Tuesday, December 31, 2019

Beowulf Epic Hero Essay example - 961 Words

Beowulf: Epic Hero An epic hero, an Anglo-Saxon hero, a modern-day hero; A hero is is often defined by certain qualities, looked upon traits. We have heroes amongst our lives everyday, from saving a life to simply helping someone out. In the epic poem, â€Å"Beowulf†, Beowulf was the most heroic man of the Anglo-Saxon times. The Anglo-Saxon code reflects much of the code of Chivalry, the code of the Samurai, to the modern-day code of just doing good. He embodied courage, honesty, loyalty, and much more, attributes that were all valued by the Anglo-Saxon code. Beowulf was truly an Anglo-Saxon hero of his time as he possessed all the traits of an Anglo-Saxon hero. Beowulf was never afraid to die. One of most valiant traits enclosed†¦show more content†¦The Anglo- Saxons always strived for fame, a warrior was always prepared to die as for one could become famous for his feats on the battlefield. â€Å"I’ve avenged their crimes, and the Danes they’ve killed. And I promise you that whoever sleeps in Herot- You, your brave soldiers, anyone of all the people in Denmark, old or young - they, and you, may now sleep without fear of either monster, mother or son. (75)† Receiving fame through a great feat in war was a best way for a warrior to achieve honor in death. Each character was defined by a status, and that status was in a formation of their fame, their accomplishments. In this case, Beowulf’s fame was created by the many great deeds and battles he’s fought. â€Å"Of sea-huge monsters I killed. What man, anywhere under Heaven’s high arch, has fought in such darkness, endured more misery or bee n harder? (41)† In the Anglo-Saxon culture, it was so important for the warriors to be proud of what they did and sought fame from them. Generosity was key, it was an aptitude that was essential to become a great ruler as well. Hrothgar, King of the Danes, was a great political leader that embodied generosity to the fullest. Hrothgar mentions that Beowulf manifested the qualities of a good leader, a king to be exact, a great protector of the Geats. â€Å"One man found it, came to Denmark and with the Lord’s help did what none of the Danes could do, our wisdom, ourShow MoreRelatedThe Epic Of Beowulf As An Epic Hero1519 Words   |  7 Pagesaway following a journey, you have most likely read an epic. An epic by definition is â€Å"a long poem, typically one derived from ancient oral tradition, narrating the deeds and adventures of heroic or legendary figures or the history of a nation†. Every epic has a main character that undergoes the same archetypal journey a s all other heroes, an epic hero. There are specific qualities one must have to be considered an epic hero. Each epic hero possesses superhuman strength, displays a strong sense ofRead MoreThe Epic Of Beowulf As An Epic Hero711 Words   |  3 Pagesthan the writer. These â€Å"epic heros† are protagonists that fulfill their potential of greatness through using their bravery, strength and humility for good. The near ancient tale of Beowulf is a classic example of an epic story that contains an epic hero. In this tale Hrothgar, the king of the Danes, has been terrorized by a beast known as Grendel. This beast has been murdering the king’s people and no one has come close to stopping this killer. A Geat warrior named Beowulf hears of the King’s predicamentRead MoreBeowulf : An Epic Hero930 Words   |  4 Pages The story of Beowulf shows its reader many characteristics of why this Anglo-Saxon poem is an epic. First of all, Beowulf is a warrior of epic renown by the time he formally introduces himself in the poem. Next, Beowulf is the warrior that many strive to be in life. In addition, Beowulf finds himself tackling many quests that involve dangerous beasts, or as he might call them, demons. The next quality shown by Beowulf is his bravery and honor. The reader is able to easily identify this characteristicRead MoreBeowulf, The Epic Hero1373 Words   |  6 Pages 2015 Beowulf, The Epic Hero In Anglo Saxon times, Beowulf is considered a well known epic hero. â€Å"Epic heroes are literary characters from ancient mythology and other stories, which were written down in the form of long, narrative epic poems. The hero is the main character, or protagonist of the poem†(Epic Hero: Definition, Characteristics Examples.). The epic hero usually battles for accomplishments to a set of tasks to complete important goals. Beowulf is described as an epic hero becauseRead MoreThe Epic Hero Of Beowulf866 Words   |  4 PagesAn epic hero is someone who is of great importance, they have supernatural abilities, have some form of connection with the Gods, and accomplish great deeds. In Beowulf, translated by Seamus Heaney, Beowulf is the epic hero in his tale and he is considered great by those who know of his life. There are two versions of his story which portrays him in a certain way. The video version does not do its best to portray him as an epic hero but instead show that he is a liar, a womanizer, and a coward. TheRead MoreBeowulf : An Epic Hero894 Words   |  4 Pages The character of Beowulf demonstrates several characteristics that make a great epic hero. Throughout his lifetime he displayed several characteristics such as honor, bravery, physical superiority, leadership, and glory. These characteristics all formed how the Anglo-Saxons believed one should live their life. Along with the valorous deeds that Beowulf accomplished he is considered to be a prime example of an epic hero. Beowulf would have even been considered a model human to the Anglo-SaxonsRead MoreBeowulf : An Epic Hero978 Words   |  4 Pages Beowulf is a character that exudes the qualities of an epic hero. Throughout this epic, Beowulf is seen as a hero to many and a major threat to the evils he encounters. The values of the Anglo-Saxons, who would have read and admired this poem, included loyalty, bravery, and honor. Beowulf’s character exemplifies all of these qualities to the highest degree. The values and traditions of the original composers of this story cause Beowulf’s character to be the perfect example of an Anglo-SaxonRead MoreBeowulf: an Epic Hero983 Words   |  4 PagesGauvain British Literature Beowulf Essay 9/22/04 Beowulf: An Epic Hero According to Abrams, the heroic poem is a long verse narrative on a serious subject, told in an elevated style, and centered on a heroic or quasi-divine figure on whose actions depends the fate of a tribe, a nation, or the human race. Beowulf fits Abrams description of an epic, exhibiting all of the characteristics listed throughout the book, thus defining Beowulf as a hero and making the book an epic through its elevatedRead MoreBeowulf, the Epic Hero1431 Words   |  6 PagesBeowulf, the Epic Hero There have been many grand stories about great warriors, and champions; those about epic heroes however, are the truly exceptional tales. One such tale, over a thousand years old, stands out from all the rest: Beowulf, the tale of a great warrior, on his quest to achieve eternal glory, defeating great opponents. Throughout the whole story, Beowulf demonstrates most –if not all- of the qualities that an archetypal hero possesses. He embodies the highest ideals of his cultureRead MoreBeowulf : The Epic Hero960 Words   |  4 PagesPotter, and Beowulf all have in common? They all demonstrate the qualities of epic heroes. Beowulf represents several characteristics of an epic hero and demonstrates the values of the Anglo-Saxons. He is the main character of his story, he has a main goal, he travels and fights with a group of people, and he accomplishes many valorous deeds; the values of the Anglo-Saxons are also shown through the actions of Beowulf, such as courage, loyalty, an d fame. For example, when Beowulf heard a cry

Sunday, December 22, 2019

King’s “Letter from Birmingham Jail” and Swift’s “A Modest...

Martin Luther King’s Letter from Birmingham Jail is a very sophisticated argument that gets to the point, but in the same time it gets very deep and complex. The letter is a historical and emotional letter that spoke to the hearts of people all across America. It was also well thought out and wrote with great deep meaning. By using three categories of persuasion, ethos, pathos, and logos, King was able to get on a much needed personal level with his audience. Along with letting the reader know that he had valid ideas and reasons. Getting on a personal level would let King explain his view of what was Right and unjust. I believe that King’s letter was the greater argument than Swift’s, because he knew what his argumentative goal was, to†¦show more content†¦Though Martin Luther King had talked about the problems he was facing he still had many other point to prove before he was satisfied with his argument. King goes on in the letter and gets on a pe rsonal level with the clergymen. He opens the doors of emotions with his reader’s. With referring to words of religious icons, Love your enemies, bless them that curse you, pray for them that despitefully use you. (740). Martin Luther King was able show the clergymen that segregation was happening and unjust acts toward African Americans were still occurring in the United States. King also knew that he was going to need to get the White majority to listen. King used personal experiences from his children, when you suddenly find your tongue twisted and your speech stammering as you seek to explain to your six-year-old daughter why she can’t go the public amusement park that has just been adverted on television, and see tears welling up in her little eyes when she is told that Funtown is closed to colored children, and see the depressing cloud of inferiority begin to form in her little mental sky, and see her begin to distort her little personality by unconsciously dev eloping a bitterness toward white people. (735). I felt that King brought out the emotions of his audience. This too got the reader listening to his words. King was able to accomplish this by using the persuasive strategy,Show MoreRelatedSimilarities between Martin Luther Kings Letter from Birmingham Jail and Jonathan Swifts A Modest Proposal1358 Words   |  6 Pagescursory analysis of Letter From Birmingham Jail by Martin Luther King, Jr. and A Modest Proposal by Jonathan Swift reveals glaring differences between the two essays. Surprisingly, a side-by-side comparison also yields many similarities between the two works. The most obvious similarity between the two essays is the overarching theme of the subject matter. In both essays, the writers address deeply-entrenched social injustices. For example, in Letter From Birmingham Jail, King, in his highly-impassionedRead MoreIrony in Jonathan Swifts A Modest Proposal1101 Words   |  5 Pagescommentary on the English Government. Swift’s works are heavily ironic and satirical and sometimes would leave a very unpleasant taste in the mouth. His political ideas are radical and when he chooses to oppose a view, his words would be usually full of sharp sarcasm and harsh comments though usually hidden in allegories and metaphors still are so clear in their meanings that no one can fail to understand who or what he is pointing to. In his work the â€Å"Modest Proposal†, Swift doesn’t even bother to useRead MoreAnalysis Of Letter From Birmingham Jail And Johnathan Swifts Essay1366 Words   |  6 Pagesbelieve, but are not always ethically and morally correct. Society becomes blinded by its traditions about how things are supposed to be done that nobody sees the pain that is being inflicted. Martin Luther King Jr., â€Å"Letter from Birmingham Jail† and Johnathan Swifts, â€Å"A Modest Proposal,† persuade their audience in very different ways but are both effective in using pathos. In order to create an effective call to change, an author must use the emotions of the reader to create a need to take action.Read MoreAn Analysis of Jonathan Swift and Martin Luther King Jr.’s Stylistic Devices2370 Words   |  10 Pagesprovide useful solutions but failed. The Irish now left with nothing but what the English give them suffer mass oppression, the real issue Swift wishes to addres s. nbsp;nbsp;nbsp;nbsp;nbsp;Swift establishes a mutual understanding with the English from the beginning, an essential part of the careful construction in his essay. He cannot let on the essay will take a dramatic turn after the flip of the second page. Swift does this because he wants to give the impression that he shares the same views

Saturday, December 14, 2019

Database Implementation Plan for Riordan Manufacturing Free Essays

string(57) " encrypted and transmitted to the disaster recovery ite\." Database Implementation Plan for Riordan Manufacturing Riordan Manufacturing has asked our firm, LTB and Associates, to develop a web-based plan to be used as a Business-to-Business web site in order to purchase materials from their vendors. We have examined Riordan’s products and business systems, interviewed Riordan’s employees, and have determined the best course of action to implement the plan. Riordan Manufacturing is a plastics manufacturer based in several locations across the world. We will write a custom essay sample on Database Implementation Plan for Riordan Manufacturing or any similar topic only for you Order Now With three plants based in the continental US, which are located in Albany, Georgia; Pontiac Michigan; and in San Jose, California, which is the company headquarters. A fourth plant is located in Hangzhou, China will not be part of the plan as they purchase materials locally. This where we explain how the database will be set up. Refer to the ERD, Sequence diagram, Use Case diagram, and Class Diagram that follow [pic] [pic] The following paragraphs will describe the considerations that Riordan Manufacturing will need to make in implementing the database plan. Database Management System and Data iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted" style="position: absolute; clip: rect(1px, 1px, 1px, 1px);" src="https://phdessay.com/database-management-system-and-data/embed/#?secret=xcLB38cLBD" data-secret="xcLB38cLBD" width="500" height="282" title="#8220;Database Management System and Data#8221; #8212; Free Essays - PhDessay.com" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"/iframe Where ever it is possible to for our firm to do so, LTB and Associates will make a recommendation on the choice to make. In order to implement the database properly, these recommendations should be implemented in order to offer the tightest amount of security that will be possible. Type of Online Processing Riordan Manufacturing will need to decide between real-time asynchronous processing and batch processing. Real-time asynchronous processing is applicable when the processing must be performed immediately or when the results must eventually be communicated back to an on-line user. One of the problems with real-time processing is that real-time timers and events are required; they are expensive as the computer resources that are used to raise, maintain and check events. Another problem with timer or even processes is that they create locking problems as they may contend with on-line processes for resources and for access the same data. Batch solutions are ideal for processing that is not real-time event based. Batch processes are data-centric and can efficiently process large volumes of data off-line without affecting the company’s on-line system. Batch processing will allow business function to execute on a periodic or recurring basis; or it can operate over data that matches a given criteria. After studying Riordan Manufacturing’s Inventory and Supply Chain processes, the recommendation is for the company to go with batch processing for replenishment of raw materials for the operations. With daily reporting of the materials used at the end of each manufacturing run as the current method of inventory control, batch processing will work well. While real-time processing works well for online shopping, it is not the best approach to take for this application. Access Privileges Normally it is not considered a good security risk to grant access to individuals/companies who are located outside of the normal company network and/or firewall. But in order to provide a better integration of the database between Riordan Manufacturing and vendors/suppliers it is necessary to allow limited access. Riordan shall determine the types of privileges to grant to vendors. These privileges include (a) view, (b) insert, (c) update, and (d) delete (logical deletion only). Riordan shall also determine the type of data vendor should be able to access. The data should only relate to the materials that have been used in the daily manufacturing run; materials that have been previously placed on order; and the estimated projections of materials needed for the upcoming week. This will allow both Riordan Manufacturing and the suppliers to determine the present and short-term inventory needs. Bandwidth High speed access of the Internet has decreased in cost in recent years and the increased utility and the increased ease of use versus the cost of acquiring and maintaining the access has become more financially feasible. LTB and Associates recommend that Riordan acquire the appropriate bandwidth that will allow for the effective flow of information and which will support concurrent access of the company database. Security With the ever-growing threats that are present in the web-based global economy, there is an increased awareness of security. This includes both corporate and political terrorism as well as the knowledgeable lone user bent on mischief. LTB and Associates recommend that the administration plan should ensure that there are methods of data security implemented as information travels over the internet. An effective firewall should be implemented to deny access to unauthorized people. Data should be encrypted. Whenever possible, a Virtual Private Network be established between Riordan Manufacturing and the larger and more critical suppliers Database Administration Plan To ensure the productivity, continuity, and performance of the database for Riordan, proper maintenance, database backup, and change management procedures must be developed and implemented. The database must be backed up regularly in case the system needs to be restored due to data corruption or the loss of the data center due to natural or man-made disasters. Database backups are also critical for testing upgrades, fixes, and enhancements that will need to be migrated into production. Periodic maintenance is also a key to database performance and continuity. Applying operating system patches and security updates to the servers that house the databases help keep the software updated and the servers performing efficiently. Consistent re-indexing of the database can help keep performance high as the database grows in size. Another very important part of administering a database is change management. Database upgrades, fixes, and enhancements must be tested and implemented in a manner that minimizes potential errors, disruption to users, and preserves an audit trail for troubleshooting and compliance issues. Database Backup Plan In order to minimize potential data loss and downtime, the database will be backed up each night and stored in a secure location on the network. Storing the backups on the network will help facilitate transferring the backup to the disaster recovery site. Once the backup is created and stored on the network, a copy will be encrypted and transmitted to the disaster recovery ite. You read "Database Implementation Plan for Riordan Manufacturing" in category "Papers" The backup can then be easily restored at the disaster recovery site as needed, or used in a development environment for testing upgrades, fixes, and enhancements. Database administrators will also have the ability to create backups as needed for testing or emergency purposes. Database backups wi ll be restored to the disaster recovery database at least bi-monthly to verify that the backups are generating correctly and that the disaster recovery-restore process is working as it should. Maintenance Plan Once a month, the database servers will undergo scheduled maintenance. Operating system patches, security updates, and database application patches will be applied to the hardware housing the database in order to ensure the system is kept up to date. Database hardware will also undergo diagnostic checks to ensure everything is working properly. At this time the database will also be re-indexed to preserve performance as the database grows. The patches, security updates, and database application patches will be applied to the development servers one week prior to implementation on the production server. Applying the maintenance related patches to the development system a week prior to implementation in the production system will allow time to monitor the development systems for any issues resulting from the patches and ensure the patches are safe to install into production. For emergency maintenance issues such as hardware failures or power outages, the disaster recovery database will be restored from the latest production backup and work should be closely coordinated with the server team to ensure proper procedures are followed. Change Management The backbone to any administration plan is change management. Maintenance, database backups, upgrades, and other events must be carefully tested, planned, and executed to minimize potential consequences including data corruption and downtime, and changes must be closely tracked to preserve the integrity of the database, maintain a log of changes for troubleshooting potential issues, and ensure proper testing and compliance controls are met. The database team will use Microsoft’s Visual Source Safe (VSS) as the main tool for version control. Patches, fix scripts, and any other code that applies to the databases will be stored in VSS and roper code check in and check out procedures will be followed to ensure the proper code changes are migrated to the database. Only database administrators will have the ability to migrate changes to the databases. Developers can check out and modify code, but cannot implement any changes in the databases. All changes will be properly tested in a development database and signed off on by the appropriate par ties. A network of IT and business â€Å"approvers† will be established for each business area (for example: accounting, procurement, sales, etc. ) and will be responsible for signing off on changes that affect their particular areas. There will be at least one main approver and one backup approver that are subject matter experts for their respective business areas so that all areas utilizing the database will have a representative. Approvers will be the preferred testers, but other users may test changes as long as the approvers review the test results prior to signing off on the test. Signoff for changes will be obtained via email using a template that details the change to be made, a tracking number for the change, and the location in VSS where the change is stored, so that the database administrators will be able to pull the change directly from VSS for implementation. Database administrators will not proceed with migration of a change until all appropriate approvers have responded in the affirmative. Disaster Recovery Plan (DRP) While preparing a disaster recovery plan (DRP), it is essential to think about the hardware, software and data that will be used to allow for an organization to continue operations in the event of a natural disaster or a disaster caused by human hands. In considering the idea of protection of the database, this plan will not only help preserve the company’s investment but also secure the customers faith in Riordan. Some companies spend some 25% of their information technology budget on disaster recovery plans. LTB and Associates recommends the implementation of a DRP. The cost of implantation and the subsequent maintenance versus the cost of a data loss is negligible in the impact it would have. The first step in drafting a disaster recovery plan is conducting a thorough risk analysis of the database systems. Make a list all the possible threats to system operation and evaluate the likelihood of their occurrence. The threats can include electronic-based; such as virus attacks or data deletions, deliberate or accidental; and natural disasters, such as fire, flood, storm or earthquake. Once the threats have been identified and ranked in likelihood of occurrence; what can be done to minimize or limit the impact from these disasters. The more preventative actions we can establish in the beginning the better. It is better to take a proactive rather than a reactive approach in determining and documenting the DRP. The recovery procedure will be written in a detailed plan defining the roles and responsibilities of the IT staff. Defining how to compensate for the loss of various aspects of the network (databases, servers, communications links, etc. ) and specify who will arrange for these repairs and how the data recovery process will occur. Communication Plan During a disaster situation, all parts of the communication plan should be cleared with a central location. All information should be reviewed by management before being released. LTB and Associates recommend that the following steps be implemented. 1. Communication methods need to be established in advance. (Wireless or satellite telephone systems, email address, etc†¦) 2. Develop templates for press releases, and include the skill sets of key employees, customer information, supplier information. Include maps of locations that may be difficult to communicate in. Develop logs that can be used to track incoming and outgoing communications. 3. Make sure that these processes are easy to understand. 4. Develop a contingency plan should the computer network where data is stored is damaged. Use text files and several copies in different storage devices and store this information in a remote server or on removable media which is then stored offsite. 5. Determine what is to be considered as privileged/proprietary information; establish which levels of management and the key personnel to have access to the information; and the approvals for accessing the information 6. Develop a set of detailed documents and instructions that can be shared with employees. . Establish a set of technology based tools. 8. Develop a detailed training plan; be sure to include all key personnel, top management and support personnel that can interface with customer and/or suppliers. 9. Develop relationships with News Service agencies. 10. Establish and train employees as observers to watch for individuals with microphones and notepads; make sure they are aware of the proper channels of communications. 11. D o plan periodic mock scenarios and drills of disasters in order to review the DRP. LTB and Associates recommends that the follow items be purchased, maintained, implemented, and stringently adhered to at every Riordan Manufacturing plant in the continental USA. †¢ Prevention Plan †¢ An electronic manual. †¢ A printed hardcopy manual. †¢ Data and Software Backups †¢ Daily backups, local to each plant and stored offsite. †¢ Weekly backup, to be performed system-wide by the Atlanta, Georgia plant and stored offsite. †¢ Storage area networks. †¢ Surge Protectors and Power Supply Fault Switches. †¢ Anti Virus, Firewall and Security Software. †¢ Fire Prevention and Detection Smoke detectors and fire alarm systems. †¢ Fire extinguishers. †¢ Review and update insurance policies for all facilities and equipment. Disaster Recovery Process. In the event of a disaster occurring at any Riordan Manufacturing plant the following steps should be taken to restore the operation of the system to normal operation. The steps c an apply to any and all sites. 1. Contact the proper level of management and notify pertinent personnel a. Determine if the equipment is functional and has suffered no damage. b. Repair or replace the equipment as needed per the situation. 2. Retrieve the latest weekly backup from the Atlanta, Georgia server and/or facility. (Note – if the Atlanta plant is the affected plant, retrieve the last weekly back up from the offsite storage facility) 3. Restore the database to the server. Perform a system check for proper operation. 4. Retrieve the latest daily backup from the offsite storage facility. 5. Restore the database to the server. Perform a system check for proper operation. 6. Retrieve and key in any pertinent data that was recorded on hardcopy sources from the affected plant and double check accuracy with personnel if possible. How to cite Database Implementation Plan for Riordan Manufacturing, Papers

Friday, December 6, 2019

Teletech Case free essay sample

Background The Teletech Corporation operated in two business segments: Telecommunications Services (TS), and Products and Systems (PS). Though Teletech was a dominant service provider in the area, the company has been experiencing a downtrend of earning growth and stock prices due to keener competition and worse performance in certain segment. Problems statement Teletech has been using economic profit as a measure of value creation at the segment and business-unit level and net present value as a measure of value creation at the project level; and both these values were calculated using the hurdle rate. The main problem faced by Teletech was that the company leaders had to decide what hurdle rate(s) should be used for evaluating performance and budgeting of each segment; and what would be the future of the PS unit, having in mind the accusatory letter of the new 10% stakeholder, Victor Yossarian. By October 2005 only one corporate hurdle rate of 9. We will write a custom essay sample on Teletech Case or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page 30% was used for performance assessment, and the rate was based on the Teletech’s WACC as a representation of the opportunity cost of money. There was an ongoing debate if one common corporate hurdle rate should continue be used for valuation, or different hurdle rates which take into account the associated with the investments risk should be implemented. There was a doubt that the returns of the PS segment were relatively high because they were compared to the not risk-adjusted corporate hurdle rate, and that in fact the PS segment was reducing the shareholders’ value. Victor Yossarian’s opinion was that Teletech had to get rid of the PS segment as it was not providing adequate return. Hurdle rates recommendation We recommend that Teletech should use two different hurdle rates for both segments. First, using WACC as a corporate hurdle rate is not appropriate since different segments have different investment risks. The Products and Systems segment (with the beta of 1. 36) clearly had higher risk than Telecommunication services (with the beta of 1. 04). Thus, instead of using one hurdle rate calculated based on the corporate beta of 1. 15, using two rates will allow the returns of the segments to be compared to more suitable risk-adjusted rates. See Exhibit 1) Second, our calculation shows that using two hurdle rates would result in higher economic profits of each segment as well as in total (See Exhibit 3). Higher profit would make company more attractive to investors. Third, using different hurdle rates also would help the assessment of capital-investment proposals more accurate. Since different segment has different risk, when evaluating a project, the firm shoul d classify the project into each segment and use an appropriate hurdle rate of the corresponding segment to calculate NPV of the project. That would make the NPV of the project more precise. For example, the Telecommunications services had lower risk, lower beta, thus it had lower cost of capital. So, if everything else equals, the NPV of a project in the TS segment should be higher than that of the PS segment. This should be reflected in a lower hurdle rate for TS and a higher hurdle rate for PS. PS recommendation We recommend forming PS as separate entity (financially) , considering possible unit reorganization or sale. Our reasoning is: †¢ The PS segment does not provide satisfactory return, although it is shown as profitable when compared to the corporate hurdle rate of 9. 30% (or even with a PS segment hurdle rate see detailed calculation in Exhibit 1 and returns-hurdle rates comparison in Exhibit 2), or in terms of Economic profit (see Exhibit 3). However, the reported high returns are mainly because PS is able to receive low-interest debt based on the higher aggregate corporate rating. However, if the PS segment is organized as a separate entity (with assumed BB rating), then it will need at least 86% equity financing to be break even, assuming that PS 11% ROC will remain constant (see Exhibit 4 for the calculation). †¢ The TS segment will be able to provide higher return; because of the expected A rating and the associated lower loan rates and higher leverage. The TS will have a higher price per share, closer to the industry, as a result of the reduced investment risk (surpassing the risk of higher leverage). Assuming that the company activities are transparent, the price per share could go even higher, as there will not be doubt that a profitable segment of the company will cover the unsatisfactory performance of another segment. Other recommendations We recommend that the company should disclose more information. The view that â€Å"All money is green† and investors do not know as much about the firm’s operations as the company, should be rejected. More transparency would narrow the gap between uninformed (or small) and informed (or large) investors, thereby lowering the cost of capital.