On the opposite spectrum from supplier bargaining power is the bargaining power of buyers. These buyers do not just represent the end user consumer who purchases a PC, laptop computer, or other computer accessory, but represent the buyers all along the entire supply chain from concept and research and development to manufacturing, customization, packaging, transportation, sales, and delivery and in some cases, after the sale customer service. Their overall buying power as a group is considered…
Neither Dale Carnegie nor the publishers, Simon and Schuster, anticipated more than this modest sale. To their amazement, the book became an overnight sensation, and edition after edition rolled off the presses to keep up with the increasing public demand. Now to Win Friends and InfEuence People took its place in publishing history as one of the all-time international best-sellers. It touched a nerve and filled a human need that was more than a faddish phenomenon of post-Depression days, as…
If you use part of your home as an office, you may be able to deduct depreciation on that part based on its business use. For information about depreciating your home office, see Publication 587. Inventory. You cannot depreciate inventory because it is not held for use in your business. Inventory is any property you hold primarily for sale to customers in the ordinary course of your business. If you are a rent-to-own dealer, you may be able to treat certain property held in your business as…
The book is so seamlessly written that it is not merely lifelike but also, in the best sense, novel like. It narrates a story in a skillful manner, with much attention to character. DeLillo makes us familiar with some peculiar habits of the characters. Like Everett cannot make himself go to bed at night without checking that the oven is off, and then sometimes double-checking, and reminding himself as he climbs the stairs that he has in fact completed his check. No doubt DeLillo has chosen such…
While ubiquitous Internet access is extremely convenient and enables marvelous new applications for mobile users, it also creates a major security vulnerability—by placing a passive receiver in the vicinity of the wireless transmitter, that receiver can obtain a copy of every packet that is transmitted! These packets can contain all kinds of sensitive information, including passwords, social security numbers, trade secrets, and private personal messages. A passive receiver that records a copy of…