In April 2019, Paul Marrapese, an independent security researcher from San Jose, California, has published research warning that peer-to-peer software developed by Shenzhen Yunni Technology firm, that's used in millions of IoT devices around the world, has a vulnerability that could allow an attacker to eavesdrop on conversations or press household items into service as nodes in a botnet.
The software, called iLnkP2P, is designed to enable a user to connect to IoT devices from anywhere by using a smartphone app. The iLnkP2P functionality is built into a range of products from companies that include HiChip, TENVIS, SV3C, VStarcam, Wanscam, NEO Coolcam, Sricam, Eye Sight, and HVCAM.
What Marrapese found is that as many as 2 million devices, and possibly more, using iLnkP2P software for P2P communication do not have authentication or encryption controls built-in, meaning that an attacker could directly connect to a device and bypass the firewall. Marrapese discovered the iLinkP2P flaw after buying an inexpensive IoTconnected camera on Amazon.
"I found that I was able to connect to it externally without any sort of port forwarding, which both intrigued and concerned me," Marrapese told Information Security Media Group. "I found that the camera used P2P to achieve this, and started digging into how it worked. From there, I quickly learned how ubiquitous and dangerous it was."
While the flaws with the iLnkP2P peer-to-peer software apparently have not yet been exploited in the wild, Marrapses believes it's better for consumers to know now before an attacker decides to start taking advantage of this particular vulnerability.
"There have been plenty of stories in the past about IP cameras and baby monitors being hacked, but I believe iLnkP2P is a brand new vector not currently being exploited in the wild," Marrapese says. "With that being said, the biggest motivation behind this disclosure is to inform consumers before it's too late - because I believe it's only a matter of time." As part of his research, Marrapese says he attempted to contact not only Shenzhen Yunni Technology but also several of the IoT manufacturers that use the company's P2P software. As of Monday, even after publishing results, he had not heard back from anyone.
Users of IoT devices that make use of the iLnkP2P software scan a barcode or copy a sixdigit number that is included in the product. From there, the owner can access the device from a smartphone app.
It's through these unique identifier numbers that Marrapese was able to discover that each device manufacturer used a specific alphabetic prefix to identify their particular product. For instance, HiChip uses "FFFF" as a prefix for the identification number for its devices. Once Marrapese was able to identify these devices through the unique number systems, he created several proof-of-concept attacks that took advantage of the flaws in the software.
a) In this case study, it is mentioned that vulnerable IoT devices can service as nodes in a botnet. Explain the working mechanism of a Botnet. Discuss any two attacks carried out by a botnet.
b) Report the importance of security in IoT devices. How does encryption help improve security for these devices?
c) Discuss the importance of lightweight cryptography in IoT enabled low-power devices. List the potential lightweight cryptographic algorithms for low-power IoT devices.
In: Computer Science
IM GETTING A ERROR MESSAGE :
if rentalCode == 'W' and averageMiles <= 900:
mileCharge = weeksRented * 100.00
else:
Collect Customer Data - Part 2
Prompt: "Starting Odometer Reading:\n"
Variable: odoStart = ?
Prompt: "Ending Odometer Reading:\n"
Variable: odoEnd = ?
Add code to PRINT odoStart and odoEnd variables as well as the totalMiles to check your work.
The following data will be used as input in the test:
odoStart = 1234 odoEnd = 2222
Collect Customer Data - Part 2 - Feedback Link
IF you would like some constructive feedback on your assignment before you submit for a grade, press the Help Me! button below.
Help Me!
Customer Data Check 2
In your rental_car.py file, add code to print out the two new
variables you have collected input for:
odoStart
odoEnd
totalMiles
import sys
'''
Section 1: Collect customer input
'''
#Add customer input 1 here, rentalCode = ?
rentalCode = input("(B)udget, (D)aily, or (W)eekly
rental?\n")
print (rentalCode)
#Collect Customer Data - Part 2
#4)Collect Mileage information:
#a) Prompt the user to input the starting odometer
reading and store it as the variable odoStart
#Prompt -->"Starting Odometer Reading:\n"
# odoStart = ?
odoStart = input('Starting Odometer Reading: ')
#b) Prompt the user to input the ending odometer
reading and store it as the variable odoEnd
#Prompt -->"Ending Odometer Reading:"
# odoEnd = ?
odoEnd = input('Ending Odometer Reading: ')
#c) Calculate total miles
totalMiles = int(odoEnd) - int(odoStart)
#Print odoStart, odoEnd and totalMiles
print (odoStart)
print (odoEnd)
print (totalMiles)
# Calculate Charges 2
## Calculate the mileage charge and store it
as
# the variable mileCharge:
#a) Code 'B' (budget) mileage charge: $0.25 for each
mile driven
if rentalCode == "B":
mileCharge = totalMiles * 0.25
#b) Code 'D' (daily) mileage charge: no charge if the
average
# number of miles driven per day is 100 miles or less;
# i) Calculate the averageDayMiles
(totalMiles/rentalPeriod)
elif rentalCode == "D":
averageDayMiles = totalMiles/rentalPeriod
if averageDayMiles <= 100:
extraMiles == 0
# ii) If averageDayMiles is above the 100 mile per
day
# limit:
# (1) calculate extraMiles (averageDayMiles -
100)
if totalMiles >= 100 and rentalCode == 'D':
# (2) mileCharge is the charge for extraMiles,
mileCharge = totalMiles * int(rentalPeriod) *0.25
#c) Code 'W' (weekly) mileage charge: no charge if
the
# average number of miles driven per week is
# 900 miles or less;
if rentalCode == 'W' and averageMiles <= 900:
mileCharge = weeksRented * 100.00
else:
mileCharge = 0
# i) Calculate the averageWeekMiles (totalMiles/
rentalPeriod)
# ii) mileCharge is $100.00 per week if the average
number of miles driven per week exceeds 900 miles
if rentalCode == 'W' and averageMiles >= 900:
mileCharge = weeksRented * 100.00
else:
print('Charges : ${}'.format(mileCharge))
In: Computer Science
Im in a java class and having trouble with assigning the seat to a specific number from the array.. Below are the instructions I was given and then the code that I have already.
ITSE 2321 – OBJECT-ORIENTED PROGRAMMING JAVA Program 8 – Arrays and ArrayList
A small airline has just purchased a computer for its new automated reservations system. You have been asked to develop the new system. You are to write an application to assign seats on flight of the airline’s only plane (capacity: 10 seats). Your application should display the following alternatives: "Please type 1 for First Class" and "Please type 2 for Economy." If the user types 1, your application should assign a seat in the first-class section (seats 1 – 5). If the user types 2, your application should assign a seat in the economy section (seats 6 – 10). Your application should then display a boarding pass indicating the person’s seat number and whether it’s in the first-class or economy section of the plane. Use a one-dimensional array of primitive type boolean to represent the seating chart of the plane. Initialize all the elements of the array to false to indicate that all the seats are empty. As each is assigned, set the corresponding element of the array to true to indicate that the seat is on longer available. Your application should never assign a seat that has already been assigned. When the economy section is full, your application should ask the person if it’s acceptable to be placed in the first-class section (and vice versa). If yes, make the appropriate seat assignment. If no, display the message "Next flight leaves in 3 hours." End the program when all the ten seats on the plane have been assigned.
No input, processing or output should happen in the main method. All work should be delegated to other non-static methods. Include the recommended minimum documentation for each method. See the program one template for more details.
Run your program, with your own data, and copy and paste the output to a file. Create a folder named, fullname_program8. Copy your source code and the output file to the folder. Zip the folder and upload it to Blackboard.
/*
* To change this license header, choose License Headers in Project
Properties.
* To change this template file, choose Tools | Templates
* and open the template in the editor.
*/
package airlineapp;
import java.util.Scanner;
/**
*
* @author user1
*/
public class AirlineApp {
int num;
int i;
int counter = 0;
int [] seatNum = new int[11];
public static void main(String[] args) {
AirlineApp application = new AirlineApp();
application.userInput();
application.seatChart();
//create the array
// TODO code application logic here
}
public void userInput(){
Scanner input = new Scanner(System.in);
System.out.print("Please type 1 for first class and press 2 for
economy: ");
//gets the input from the user and saves it as num to perform the
rest
//of the aplication
num = input.nextInt();
}
public void seatChart(){
for(int counter = 0; counter < seatNum.length; counter++){
if(num != 2 && counter < 6 )
counter = counter + 1;
}
}
}
In: Computer Science
This question need to be solved using java coading :-
I. Input
All input data are from a file "in.dat". The file contains a
sequence of infix form expressions, one per line. The character '$'
is an end mark. For example, the following file has four infix form
expressions:
1 + 2 * 3 ^ ! ( 4 == 5 ) $
3 * ( 6 - 4 * 5 + 1) + 2 ^ 2 ^ 3 $
77 > ( 2 - 1 ) + 80 / 4 $
! ( 2 + 3 * 4 >= 10 % 6 ) && 20 != 30 || 45 / 5 == 3 * 3 $
Each expression is a sequence of tokens (i.e., constant integers,
operators, and end mark) separated by spaces. There is no variable.
II. Output
Output data and related information are sent to the screen.
Your program should do the following for each expression:
(1) printing the expression before it is manipulated;
(2) showing the converted postfix form expression;
(3) showing the expression tree;
(4) printing the fully parenthesized infix form expression;
(5) reporting the value of the expression.
III. Operators
The following operators are considered. They are listed in the
decreasing order of precedence.
Token Operator Associativity
! logical not right-to-left
^ exponentiation right-to-left
* / % multiplicative left-to-right
+ - additive left-to-right
< <= > >= relational left-to-right
== != equality left-to-right
&& logical and left-to-right
|| logical or left-to-right
IV. Other Requirements
Since a large amount of information are to be displayed on the
screen, it is mandatory for your program to provide users a prompting
message such as
Press <Enter> to continue ...
after each expression is processed, so that users have the chance to
check the output of your program carefully.
V. Algorithm: Infix_to_postfix conversion
Input: An infix form expression E = t1 t2 t3 ... $,
which is a sequence of tokens.
Output: The postfix form expression of E.
Algorithm:
{
do {
get the next token t;
case (t) {
operand: place t onto the output;
break;
operator: while (stack s is not empty
&& stacktop(s) is not a left parenthesis)
&& precedence(stacktop(s)) >= precedence(t)
// assuming left-to-right associativity,
// not for the exponentiation operator ^,
// which has right-to-left associativity
{
pop(x,s);
place x onto the output;
}
push(t,s);
break;
(: push(t,s);
break;
): while (stacktop(s) is not a left parenthesis) {
pop(x,s);
place x onto the output;
}
pop(x,s);
break;
end mark: while (stack s is not empty) {
pop(x,s);
place x onto the output;
}
place the end mark onto the output;
break;
}
} while (t is not the end mark);
}
This below is "in.dat file"
12 * 23 <= ( ( ( 3456 ) ) + ( 6789 ) ) $
1
4 ^ 3 - ( 2 + 4 * 15 ) - ( 90 / 3 != 30 ) $ 2
! ( 222 < 111 ) + 2 * 3 ^ ( 29 - 3 * 9 ) > 18 && 1234
== 1234 $ 1
( 2 * ( 62 % 5 ) ) ^ ( ( 4 - 2 ) ) - 2 ^ 2 ^ 2 $ 0
( ( 9 / ( 5 - 2 ) + 2 ) * ( 2 ^ 2 * 2 ) - 79 ) || ! ( 65432 >
54321 ) $ 1
( ( 9999 >= 8888 ) + 2 ) * ( 4 / ( 999 - 997 ) ) - 2 ^ ( 5 - 3 )
$ 2
In: Computer Science
This question need to be solved using java coading :-
I. Input
All input data are from a file "in.dat". The file contains a
sequence of infix form expressions, one per line. The character '$'
is an end mark. For example, the following file has four infix form
expressions:
1 + 2 * 3 ^ ! ( 4 == 5 ) $
3 * ( 6 - 4 * 5 + 1) + 2 ^ 2 ^ 3 $
77 > ( 2 - 1 ) + 80 / 4 $
! ( 2 + 3 * 4 >= 10 % 6 ) && 20 != 30 || 45 / 5 == 3 * 3 $
Each expression is a sequence of tokens (i.e., constant integers,
operators, and end mark) separated by spaces. There is no variable.
II. Output
Output data and related information are sent to the screen.
Your program should do the following for each expression:
(1) printing the expression before it is manipulated;
(2) showing the converted postfix form expression;
(3) showing the expression tree;
(4) printing the fully parenthesized infix form expression;
(5) reporting the value of the expression.
III. Operators
The following operators are considered. They are listed in the
decreasing order of precedence.
Token Operator Associativity
! logical not right-to-left
^ exponentiation right-to-left
* / % multiplicative left-to-right
+ - additive left-to-right
< <= > >= relational left-to-right
== != equality left-to-right
&& logical and left-to-right
|| logical or left-to-right
IV. Other Requirements
Since a large amount of information are to be displayed on the
screen, it is mandatory for your program to provide users a prompting
message such as
Press <Enter> to continue ...
after each expression is processed, so that users have the chance to
check the output of your program carefully.
V. Algorithm: Infix_to_postfix conversion
Input: An infix form expression E = t1 t2 t3 ... $,
which is a sequence of tokens.
Output: The postfix form expression of E.
Algorithm:
{
do {
get the next token t;
case (t) {
operand: place t onto the output;
break;
operator: while (stack s is not empty
&& stacktop(s) is not a left parenthesis)
&& precedence(stacktop(s)) >= precedence(t)
// assuming left-to-right associativity,
// not for the exponentiation operator ^,
// which has right-to-left associativity
{
pop(x,s);
place x onto the output;
}
push(t,s);
break;
(: push(t,s);
break;
): while (stacktop(s) is not a left parenthesis) {
pop(x,s);
place x onto the output;
}
pop(x,s);
break;
end mark: while (stack s is not empty) {
pop(x,s);
place x onto the output;
}
place the end mark onto the output;
break;
}
} while (t is not the end mark);
}
This below is "in.dat file"
12 * 23 <= ( ( ( 3456 ) ) + ( 6789 ) ) $
1
4 ^ 3 - ( 2 + 4 * 15 ) - ( 90 / 3 != 30 ) $ 2
! ( 222 < 111 ) + 2 * 3 ^ ( 29 - 3 * 9 ) > 18 && 1234
== 1234 $ 1
( 2 * ( 62 % 5 ) ) ^ ( ( 4 - 2 ) ) - 2 ^ 2 ^ 2 $ 0
( ( 9 / ( 5 - 2 ) + 2 ) * ( 2 ^ 2 * 2 ) - 79 ) || ! ( 65432 >
54321 ) $ 1
( ( 9999 >= 8888 ) + 2 ) * ( 4 / ( 999 - 997 ) ) - 2 ^ ( 5 - 3 )
$ 2
In: Computer Science
Please code this in C
In this project, we shall simulate the operations of an ATM machine.
Suppose you’re in charge of this simulation and here is a scenario of what is required to do:
The customer will be assigned a random number for his/her balance.
First, the customer is prompted to enter his personal identification number pin (for this case study, we test only if this pin is formed by 4 digits! otherwise, a message like “Invalid PIN, try again . . .” will be displayed) and the user is re-prompted to enter the pin. The customer is given three chances to enter his pin. If he/she fails during the three trials you display a message like “Sorry you can’t continue, contact your bank for assistance!”
If the pin is correct (formed by 4 digits), then the system will ask the customer for the receipt ( 1 for YES and 2 for NO ) and a menu will be displayed containing five possible options to choose from: Fast Cash, Deposit, Withdraw, Balance and Get Card Back.
Here is the explanation of each of the 5 options:
Get Card Back: Display the message “Goodbye! “and exit the program.
Fast Cash: Let the customer choosing the amount of cash from a menu similar to the following:
Press:
1 --> $20.00 $40.00 <-- 2
3 --> $80.00 $100.00 <-- 4
Withdraw: Prompt the user for the amount of money he/she would like to withdraw and make the sure that he/she has enough money for that!
Deposit: Prompt the customer for the amount of deposit.
Balance: Just display the amount of money the customer has.
Don’t forget to print the receipt if the customer wants one.
Sample execution: bolded text represents the user entry
Virtual Bank at West
WELCOME
Enter Pin: 245
Invalid PIN, Re-enter Pin: 5487
(clear screen )
Receipt y or Y -> Yes No <- n or N
Enter choice: N
(Clear screen)
CHOOSE FROM THE FOLLOWING
1 -> Fast Cash Withdraw <- 2
3 -> Deposit Check Balance <- 4
5 -> Get Card Back
Enter your choice: 4
(Clear screen)
Your Balance is : $124.3
1 -> Another Transaction Get Card Back <- 2
Enter your choice: 1
(Clear screen)
CHOOSE FROM THE FOLLOWING
1 -> Fast Cash Withdraw <- 2
3 -> Deposit Check Balance <- 4
5 -> Get Card Back
Enter your choice: 2
(Clear screen )
Enter amount (enter 0 to cancel): 300.00
Sorry not enough balance
Enter amount (enter 0 to cancel): 30.00
Take your cash…
(Clear screen)
Your Balance is: $124.32
1 -> Another Transaction Get Card Back <- 2
Enter your choice: 1
(Clear screen)
CHOOSE FROM THE FOLLOWING
1 -> Fast Cash Withdraw <- 2
3 -> Deposit Check Balance <- 4
5 -> Get Card Back
Enter your choice: 8
Invalid Entry
(Clear screen)
CHOOSE FROM THE FOLLOWING
1 -> Fast Cash Withdraw <- 2
3 -> Deposit Check Balance <- 4
5 -> Get Card Back
Enter your choice: 5
(Clear screen)
THANK FOR USING OUR VIRTUAL BANK SYSTEM
GOODBYE. . .
In: Computer Science
R PROGRAMMING QUESTION
- Below I have code. For each double hashtag (##) can you comment on the code below it (Describe what is happening in the code below it next to each ##)
- Run the code and compare the confidence intervals
- I have to submit the confidence intervals, comments, and the code with the ## filled out
Leaps.then.press.plot.2<-function(xmat0,yvec,xpred,ncheck=20)
{
#
#input quadratic matrix with less than 30 columns eg. the result of x.auto2a<-matrix.2ndorder.make(xmat[,-7],F)
#also, no need for plotting, just pull out best, xpred is one of the row vectors from x.auto2a, but all terms with weight are divided by 2
#
##
leaps.str<-leaps(xmat,yvec)
##
z1<-leaps.str$Cp-leaps.str$size
##
o1<-order(z1)
matwhich<-(leaps.str$which[o1,])[1:ncheck,]
MPSEvec<-NULL
##
for(i in 1:ncheck){
ls.str0<-regpluspress(xmat[,matwhich[i,]],yvec)
##
parvec<-matwhich[i,]
npar<-sum(parvec)
## (WHY npar+1)
MPSE<-ls.str0$press/(length(yvec)-(npar+1))
MPSEvec<-c(MPSEvec,MPSE)
}
##
I1<-(MPSEvec==min(MPSEvec))
##
i<-c(1:ncheck)[I1]
##
xmat.out<-xmat[,matwhich[i,]]
##
xpred.out<-xpred[matwhich[i,]]
##
list(xmatout=xmat.out,yvec=yvec,xpredout=xpred.out)
}
Bootreg<-function(xmat,yvec,xpred,nboot=10000,alpha=0.05)
{
##
lstr0<-leaps.then.press.plot2(xmat,yvec,xpred)
xmat0<-lstr0$xmat.out
yvec0<-lstr0$yvec
xpred0<-lsstr0$xpredout
##
rprd.list<-regpred(xpred0,xmat0,yvec0)
ypred0<-rprd.list$pred
sdpred0<-rprd.list$sd
df<-rprd.list$df
##
bootvec<-NULL
nobs<-length(yvec0)
for(i in 1:nboot){
##
vboot<-sample(c(1:nobs),replace=T)
xmatb<-xmat0[vboot,]
yvecb<-yvec0[vboot]
##
lstrb<-leaps.then.press.plot2(xmatb,yvecb,xpred)
##
xmatb0<-lstrb$xmat.out
yvecb0<-lstrb$yvec
xpredb0<-lsstrb$xpredout
##
rprd.list<-regpred(xpred0,xmat0,yvec0)
ypredb<-rprd.list$pred
sdpredb<-rprd.list$sd
dfb<-rprd.list$df
##
bootvec<-c(bootvec,(ypredb-ypred0)/sdpredb)
}
##
lq<-quantile(bootvec,alpha/2)
uq<-quantile(bootvec,1-alpha/2)
##
LB<-ypred0-(sdpred0)*uq
UB<-ypred0-(sdpred0)*lq
##
NLB<-ypred0-(sdpred0)*qt(1-alpha/2,df0)
NUB<-ypred0+(sdpred0)*qt(1-alpha/2,df0)
list(bootstrap.confidence.interval=c(LB,UB),normal.confidence.interval=c(NLB,NUB))
}
> regpred<-
function(xpred,xmat,y){
##
ls.str<-lsfit(xmat,y)
#calculate prediction
ypred<-ls.str$coef%*%c(1,xpred)
#use ls.diag to extract covariance matrix
ycov<-ls.diag(ls.str)$cov.unscaled
#use ls.diag to extract std deviation
std.dev<-ls.diag(ls.str)$std.dev
#variance of data around line
v1<-std.dev^2
#variance of prediction
vpred<-v1*c(1,xpred)%*%ycov%*%c(1,xpred)
df=length(y)-length(diag(ycov))
list(pred=ypred,sd=sqrt(vpred),df=df)
}
In: Computer Science
|
Using the general principles of ordinary income, is income proceeds from selling the copyright to a book where the recipient was an employee accountant who wrote a novel in her spare time over a number of years, considered "ordinary" income in the hands of the receipient? |
|||||||||
|
|||||||||
|
The Big Bang Company was set up by Ed, an Australian resident. It is incorporated in Singapore and has two directors who are resident in Singapore and who hold board meetings in Singapore. Each director has two shares in the Big Bang Company, which they hold on trust for Ed. The Big Bang Company owns real property, all of which is outside Australia, and makes its profits from commercial property leases on a large scale. Ed does not attend the board meetings in Singapore; however, the constitution of the Big Bang Company provides that the decisions of the directors are only effective if Ed concurs with them. The directors carry on all operational activities, such as collecting rent, paying commission, finding tenants, making minor repairs and maintaining the buildings. Is there any possible scenario in which the Big Bang Company could be considered a resident of Australia for tax purposes? |
|||||||||
|
|||||||||
|
Ajay is a student from India who comes to Australia to study for a four-year bachelor degree in business. Ajay lives in rental accommodation near the university with fellow students and works part-time at the university social club as a barman. After six months, he has to withdraw from his studies and return to India because his father is ill. Is Ajay considered a resident of Australia? |
|||||||||
|
|||||||||
|
Fred, an executive of a British corporation specialising in management consultancy, comes to Australia to set up a branch of his company. Although the length of his stay is not certain, he leases a residence in Melbourne for 12 months. His wife accompanies him on the trip but his teenage sons, having just commenced college, stay in London. Fred rents out the family home. Apart from the absence of his children, Fred’s daily behaviour is relatively similar to his behaviour before entering Australia. As well as the rent on the UK property, Fred earns interest from investments he has in France. Because of ill health Fred returns to the UK 11 months after arriving in Australia. Would Fred be an Australian resident for tax purposes? |
|||||||||
|
|||||||||
In: Accounting
Former CEO Ron Johnson designed and tried to implement a new strategy for JCPenney (JCP). However, the firm’s tar- get “middle market” customers did not respond well to the new strategy and the innovations associated with it. In fact, some say that Johnson’s innovations and strategy alienated what had historically been the firm’s target customers.
Johnson came to JCP after successful stints at Target and Apple. At Apple, he was admired for the major role he played in developing that firm’s wildly successful Apple Stores, which a number of analysts say brought about “a new world order in retailing.” It was Johnson’s ability to establish what some viewed as path-breaking visions and to develop innovations to reach them that appealed to JCP’s board when he was hired.
Comparing JCP to the Titanic, Johnson came to the CEO position believing that innovation was the key to shaking up the firm. Moreover, he reminded analysts, employees, and others that he came to JCP to “transform” the firm, not to marginally improve its performance. Describing what he intended to do at JCP, Johnson said that “in the U.S., the department store has a chance to regain its status as the leader in style, the leader in excitement. It will be a period of true innovation for this company.”
The essence of Johnson’s vision for JCP was twofold. First, he eliminated the firm’s practice of marking up prices on goods and then offering discounts, heavy pro- motions, and coupons to entice its bargain-hunting tar- get customers. Instead, Johnson introduced a three-tiered pricing structure that focused on what were labelled “everyday low prices.” To customers though, the pricing structure was confusing and failed to convince them that the “everyday low prices” were actually “low enough” compared to competitors’ prices.
Innovation was at the core of the second part of the new CEO’s vision, with one objective being to give JCP a more youthful image. The innovations Johnson implemented to create this image included establishing branded boutiques within JCP stores. To do this, JCP set up branded boutiques “along a wide aisle, or ‘street’ dotted with places to sit, grab a cup of coffee, or play with Lego blocks.” With an initial intention of having 100 branded shops within JCP stores by 2015, Johnson asked people “to envision an entire store of shops with a street and square in the middle representing a new way to interface with the customer.” Disney was one of the brands to be included as a shopping destination, as were Caribou Coffee, Dallas- based Paciugo Gelato & Cafe?, and Giggle, a store dedicated to making “it a whole lot easier to become a parent” by offering innovative and stylish “must-have baby items.” In addition, and as noted in Chapter 4’s Opening Case, Levi’s, IZOD, Liz Claiborne, and Martha Stewart branded items were to be included as part of the boutiques.
But, these innovations and the strategy used to exploit them did not work. So what went wrong? Considering the components of the model shown in Figure 13.2 yields a framework to answer this question. While it is true that Johnson had an entrepreneurial mind-set, cross-functional teams were not used to facilitate implementation of the desired innovations such as the boutique stores. In essence, it seems that Johnson himself, with- out the involvement of others throughout the firm, was instrumental in deciding that the boutiques were to be used as well as how they were to be established and operated within selected JCP stores. In addition, the values associated with efforts to change JCP from its historic roots of being a general merchant in the space between department stores and discounters to becoming a firm with a young, hip image were not shared among the firm’s stakeholders. Finally, Johnson’s work as an entrepreneurial leader was, seemingly, not as effective as should have been the case. Because of mistakes such as these, the level of success desired at JCP through internally developed innovations was not attained.
1. The new CEO tried to be innovative. Were the innovations introduced, more incremental or more novel? Please explain.
2. What are the reasons that the innovations implemented by the new CEO failed?
3. What recommendations do you have for turning around the performance of JCP?
In: Operations Management
Vinnie is a professional road cyclist participating in the 2020 Giro d’Italia, a three-week race nearly 3,600 km in distance with some stages exceeding altitudes of 2,700 m above sea level (i.e., Stelvio Pass, Italy). As the newly hired head of the high-performance team, it is your responsibility to manage his preparation for the event. You must demonstrate to your team a fundamental understanding of physiology, the chronic adaptations expected from his training, and methods that could be implemented to improve the likelihood of success.
1)Your first job was to schedule a VO2max test for Vinnie to examine his aerobic fitness. After repeating the assessment several weeks later after an intensive training block, you notice that VO2max has dropped, but there has been an increase in VT2. Please discuss why VO2max decreased and what impact both changes will have on performance?
2)Out of interest, you decide to measure Vinnie’s gross mechanical efficiency during cycling (i.e., the ratio of work accomplished to energy expended). You determine that he is 21.9% efficient. Please explain what efficiency is a measure of, where does this value sit within normal efficiency data and why you are unlikely to see values much higher (e.g., 50%)?
3)Within the alveoli, the partial pressure of O2 is reduced from that measured in the outside air (160 mmHg) to approximately 105 mmHg.
What values do you expect to observe in PO2 and PAO2 when Vinnie is cycling at the peak of Stelvio Pass (barometric pressure = 543 mmHg)?
What impact would the change in PAO2 have on Vinnie’s performance?
4)
The longest leg of the race is 228 km, during which energy intake is critical. Glycolysis and β-oxidation are processes that break down carbohydrates (i.e., glucose, sucrose, fructose) and fatty acids, respectively.
Based on what you know about the yield and speed of these two pathways, do you recommend Vinnie ingest glucose or fatty acids during the race? (Hint, remember the cross-over concept)
5)
You recommend that Vinnie performs altitude training as part of his preparation for the race, a training approach that is novel to him.
6)
During a casual chat with a sport scientist from another team, they suggest preparing “finish bottles” for the longer legs of the race. Along with a dose of painkillers, a “finish bottle” typically contains an ergogenic dose of caffeine (i.e., approximately 3 to 5 mg·kg-1 of bodyweight).
Additionally, caffeine has a mild effect at mobilising free fatty acids. Please describe what is meant by mobilisation, and how this may influence performance
7)
Given that the average distance of each leg is 170.5 km in distance, and sometimes undulating in elevation, you understand that fatigue is inevitable. The energy depletion model of fatigue focuses around the concept that depleted substrates are just one source of fatigue, particularly observed in muscle glycogen and phosphocreatine stores.
8)
As the event is soon approaching, parts of Hungary are experiencing a heatwave. Indeed, temperatures may exceed 32° Celsius during the first leg of the race leaving Budapest.
In terms of thermoregulation, what physiological changes are likely to occur during this leg of the race?
In: Anatomy and Physiology