotel, in so doing guests security will definitely be enhanced.

The hotel should also adopt various cuisines, in doing so the guest will feel much appreciated. They will also being looking forward to see various cuisines that are available at any particular. Describe how you think the hotel’s management will Develop its operation so that it drives the long-term strategy of the hotelThey should also ensure that they adopt a low cost supply chain, in doing so this will enhance the quality of purchases, fast delivery and right prices. With a proper supply chain process stock outs of major items will be significantly reducedPenang Mutiara should have a hotel website.

In it they should have as many facilities as possible, examples would warning the guest in advance of the current weather condition and the appropriate dress code for the weather, they can also highlight the uniques features available in the hotel, eg a kids club for the young ones., there also could be a feedback sections where guests can be able to air both their appreciations and complaints and probably give suggestions for improvement.Penang Mutiara can also set aside a budget for advertising themselves in both the digital and print media; this will enhance awareness in the market.They should also enhance the hotel with free wifi within the hotel premise and also ensure that all hotel rooms are fitted with sets of TV, Bibles, Quaran among others

A. helps you get more done through faster

A. Network Services NeededBusiness NeedsUMUC facilities located in Adelphi, MD require a complete array of network services and systems. Although the campus is a satellite location the students and faculty require the same amount of services and systems as any campus across the country.

The needs of the Adelphi campus are internet, email access, file sharing, printing, database access, voice of IP and video conferencing. Recommended Network ServicesDynamic Host Configuration Protocol (DHCP) – Dynamic Host Configuration Protocol (DHCP) is a client/server network protocol which will automatically lease a computer new on the network with and IP address, subnet mask, DNS servers and default gateway 1.Domain Name System (DNS) – DNS setup is important to maintain the network operating smoothly. Improper DNS can cause traffic slowdown, authentication issues, and produce a plethora of strange errors 2.Microsoft Exchange Email Standard – Exchange 2016 helps you get more done through faster search and an inbox that is more personalized, more helpful, and more intelligent 3.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

• Large mailboxes – 50 GB of mailbox storage and can send messages up to 150 MB • Outlook support – connect supported versions of Outlook to Exchange Online• Web-based access – For web-client access, Outlook• Shared calendar/contacts – Compare calendars, access collaboration features, including shared calendars, groups, the global address list, external contacts, tasks, conference rooms, and delegation capabilities.• Security – protected with anti-malware and anti-spam protection via Exchange Online Protection.• Hosted voicemail – hosted Unified Messaging services, call answering, a dial-in user interface, and company automated attendant capabilities.• Data loss prevention (DLP) – regulatory standards such as PII and PCI, which help to identify, monitor, and protect sensitive data through deep content analysis.• Office applications – Word, Excel, PowerPoint, Outlook, Publisher, and OneNoteSimple Network Management Protocol (SNMP) – Network management stations execute management applications which monitor and control network elements. Network elements are devices such as hosts, routers, terminal servers, and so forth, which are monitored and controlled through access to their management information 4.File Server – is a computer attached to a network with the purpose of providing a location for shared disk access, shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations.

Print Server – A print server is a software application, network device or computer that manages print requests and makes printer queue status information available to end users and network administrators 5.Voice over IP (VoIP) – It is an alternative way of making phone calls that can be very cheap or completely free. The ‘phone’ part is not always present anymore, as you can communicate without a telephone set 6.Database Server – A database is a collection of information organized to provide efficient retrieval. The collected information could be in any number of formats (electronic, printed, graphic, audio, statistical, combinations).Internet – an electronic network that connects computer networks and organizational computer facilities around the world.

This network will provide service for all students and faculty to access information for research around the world.B. List additional servers or network devices.

Business NeedsUMUC Adelphi Campus houses a diverse group of faculty and students with desire to maximize their administrative professionalism and educational awareness. It is necessary to utilize any and every technological advancement to ensure they maximize their potential. This includes everything from data connectivity, wireless availability, and data security.

Recommended additional servers and devicesThe following servers will be implemented into the network:• Dynamic Host Configuration Protocol (DHCP)• Domain Name System (DNS)• Email Exchange Server• File Server• Print Server• Database Server• Proxy Server• Web ServerThe following network devices:• (2) Firewalls – Cisco Firepower 2100 Series• (2) Wireless Controllers – Cisco 5520 802.11ac• Router – Cisco 4431 ISR• (12) Layer 3 Switch – Cisco Catalyst 3650 Series • (16) Wireless Access Point – Cisco Aironet 1815i• (173) Student Computers – Hewlett-Packard HP Prodesk 400 G3• (17) Faculty Computers – Hewlett-Packard Z440 WorkstationC. List network security measures.Recommended network security measuresFirewall – The UMUC Adelphi Campus will contain 2 firewalls, the first will separate the ISP from the entire network, and the second firewall will create a DMZ which will house certain servers such as the Web server, DNS server and DHCP server.Intrusion Detection Services – . The IDS detects possible intrusions from various forms of intrusions to include URL filtering, signature recognition, anomaly recognition and allows the user to adjust the IDS scope as needed to protect against host or network based threats 7.Intrusion Protection Services – IPS which jumps into action upon the detection of a threat.

The IPS can shut off ports that may be used in an attack, minimizing the attack as its happening.Anti-Virus – Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.Back Ups of Network Files – Backing up files and systems on a consistent times schedules will prevent loss of data.Updating Patches and Hotfixes – Updating patches and hotfixes as soon as possible provides security and closes holes in security. These patches and hotfixes will be updated as soon as they are downloaded.New Hire Training – Train all new hires on procedures to create passwords and security protocols for company owned computers.

Security Refreshers – Annual security training to refresh security protocols for company owned computers.D. Justify network services, security measures, and devices.Dynamic Host Configuration Protocol (DHCP) – Dynamic Host Configuration Protocol (DHCP) is a client/server network protocol which will automatically lease a computer new on the network with and IP address, subnet mask, DNS servers and default gateway 1Domain Name System (DNS) – DNS setup is important to maintain the network operating smoothly. Improper DNS can cause traffic slowdown, authentication issues, and produce a plethora of strange errors 2.Microsoft Exchange Email Standard – Exchange 2016 helps you get more done through faster search and an inbox that is more personalized, more helpful, and more intelligent 3.Simple Network Management Protocol (SNMP) – Network management stations execute management applications which monitor and control network elements.

Network elements are devices such as hosts, routers, terminal servers, and so forth, which are monitored and controlled through access to their management information 4.File Server – is a computer attached to a network with the purpose of providing a location for shared disk access, shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations.Print Server – A dedicated print server will prioritize print jobs and keep printing clear of issues.Voice over IP (VoIP) – It is an alternative way of making phone calls that can be very cheap or completely free. The ‘phone’ part is not always present anymore, as you can communicate without a telephone set 6.Database Server – A database is a collection of information organized to provide efficient retrieval.

The collected information could be in any number of formats (electronic, printed, graphic, audio, statistical, combinations).Internet – an electronic network that connects computer networks and organizational computer facilities around the world. This network will provide service for all students and faculty to access information for research around the world.Proxy Server – A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server.

The proxy provides the resource either by connecting to the specified server or by serving it from a cache 8. This allows servers in the DMZ to be accessed by clients on the web without sacrificing security.Web Server – Dedicated computers and appliances may be referred to as Web servers as well.

The process is an example of the client/server model. All computers that host Web sites must have Web server programs 9.Firewall – The UMUC Adelphi Campus will contain 2 firewalls, the first will separate the ISP from the entire network, and the second firewall will create a DMZ which will house certain servers such as the Web server, DNS server and DHCP server.Intrusion Detection Services – . The IDS detects possible intrusions from various forms of intrusions to include URL filtering, signature recognition, anomaly recognition and allows the user to adjust the IDS scope as needed to protect against host or network based threats 7.Intrusion Protection Services – IPS which jumps into action upon the detection of a threat. The IPS can shut off ports that may be used in an attack, minimizing the attack as its happening.

Anti-Virus – Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.Back Ups of Network Files – Backing up files and systems on a consistent times schedules will prevent loss of data.Updating Patches and Hotfixes – Updating patches and hotfixes as soon as possible provides security and closes holes in security. These patches and hotfixes will be updated as soon as they are downloaded.

New Hire Training – Train all new hires on procedures to create passwords and security protocols for company owned computers.Security Refreshers – Annual security training to refresh security protocols for company owned computers.E. Identify network storage and cloud based servicesRecommended network storage and cloud based servicesUMUC Adelphi campus shall utilize Mircosoft Azure for Cloud Storage and Cloud based services to include: Virtual Machines, Provision Windows and Linux virtual machines, App Services – web and mobile, cloud-scale job scheduling and compute management, Service Fabric and additional Cloud Services 3. The Cloud Services will consist of a Self Service Provisioning Platform to make individual ease and control over individual needs of faculty and students due to it being a pay as you go and pay for what you use 7.• Flexibility of access• Ease of use• API availability• Metering services• Ability to try out software applicationsF. Data protection and backup methodBack Up MethodUMUC Adelphi Campus will nightly back-ups of all student and faculty computers however the servers and backbone devices will utilize system state back-ups which will include anything required by the operating system to restore configurations, such as files, registry settings, and drivers.

One copy will be kept on-site and another copy will be stored in the cloud and an additional copy will be kept off-site.References1 jonathan, “Fundamentals: DHCP,” 10 October 2014. Online.

Available: http://www.routingloops.co.

uk/fundementals/fundamentals-dhcp/. Accessed 14 July 2017.2 C. Fettinger, “Fundamentals of DNS in a Small Business Network,” CyberStreams, Online. Available: https://www.cyberstreams.com/fundamentals-dns-small-business-network/. Accessed 14 July 2017.

3 Microsoft, “Compare Exchange Online plans,” 2017. Online. Available: https://products.

office.com/en-us/exchange/compare-microsoft-exchange-online-plans. Accessed 14 July 2017.4 Cisco, “SNMP Management Information Base,” Cisco, 2002. Online. Available: http://www.

cisco.com/c/en/us/td/docs/switches/wan/mgx/ses/software/ses_pnni_r3-0/configuration/guide/scg/oricgape.pdf. Accessed 14 Juy 2017.5 M. Rouse, “Definition,” Techtarget, 2010. Online.

Available: http://whatis.techtarget.com/definition/print-server. Accessed 14 July 2017.6 N. Unuth, “What Is VoIP and What Is It Good For?,” Lifewire, 28 April 2017. Online. Available: https://www.

lifewire.com/what-is-voip-3426730. Accessed 15 July 2017.7 T. N.

Pro, “Testout Labsim,” 08 May 2017. Online. Available: https://cdn.

testout.com/client-v5-1-10-429/startlabsim.html.8 whatmyipaddress, “What is a Proxy Server?,” 2017. Online. Available: http://whatismyipaddress.com/proxy-server.

Accessed 15 July 2017.9 M. Rouse, “Definition of Web Server,” Techtarget Network, July 2015. Online. Available: http://whatis.techtarget.

com/definition/Web-server. Accessed 15 July 2017.

a) sales representatives are not trained or monitored

a) One of the major organisational problems experienced at Duplox Copiers is the dissatisfaction and increased complaints from customers about quality of service and machine breakdowns.

This is because of the poor customer service provided by the Technical Service Specialists (TSSs). However, this cannot be blamed on the TSSs because they are not required to ‘go by the book’. All the new equipment installations have to meet the company’s standards in terms of ventilation, space and wiring. Equally, sales representative’s gets 50% of their income based on the sales and service contracts, therefore, they are reluctant to inform customers to make expensive alterations to their facilities to install the machine since they might lose the sale. Besides, the sales representatives are not trained or monitored on their sales techniques.b) An underlying structural factor that contributes to these underlying problems at Duplox Copiers is leadership and decision making. This is because when TSSs require technical advice from head office where there are several technical experts who specialise in different types of machines, they are supposed to call the field service managers (FSMs) who will first try to solve the problem before contacting the Technical Support Department.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

This is a slow decision making process which interferes with the timely completion of work by TSSs. Hence, this bureaucracy should be abolished and TSSs allowed to communicate directly with technical experts from head office. Besides, TSSs should be allowed to make their own decision and given discretion over maintenance schedules and services.On the other hand, a contextual factor that contributes to these underlying problems is the Duplox workforce. This is because they are not motivated and they lack workforce morale as a result of poor compensation. Besides, the company’s technical service specialists experience a decline in their attitude towards work and the organisation as indicated in the annual attitude survey as well as the increased employee turnover. These contribute to Duplox problems to a greater extent.

c) One underlying factor that relates to Duplox strategy causing these problems relates to the fact that TSSs are put under tighter control. For instance, approval from FSM is required for many actions of TSSs even if they are within budget limits. Moreover, TSSs cannot order tools or parts required for maintenance since these have to be ordered by FSM.

This slows down TSSs work since they have to wait for parts for a longer time to be ordered by FSM. Equally, since there are delays in receiving parts, TSSs who starts the job are not the ones who necessarily finish the job. This brings a lot of inconsistencies in the maintenance process. This results to inferior work hence increased complaints from customers.Section B: Strategic and Structural Recommendationsa) Firstly, for the contextual variable, Duplox should design an effective reward structure and compensate employees favourably in order to motivate them and improve their morale. Besides, the company can also reward employees through offering incentives to them.

According to Long ; Singh (2018), incentives such as extra paid day off, shopping vouchers or gift cards are motivation boosters and will keep employees engaged at work. The organisation should also conduct professional training and development for its workforce. In terms of structural variable, Duplox should remove bureaucracy and ensure faster decision making process through allowing TSSs to make direct calls to technical experts from head office. This will ensure timely completion of tasks. b) One of the actions to be completed in the professional development and training for knowledge and skills of the current position is to train sales people to ensure that they recommend to customers the right machine for the right space. They should also be trained to ensure that the right machine is delivered to customers as per specifications.

Secondly, Duplox should set up a peer mentoring program. This is because inexperienced sales representatives struggle with many questions from customers which might discourage some. Hence, the company should assign experienced sales person in a team to mentor new hires. The experienced employees are asked to keep an open dialogue to enable the inexperienced sales representatives to get along well with answering customers concerns or questions.2) The individuals who are expected to complete these actions are the sales people who should ensure that customers get the right equipment for the space provided. Additionally, these actions would be completed by Director of technical service support as well as Director of human resources.

The Director of technical service support will ensure that technical service specialists receive relevant and adequate training while Director of human resources will oversee the overall training of both sales representatives and the TSSs in each geographical location.3) The professional training and development should be conducted for a period of between 4-6 weeks in each geographical location. This indicates that the training should start on 1st November 2018 and end on 15th December 20184) These recommendations should be implemented because the morale of sales representatives is down and they are reluctant to tell customers to make expensive alterations to their facilities since they fear that they might lose the sale.

Furthermore, the TSSs lack team spirit hence they should be trained to become team players and align with the organisational value.5) One way that Duplox Copiers could evaluate the success or effectiveness of the solution is through conducting a survey to determine the satisfaction of both customers and staff. Essentially, the satisfaction of customers and staff indicates that the training solution has been successful.Section Ca) The various components of compensation mix consist of the base salary as well as the incentives payable to employees in form of bonuses. Arguably, at Duplox Copiers, TSSs are paid on a flat salary and a bonus system. The bonuses paid to TSSs depend on whether their productivity met or exceeded past year’ standards and whether services and repair expenses were below standard.

If they achieve these bonuses, they can double their earnings. Additionally, Regional Sales Managers, Director of Technical Services, Field Sales Managers as well as Branch service managers are all paid on a salary a bonus systemFurthermore, the compensation of Inventory Management Director as well as her two managers depends partly on minimising inventory carrying charges. Moreover, Director of Technical Training and Support’s compensation is designed based on the cost recovery level that she can obtain from Technical Service Department and partly on keeping down the overall cost on her department.In allocating compensation among these components, Duplox seeks to provide competitive and reasonable fixed compensation while emphasizing more on the performance based compensation such as commissions paid to sales representatives. b) One of the most common compensation level strategies is salaries and wages. Accordingly, when determining what a company’s pay for salaries and wages, it is important to consider the prevailing economic conditions in that particular region, the volume of potential employees as well as the legislative requirement put in place (Long, 2014). When an organisation determines what to pay, the first consideration should be the role placement which can be determined through job classification or evaluation (Long & Singh, 2018). Secondly, the organisation should consider the relevant experiences and skills required which might impacts on applicant’s placement in the range of salary upon hire.

Another level of compensation strategies is pay increase. Arguably, base pay is a regular payment which is fixed given to an employee in exchange of performance of their roles and responsibilities (Martocchio, 2014). A pay increase therefore is considered as an increase in pay that employees receive as a result of an increase in their base pay. Another level of compensation strategies is bonus payments.

These are compensation over and above the specified amount such as salary or wages (Long ; Singh, 2018). This form of compensation is only distributed as outlined in the employment contract. Essentially, bonuses are used by organisations to improve employee productivity, morale and motivation or as thank you message to workers who achieve significant goal (Long, 2014).Additionally, the other level of compensation strategy is the incentive plans. Offering incentive plans, more so to senior staff can allow a company to compete for talents that they would not have been able to pursue (Long ; Singh, 2018). Lastly, another level of compensation strategy is the skilled based pay.

In this system, salary levels are based on the skills of employees and not the job title (Martocchio, 2014). Notably, a set of skills are assigned particular pay grade.References

x

Hi!
I'm Garrett!

Would you like to get a custom essay? How about receiving a customized one?

Check it out