Between Enforcement and Regulation

Total Page:16

File Type:pdf, Size:1020Kb

Between Enforcement and Regulation Katharina Voss Between Enforcement and Regulation A Study of the System of Case Resolution Mechanisms Used by the Between Enforcement and Regulation Between European Commission in the Enforcement of Articles 101 and 102 TFEU Katharina Voss ISBN 978-91-7797-570-0 Department of Law Doctoral Thesis in European Law at Stockholm University, Sweden 2019 Between Enforcement and Regulation A Study of the System of Case Resolution Mechanisms Used by the European Commission in the Enforcement of Articles 101 and 102 TFEU Katharina Voss Academic dissertation for the Degree of Doctor of Laws in European Law at Stockholm University to be publicly defended on Friday 12 April 2019 at 10.00 in Nordenskiöldsalen, Geovetenskapens hus, Svante Arrhenius väg 12. Abstract This thesis examines the current design of the system of case resolution mechanisms used by the European Commission (the Commission) where an infringement of Articles 101 and 102 TFEU is suspected and advances some proposals regarding this design. Infringements of Articles 101 and 102 TFEU cause considerable damage to the EU economy and ultimately, to consumers. Despite intensified enforcement of Articles 101 and 102 TFEU and ever-growing fines imposed for such infringements, the Commission continues to discover new infringements, which indicates a widespread non-compliance with EU competition rules. This raises the question of whether the enforcement currently carried out by the Commission is suitable for achieving compliance with Articles 101 and 102 TFEU. The thesis is divided into four main parts: First, the objectives pursued by the system of case resolution mechanisms used by the Commission are identified. Second, taking stock, the case resolution mechanisms currently employed are assessed in the light of these objectives. Third, the question of whether and how the different case resolution mechanisms could be viewed through the lens of regulatory enforcement is considered. Fourth, an assessment is made as to whether a different approach to case resolution could be employed based on a prescriptive theory of regulatory enforcement, responsive regulation. The research conducted shows that the main objectives pursued by the system of case resolution mechanisms used by the Commission are: to bring infringements to an end, to punish and deter infringers, to prevent infringements and to clarify competition rules. These objectives shall be achieved in an effective and efficient manner. The case resolution mechanisms that are assessed are Article 7 decisions, Article 9 decisions and cartel settlements. These mechanisms pursue varying sets of objectives. Their fulfilment depends, on the one hand, on the legal and procedural modalities of each case resolution mechanism and, on the other, on the types of cases allocated to that case resolution mechanism. The assessment returns varied results showing that some objectives are difficult for the Commission to achieve. Moreover, the choices made by the Commission when allocating case resolution mechanisms to cases are sometimes counterproductive with regard to the fulfilment of the relevant objectives. Taking into account the different characteristics exhibited by the case resolution mechanisms, an attempt is made to categorise these mechanisms as pursuing different regulatory enforcement styles. The conclusion is that this is not fully possible, exposing the multi-faceted nature of the case resolution mechanisms currently at the Commission’s disposal. Finally, a potential design of a case resolution system based on the theory of responsive regulation is advanced. This design is specifically aimed at remedying some of the deficiencies identified in the current approach to resolving potential infringements of Articles 101 and 102 TFEU. Instead of choosing a case resolution mechanism on a case-by-case basis, a prescriptive system based on infringement history and the cooperation offered by the undertaking would determine what case resolution mechanism to employ. The aim of such case resolution mechanisms would be to reduce the focus on fines. Instead, focus would be placed on cooperation as a means of bringing infringements to an end and preventing infringements by way of corporate compliance programmes. Keywords: EU competition law, enforcement, compliance, antitrust, Regulation 1/2003, case resolution mechanism, regulatory enforcement theory, responsive regulation, corporate compliance programme. Stockholm 2019 http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-163542 ISBN 978-91-7797-570-0 ISBN 978-91-7797-571-7 Department of Law Stockholm University, 106 91 Stockholm BETWEEN ENFORCEMENT AND REGULATION Katharina Voss Between Enforcement and Regulation A Study of the System of Case Resolution Mechanisms Used by the European Commission in the Enforcement of Articles 101 and 102 TFEU Katharina Voss ©Katharina Voss, Stockholm University 2019 ISBN print 978-91-7797-570-0 ISBN PDF 978-91-7797-571-7 Cover Picture: Forth Railway Bridge, Scotland: the Fife cantilever under construction during October 1888 The image and information shown here are provided by © Universal Images Group Printed in Sweden by Universitetsservice US-AB, Stockholm 2019 Für Opa Acknowledgements Writing this doctoral thesis has many times been a rather lonely journey. Yet, at the end of it, there are so many people I would like to thank as there have been numerous helping hands over the years that have, in one way or the other, contributed to my journey towards this finished product. First of all, I would like to thank my supervisors, Antonina Bakardjieva Engelbrekt and Vladimir Bestidas Venegas. The two of you make up the perfect team, complementing one another and providing support at different times. Antonina, without your dedication to detail, numerous comments and questions, this thesis would never have become what it is today. Thank you for that. Vladimir, thank you for supporting me right from the start, for being curious about learning more and for always pushing me further. I would also like to thank those who have read and commented the manuscript at various stages: Erling Hjelmeng, Lars Henriksson, Jane Reichel, Claes Lernestedt, Michaela Ribbing and Mauro Zamboni. I also owe a great deal to Moritz Jesse, without whose encouragement I would never have pursued a doctoral degree in the first place. I would like to thank Elisabeth Eklund and Johan Sahl for their insights from the ‘real world’ of competition law enforcement. I also learned a great deal during my 3-month internship at DG Competition and would in particular like to thank Rainer Becker and Josefine Hederström for their kindness and patience. Thank you to Louise Ratford for language editing the manuscript. Without the community of doctoral students at Stockholm University, my years as a doctoral student would never have been the same. I would like to thank you one and all for sharing ups and downs and for (unwittingly) teaching me Swedish. No need to mention names as you know who you are. A special thanks to Louise Dane without whom these last few months of work on the thesis would have been much harder to bear. I am grateful to Stockholm University and the Swedish Competition Authority for their financial support throughout my time as a doctoral student as well as to Stiftelsen av den 28 oktober, Winroths stipendiestiftelse and Elsa Eschelssons stiftelse. Last, but definitely not least, I would like to thank my family for their unfailing support over the years. Cedric, without you this thesis would never have been written. Thank you for all your help, for being understanding and so supportive always. Samson, du bist Mamas kleiner Schatz, vergiss das nie. Contents 1 Introduction ...................................................................................................... 1 1.1 Aim and research questions ............................................................................................. 5 1.2 Scope ............................................................................................................................... 7 1.3 Terminology .................................................................................................................... 9 1.3.1 Law Enforcement ................................................................................................ 9 1.3.2 Consequentialist and retributionist theories of punishment ............................... 10 1.3.2.1 Deterrence ................................................................................................... 11 1.3.2.2 Retribution ................................................................................................... 13 1.3.3 Regulation ......................................................................................................... 14 1.3.4 Compliance ....................................................................................................... 18 1.4 Method .......................................................................................................................... 20 1.4.1 Approach to research findings from social sciences .......................................... 22 1.4.1.1 Meta studies ................................................................................................. 25 1.4.1.2 Quasi-experimental studies .......................................................................... 25 1.4.1.3 Vignette studies ........................................................................................... 26 1.4.1.4 Surveys .......................................................................................................
Recommended publications
  • The Fourth Paradigm
    ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive
    [Show full text]
  • OECD‘S Directorate for Science Technology and Industry
    THE ECONOMIC AND SOCIAL ROLE OF INTERNET INTERMEDIARIES APRIL 2010 2 FOREWORD FOREWORD This report is Part I of the larger project on Internet intermediaries. It develops a common definition and understanding of what Internet intermediaries are, of their economic function and economic models, of recent market developments, and discusses the economic and social uses that these actors satisfy. The overall goal of the horizontal report of the Committee for Information, Computer and Communications Policy (ICCP) is to obtain a comprehensive view of Internet intermediaries, their economic and social function, development and prospects, benefits and costs, and responsibilities. It corresponds to the item on 'Forging Partnerships for Advancing Policy Objectives for the Internet Economy' in the Committee‘s work programme. This report was prepared by Ms. Karine Perset of the OECD‘s Directorate for Science Technology and Industry. It was declassified by the ICCP Committee at its 59th Session in March 2010. It was originally issued under the code DSTI/ICCP(2009)9/FINAL. Issued under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD member countries. ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 30 democracies work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population.
    [Show full text]
  • Protecting the Crown: a Century of Resource Management in Glacier National Park
    Protecting the Crown A Century of Resource Management in Glacier National Park Rocky Mountains Cooperative Ecosystem Studies Unit (RM-CESU) RM-CESU Cooperative Agreement H2380040001 (WASO) RM-CESU Task Agreement J1434080053 Theodore Catton, Principal Investigator University of Montana Department of History Missoula, Montana 59812 Diane Krahe, Researcher University of Montana Department of History Missoula, Montana 59812 Deirdre K. Shaw NPS Key Official and Curator Glacier National Park West Glacier, Montana 59936 June 2011 Table of Contents List of Maps and Photographs v Introduction: Protecting the Crown 1 Chapter 1: A Homeland and a Frontier 5 Chapter 2: A Reservoir of Nature 23 Chapter 3: A Complete Sanctuary 57 Chapter 4: A Vignette of Primitive America 103 Chapter 5: A Sustainable Ecosystem 179 Conclusion: Preserving Different Natures 245 Bibliography 249 Index 261 List of Maps and Photographs MAPS Glacier National Park 22 Threats to Glacier National Park 168 PHOTOGRAPHS Cover - hikers going to Grinnell Glacier, 1930s, HPC 001581 Introduction – Three buses on Going-to-the-Sun Road, 1937, GNPA 11829 1 1.1 Two Cultural Legacies – McDonald family, GNPA 64 5 1.2 Indian Use and Occupancy – unidentified couple by lake, GNPA 24 7 1.3 Scientific Exploration – George B. Grinnell, Web 12 1.4 New Forms of Resource Use – group with stringer of fish, GNPA 551 14 2.1 A Foundation in Law – ranger at check station, GNPA 2874 23 2.2 An Emphasis on Law Enforcement – two park employees on hotel porch, 1915 HPC 001037 25 2.3 Stocking the Park – men with dead mountain lions, GNPA 9199 31 2.4 Balancing Preservation and Use – road-building contractors, 1924, GNPA 304 40 2.5 Forest Protection – Half Moon Fire, 1929, GNPA 11818 45 2.6 Properties on Lake McDonald – cabin in Apgar, Web 54 3.1 A Background of Construction – gas shovel, GTSR, 1937, GNPA 11647 57 3.2 Wildlife Studies in the 1930s – George M.
    [Show full text]
  • Open Dissertationdraft3.Pdf
    The Pennsylvania State University The Graduate School College of Information Sciences and Technology SUPPORTING THE USER EXPERIENCE IN FREE/LIBRE/OPEN SOURCE SOFTWARE DEVELOPMENT A Dissertation in Information Sciences and Technology by Paula M. Bach © 2009 Paula M. Bach Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2009 The dissertation of Paula M. Bach was reviewed and approved* by the following: John M. Carroll Professor of Information Sciences and Technology Dissertation Advisor Chair of Committee Mary Beth Rosson Professor of Information Sciences and Technology Andrea Tapia Assistant Professor of Information Sciences and Technology Allison Carr-Chellman Professor of Instructional Systems Steven Haynes Professor of Practice of Information Sciences and Technology John Yen Professor of Information Sciences and Technology Associate Dean for Research and Graduate Programs *Signatures are on file in the Graduate School iii ABSTRACT With the increasing number and awareness of free/libre/open source software (FLOSS) projects, Internet users can download a FLOSS tool that meets just about any need. The user experience of projects, however, varies greatly and identifying FLOSS projects that offer a positive user experience (UX) is challenging. FLOSS projects center on software developer activities with little attention to user-centered design activities that could increase the user experience on the project. The purpose of this dissertation is to understand open source software ecology in order to bring support for user experience design activities on FLOSS projects. CodePlex, an open source project hosting website, serves as the open source software ecology. The research consists of two phases, a descriptive science phase and a design science phase.
    [Show full text]
  • Workshop Topics 2015
    Workshop Topics 2015 Bestselling authors and collaborators Bonnie Low-Kramen and Vickie Sokol Evans welcome the opportunity to educate and inspire your administrative staff. Through interactive training, they cover both soft and hard skills resulting in increased productivity as well as a renewed and reenergized commitment to excellence. Contents Soft-Skills with Bonnie Low-Kramen ............................................................................................................................................. 1 Signature Sessions ........................................................................................................................................................................... 1 Communication & Problem Solving......................................................................................................................................... 2 Gender Differences ......................................................................................................................................................................... 3 Topics for Managers ....................................................................................................................................................................... 4 Tech-Skills with Vickie Sokol Evans ............................................................................................................................................... 6 Signature Sessions ..........................................................................................................................................................................
    [Show full text]
  • Motion Capture Technologies 24
    MOTION CAPTURE TECHNOLOGIES 24. 3. 2015 DISA Seminar Jakub Valcik Outline Human Motion and Digitalization Motion Capture Devices Optical Ranging Sensor Inertial and Magnetic Comparison Human Motion Brain + Skeleton + Muscles Internal factors External Factors Musculature Shoes Skeleton Clothes Weight Type of surface Injuries Slope of surface Movement habits Wind Pregnancy Gravity State of mind Environment Motion Capture 푛 Sequence of individual frames 푚 = (푓푘)푘=1 Captured information Static body configuration Position in space Orientation of body Silhouette vs. Skeleton Appearance Based Approaches Eadweard Muybridge, 1878 Boys Playing Leapfrog, printed 1887 Appearance Base Approaches Originally only regular video cameras, CCTV Silhouette oriented 푓푘 ≔ 퐵푘 푥, 푦 ∈ {0, 1} Silhouette extraction is a common bottleneck Model Based Approaches Additional abstraction – 2D, 3D Stick figure, volumetric model, … Skeleton Joint (or end-effector), Bone Undirected acyclic graph 퐽 – tree Joint ~ Vertex, Bone ~ Edge 3×|푉 퐽 | Static configuration ~ Pose 푝 ∈ ℝ 푛 푛 푚 = (푓푘)푘=1= (푝푘)푘=1 Motion Capture Devices Optical Both, appearance and Markerless model based approaches Invasive Inertial Magnetic Only model based Mechanical approaches Radio frequency Optical Markerless MoCap Devices 3D scene reconstruction Multiple views Depth sensors RGB stereoscopic cameras Multiple synchronized cameras Additional sensors Silhouette extraction Depth sensing IR camera, ranging sensor Ranging Sensor - Triangulation Laser
    [Show full text]
  • Software in Flux: Free and Cloudy a Gallaugher.Com Chapter Provided Free to Faculty & Students for Non-Commercial Use © Copyright 1997-2009, John M
    Software in Flux: Free and Cloudy a gallaugher.com chapter provided free to faculty & students for non-commercial use © Copyright 1997-2009, John M. Gallaugher, Ph.D. – for more info see: http://www.gallaugher.com/chapters.html Last modified: March 8, 2009 (draft version: comments very much welcomed) Note: this is an earlier version of the chapter. All chapters updated after July 2009 are now hosted (and still free) at http://www.flatworldknowledge.com. For details see the ‘Courseware’ section of http://gallaugher.com INTRODUCTION For many, software has been a magnificent business. It’s the $200 billion a year juggernaut1 that placed Microsoft’s Bill Gates and Oracle’s Larry Ellison among the wealthiest people in the world. Once a successful software product has been written, the economics for a category- leading offering are among the best you’ll find in any industry. Unlike physical products assembled from raw materials, the marginal cost to produce an additional copy of a software product is effectively zero. Just duplicate, no additional input required. That leads to businesses that can gush cash. Microsoft generates a $1.5 billion a month from Windows and Office, alone2. Network effects and switching cost can also offer a leading software firm a degree of customer preference and lock in that can establish a firm as a standard, and in many cases creates winner-take-all (or at least winner-take-most) markets. But as great as the business has been, the fundamental model powering the software industry is under assault. Open source software offerings – free alternatives where anyone can look at and potentially modify a program’s code – pose a direct challenge to the assets and advantages cultivated by market leaders.
    [Show full text]
  • Simulating High Flux Isotope Reactor Core Thermal-Hydraulics Via Interdimensional Model Coupling
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Masters Theses Graduate School 5-2014 Simulating High Flux Isotope Reactor Core Thermal-Hydraulics via Interdimensional Model Coupling Adam Ross Travis University of Tennessee - Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_gradthes Part of the Mechanical Engineering Commons Recommended Citation Travis, Adam Ross, "Simulating High Flux Isotope Reactor Core Thermal-Hydraulics via Interdimensional Model Coupling. " Master's Thesis, University of Tennessee, 2014. https://trace.tennessee.edu/utk_gradthes/2759 This Thesis is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Masters Theses by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a thesis written by Adam Ross Travis entitled "Simulating High Flux Isotope Reactor Core Thermal-Hydraulics via Interdimensional Model Coupling." I have examined the final electronic copy of this thesis for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Master of Science, with a major in Mechanical Engineering. Kivanc Ekici, Major Professor We have read this thesis and recommend its acceptance: Jay Frankel, Rao Arimilli Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) Simulating High Flux Isotope Reactor Core Thermal-Hydraulics via Interdimensional Model Coupling A Thesis Presented for the Master of Science Degree The University of Tennessee, Knoxville Adam Ross Travis May 2014 Copyright © 2014 by Adam Ross Travis All rights reserved.
    [Show full text]
  • The State of Broadband 2020: Tackling Digital Inequalities a Decade for Action
    The State of Broadband: Tackling digital inequalities A decade for action September 2020 The State of Broadband 2020: Tackling digital inequalities A decade for action September 2020 © International Telecommunication Union and United Nations Educational, Scientific and Cultural Organization, 2020 Some rights reserved. This work is available under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 IGO license (CC BY-NC-SA 3.0 IGO; https:// creativecommons .org/ licenses/ by -nc -sa/ 3 .0/ igo). Under the terms of this license, you may copy, redistribute and adapt the work for non-commercial purposes, provided the work is appropriately cited, as indicated below. In any use of this work, there should be no suggestion that ITU or UNESCO endorses any specific organization, products or services. The unauthorized use of the ITU or UNESCO names or logos is not permitted. If you adapt the work, then you must license your work under the same or equivalent Creative Commons license. If you create a translation of this work, you should add the following disclaimer along with the suggested citation: “This translation was not created by the International Telecommunication Union (ITU) or the United Nations Educational, Scientific and Cultural Organization (UNESCO). Neither ITU nor UNESCO are responsible for the content or accuracy of this translation. The original English edition shall be the binding and authentic edition”. Any mediation relating to disputes arising under the license shall be conducted in accordance with the mediation rules of the World Intellectual Property Organization (http:// www .wipo .int/ amc/ en/ mediation/ rules). Suggested citation. State of Broadband Report 2020: Geneva: International Telecommunication Union and United Nations Educational, Scientific and Cultural Organization, 2020.
    [Show full text]
  • An Antitrust Rule for Software Integration
    An Antitrust Rule for Software Integration J. Gregory Sidakt What is the proper legal standardfor product integration involving software? Because software is subject to low marginal costs, network effects, and rapid technological innovation, the Supreme Court's existing antitrust rules on tying arrangements, which evolved from industries not possessing such characteristics, are inappropriate. In this Article, I ask why firms integrate software products. Next, I review the Supreme Court's tying decisions in Jefferson Parish and Eastman Kodak. I propose an approach to judging the lawfulness of product integration in technologically dynamic markets that supplements the Supreme Court's current standard with four additionalsteps in cases of tying of computer software. Thereafter, I examine the D.C. Circuit's approach to software integration, which arose from that court's 1998 interpretation, in Microsoft II, of an antitrust consent decree between the US. Department of Justice and Microsoft Corporation. I argue that the D.C. Circuit's rule has general applicabilityand should be recognized as the appropriate standardfor software integration under antitrust law. I show how my approach imparts greater clarity to the D.C. Circuit's rule. I examine the competing product integration rule proposed in 2000 by Professor Lawrence Lessig as amicus curiae in the government's subsequent antitrust case against Microsoft, concerning the integration of Internet Explorer and Windows 98. My approach enables Professor Lessig's analysis to be reconciled with the D.C. Circuit's rule, but Professor Lessig's rule, on its own, would contain serious shortcomings. Thereafter, I evaluate Judge Thomas Penfield Jackson's April 2000 findings of law on the integration of Internet Explorer and Windows 98.
    [Show full text]
  • Magic Quadrant for Enterprise Data Loss Prevention Published: 28 January 2016
    G00277564 Magic Quadrant for Enterprise Data Loss Prevention Published: 28 January 2016 Analyst(s): Brian Reed, Neil Wynne Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection. Strategic Planning Assumptions By 2018, 90% of organizations will implement at least one form of integrated DLP, up from 50% today. By 2018, less than 10% of organizations with integrated DLP will have a well-defined data security governance program in place, up from near zero today. Market Definition/Description Gartner defines the data loss prevention (DLP) market as those technologies that, as a core function, perform both content inspection and contextual analysis of data at rest on-premises or in cloud applications and cloud storage, in motion over the network, or in use on a managed endpoint device. DLP solutions can execute responses — ranging from simple notification to active blocking — based on policy and rules defined to address the risk of inadvertent or accidental leaks, or exposure of sensitive data outside authorized channels. Data loss prevention technologies can be divided into two categories: ■ Enterprise DLP solutions incorporate sophisticated detection techniques to help organizations address their most critical data protection requirements. Solutions are packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and agents, or soft appliances for data discovery. Leading characteristics of enterprise DLP solutions include a centralized management console, support for advanced policy definition and event management workflow. Enterprise DLP functions as a comprehensive solution to discover sensitive data within an organization and mitigate the risk of its loss at the endpoints, in storage and over the network.
    [Show full text]
  • Microsoft Word Flowchart Template
    Microsoft Word Flowchart Template Preparative or self-blinded, Barr never ploat any triple! Divalent Desmond always unmake his nippleworts if Ben is segreant or lambastes historically. Emile is fiendishly heftiest after swimming Jeremias put-down his birthstone stalactitically. Every day requirements for helping others move the microsoft word family tree to execute the layout Begin preparing with pool common director of nursing services interview questions and sample answers. Listed below reproduce the detailed functionality of this application and its components. Cash Flow Forecasting with Inflation Adjustment by Jason Varner. Add other shapes to rupture the flowchart. Graph call to create common chart. The Work Breakdown Structure Template. Transform the way society use and visualize data directory you can schedule your best ideas to life. Marketing An encounter of a manufacturing company defining and mapping its processes. Product comparison is country of comparing features and qualities of a product with others to none its usefulness and variety in market to breath more customers and clients. In Visio, designs and drawings are produced from shapes. Flow charts tend we provide people create a common language or reference point when dealing with a distress or process. Want already know more? Operation Description Machine, Device, Jig, Tools, for Mfg. Stay up purchase date judge the latest marketing, sales, and service tips and news. They are used to plot plan data points on horizontal and vertical axis that shows how fast one variable is affected by another. When ready start creating drawings with MS Visio you very few learn enough there way always certain pain of shapes you use.
    [Show full text]