Saturday, December 28, 2019

The Struggle of the Educational System Essay - 1151 Words

The Struggle of the Educational System It seems as if the American government has struggled to evaluate the current educational system in order to determine if significant social issues, including increasing regional poverty, and declining literacy rates in specific urban regions are related to economic differentiations in the education system. There needs to be more emphasis placed on determining a system that provides greater equity between disadvantaged inner-city schools and wealthier suburban, middle class schools. The gap between the nation’s best and worst public schools continues to grow. Our country is based on freedom and equality for all, yet in practice and in the spectrum of education this is rarely the case. Many obvious†¦show more content†¦This guarantees that every child receives an education, but it is not an equal education† (Kozol, 238). State officials determine the sufficient funds, but due to the dynamics of politics they are shaped by what the richer districts determine to be enough. So, in turn, what they are doing is placing the education of the inner-city students in the hands of the supporters of the suburban schools. If the officials are to allocate more money to the poorer districts, then they will be the ones that are affected by additional tax levies on their higher incomes and property values. â€Å"What is at stake is the future of a heterogeneous America, a place where there is equal opportunity for everyone, not just for those who can afford to pay for a good education and the chance to have a more prosperous life† (Kozol 237). It seems as if â€Å"Those who do not want their children to be handicapped by the learning problems of others who have suffered generations of oppression, ignorance, and neglect simply abandon the city schools that these students were being integrated into and fled to richer suburban schools† (Kozol 238). Today, Blacks, Hispanics, and poorer children dominate 23 of the nations 25 largest urban school sy stems. This has raised a permanent fissure in our public schools and has separated them into two separate and unequal classShow MoreRelatedHow Bilingualism Has Impacted The United States Modern Education System1114 Words   |  5 Pageshas impacted the United States’ modern education system. He describes an amendment that would constitute English as the official in the United States, which he believes can be a potential threat to the educational system. Gonzalez suggests that instead of having an amendment that constitutes English as the national language, American schools should implement Spanish to highlight the importance of being bilingualism in the American educational system. A constitutional amendment declaring English asRead MoreThe Achievement Gap Between Minority And Nonminority Children974 Words   |  4 Pagesthere are always those students who exceed, but there are also individuals who struggle significantly. However, minority students tend to struggle more t han nonminority students. According to an article called â€Å"Addressing the Achievement Gap Between Minority and Nonminority Children by Increasing Access to Gifted Programs,† by Paula Olszewski-Kubilius, Seon-young Lee, and Mephie Ngoi, â€Å"The most significant educational problem in the U.S. is the fact that the achievement of minority children lagsRead Moredoc700 r1 research resources scavenger hunt For Chris Laitinen WK1885 Words   |  4 Pages 1. Name the nine University of Phoenix Research Centers. A. Center for Global Business Research B. Center for Management and Entrepreneurship C. Center for Workplace Diversity Research D. Center for Educational and Instructional Technology Research E. Center for Leadership Studies and Educational Research F. Center for Professional Responsibility in Education G. Center for Behavioral Health and Research H. Center for Health Engineering Research I. Center for Healthcare Research 2. True or FalseRead MoreThe Inner City Of Los Angeles805 Words   |  4 Pagestime went on I witnessed my classmates and I take completely different paths. The strong support system I had at home proved effective. As I went on to go to college, many of my peers dropped out, the dismal state of our public school system had clearly failed them. During my undergraduate studies, the stories of my old classmates did not leave my mind. I remained deeply intrigued with the struggles of inner city people of color and the mobility they are granted. I began to volunteer at ArtStartRead MoreAchieving A Successful Teenage Mothers1229 Words   |  5 Pagesdegree. Thus, adolescent mothers would pursue their educational attainment for themselves, their children, and for their supportive systems (Moore, 2014). Ravenell (2012) conducted a study where sixty-three percent of teenage mothers had a diploma, nineteen percent had received a GED, and another nineteen percent had not finished high school. Mothers who had gotten a GED or a high school diploma declared that it was due to their support systems from both their parents and teachers. Overall, supportRead MoreHow Education Can Be Run And Who Should Benefit From It?873 Words   |  4 Pagesbelong to the Eastern and Western cultures share similar views of education being the key to success, yet both cultures have their own views on how to get to that point of success. The refore, most cultures have very different views on how an education system should be run and who should benefit from it. Comparing four popular world cultures, there are significant differences in the role education plays between each. This paper will explore not only the differences in the role education plays amongstRead MoreInvestigating What Macro-sociological Approaches and Micro-sociological Approaches Tells Us About Student Under-achievement in School850 Words   |  4 PagesInvestigating What Macro-sociological Approaches and Micro-sociological Approaches Tells Us About Student Under-achievement in School Macro-sociology approaches offer explanations for social phenomena in terms of the way in which social systems work as a whole. Micro-sociology gives explanations in terms of how people make things happen by interpreting their experience and acting on their interpretations. Macro-sociology divides into consensus and conflict approaches. The Read More Gender Segregation in Education Essay1159 Words   |  5 Pagessegregation in education is spoken, but how often do we think of women? Women have gone through tremendous struggles to receive the same rights as men to an equal education. The following pages will explain many aspects of the history of the women’s struggles for desegregation, accomplishes made for desegregation, and the affects of sex or gender segregation still present in today’s educational system. In the early colonial times, women’s roles were very defined. Men and society expected women to haveRead MoreThe Foster Care System Is A Growing Problem With The Problem Of Trauma And Educational Needs1535 Words   |  7 Pagesin foster care and increased from 2012. The foster care system is a growing problem with the problem of trauma and educational needs. In three journal articles that are discussed, the problems are taken into studies to try and improve the foster care system. In the journal article, â€Å"Caregivers, School Liaisons, and Agency Advocates Speak Out about the Educational Needs of Children and Youths in Foster Care†, they discussed the educational need of children in foster care. 40% of children enteringRead MoreEducation Vs Horace Mann1401 Words   |  6 PagesThrough learning, skills that have been passed down from the errors of others, communities were able to learn and grow with each other. Simple public education systems began to pop up to educate the youth and the curious, and ever since the first school systems began there has been room for improvement. The largest reforms of the educational system began at the beginning of the Industrial Revolution. Primarily, both Geoffrey Canada and Horace Mann share similar views on school tuition, and believe

Friday, December 20, 2019

The Working Poor - 1071 Words

The working poor are those people that work the hardest for their dollar, work the hardest to get their paychecks, work the hardest to survive. Most of the working poor live paycheck to paycheck and like the saying goes, â€Å"robbing from Peter to pay Paul.† There is a way out of poverty, and there is a way for these struggling individuals to escape the perils of their life in poverty. It is not an easy road out, but it is possible. It is important for those that are born into this lifestyle to know that this is not a destination; there is hope that they will live a so called â€Å"better† life. Who are the Working Poor? Before we describe who the working poor are, let’s describe what poverty is. â€Å"There are two general methods of defining†¦show more content†¦Gabourey Sidibe and Jennifer Hudson are a few stars that are heard about as going from nothing to everything. You do not have to be a star to be able to escape from poverty though. There are many programs that are available to individuals to assist them in finding employment and assistance to get out of poverty. The programs that are available are reliant on the presidents and law makers that are lobbied. â€Å"The Bush administration had been wildly criticized for not being responsive to the needs of the poorest Americans,† (Burger, 2008, p. 20). At times an individual just needs help in getting shown the right direction. â€Å"Isolated in the projects, many like Camellia lack the encouragement and connections to find decent work until a helping hand gives a push or opens a door,† (S hipler, 2004, p. 123). To be able to break out of poverty an individual must not be afraid to leave. Personal reaction conclusion Poverty is not something that effects just a certain population; it is non-discriminative. The working poor are the heart of America. They are people that we see every day. For those that are living this way, it is important to know that there is a way out. In Shipler (2004) book The Working Poor, he states, â€Å"George W. Bush gave voice to the myth when he was asked whether he meant to send a message with the inclusion of two blacks, a Hispanic, and two women in the first seniorShow MoreRelatedWorking Poor Essay3209 Words   |  13 PagesThe Struggle of the Working Poor Revised Essay Sociology 113 Yvonne Barney October 19, 2012 The Struggle of the Working Poor Society often describes the impoverished with one word, lazy. Society has taught us that if a person wants to be financially successful, it is a simple process of education and hard work that will equate to a successful income. This is the American dream. If the impoverished simply would get a job instead of being lazy, they would not need to rely on programs likeRead MoreWorking Poor : The Work Poor1051 Words   |  5 PagesElizabeth McCumber April 24, 2015 Working poor paper Throughout both in-class discussions, and David Shipler’s â€Å"The Working Poor: Invisible in America† we learned being poor in America is anything but easy. Even with all of our government assistance programs such as Medicaid and Welfare, many family generation after generation seem to fall below the poverty line and create a life of struggle and long way out for their families. When Shipler is explaining different families and their lac of selfRead MoreWorking Poor : The Work Poor Essay1277 Words   |  6 PagesWorking Poor The Working Poor: Invisible in America is a story that takes personal stories and accounts of people lives to describe the injustices that people face every day. Poverty is damaging to both the economy and the people who face it. Many times social policies are created to assist the people who are working but still struggle to get basic needs like food, utilities, gas, and medical. Poverty is a perpetuating cycle that is intended to keep the poor oppressed and discriminated againstRead MorePoverty Is A National Epidemic That Plagues Americans Across The Country Essay1531 Words   |  7 Pagesof our humanity. Poverty is a generational cycle that is inherited and becomes the anchor to all future success. It is often said that poverty is the effect of a lazy, uneducated nation, in reality, the poverty level family has at least one adult working at least 40 hours a week at a painstakingly back breaking job that the elite American would quiver at the thought of performing. The effect o f Poverty is caused by lack of opportunities, greed, and generational circumstances One of the mainRead MoreWhat Is It Like Living In A Home With Low Income? Poverty1006 Words   |  5 Pages academic performance, and health conditions. Children who live in poverty have impaired social development throughout their entire life. They tend to be more aggressive because of the surroundings they are in. Parents often spend their energy working,the children do not get shown a lot of affection. This could lead to the child fighting and being disrespectful because they want any attention from their parents that they can. This aggressive behavior can lead to fighting in school and other publicRead MoreNickel And Dimed : On ( Not ) Getting1175 Words   |  5 Pagesback or avoided at all costs. We see this when Ehrenreich describes her co-worker, â€Å"Holly†, who continues to work despite being ill, and possibly pregnant. This is also apparent when Ehrenreich states, â€Å"There are no secret economics that nourish the poor; on the contrary, there are a host of special costs. If you can’t put up the two months’ rent you need to secure an apartment, you end up paying through the nose for a room by the week. If you have only a room, with a hot plate at best, you can’t saveRead More The Working Poor Essay769 Words   |  4 PagesBecause of this, many Americans are working full time jobs that are below the Federal poverty line. These types of people are often called the â€Å"working poor†. Due to this the working poor have to run to welfare. This affects all Americans because taxpayers are the ones paying for welfare. The more jobs that are taken overseas, the more poverty we will have. nbsp;nbsp;nbsp;nbsp;nbsp;It is now said that the middle-class Americans are now becoming the poor in America. According to William H. JasperRead MoreWho are the Working Poor1280 Words   |  6 Pagesabout it in our book, researching online, and grabbing a personal text, I was highly intrigued with the components that make up â€Å"the working poor,† it’s actual definition, and so much more. Before getting into the statistics, a simple definition of â€Å"the working poor† is that it is a group of people who spend about twenty-seven weeks or more in a year either working or looking for work, but their incomes fall below the level of poverty (USDAVIS, 2013). With this definition, it is understandable asRead MoreWal Mart And Its Effect On Society1517 Words   |  7 Pagesadopted subjective vision, either because they care not to look further than the inexpensiveness of their product or the owner are blinded by their profits. Wal-Mart takes advantage of a system by exploiting cheap labor and poor working conditions. The same company that advises these poor standards receive large quantities of subsidies from The American Government. Some people would claim that this is strictly business, and they are just playing the hand they have been built in a corrupt system. HoweverRead More Working and Poor Essay1089 Words   |  5 Pages It’s difficult to imagine ho w some people hold multiple jobs to support their family and still live below the poverty line. The saying â€Å"the rich gets richer and the poor get poorer† has never been so evident in today’s society. With a growing percentage of people living below the poverty line, one has to question the government policies enacted to elevate the living standings for its people. Government policies great influence the everyday life of its people. It is difficult to enact common ground

Thursday, December 12, 2019

Discusses About Shadow Broker Organization â€Myassignmenthelp.Com

Question: Discusses About Shadow Broker Organization? Answer: Introduction: A group of mysterious hackers is seen to be involved with the dealing of malware and hacking tools that is an associated tool used by the National Security Agency (NSA) of America. This topic of secrecy and controversy regarding the tools that are involved with the National Security Agency (NSA), are exposed by the mysterious group involved in crime known as the Shadow Brokers. This report discusses about the nature of the problems that was caused by this group, the reason for its occurrence and the mitigation of such attacks in the future. Discussion: The Shadow Brokers are a group of hackers whose existence came in light in 2016, summer. These groups of hackers were involved in exploiting the resources obtained from information leaks associated with the National Security Agency (NSA). The exploited resources were used to target the firewalls of business enterprises, anti-viruses and products related to the Microsoft Corporation (Martin, Kinross Hankin, 2017). The Shadow Brokers are mainly informed with the main hack, which is termed as the Equation Group that is associated with operations of National Security Agency (NSA). Identification of the problem: In August of 2016, the group of hackers claimed to have stolen a cyber weapon from another hacking team, which was termed as the Equation Group. The cyber weapon was used by the National Security Agency (NSA). The cyber weapon involved provided the group access to the secretive files contained in the NSA. The group also led to hacking and exploiting secret information from software accounting to 1 gigabyte of information over a period of 8 months. This information was connected to the NSA (Sanger, 2016). The group also tried to sell the source code of particular information from NSA by using the online methods of auction. The auction was supposed to be transacted via the use of crypto currencies. However, the auction was an unsuccessful one. On April 2017 the most recent activity of the group of hackers, include a data dump. The dump of data accounted to 300 megabytes of data. The data associated made published reports of threats and vulnerabilities of the products of Microsoft. The Shadow brokers also claimed to publish hacked tools and resources from the CIA that was originally made to spy on the monetary transactions of people (Shane, Mazzetti Rosenberg, 2017). This led the group claim associated vulnerabilities in the Windows version of the Microsoft installed in the Swift bank. As, the software is used by multiple banks, the exploitation posed a grave threat to the banks all over the world. Reason of occurrence: The main reason for occurrence of these hacks is the presence of bugs and malware in a system. The government agencies are responsible to conduct spying and espionage operations on particular targets by getting close to their system. The method used by them is acquisition of vulnerabilities in its system due to presence of bugs in the system. Rather than informing the manufacturers about the presence of such malfunctions, they exploit them to get access to the system to conduct their operations (van Der Walt, 2017). This system led to the hacking of such amount from the government agencies. This led to the raising of questions about the security of the agencies involved. This issue was further debated by the presence of FBI to give light on the discussion about the requirements of law enforcement in agencies. The codes that were made public by the Shadow brokers were made to be readable even by the low programmable experts to facilitate its uses in all devices. Even its use would not require great programming experts to run and implement them (Audiot, 2016). The code was supposed to be a bit old but they included many powerful tools to facilitate the process of hacking. The first documents that were released included system vulnerabilities in Cisco and other developers. The documents that were released recently by the Shadow Brokers showed the spying operations of NSA on a Middle Eastern bank transfer network termed as SWIFT. The hack revealed the operation of the NSA who was trying to get access to targeted clients of the bank transfer network (Boylan, 2015). This led to hindrance in the operation of the NSA as rising of suspicions of the bank were prominent. As far the authenticity of the stolen documents goes, Edward Snowden of NSA reported the genuineness of the stolen resources as the malware was full of virtual prints of the NSA. The malware also included a 16-digit identification code for the NSA (Broadhurst et al., 2017). According to Kaspersky, similarities in documents may lead to authenticity of the found sources. In addition, the Risk Based Security confirmed the exploitation of resources from NSA but no breaches were made in the system of the NSA. Solutions: There are various speculations regarding the problem that occurred due to the Shadow brokers. Moreover, the organization involved is already applying solution-based protocols to minimize the further risks that can arise. However, it was seen that Microsoft started working on their patch to address the vulnerability many weeks before the posting of the message from Shadow Brokers. The reason might be NSA disclosing about the information of exploited resources. Though a system patch requires weeks before making it public the reason of applied solution can be disclosure of information from the NSA (Planqu, 2016). The theory discussed is not evident as both parties are not claiming about the disclosure of information, but it might be the reason for applying patches to the system to help in mitigating the risks. The Vulnerabilities Equity process was created under the influence of Obama and now is continued by Trump (Caulfield, Ioannidis Pym, 2017). It was made to minimize the security vulnerabilities and threats to the agencies of the government that could lead to various large-scale problems. The ransomware attack, which took place in May 2017, was a massive cyber attack that affected users from all over the world. The computers who had the Microsoft Operating system installed were targeted by the ransomware. The main characteristics of the ransomware are that after infecting a computer, some files were encrypted and required payments in bitcoin to decrypt them. This report discusses about the specifications of the ransomware attack that took place all over the world. The report also includes the process of attack and the prevention of the attack. A cyber attack involving the ransomware had been originated due to the theft in cyber weapons (Brewer, 2016). The researchers of security in the Kaspersky Lab recorded more than 45,000 attacks in users belonging to 99 countries, which included UK, India, Russia, Italy, China and Egypt. However, the attack involved was not meant to target large-scale businesses but were meant to attack random users. Description of the problem: The WannaCry ransomware attack was an attack in a worldwide level that took place in May 2017, was a massive cyber attack that affected users from all over the world. The computers who had the Microsoft Operating system (OS) installed were targeted by the WannaCry ransomware (Kharraz et al., 2015). The main characteristics of the ransomware are that after infecting a computer, some files were encrypted and required payments in bitcoin to decrypt them. The main users who were risked due to the attack were the users with older versions of the OS like the Windows XP and the Windows Server 2003. Although, after the attack Microsoft made security patches to address the vulnerabilities in the system, the patches were made for the newer versions like the Windows 7 and 8. Due to this, Microsoft made an emergency patch for the older versions too. After many days of the ransomware attack, almost all of the infected users applied their updates in the system, which slowed down the infectious problems (Pathak Nanded, 2016). In addition, detailed technical reports were analyzed and made by several companies including Microsoft, Cisco and McAfee. Impact of the problem: The researchers of security in the Kaspersky Lab recorded more than 45,000 attacks in users belonging to 99 countries, which included UK, India, Russia, Italy, China and Egypt. In addition, the most affected countries among them were the Ukraine, Taiwan, India and Russia. The WannaCry ransomware attack also caused diverse impact on the National Health Service hospitals in Scotland and England, which also included 70,000 devices like the computers, scanners, and other equipments in the health care services (Chinthapalli, 2017). In addition, the ransomware also had its impact on the motor services including the Nissan and the Renault. Nissan stopped their production in order to stop the spreading of the ransomware. Renault also followed the same strategy to stop the spreading of the ransomware by halting their production across several sites. The impact of the attack is said to be low due to the fast analysis of the code of the ransomware, which had vulnerability in its code (Boatman, 2015). The presence of a technical kill switch made spreading of the attack stop. The loss in infrastructure could lead up to several millions. Carrying out of the attack: The WannaCry ransomware attack was carried out using several sets of software made for hacking. The External Blue is one such program. The software exploits a specific vulnerability that is present in the OS of Windows (Kharraz et al., 2016). This vulnerability can lead to breach in the system even under strong protocols. For mitigating such risks in the system, Microsoft released a patch to fight the vulnerability and risk due to the presence of such threat. The execution of the ransomware attack is divided into three different processes. These include the spreading of the vulnerability, encrypting of the file, displaying of ransom information and decrypting the encrypted file. The main sample program is the main program responsible for spreading the attack and releasing the WannaCry ransomware (Tuttle, 2016). This results in encryption of a file. The sample program includes an RSA public key and its corresponding private key is present with the attacker. Before applying encryption, a new sub-public and sub-private key is generated. The sub-public key is used to encrypt the user file and the sub-private key is used to do the same. Decrypting is usually done after payment is confirmed in the bitcoin network as the ransomware demands for payment in bitcoin. Prevention: Although, many risk mitigation processes where undertaken after the attack has been taken. Several companies like the Microsoft made security patches to fight the ransomware attack, which significantly slowed the spreading of the infected ransomware (Choi, Scott LeClair, 2016). However, the presence of security protocols where to be taken before hand so that the problem in infection could have been minimized and the large-scale problem could have been minimized. Various procedures could slow the process of ransomware attack in a device. Network segmentation is one such process where the infrastructure is divided among the connected and the unconnected one, which will facilitate the segmentation of the infrastructure to avoid the vulnerable areas to be hit directly (Mansfield-Devine, 2016). In addition, the Enhanced Mitigation Experience Toolkit of the Microsoft helps to provide additional security to the system that is specifically made to fight the ransomware attacks. The presence of other upgraded securities in the connected device is another mitigation process, which involves detection of malicious attacks to the system. Conclusion: Thus, it can be concluded form the report that the ransomware attack caused a widespread attack in the user data as well as in the economy of the world. The presence of enhanced security protocol is thus needed to secure the system and protect the data and information that is present. References: Audiot, N. (2016). Playing defence against the Equation Group. Boatman, K. (2015). Beware the Rise of Ransomware. Boylan, R. J. (2015) The shadow government: its identification and analysis.'.New Dawn, (42), 21. Brewer, R. (2016). Ransomware attacks: detection, prevention and cure.Network Security,2016(9), 5-9. Broadhurst, R., Woodford-Smith, H., Maxim, D., Sabol, B., Orlando, S., Chapman-Schmidt, B., Alazab, M. (2017). Cyber Terrorism: Research Review: Research Report of the Australian National University Cybercrime Observatory for the Korean Institute of Criminology. Caulfield, T., Ioannidis, C., Pym, D. (2017). The US Vulnerabilities Equities Process: An Economic Perspective. Chinthapalli, K. (2017). The hackers holding hospitals to ransom.BMJ,357, j2214. Choi, K. S., Scott, T. M., LeClair, D. P. (2016). Ransomware against police: diagnosis of risk factors via application of cyber-routine activities theory.International Journal of Forensic Science Pathology. Kharraz, A., Arshad, S., Mulliner, C., Robertson, W. K., Kirda, E. (2016, August). UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. InUSENIX Security Symposium(pp. 757-772). Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E. (2015, July). Cutting the gordian knot: A look under the hood of ransomware attacks. InInternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment(pp. 3-24). Springer, Cham. Mansfield-Devine, S. (2016). Ransomware: taking businesses hostage.Network Security,2016(10), 8-17. Martin, G., Kinross, J., Hankin, C. (2017). Effective cybersecurity is fundamental to patient safety. Pathak, D. P., Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing challenge.International Journal of Advanced Research in Computer Engineering Technology (IJARCET) Volume,5. Planqu, D. (2016). Cyber Threat Intelligence. Sanger, D. (2016). Shadow brokers leak raises alarming question: Was the NSA hacked.New York Times. Retrieved August,27, 2016. Shane, S., Mazzetti, M., Rosenberg, M. (2017). WikiLeaks releases trove of alleged CIA hacking documents.The New York Times, Mar. Tuttle, H. (2016). Ransomware attacks pose growing threat.Risk Management,63(4), 4. van Der Walt, C. (2017). The impact of nation-state hacking on commercial cyber-security.Computer Fraud Security,2017(4), 5-10.

Wednesday, December 4, 2019

Dollar General Case Analysis free essay sample

Intuitively one might assume that Dollar General, the well-known extreme-value retailer, has an established competitive advantage versus other consumer goods retailers with respect to price. It would then follow that cost would be a defining characteristic of the company, and a cost analysis an appropriate analytical tool. However, the four distinct types of retailers within the dollar store retail segment (original dollar stores, close-out retailers, limited assortment grocers, and extreme-value retailers) all compete on price. Dollar General is very competitive in this regard, but this alone has not rendered the company successful; price is not Dollar General’s competitive advantage amongst its competitors. Therefore, a demand-side differentiation analysis proves far more useful in addressing the current issues facing Dollar General (only 6. 9% sales growth and 1. 5% net income growth in 2006, down from 23. 1% and 5. 5% respectively in 1997), and furthermore developing a plan for increased future profitability. Dollar General currently commands ~24% of all sales in the US Dollar Store Industry. The company’s product, or more accurately the need that the company satisfies, is the desire for an accessible small-format retailer for purchases generally totaling $10. The store acts as a convenient, temporary alternative to weekly shops at grocery stores or minor goods retailers. Keeping in line with this are the average sizes of Dollar General stores (6,900 square feet), which allow goods to be sought out in an efficient, brisk manner with limited store traffic. Where Dollar General locates their stores is essential to both satisfying current market needs, and to diversifying the company away from competitors. The company operates more than half of its stores in communities of 20,000 people or less; in these rural areas, Dollar General represents one of very few options with regards to small-scale basic consumable merchandise. Furthermore, Dollar General locates most of its stores in strip-malls (49%) or freestanding structures (49%) that bisect popular commuter paths, capitalizing on an ever-present demand for convenience as well as low price in the marketplace. Dollar General meets the needs of American consumers with bargain-based mentalities, as well as those currently living on fixed/low-income salaries. The motivation for an increasingly large percentage of the American populace is convenience, coupled with a low price, rather than simply price. This motivation is coupled with a psychological change in American consumerism; there is a dichotomy in the marketplace, an â€Å"hour-glass economy†, wherein commodity goods are bought in discount channels, and luxury products are purchased in high-end channels. The criteria for Dollar General customers can be simplified into convenience, speed of shopping experience, and variety of goods. Paper goods and small consumables have long been part of Dollar General’s market basket; they typify the type of good that sells at extreme-value retailers. Limited SKU’s (~4,900 per store average) are also part of Dollar General’s customer criteria; excess variety consumes shelf space and extends the time of a shopping trip, creating discrepancies between consumer preferences and the attributes of the products in-store. Price premiums have not factored into Dollar General’s customer’s habits. However, this is not to say that the company’s convenience of access could not therefore allow a few select items to carry a price premium, particularly those that already have higher markups. This could only be done with a very limited selection of goods (likely dairy, frozen goods) before the ethos of Dollar General becomes compromised. This begins an analysis of the growth opportunities currently being discussed by management at Dollar General. The extreme-value market segment is seen as one of the most under-saturated sectors in the US, and several plans of action are posited within the case, each with fairly clear pros and cons (EXHIBIT 1). Perhaps the most pressing concern for Dollar General is addressing how to grow without either stretching resources to an extreme, or compromising the company’s competitive advantages. I would suggest the company to carry out the following actions. First, the company should seek limited expansion within the continental United States (US extreme-value industry still growing at $1.5 billion/year), namely into California. However, expansion should be limited to this state only. Whereas development within the US had been the company’s growth engine for years, the company is now closing and remodeling stores with equal returns. As such, the company’s growth aims should be moved abroad (Europe), where extreme-value markets are well received, and stores with limited SKUâ⠂¬â„¢s fair better than larger discount outlets. Secondly, store merchandise productivity could be enhanced by eliminating seasonal items (costumes, summer toys) and adding more strategic grocery items. Research suggests that same-store growth could be spurred by a heavier emphasis on fresh grocery items, and Dollar General appears to have the delivery capabilities to keep a fair supply of perishables on hand. A slightly larger store size for new shops might be necessary for this sort of development, as Dollar General seems to have slightly underestimated the ‘sweet-spot’ for its store size with the current store model. The stores would remain small enough to facilitate accelerated shopping, but large enough to hold a proper number of SKU’s, still in the 4900-5300 range. Finally, Dollar General should expand into cash checking and wire transfer. Providing this service requires no additional manpower, and many people (particularly those on low annual salaries) need a convenient place to cash checks; they are then hugely likely to pick up a small bundle of goods before exiting the store. This service would tap into a market of 28 million Americans who do not yet have a bank account (particularly young men and women). Exhibit 1