5 Steps to Identify Core Processes

Comments (20)

5 Steps to Identify Core Processes

By: Chris Anderson

Part Two of Creating Well-Defined Processes


Part One: http://www.bizmanualz.com/articles/02-08-05_Process_Improvement.html?src=ART83

Next Week: Implementation

Last week, we raised the question: how do you know where to begin? How can you identify a gap in one of your company's core processes?

The answer: follow the money trail...

But how do you follow the money trail, and what will that mean for your business? To answer this, let's look at five steps to identify your core processes and any needs for change.

Step 1: Define Your Business Model

The following question might sound very basic, but you should first ask yourself: what business am I in? You'll ask this because you want to follow the money trail: to identify how exactly you earn revenue and from where that revenue comes. And this also defines your business model, which sets how you make money. By examining your business model (including mission and vision statements), you see not only how you can make money but also how you should make money. In other words, what should be happening in your business to increase revenue - but isn't and why?

Step 2: Create a Process Map

Once you've looked at your business model, continue to follow the money trail and identify your company's core processes in the cash to cash cycle. By doing this you can see which processes are most critical to the overall success of your business.

Next, connect the core processes in a process map. Link suppliers, inputs, outputs and customers together to see the overall cash conversion cycle. Let's examine a high level process map.

Here we have the complete business cycle of a typical company using the SIPOC method, which connects Suppliers to Inputs to Processes to Outputs to Customers. To illustrate, a typical process map flows like the following from left to right: a Supplier connects the input purchasing with the Process of inventory and to the Output sales, which is then connected to the Customer. From there, the cycle also flows back from right to left: the Customer connects the Output accounts receivable to the Process of manufacturing to the Input accounts payable and finally to the Supplier.

With this you can see the departments through which cash flows. And once you identify and break down your company's core processes, you are closer to answering the question: which process do I start to improve?

Step 3: Examine Financial Statements

Now continue along the money trail by looking at your financial statements, including the balance sheet, income statement and cash flow statement. Your financial statements indicate where your money is piling up, sort of like a snap shot of what your velocity is currently.

For example, in a manufacturing company, you can determine if there are long wait times between sales or long delivery times - both of which are evident in inventory. And inventory (as seen in your financial statements) also show the effects of time - and whether your process velocity (i.e. a slow process in the conversion cycle that causes long lead and wait times) is causing a pile up in your financial statements. Ask yourself: "are my processes fast enough to make my customers happy?"

Step 4: Set Velocity

Velocity is the speed at which your system is operating currently e.g. goods delivered on time and responsiveness to orders. To design an effective process, you will need to know the set velocity that the organization needs to maintain good customer satisfaction. If your inventory process has a long cycle time, beginning with raw materials and ending with the customer, then this could be an indication of a low velocity. Customers set the pace, and they will tell you if the velocity of product turnaround is sufficient. And so companies need to calculate what that pace is to make customers happy.

Step 5: Determine Leverage

The last element in following the money trail is to review leverage - which process improvement will create the strongest return on investment (ROI)? Keep in mind both time and money, and determine what process inefficiency is consuming all of your cash. Why is that process eating away your money, and should it be? But keep in mind, too, the element of risk: what will happen if I make a change, and what will happen if I make no change?

For gauging your ROI needs, examine the five parts we've discussed so far: your business model, process map, your financial statements, velocity and the leverage to make your customers happy. Answer these five questions, and you should know where to start.

Let's look at an example in play...

Review a Case Study of Core Business Processes

A manufacturing company interested in ISO 9001 quality was experiencing poor customer service and very low inventory turns, and needed help. The company's perceived problem was not that they carried too much inventory but, instead, that they had poor customer service and employee performance in processing and fulfilling orders in a timely manner. Because of this, they wanted us to focus on those areas. But with such a pile up of inventory we saw a red flag. And we asked the company: where is the root cause of the problem?

As we took a further look, we immediately saw a connection between poor customer sales service and a large stock of inventory. The company's manufacturing cycle efficiency was so low that it created a perceived need for higher inventory. And customers weren't happy because of long wait times to receive the products that they ordered. In other words, customers weren't getting the velocity that they had expected and wanted.

The company insisted that it needs more inventory to keep customers happy. But this is just another bandage to fix the symptom of the problem and not the root cause.

Inventory is a result of the purchasing, manufacturing and sales cycles. And so we examined the financials, business model and system velocity of the company. From there we created a process map of these three core processes, as well as defined the company's leverage points that would ensure a healthy ROI for any process changes made. We calculated an improvement of five times in velocity. By removing the inefficiencies out of the system, inventory decreased significantly, turns increased greatly, and customers were happy. We helped reduce the total amount of inventory. And we also helped increase the speed of the inventory cycle by focusing on purchasing, manufacturing and sales.

Create a Gap Analysis

And so with this example, we can now answer our original question: where do you start? As we've discussed, follow the money trail through the five key steps: define your business model, create a process map, examine financial statements, set velocity and determine leverage. But what pulls it all together?

We pull all of this together with a Gap Analysis. An operations assessment (also called an audit) results in a Gap Analysis and this report of gaps, or inefficiencies, found in the system shows you where to start to achieve your target. A Gap Analysis helps you identify your core processes and performance metrics in order for you to achieve your objectives.

Look Ahead

Next time, we will look at a process map more in-depth. We've identified where to start, but we will learn how to create a process map - one of the most important documents you need for your organization's success.

You have permission to publish this article free of charge, as long as the resource box is included with the article. If you do run my article, a courtesy reply to sean@bizmanualz.com would be greatly appreciated. This article is 1,122 words long including the resource box. Thanks for your interest.

About The Author

Chris Anderson is the managing director of Bizmanualz, Inc. and co-author of policies and procedures manuals, producing the layout, process design and implementation to increase performance.

To learn how to increase your business performance, visit: http://www.bizmanualz.com?src=ART84


stylinpat 21.03.2009. 22:29

What is d0 stepping when talking about intel processors? And what is happening with the new core i7-950 and 975 processors?


Admin 21.03.2009. 22:29

"Stepping is a designation used by Intel and AMD (or any semiconductor manufacturer) to identify how much the design of a microprocessor has advanced from the original design. The stepping is identified by a combination of a letter and a number.

Typically, the first version of a microprocessor comes out with stepping A0. As design improvements occur, later versions are identified by changes in the letter and number. Changes in the number (for example, A3) indicate minor design changes, while changes to both the letter and number are made following more extensive changes (for example, B2). Stepping allows consumers and servicers to identify a microprocessor's version."

Yes, I know I copied and pasted that, but they said it so much more eloquently than I could! lol!

What's happening with the new Intel Core i7, 950 and 975 processors?
Or do you mean what is all the 'jazz' about the new Intel Core i7 processors?

There is the Intel Core i7,-> 920, 940, 950, 960 Extreme Edition, and 975 Extreme Edition.

The Intel Core i7 is a Whole different 'ballgame' with processor technology.
For one, they brought back Hyperthreading Technology. HT. As you
may recall with the Pentium 4's that had HT, there was a Virtual processor core. Not a physical dual core like an Intel Core2 Duo, per se, but multi-threading tasks could be done by a Pentium with HT.
The Operating System, (Windows), saw a Pentium 4 with HT as being two processors.
(Pentium 4's were/are, a Single Core processor)

The Intel i7 has four processor cores. It's a Quad Core. Since it has HT, it has Four physical cores, and Four Virtual cores.
Windows sees it as 8 processors!
"Re-implemented Hyper-threading. Each of the four cores can process up to two threads simultaneously, so the processor appears to the OS as eight CPUs. This feature was present in the older NetBurst microarchitecture but was dropped in Core."

The Intel i7 no longer uses a Front Side Bus. (FSB)
It uses the QuickPath Interconnect interface QPI

It has an On -Die memory controller, the processor no longer has to go through a Northbridge chip, to access the ram memory,
"On-die memory controller: the memory is directly connected to the processor.
* Three channel memory: each channel can support one or two DDR3 DIMMs. Motherboards for Core i7 have four (3+1) or six DIMM slots instead of two or four, and DIMMs can be installed in sets of three or two.
* Support for DDR3 only."
Here's the path for the Intel processors before Core i7,

It has an L1, L2, and L3 cache. (Used by AMD for a while now)

Uses the new LGA1366, processor socket. Designed for it, and only it,
It's okay, but you know what? It's a Quad Core, and only a handful of games are written (programmed) for Quad Core. Most are written for a dual core, like a Core2 Duo, or an AMD Athlon 64 X2.

Know what's better?

Cell processor technology like used in Playstation 3.

Nvidia Tesla Technology.

6.Cell Processor:

7.Nvidia Tesla Technology,


Mamaw 10.06.2010. 09:34

I having severe night sweats. Are there any natural things to help? I am going through menopause and having severe night sweats. Are there any natural things I can take to help with this? Also, what is a comfortable material to sleep in?


Admin 10.06.2010. 09:34

PLEASE! I cannot stress enough that you have a complete hormone panel test. Saliva is more accurate than blood, but unfortunately, most insurance companies do not recognize this fact (yet). You are experiencing a symptom of hormone inbalance so treating the night sweats is only treating the symptom. It is important to get to the cause of of this symptom.

Here is an excerpt from womentowomen.com

5 natural ways to reduce hot flashes and night sweats

Most of the women we meet in our clinic and Personal Programs prefer to use the most natural, least invasive methods available for health care. For them, addressing their menopausal symptoms by filling a prescription doesn?t hold the appeal it might for others. Antidepressants, anti-anxiety drugs, sleeping pills, and synthetic hormones, the solutions conventional medicine continues to offer women for hot flash relief, are not the first line of therapy at Women to Women. For 25 years we?ve been offering women safe alternative solutions that effectively address the underlying causes of hot flashes and provide equivalent ? if not superior ? results.

Here are some options we find helpful:

1) Understand your triggers. The first step in pulling the plug on your hot flashes is to identify and understand your triggers. Are you more prone at certain times of the day or night? Do certain foods set you off on a heat wave? Track these observations and patterns in your journal or Women to Women?s Wellness Diary.

2) Nourish your body?s neuroendocrine pathways. Eat whole, fresh foods, and balance your meals and snacks with plenty of fruits and vegetables, healthy fats, and protein. Add a top-grade multivitamin-mineral complex, essential fatty acids, and soy to augment your core nutrition and ensure an adequate supply of the micronutrients your body needs for neurotransmitter and hormonal balance. With a solid nutritional foundation, you will find the passage through menopause to be a lot less bumpy. (To learn more, read our dietary pointers for quelling hot flashes.)

3) Stay active. Recent research suggests exercise helps calm hot flashes by reducing anxiety. In a small study looking at the effect of exercise on overall menopause symptoms, women who exercised experienced reduced hot flashes, while those who did not experienced an increase. Whatever form of exercise you enjoy makes for better hormonal health, provided it does not make you feel more stressed-out or overheated. Forms of exercise that raise core body temperature can trigger hot flashes, so be sure to provide ample cool-down time, and avoid dashing off to undertake anything stressful after your work-outs.

4) Cultivate emotional health. Make a commitment to follow a path that brings you emotional wellness. Take incremental steps to reduce stress, whatever form it takes in your life. Whether that means setting better boundaries at work, home, or within your community, learn to value your own well-being enough to keep commitments and expectations reasonable. Use your inner guidance to seek out and cultivate practices that calm rather than stimulate your inner thermometer. In our experience women find meditation, prayer, yoga, biofeedback, Emotional Freedom Technique, and the Hoffman Quadrinity Process to be extremely helpful.

5) Add gentle hormonal support when needed. Given that phytohormones approximate the molecular configuration of the hormones produced in our own bodies, it stands to reason that we?re better equipped to utilize them safely and effectively than pharmaceutical drugs or synthetic forms of hormone therapy. If you?re considering herbal support, a product containing a range of plant constituents, like the one we offer in our Personal Program, can offer synergistic benefits that a single herb may not. For more information, read our article on phytotherapy. You may also want to explore acupuncture and Traditional Oriental Medicine (TOM), or talk to your practitioner about bioidentical hormones


Nick S 24.02.2009. 19:04

How do I build a computer? I wanan build my own computer just for gaming only.
I wanna build my own computer, any help?

Nick S

Admin 24.02.2009. 19:04

First off, ignore anyone who says "if you have to ask then you can't do it" or anything like that. We all have to start somewhere...I remember building my first machine years ago, I had a billion questions. Since then, I've built tons of em, and I've screwed up a few along the way. But I ALWAYS recommend to ANYONE (even my grandma), build your own computer. Most don't listen, and that's fine...not everyone has the stomach for it. You're asking, so you do.

Step 1: Research! Go out and read as much as you can on the process. Even buy a book or two. The important thing is that you need to be able to identify every part in the machine. You should have a basic idea on what the terminology is.

Step 2: Get a generic list of parts that you need/want. Not specifics yet...

Step 3: List your requirements. (eg, 2.6 ghz Dual Core Processor with 2 gb of RAM, 160 gb hard drive) This should be the base, things you don't want to compromise.

Step 4: Find compatible parts. This isn't as hard as you might think. The biggest compatibility issue is motherboard to CPU. Save yourself this trouble by getting a bundle.

Step 5: Buy and put it together.

From there, fire it up and install your software.

There are tons of advantages to building your own machine...it IS cheaper when you build your own performance machine (it's NOT cheaper to build a budget machine....for that, you want to buy). It's cheaper not only initially, but in the long run...the knowledge you have will help you diagnose problems. Also, it's easier to realize that you don't need to scrap a machine for one bad part.

And if anyone says "you can't" or "you shouldn't", tell them "bite me". We don't get smarter by buying solutions, we get smarter by creating them ourselves.


Marchelle 19.04.2012. 08:04

A serious problem with CAT 3412 Main Propulsion Cooling System, Please Help!? I am having a serious problem with my 3412 Main Propulsion Engines. The liners fail at around 2000 hrs, and i was not able to figure out the problem although I am told it is the coolant used.
So i want to ask three questions. What is the level of pH required for such engines working in tropical areas? Would the layout and performance of the cooling system also cause liner failure? What would be your recommendation for a process to identify the cause of the problem?


Admin 19.04.2012. 08:04

Liner damage from cooling system problems is usually due to cavitation erosion. An excellent discussion of this problem, it's causes and solutions can be found in the CAT publication Coolant and Your Engine, don't have the form number handy but maybe your local dealer can provide a copy.
If your damage is in fact due to cavitation erosion, first you need to assure the coolant you're using is suitable for a heavy duty engine. This is important, since coolants formulated for automotive engines typically have high silicate levels and don't protect against cavitation erosion. Your engines Operation and Maintenance manual has information on CAT specifications for water used in cooling systems and for the coolant.

In general, minimum acceptable water used in cooling systems should meet the following:
Chloride, 40 ppm max
Sulfate, 100 ppm max
Total hardness 170 ppm
total solids, 340 ppm
pH, 5.5-9.0
From LEBV0915, Engine Installation and Service Handbook

In a properly designed and maintained cooling system, while not preferred by CAT, plain water and a proper corrosion inhibitor is acceptable and in use succesfully in many systems.

Has a cooling system audit been performed? Improper coolant flow rates and system pressures can also cause cavitation erosion. There is a CAT EDS sheet on cooling system audits, also the publication LEBV4830, Marine Analyst Service Handbook also has some very helpful information of marine engine cooling systems.

you can do the following three steps:

(1) properly indentify the failure mode of the liner;
(2) verfiy the suitablity of the coolant for a heavy duty diesel engine;
(3) perform a proper cooling system audit to assure overall cooling system design is to CAT and industry standards. You will need TMI information on the engine cooling system components, such as pump curve(s), performance of heat exchanger and aftercooler cores, etc. And I would strongly recommend you get a copy of the Marine Engine Application and Installation Guide, at least the cooling system portion, should be able to get from your local dealer.

you can come to my obd2 online store http://www.obd2s.com for the technical support!


aleeya 29.12.2006. 14:02

"my internet explorer cannot be displayed" every single time? Previously my laptop has some errors in the security updates as the automatic updates were off suddenly for quite some time but now it is finally alright now.

However,whenever i am connected to the internet,the internet webpage will be fine and will upload as per normal but for after a while,it will suddenly change to "internet explorer cannot be displayed" after multiples of refreshes.I reconnect again and the same process applies.
I run a scan in symantec antivirus and spyware terminator and they detected some virus but i've deleted it.I suspected it must be some tracking cookies that prevent me from surfing the net but still i am not sure about it.Some recent virus history that my laptop has encountered is w32 spybot but again everything is deleted and some were cleaned.I even using ccleaner too.

So i really need help on how to solve this.
My internet connectivity is fine really.


Admin 29.12.2006. 14:02

The problem may occur for many reasons. These reasons include, but are not limited to, the following: ? Connectivity issues or network-related issues, including the following:? A conflict with the firewall or a firewall configuration issue
? Issues with network drivers
? Issues with winsock or TCP/IP
? Erroneous entries in the Hosts file

? Third-party software or Internet connections settings issues, including the following: ? Issues with the Startup files or other potential service conflicts
? User Account corruption
? Malicious software has been installed

? Internet Explorer configuration settings, including the following: ? Internet Explorer is not optimized
? Internet Explorer has conflicting or inappropriate settings
? Conflicts with third-party browser extensions
? Problems with DLL files or use of unregistered DLL files

? Damaged or missing core Windows files, including the following: ? System File Checker
? System Restore

Guided Help to identify and fix connection problems
? You must be logged on to Windows by using a computer administrator account to install and to use this Guided Help.
? You must be running Windows XP Home Edition, Windows XP Professional, Windows XP Media Center Edition, or Windows XP Tablet PC Edition to install and to use this Guided Help.
You must first download Guided Help. To start, click the following link: http://support.microsoft.com/?scid=aw;en-us;326155&eula=1

Test other known good sites
Start IE, go to google.com, yahoo.com, etc. sites that are not ever down. Reason: You may be getting the message due to a site where the server is down.

Verify connectivity

Make sure that the cables that connect the computer to the modem (this includes cable, DSL and dial-up modems) are secure and that there is correct activity from the modem.

Note You may have to contact your Internet Service Provider or (ISP) to verify connectivity.

Run the Network Diagnostics Tool

The Network Diagnostics tool runs several tests on your computer to determine and report on network connectivity. To run the tool, follow these steps: 1. Click Start, and then click Help and Support.
2. Click Use Tools to view your computer information and diagnose the problem.
3. Click Network Diagnostics.
4. Click Set Scanning Options. Click to select every check box except the Verbose check box.
5. Click Save Options, and then click Scan your System.
Note This may take several minutes to run.
6. Expand IP address. Make a note of the IP address that is listed. ? If the IP address which starts with 169.x.x.x, Windows has assigned you an automatic IP because it did not receive one from your Internet service provider. This prevents you from accessing the Internet.
? If there are any failures, or if you receive an Automatic Private IP address (APIPA) 169.x.x.x address, start with Section 1 because there may be a hardware configuration issue or a hardware issue.
? If you do not receive an error, and you receive an IP address that starts with any other number, you may be experiencing a software conflict or a configuration issue. Start with Section 2.

Power cycle the modem or router
It is sometimes possible that your IP settings or configurations that you receive from your Internet service provider are misconfigured or have to be updated. Power cycling the modem or router updates these settings. 1. Disconnect the cable that goes from the computer to the modem.
2. Turn off the modem. If the modem does not have a power switch, disconnect the power.
3. Wait several minutes. Then, turn on the modem, connect the cable from the computer to the modem, and restart the computer.
4. Test your connection again and see whether you can browse the Internet.

Verify firewall or router settings
If you connect to the Internet by using a router, it is possible that the configuration settings in the device have changed or have to be updated. To determine whether the router may be in conflict, you can connect your computer directly to the modem or Internet connection to bypass the router.

Note This will leave your computer vulnerable to attacks. Make sure that the Windows Firewall is enabled. To enable the Windows Firewall in Windows XP with Service Pack 2, follow these steps: 1. Click Start, and then click Control Panel.
2. Click Security Center.
3. Click Windows Firewall.
4. On the General tab, select the option to enable the firewall.
To enable the Internet Connection Firewall in Windows XP without SP2, follow these steps: 1. Click Start, and then click Control Panel.
2. If you are in Category View, click Network and Internet Connections.
3. Click Internet Connections, right-click Internet Connection, and then click Properties.
4. On the Advanced tab, click to select the To protect my computer and network by limiting or preventing access to this computer from the Internet. checkbox, and then click OK.

A padlock icon should now appear for the connection you selected. This means that the firewall has been enabled for this connection. If you have multiple connections and are not sure as to which should be selected, enable the firewall on all connections or contact your Internet service provider for more help in determining which is the appropriate connection.
After your computer is connected directly, test Internet Explorer. If you can visit Web sites, contact the router's manufacturer for help in configuring the device.

Verify that the network adapter is enabled and working correctly
Make sure your network adapter is compatible with Windows XP. Use device manager to verify that your network adapter is installed correctly and is working correctly. Update the driver if you must.

To determine if your network adapter is not installed or detected correctly, verify the device in Device Manager. If there is a exclamation mark icon or a question mark icon appears next to the device, double-click the device, and then verify the error that appears. To access Device Manager, follow these steps: 1. Click Start, click Run, type devmgmt.msc, and then click OK.
2. Right-click My Computer, click Manage, and then click Device Manager.
3. Right-click My Computer, click Properties, click the Hardware tab, and then click Device Manager.
4. Type the following at a command prompt: start devmgmt.msc
To access Device Manager on a local or remote computer, follow these steps:1. Click Start, click Run, type mmc, and then click OK..
2. Click File, click Add/Remove Snap In, click Add, and then click Device Manager.

Repair the connection
The connection settings may have to be renewed or may be misconfigured. Repairing the connection will reset some configuration settings. 1. Click Start, click Run, type ncpa.cpl, and then click OK.
2. Right-click the appropriate network connection, and then click Repair.
3. Test your connection.

Repair Winsock
These issues may occur if the Winsock registry keys are damaged or corrupted.

Warning Programs that access or monitor the Internet, such as antivirus programs, firewall programs, and proxy clients, may be negatively affected when you run the netsh winsock reset command. If you have a program that no longer functions correctly after you follow these steps, reinstall the program. On computers that are running Windows XP with Service Pack 2, follow these steps: 1. Click Start, click Run, type netsh winsock reset, and then click OK.
2. When the Command Prompt flashes, restart the computer.
On computers that are running Windows XP without Service Pack 2, follow these steps.

A. Delete registry keys
1. Click Start, click Run, type regedit, and then click OK.
2. In Registry Editor, locate the following keys:
3. Right-click each key, and then click Delete
4. When you are prompted to confirm the deletion, click Yes.
5. Restart the computer.

B. Install TCP/IP
1. Right-click the network connection, and then click Properties.
2. Click Install.
3. Click Protocol, and then click Add.
4. Click Have Disk.
5. Type C:\Windows\inf, and then click OK.
6. On the list of available protocols, click Internet Protocol (TCP/IP), and then click OK.
7. Restart the computer.

Reset TCP/IP
TCP/IP may have become damaged or some configurations may have been changed. Resetting TCP/IP should reconfigure these settings appropriately. To reset TCP/IP, follow these steps: 1. Click Start, click Run, type cmd, and then click OK.
2. At the command prompt, type the following information, and then press Enter:
netsh int ip reset filename.txt

Test in Safe mode with Networking
1. Restart the computer. Press the F8 key repeatedly when the screen goes blank.
2. Click Safe Mode with Networking, and press ENTER.
3. If you are presented with an option to select a version of Windows, select the appropriate version, and then press ENTER.
4. After the computer has started in Safe mode, test your connection.

Test by using a new user account
If you still cannot browse the Internet, there may be some corruption with the user account you are currently using. If you have multiple user accounts on your computer, test this by logging in as a different user.

Run antivirus software and antispyware software
If you have antivirus software or antispyware software installed, update it and run the software.

Optimize Internet Explorer
By optimizing Internet Explorer, you can clear old files and settings that may be causing conflicts and may be preventing you from connecting to the Internet. To optimize Internet Explorer, follow these steps: 1. In Internet Explorer, click Tools, and then click Internet Options.
2. Click the General tab.
3. Under Temporary Internet files, click Delete Files.
4. Click to select the Delete all offline content check box, and then click OK.
5. Click Delete Cookies. When you are prompted to confirm this selection, click OK.
6. Click Settings.
7. Click View Objects.
8. Click View, and then click Details.
9. If Damaged appears in the Status column for any program file, remove that program file.
10. Close the Downloaded Program Files dialog box.
11. In the Settings dialog box, click OK .
12. Under History, click Clear History, and then click Yes when you are prompted to confirm the selection.
13. In the Internet Options dialog box, click OK.
14. Try to browse the Internet.

Register Internet Explorer DLLs
Some core Internet Explorer files may have been unregistered. This means that a required file may no longer have its location identified in the registry. Reregistering Internet Explorer DLLs replaces any missing links in the registry for these files.

Note For the file to be correctly registered, make sure that you press ENTER or click OK after each entry. 1. Click Start, click Run, and then type each of the following commands. Press ENTER after you type each command.
regsvr32 urlmon.dll
regsvr32 shdocvw.dll
regsvr32 msjava.dll
regsvr32 browseui.dll
regsvr32 mshtml.dll
regsvr32 jscript.dll
regsvr32 vbscript.dll
2. Test to see if the problem is resolved. If it is not resolved, go to step 3.
3. Click Start, click Run, and then type each of the following commands. Press ENTER after you type each command.
regsvr32 urlmon.dll
regsvr32 wininet.dll
regsvr32 wintrust.dll
regsvr32 initpki.dll
regsvr32 dssenh.dll
regsvr32 rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 cryptdlg.dll
regsvr32 softpub.dll

Damaged or missing core Windows files
Part 1: Run System File Checker
This problem may occur if some core system files have been removed or replaced. To resolve this problem run System File Checker (SFC) scan to identify missing system files. Then, replace these files. To run SFC, follow these steps:1. Click Start, click Run, type cmd, and then click OK.
2. Type sfc /scannow, and then press ENTER.

System Restore
If no other step that was mentioned earlier has resolved the issue and the problem has only started recently, a System Restore may be performed to restore the operating system to a previous working state.


Lagixel 10.06.2009. 03:31

Error extracting support files: Access Denied? I am running Windows XP, and I'm trying to download the Catalyst Software Suite from Radeon ATI. Whenever I try to install it, this error message come sup saying:

How can I get rid of this?


Admin 10.06.2009. 03:31

Setup initialization errors can be caused by a number of factors. This is a non-exhaustive list of possible resolutions:

1.) Insufficient permissions on the machine. If you are using a Windows NT or a Windows 2000 machine, you need to have administrative permissions to run an InstallShield Professional 6.x setup. Make sure you have the correct permissions.

2.) If you just ran an InstallShield setup, the engine takes a few seconds at the end of the installation to clean up. During this time Ikernel.exe (the engine file) is running in memory from a previous process. That is why you are not allowed to launch another setup. Waiting a few seconds and running the setup again should resolve this.

3.) Check and make sure Ikernel.exe is not in memory. If it is, and no setup is running at the time, end that task and restart the system.

4.) Delete the Program Files\Common Files\InstallShield\Engine folder and then rerun the setup.

5.) Reinstalling Internet Explorer (IE) 5.x can also repair a number of corrupted/missing core Windows files from your machine, so reinstalling IE 5.x and the NT service pack is also suggested.

6.) Another possibility is that you do not have sufficient COM permissions. For information on how to troubleshoot this, see InstallShield article Q104986, INFO: Initialization Error Troubleshooting.

7.) The other potential cause is a missing Stdole.tlb, stdole32.tlb, or stdole2.tlb file. These are core Windows files and should exist on your machine. Make sure that if you get these file from another machine, the machine is running the same operation system as the machine you are trying to run the setup on.

8.) If you are trying to install to a Windows 98 machine, download and run Dcom98.exe from the following site: http://www.microsoft.com/com/dcom/dcom98/download.asp.

9.) Make sure that you are using the latest version of the InstallShield engine. To install the latest engine see article Q105097, INFO: Install the Latest Version of Ikernel.exe

10.) The Default Impersonation Level must be set to Identify. Verify that the DCOM Configuration Properties Defaults Impersonation Level is set correctly. Users that have their Default Impersonation Level set to Anonymous experience this error message. To change the impersonation level, please follow the steps below:
a. Click on the Start button
b. Select Run
c. Enter DCOMCNFG then click OK
d. Select NO for any Warning screens that are presented
e. The "Distributed COM Configuration Properties" screen is displayed
f. Select the "Default Properties" tab
g. The "Defaults Impersonation Level" field must be set to "Identify"
h. Select Apply then OK

11.) The said symptom occurs if the user does not have access priviliges for the following registry keys:
Use regedt32.exe* to alter the security settings. Give Full Control to following user types:
Administrator (on the local machine)
Created Owner

12.) Using Regedit.exe* check the value of CommonFilesDir registry entry under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion, to ensure that there are no trailing spaces or tab characters in the text of that value.


gene-targeting 07.02.2006. 02:09

does repetitive sequence in the arm of the targeting vector affect recombination in gene targeting? Array


Admin 07.02.2006. 02:09

Introduction. This is a brief outline of the steps necessary to produce mice with a mutation targeted to a specific gene. These animals are referred to as "knock-out" mice or "gene targeted" mice. The broad outline of the experiment includes: 1) the investigator constructs a gene targeting vector containing a mutation in the target gene; 2) the targeting vector is introduced into ES cells; 3) ES cell clones which undergo homologous recombination with the targeting vector are identified; 4) ES cell-mouse chimeras are produced; 5) the chimeras breed and transmit the chromosome with the targeted gene to their offspring; 6) homozygous animals are produced from the mating of hemizygous chimera offspring; and 7) the phenotype resulting from the genetic mutation is characterized. Core personnel are available for consultation on all aspects of gene targeting research. Contact Thom Saunders with any questions or Meet the Staff. The Transgenic Core prioritizes all requests for service on a "first-come, first-serve" basis. Your requests for electroporation, clone expansion, and blastocyst microinjection will be added to the Transgenic Core work queue in the order that they are received.
2. Plan the experiment. What is the purpose of your experiment? Do you want to completely ablate gene expression in all tissues? Do you want to analyze tissue specific regulatory sequences? Do you want to produce a model for tissue-specific gene deletions? You will need to obtain or clone the structural gene that you want to mutate. The source of the DNA is important since published studies demonstrate genomic DNA isogenic to the embryonic stem cell line give higher gene targeting efficiencies in ES cells (see Key Gene Targeting Papers). While complete sequence information is not necessary, a detailed restriction map of the gene is an irreplaceable tool. During the planning stages the material transfer agreements for R1 ES cells and other reagents should be initiated so that they are ready in time. Once a genomic clone of the gene is in hand and restriction mapped, then it is time to...

3. Clone and the Verify the Targeting Vector. The Core has cloning vectors for investigators to use in gene targeting research. They include pPNT, a basic targeting vector, pNZTK2, designed to insert the lacZ gene behind the promoter of the targeted gene, and pflox, which is designed to introduce loxP sites into the gene. A complete materials transfer agreement is required before they can be distributed. You will need to determine which 5' and 3' fragments of the gene will be used to construct the targeting vector. Generally speaking, a couple of Kb on either end should give a reasonable gene targeting frequency. You will also need to consider the methods and probes that you will use to identify ES cell clones that have undergone homologous recombination with the targeting vector. This means a Southern blot approach with probes outside of the targeting vector or a PCR based assay with primers outside of the targeting vector. Once the orientation of the fragments in the targeting vector are confirmed and the probes are tested then it is time to...

4. Electroporate ES Cells and Select Recombinants. ES cells are a very sensitive reagent, and most often the weakest link in the process of producing gene targeted mice. Fastidious tissue culture technique is necessary to maintain the totipotent state of the cells during electroporation, selection, and expansion. In order to maximize successful outcomes, the Transgenic Core maintains ES cells and companion reagents that are quality tested by producing ES cell-mouse chimeras that transmit the ES cell genome to offspring. Investigators may choose to use the Core's Gene Targeting Service (we do all of the tissue culture work, you do all of the molecular biology), or to use space in the Core lab (rent space in our completely equipped laboratory for ES cell culture work), or to do the tissue culture work in their own space. After the cells are electroporated with the targeting vector and put under drug selection, resistant clones are picked and cultured. DNA prepared from the clones is screened and ES cell clones which have undergone homologous recombination with the targeting vector are identified. During screening the clones are cryopreserved in 96 well plates at -80 degrees C. Since these conditions are not optimal for long term storage of cells, it is important to complete the screen in a timely fashion.

After clones are identified, they are brought out of the freeze and expanded. During expansion, additional DNA is prepared, if necessary, to confirm recombination with the targeting vector, clone morphology is examined, chromosome counts are used to see if the clone is euploid, and a mycoplasma test is done to see if the cells are infected. Investigators may choose to have the Core carry out these tasks, perform them in the Core stem cell laboratory, or to do them in their own space. Once targeted clones have been verified the next step is to...

5. Inject Blastocysts with ES Cells. The Core will microinject ES cells into blastocysts. See the service description for more information. The goal is to produce chimeric animals with high contribution from the ES cell clone and low contribution from the host embryo. This is typically assessed by coat color contribution. ES cells produce agouti fur and the C57BL/6 host cells produce black fur. Another sign that the ES cells have successfully colonized the host embryo is a distorted male:female sex ratio in the chimeras. Since ES cells are X:Y, a good clone will convert female host embryos to phenotypic males. Thus, the desired outcome is for 75% or more of the chimeras to be male and to include animals that have 90% or more agouti coat color. Unfortunately, we can not guarantee that all ES cell clones will produce germline chimeras. In our experience we have seen very good clones that produce high contribution chimeras that transmit to 100% of their offspring and we have also seen apparently "lethal" clones in which zero animals were born after transferring 50 injected embryos, we have seen "bad" clones in which only animals with black coat color were produced, we have seen "bad" clones which produced low agouti coat color contribution chimeras. Unfortunately there are no in vitro tests that will differentiate among these outcomes, the only way to discover the germline potential of an ES cell is to inject it. In general, we suggest that you inject at least three ES cell clones to assure transmission from one, and possibly two clones.

6. Chimera Breeding and Germline Transmission. Once the chimeras are produced, breeding is carried out to obtain offspring that carry the targeted gene. Male ES cell-mouse chimeras are mated with C57BL/6 females (also see Breeding Suggestions). The first sign of germline transmission is the appearance of pups with agouti coat color. Pups produced from sperm derived from ES cells will have agouti coats and half of these animals should carry the targeted gene. Pups that are produced from sperm derived from the C57BL/6 host embryo will have black coats. Tail biopsies from the agouti pups are screened for the presence of the targeted gene in the same way that you screen for the presence of a conventional transgene.

8. Breeding and Analysis. Once hemizygous mutant mice are identified they are mated to produce homozygous mice. The final stage is to study the animals to determine the consequences of the mutation introduced by homologous recombination in ES cells.


Jessica 05.03.2012. 01:39

Why is my mom brainwashed by society? ^


Admin 05.03.2012. 01:39

We'd have to know more about her, but here's some info that's interesting about actual brainwashing. There may be tamer similarities:

In the late 1950s, psychologist Robert Jay Lifton studied former prisoners of Korean War and Chinese war camps. He determined that they'd undergone a multistep process that began with attacks on the prisoner's sense of self and ended with what appeared to be a change in beliefs. Lifton ultimately defined a set of steps involved in the brainwashing cases he studied:

1.Assault on identity
4.Breaking point
6.Compulsion to confess
7.Channeling of guilt
8.Releasing of guilt
9.Progress and harmony
10.Final confession and rebirth
­Each of thes­e stages takes place in an environment of isolation, meaning all "normal" social reference points are unavailable, and mind-clouding techniques like sleep deprivation and malnutrition are typically part of the process. There is often the presence or constant threat of physical harm, which adds to the target's difficulty in thinking critically and independently.

We can roughly divide the process Lifton identified into three stages: breaking down the self, introducing the possibility of salvation, and rebuilding the self.

Breaking down the self
?Assault on identity: You are not who you think you are. This is a systematic attack on a target's sense of self (also called his identity or ego) and his core belief system. The agent denies everything that makes the target who he is: "You are not a soldier." "You are not a man." "You are not defending freedom." The target is under constant attack for days, weeks or months, to the point that he becomes exhausted, confused and disoriented. In this state, his beliefs seem less solid.
?Guilt: You are bad. While the identity crisis is setting in, the agent is simultaneously creating an overwhelming sense of guilt in the target. He repeatedly and mercilessly attacks the subject for any "sin" the target has committed, large or small. He may criticize the target for everything from the "evilness" of his beliefs to the way he eats too slowly. The target begins to feel a general sense of shame, that everything he does is wrong.
?Self-betrayal: Agree with me that you are bad. Once the subject is disoriented and drowning in guilt, the agent forces him (either with the threat of physical harm or of continuance of the mental attack) to denounce his family, friends and peers who share the same "wrong" belief system that he holds. This betrayal of his own beliefs and of people he feels a sense of loyalty to increases the shame and loss of identity the target is already experiencing.
?Breaking point: Who am I, where am I and what am I supposed to do? With his identity in crisis, experiencing deep shame and having betrayed what he has always believed in, the target may undergo what in the lay community is referred to as a "nervous breakdown." In psychology, "nervous breakdown" is really just a collection of severe symptoms that can indicate any number of psychological disturbances. It may involve uncontrollable sobbing, deep depression and general disorientation. The target may have lost his grip on reality and have the feeling of being completely lost and alone. When the target reaches his breaking point, his sense of self is pretty much up for grabs -- he has no clear understanding of who he is or what is happening to him. At this point, the agent sets up the temptation to convert to another belief system that will save the target from his misery.


GOODBYE YAHOO ANSWERS! 19.06.2009. 01:21

What was the year that coupmter was made? =]] curiousity! ;]] mad bordeom RANDom
live..life... LOUD!


Admin 19.06.2009. 01:21

do you mean the computer
the first resembling a modern computer were developed in the mid-20th century (1940?1945).

here is more info
The first use of the word "computer" was recorded in 1613, referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. From the end of the 19th century onwards though, the word began to take on its more familiar meaning, describing a machine that carries out computations.[3]

The history of the modern computer begins with two separate technologies?automated calculation and programmability?but no single device can be identified as the earliest computer, partly because of the inconsistent application of that term. Examples of early mechanical calculating devices include the abacus, the slide rule and arguably the astrolabe and the Antikythera mechanism (which dates from about 150?100 BC). Hero of Alexandria (c. 10?70 AD) built a mechanical theater which performed a play lasting 10 minutes and was operated by a complex system of ropes and drums that might be considered to be a means of deciding which parts of the mechanism performed which actions and when.[4] This is the essence of programmability.

The "castle clock", an astronomical clock invented by Al-Jazari in 1206, is considered to be the earliest programmable analog computer.[5] It displayed the zodiac, the solar and lunar orbits, a crescent moon-shaped pointer travelling across a gateway causing automatic doors to open every hour,[6][7] and five robotic musicians who played music when struck by levers operated by a camshaft attached to a water wheel. The length of day and night could be re-programmed to compensate for the changing lengths of day and night throughout the year.[5]

The end of the Middle Ages saw a re-invigoration of European mathematics and engineering. Wilhelm Schickard's 1623 device was the first of a number of mechanical calculators constructed by European engineers, but none fit the modern definition of a computer, because they could not be programmed.

In 1801, Joseph Marie Jacquard made an improvement to the textile loom by introducing a series of punched paper cards as a template which allowed his loom to weave intricate patterns automatically. The resulting Jacquard loom was an important step in the development of computers because the use of punched cards to define woven patterns can be viewed as an early, albeit limited, form of programmability.

It was the fusion of automatic calculation with programmability that produced the first recognizable computers. In 1837, Charles Babbage was the first to conceptualize and design a fully programmable mechanical computer, his analytical engine.[8] Limited finances and Babbage's inability to resist tinkering with the design meant that the device was never completed.

In the late 1880s Herman Hollerith invented the recording of data on a machine readable medium. Prior uses of machine readable media, above, had been for control, not data. "After some initial trials with paper tape, he settled on punched cards ..."[9] To process these punched cards he invented the tabulator, and the key punch machines. These three inventions were the foundation of the modern information processing industry. Large-scale automated data processing of punched cards was performed for the 1890 United States Census by Hollerith's company, which later became the core of IBM. By the end of the 19th century a number of technologies that would later prove useful in the realization of practical computers had begun to appear: the punched card, Boolean algebra, the vacuum tube (thermionic valve) and the teleprinter.

During the first half of the 20th century, many scientific computing needs were met by increasingly sophisticated analog computers, which used a direct mechanical or electrical model of the problem as a basis for computation. However, these were not programmable and generally lacked the versatility and accuracy of modern digital computers.

Alan Turing is widely regarded to be the father of modern computer science. In 1936 Turing provided an influential formalisation of the concept of the algorithm and computation with the Turing machine. Of his role in the modern computer, Time Magazine in naming Turing one of the 100 most influential people of the 20th century, states: "The fact remains that everyone who taps at a keyboard, opening a spreadsheet or a word-processing program, is working on an incarnation of a Turing machine." [10]

George Stibitz is internationally recognized as a father of the modern digital computer. While working at Bell Labs in November of 1937, Stibitz invented and built a relay-based calculator he dubbed the "Model K" (for "kitchen table", on which he had assembled it), which was the first to use binary circuits to perform an arithmetic operation. Later models added greater sophistication including complex arithmetic and programmability


Holly 23.04.2013. 22:02

Nutrient Poor Soil??????????? I have large patches of pale, dry, nutrient poor, dirt in my yard. How can I improve the soil? Do I just lay compost throughout it? Any suggestions would be greatly appreciated :)


Admin 23.04.2013. 22:02


I can identify with your problem. When I moved into my home we only had sand and nothing but dry sand in the backyard.

Plant need nutrients to get all the elements they need to grow and flourish. Those are found naturally in manures and compost as well as any organic matter that still has to break down.

You should add as much organic matter to your back yard as you can and mix it in with your dead dry soil.

This way you will add life to your ground. And initially anything will do. A bag of garden clippings from neighbors (cut grass, or leaves ) for example and loads of compost.

Start your own compost heap as well as a worm farm. The worm farm will host compost worms that will convert all your kitchen scraps like coffee ground, tea bags, apple cores etc...into worm castings the bets fertilizer known to man.

The process is so simple, cheap, low maintenance and you will get loads of fantastic organic plant food and soil conditioner for your soil.

I believe that all natural soil conditioners are essentially good for the soil but the best fertilizer to have in once ground are worm castings or worm humus.

The castings are actually worm poop that:

is richer in Nitrogen, phosphorus, calcium, potassium and magnesium than the finest top soils.

is a slow release plant food that will release its nutrients only to the plants when they need them.

consists of approximately 5 billion living organisms in just a handful of it.

can feed an average potted plant for up to 6 month

is water soluble and straight away available as plant food to the plants

can hold moisture better than surrounding soil which will lead to less water used and a reduced
water bill

will assist plants to grow larger and stronger roots

will never burn plants

and can be used to produce worm tea a fantastic liquid fertilizer and natural pesticide.

Earth worms and compost worms improve the beneficial microbiological activity of the organic matter they consume by up to 20 times.

If you implement this 3 steps (adding organic matter, adding compost, adding worm castings) to your soil and mix them with your dead ground you will get a wonderful topsoil with time that will be host to all the plants you want.

We have been growing fantastic fruit and vegetables as well as flowers and trees in our garden for years now!

I wish you all the best for your garden project.

Kind regards



Write a comment

* = required field





* Yes No