Premium Essay

Aaaaaaaaaaaaaaaaaaaaaaaaaaaaa

In:

Submitted By powwww
Words 2884
Pages 12
INTRODUCTION

Mengniu
CASE STUDY 2
Mrs Zhang’s farmyard, cows, and watchdog.

Founded in 1999, Mengniu Group (Mengniu) has grown rapidly to become the leading dairy product manufacturer in China. Its principal products are liquid milk (UHT milk,1 milk beverages, and yogurt), ice cream, and other dairy products such as milk powder, milk tea powder, and tablets. Mengniu has overtaken its long-established state-owned rivals through dedication to quality and innovation in all aspects of its business, including marketing, governance, and aggressive adoption of international quality and best practice standards. CDH China Fund, an IFC investee private equity fund, invested in Mengniu in 2002. Mengniu went public in 2004 and trades on the Hong Kong exchange. This sustainable business case study focuses on Mengniu’s commitment to: ■ Its supply chain, consisting of independent small farmers ■ Adoption and implementation of internationally accepted management, systems for quality assurance, environmental management, and worker health and safety ■ Its employees and the creation of a safe and desirable workplace (recognized in 2005 as one of the 20 best places to work in China based on the “Happy Workplace” index) ■ Continuing improvement and innovation through joint ventures and use of state-of-the-art equipment.

1. Ultra-high-temperature (UHT) pasteurized milk does not require refrigeration, thereby providing extended nonrefrigerated shelf life of up to nine months and simplifying shipping and storage for the producer and consumer.

16 THE PROMISE OF PRIVATE EQUIT Y

BACKGROUND
Mengniu is a manufacturer of milk products based in Inner Mongolia, famous for its grasslands and one of the traditional dairy regions of China. Mengniu was privately founded in 1999 by a management team with long experience in one of Inner Mongolia’s state-owned milk product companies,

Similar Documents

Free Essay

Social Studies Problems

...SECTION 7A HEATING AND VENTILATION SYSTEM CAUTION: Disconnect the negative battery cable before removing or installing any electrical unit or when a tool or equipment could easily come in contact with exposed electrical terminals. Disconnecting this cable will help prevent personal injury and damage to the vehicle. The ignition must also be in B unless otherwise noted. TABLE OF CONTENTS Description and Operation . . . . . . . . . . . . . . . . . . 7A-2 Heating and Ventilation Systems . . . . . . . . . . . . 7A-2 Component Locator . . . . . . . . . . . . . . . . . . . . . . . . 7A-3 Control Assembly . . . . . . . . . . . . . . . . . . . . . . . . . 7A-3 Blower Module Assembly . . . . . . . . . . . . . . . . . . . 7A-4 Air Distributor and Heater Module Assembly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7A-5 Diagnostic Informatin and Procedures . . . . . . . 7A-6 Heater System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7A-6 Insufficient Heating or Defrosting . . . . . . . . . . . . 7A-6 Blower Electrical . . . . . . . . . . . . . . . . . . . . . . . . . 7A-10 Improper Air Delivery or No Mode Shift . . . . . . 7A-11 Too Much Heat . . . . . . . . . . . . . . . . . . . . . . . . . . . 7A-13 Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7A-15 Blower Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7A-16 Repair Instructions . . . . . . . . . . . . . . . . . . . . . . . . 7A-18 On-Vehicle...

Words: 18314 - Pages: 74

Free Essay

Hacking the Art of Exploitation

...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...

Words: 139438 - Pages: 558