Monday, September 30, 2019

Research method Essay

This research will examine the importance and position of employees in terms of Job Satisfaction and career growth in Jamaica and assess the way in which the needs of the same are met by the banking industry. The approach will be based on proven methodologies applied to the market, starting with an in-depth literature review followed by primary research. This research will concentrate on the research methodologies for the primary research. Research Methodology Before research is undertaken it is important to determine the general approach that is to be used. Looking at the goals that are to be attended and the way research can help attain these goals. Research Framework Eriksson and Wiedersheim-Paul (1997) has stated that the purpose of the research is to tell the readers of the paper the intentions of the study and how these results can be utilised. With the understanding of the purpose the methodological design can take place. There are three general structures that can be used in research terms; exploratory, descriptive and explanatory (Eriksson and Wiedersheim-Paul, 1997). Where there is a problem and the purpose of the study is to increase the understanding of that problem the exploratory approach can be very useful (Saunders et al, 2000). This is an approach that looks at gathering the basic data regarding the problem and the scenario and has the aim of developing that knowledge and proposition that can then be used for further research (Yin, 1994). The descriptive study approach looks at the isolated empirical generalisations that have already been study and published and tries to explain these (Miles and Huberman, 1994). This can be defined as making â€Å"complicated things understandable by reducing them to their component parts† (Miles and Huberman, 1994). This is most suitable where the research is not to look at the research between the causes and the symptoms, but wants to understand, predict or decide (Eriksson and Wiedersheim-Paul, 1997). Explanatory research takes complex issues and then tries to make them more understandable by examining the connections between the different parts by examining cause and relationship (Miles and Huberman, 1994). This is not looking for only traditional causal explanations but seeking to determine them in the way that that research question has been phrased and how the specific factors impact and interact with each other. When this approach is utilised the research need to consider the use of more than a single research model as this would not be sufficient to explain the observed phenomena and create a full explanation that can be tested. It is worth noting that when undertaking research there is no need for the methodology to be confined to only a single approach, indeed it has been suggested that mixed approaches can be very valuable with the research itself broken down into three stages of exploratory, descriptive and explanatory (Reynolds, 1971). The stage of the research depends on the existing knowledge within the area, at the explanatory stage the aim is for the researcher to obtain a better understanding of the area of research. In the following stage there is the aim to develop descriptions of the patterns which are observed that may have been indicated as expected at the exploratory stage (Reynolds, 1971). The last stage is that of explanatory at which stage the research that has already taken place can be utilised in order to determine the relationship between the cause and effect this can then provide a researcher with a cycle of construction of the theory, hypothesis testing and the restatement of the theory (Reynolds, 1971). This research has the aim of collecting data, assessing and describing the patterns seen in the Jamaica banking provisions for its Employees and how the issue of job satisfaction is important. When considering the way in which the research can be undertaken there are two philosophies; inductive and deductive, but both are able to produce valid results (Eriksson and Wiedersheim-Paul, 1997). Where there is the use of empirical data and research will draw conclusions from this empirical data and then applying and apply theories and models observed in the real world this is an inductive approach. Where there is an approach that makes use of existing theories and testing these theories this is deductive research (Eriksson and Wiedersheim-Paul, 1997). This is a part of study where there is the publishing of data and results of different countries are available, but there is not a great deal of empirical evidence to test, as such the approach will be inductive with the use of empirical data and the applications of observed theories to try and explain the differences seen in the student performance levels. This approach to the research will ensure that the attention is focused on what can viable be achieved within the time frame and budget and also on the context of work that has already taken place, which is lacking. The data has to be gathered from the population being sampled, so the next consideration is the way in which sampling will take place. The decisions to use questionnaire is justified as this is the most effective way of ensuring that there is the targeting of the correct respondents and there is also control over the performance of the surveys. The next section will look at why we are using questioners as the research tool Research Tool Questionnaires are one of the most popular ways in which data may be collected. These are used for a range of purposes and will often be the tool used to collect quantitative data. But it is worth mentioning that although this may be classified as mostly a quantitative process of collecting data it may also be a qualitative method, depending on the number, depth and style of the questions. Quantitative research over here has relied more on the large amount of results, with the recorded data being mainly numerical in type and has been suitably used as a method of determining cause and effect relationships (Curwin and Slater, 2001). But this qualitative research is narrower and more concentrated by looking to information to be gained in-depth from a smaller quantity of subjects (Curwin and Slater, 2001). Since the data over here require phenomenal research of Grounded theory as well as historical research hence this Qualitative research is best suited for getting applied (Curwin and Slater, 2001). Since the research undertaken over here has been basically done on analysing how the Employee growth has effected change in the behaviour pattern of Jamaican Banking industry as well as the change in the social pattern of the state, the study of the same is going add something to the existing knowledge. Therefore, we must consider the different aspects of research that will characterise a research project as valid; these may include issues such as reliability, validity, objectivity, causality and bias. These may be seen in the questions that are asked, the way they are asked through phrasing and order, and in questions that are not asked. Therefore the questionnaire has been designed while considering the full possibility of getting certain answers, but in what type of answers are attained and to be seen as impartial. There are different aspects that need to be considered so that it will be accepted and good solid research. The formulation of a questionnaire may be inherently biased and reflect the desired out come rather than an objective research method. Reliability may be perceived as one of the easier objectives. This is often seen as the ability of the same study to be conducted and the results to prove the same, however repeatability does it mean that a research project is valid and can be relied upon (Denzin, 1978). We have considered other aspects of the research rather that just reliability in order to make the project valid. Reliability must also come from the level of confidence that may be seen in a study from the objectivity or recognised subjectivity which may be seen to arise. The project have been undertaken from a subjective perspective and those asking the questions if a face to face method is used, do not known the study purpose. The first stage to recognise that subjectivity is present and then recognised in order to overcome. If we set out to prove a model is true it is easy for the research to be biased, just as if we are looking for specific information other aspects may be ignored or forgotten. As such although the researcher may be biased there are certain measures that can be taken to ensure the research model used can be seen to have been implemented objectively. In designing the questionnaire it is likely that there will be others involved either by way of observation or the correlation of the data. When designing the research questions, there should be no indication of the final purpose of the study, in this way we might limit the bias of the respondents and ensure there is a lower risk of the cross contamination of bias (Denzin, 1978). However, it must also be recognised that we can never completely extinguish research bias. With the consideration and design of the research tool the next consideration is that of sampling. Sampling When looking at the way a sample should be chosen there will be the desire to choose a sample that is representative of the population that is going to be targeted. If the population is not representative then the results will not be representative. The way in which we need to consider the population is to look at the way sampling will be used. In this scale we need to talk to people who are working as a professional in one of the nineteen banks in Jamaica. The first aspect is whether probability or non-probability sampling should be used. Probability sampling is a more random sampling style, the basis of this is that the selection of each respondent is a matter of chance and that all respondents will have an equal chance of being chosen, in many cases this can be a known probably of the respondent being selected. There are a number of sampling techniques that fall into this category. These include simple random sampling, systematic sampling, stratified and cluster sampling. In total there are more than 30 probability sampling techniques (Malhotra, 1999). Random sampling is best defined as a sampling method was any member of the population will not have a zero chance of selection where the chances can be calculated. Looking at these different methods, simple random sampling is the most basic. This is where all members shave the same chance of being chosen and where the knowledge of another population member being chosen for sampling will not alter the odds. A method of undertaking this is choosing names out of a hat or any other random method. Stratified sampling is where the population of the sample is separated into distinct groups which do not overlap; this is where stratification is seen. There will then be samples taken from each of these groups. For example, this may be a sample that is divided into male and females, likewise we may look at those who can and do use the internet and those who do not. There may also be the use of age groups, they key is no overlaps between the groups. The next potential method may be multistage sampling. This may consist of two, three or more stages in the sampling. The process will start with the division of the population into non-overlapping groups as seen with the stratified sampling. However this is only the first stage, following this a sample of the first stage units will be chosen according to different criteria. This can be complex, but we could look at using this to use the second stage to ensure that we can gather results from those who are relevant to the study, such as Employees at the managerial level and have a list of employees working under him. The simplicity of these methods is attractive and the use of random sampling with the use of strafed sampling may be attractive, but there are also difficulties as we are reliant on the probably that the sample will be representative of the sample population rather than an assurance existing that they do not appear to be skewed. In a small sample population it is more important to seek to eliminate this bias than in larger sample groups. In the general population there may need to be a large number of survey’s undertaken before there is the random finding of a respondent that is a ban employee. In order to overcome this danger we will look at non probability sampling techniques as these will have a level of intervention to ensure the sample is representative. The most common is quota sampling, but this will also include judgement sampling, convenience sampling, random route sampling and snowball sampling (Talmage 1988). Quota sampling is exactly as it appears to sound, there are the definition of quotas to be used. In many cases these will consist of gender, age groups and social class quotas, which may or may not have crossovers. This is used widely in commercial settings but this is also a method that is not supported as widely in academic circles (Ojeda and Sahai, 2002). Opportunity sampling is where an opportunity is sought to interview or gain the opinions of a particular group and will then place themselves or the survey in the position of those who may be most appropriate for that study (Talmage 1988). For example, if the employee a bank is placing the interviewer near the business section of the bank may be advantageous. Random route sampling where is there is a route planned and the interviewer may travel that route to gather data and hopefully meet potential subjects. This is a very random method of sampling and is also difficult to gain the correct numbers where there is quantitative data required. Snowball sampling is a method that can be used when there is a scenario of a large level of data being required in a short period of time (Talmage 1988). This may be used with a few key people being approached and interviewed which will then lead to more potential candidates being identified (Talmage 1988). Self section is also a non random type of sampling as the respondents will volunteer themselves and a last type we may consider is that of plausibility sampling which is defined by Talmage (1988) as â€Å"a sample selected because it appears plausible that the members are representative of a wider population, without any real evidence† (page 82). With each of these methods there are advantages and disadvantages, we need to consider which is going to be most appropriate considering the population required and the sample and the sampling method. Looking at all of these it appears that the most appropriate method will be that snowballing, it is not the fastest but it is likely to provide the best results in identifying potential respondents for the research.

Sunday, September 29, 2019

Huckleberry Finn Persuasive Essay

Dominique Garcia English 3 Honors Ms. Boden February 21, 2012 The Adventures of Huckleberry Finn The Adventures of Huckleberry Finn by Mark Twain is a short novel that has been around for more than 100 years. Through the characters Huck and Jim, Twain demonstrates the importance of friendship and humanity in society. This novel is not for the ignorant or uneducated. The novel uses diction to emphasize how the past should not be repeated. The Adventures of Huckleberry Finn should belong in the American Canon because it demonstrates how society contributes to our opinions, morals, and attitude.Many students and adults can relate to Huck’s struggle to become free. Most students who read this novel are between the ages of 15-17. Adolescence is a point in a persons life when they do not know who they are. The book explains the struggle most of us go through. Also, the novel shows the importance of friendship. Through the novel, the students learn that it is right to stand up for a cause. For example, in the novel Huck stands up to racism. This can be applied to someone standing up for someone who is being bullied. Also, the novel contains many historical background of the U.S. A. Through this book we can learn what not to do. Twain emphasizes how evil slavery is and how is should not be done again. Most readers are able to understand this through the choice of words he uses. The novel also shows how ignorant and evil society can be. It lets students open their minds to not judge everyone by society’s standards. However, people complain that Twains diction in the novel is derogatory. African Americans argue that there freedom was hard earned and that the word â€Å"nigger† only emphasizes the negative .Some feel that the word is used in wrong connotation and that the book should be banned. They believe that if the youth read the book than it will only influence the use of the word and racism might begin as a problem again. The Adventures of Huckl eberry Finn by Mark Twain is a novel that has withstand 100 years. People still read it and make connections to the novel thru the themes of freedom, friendship, and society’s standards. However, other people see the novel as derogatory, unsuccessful, and improper.

Saturday, September 28, 2019

Choose any appropriate title ( ART MUSEUM) Assignment

Choose any appropriate title ( ART MUSEUM) - Assignment Example den collection of the Naà ¯ve American materials found in the Chase Fine Arts Center-present the continuing display of their artworks that are in the permanent collection. All the works in the museum covers the modern and contemporary arts providing an extensive overview of creative works from the year 1990 to the most current. All the objects emphasize on the artist works of persons living in the western half of the US. 3. Have a look at the ceramics cabinets 1 through 4 (on the 2nd floor.) What are the organizing principles for each cabinet? What common elements do the objects within each cabinet share and why have they been arranged in that way? In the second floor there are a number of mediums that are used in the museum are utilized. For instance, the piece called Flowers of fate is on display. Painting having a clock and mirror pieces that are well oil painted on a piece of wood. This piece of wood is centered on the idea of our daily experiences. For instance, the clock represents the different perspective of time and the light form above represent the accent of light in our life (Danilov, Victor,59 ) For this reason, the message brought about the piece that demonstrates our everyday experiences on the pieces of art. 4. Objects and items from the museum’s permanent collection are displayed in the gallery areas on the lower first floor. Identify three pieces of art each of which is an example of a distinct genre or style. For each painting/object explain what the genre/style is and why the piece fulfills the generic criteria. Marie Eccles Caine Foundation Gift Klompen has arranged in a different composition a exhibited the spaces and other locations in creative way. The most recent pyramid-like arrangement placed at the Nora Eccles Harrison Museum Art has a composition of 20n different compositions with various rhythms and tones. The world currently seems complex and fragile. This originates from fragile and temporary installation and continues with

Friday, September 27, 2019

Nuclear Weapon Essay Example | Topics and Well Written Essays - 1500 words

Nuclear Weapon - Essay Example That was the first and last strategic use of the "dirty bomb" which left its permanent mark in the form of acute radiation sickness and many lost generations in Japan. Such a mass level of death was only achieved by the Nazi's or blood thirsty conquerors like Genghis Khan who killed indiscriminately and mercilessly. Wiping out the entire population of an enemy country has never been easier. Yet in the aftermath of the Hiroshima and Nagasaki saga the nations of the world woke up to the horrific nightmares of such a drastic strategic weapon use. The use of nuclear weapons was strongly opposed at an international level and nuclear weapons were reduced to their role as political weapons.2Today these weapons have become political instruments with their role in pressuring and dominating other states. Any state without nuclear weapons perceives itself to be "weak" in political negotiations. 3 However super powers like the US have not exactly forgiven their weaker counterparts i.e. those countries who have dared to show defiance by "possessing" nuclear weapons. An example is the recent destruction of Iraq due to its weapons of mass destruction and the threats of a US attack faced by Iran for its hidden weapons of mass destruction.4 Pakistan has never revived from its political instability , since the political turmoil which arose just after the former premier Nawaz Sharif's refusal to sign the CTBT. 5. Arguably the nuclear weapon has become a cultural instrument .The 20th century saw two world wars and many civil wars which reshaped and readjusted the entire world's geography ,history and politics. There was a culture of violence which involved the cowboy style elimination of any state which dared defy a super power. Thus it was a culture of achieving ends by means of mass destruction and bloodshed. The ease with which the "dirty bomb" eliminated the enemy population frightened the warring nations beyond their wits. This is evident from the fact that apart from a few civil wars and regional unrest, there has been no large scale warfare around the world. Now there is a culture of promoting peace and having peace talks as all nations secretly wonder what the other state might be hiding in its weapons arsenal. However another alarming development is the increase in the ambiguous nuclear arsenals and secret war exercises in deserts by many countries like Pakistan and Israel6.The events of the past decade have seen an increase in the strategic, political and cultural importance of nuclear weapons .With in all three of these contexts Nuclear Weapons have become a part and parcel of the defence culture and an important tenet of government and policy. It should be noted in the background that the increase in the availability of the weapons has not been left uncontrolled and unmonitored. In 1957 the IAEA (The International Atomic Energy Agency) was set up to promote peaceful development of nuclear power and also provide for its control and to counter the proliferation of such weapons with in the principles of public international law. The IAEA did indeed encourage peaceful use of nuclear applications and the CTBT (Comprehensive Test Ban Treaty) was a controversial issue of the mid-nineties which prohibited the testing of nuclear technology. Notoriously enough India and Pakistan refused to sign it, making South Asia a politically sensitive nation.7Since

Thursday, September 26, 2019

Differences Between Groups and Teams Essay Example | Topics and Well Written Essays - 1000 words

Differences Between Groups and Teams - Essay Example A group can be defined as the formation of two or more people working together to achieve a common goal (Schermerhorn & Hunt & Osborn, 2003, p.172). Groups can be either formal or informal. Any gathering of multiple employees constitutes a group. When the manager arranges a meeting with the employees the leader is directing his message towards a group. There are five stages that characterize the formation of a group. The stages of group formation are forming, storming, norming, performing, and adjuring. During the norming stage the employee build a bond of trust between them and the other members that helps improve the overall performance. The size of the group is an important factor to consider. The optimal size of a group is between seven to eight members. Group decision making can be improved using techniques such as brainstorming, nominal group technique, and Delphi technique. A team is a type of formal group in which the members work together to accomplish common goals. One of the major differences between a group and a team is that in team settings individual and group accountability exists (Katzenback & Smith, 1993). Companies create teams for strategic purposes, while most work groups are formulated to accomplish specific tasks. Teams tend to be formulated to achieve long term tasks. For example a company can create a quality control team to reduce product defects. Work groups are different because they are typically formed to achieve short term goals. Another discrepancy between teams and groups is the way they operate. The five steps of the participation process of team members are illustrated below: An important aspect of teamwork is the necessity of leadership to manifest itself. Due to the nature of teamwork employees are able to exert leadership while working in settings even if the person is not the official team leader.

Wednesday, September 25, 2019

Comparing any variable, between any two cultures (either ones weve Research Paper

Comparing any variable, between any two cultures (either ones weve discussed in class, or preferably other cultures not dealt with in class - Research Paper Example Since the symbol has to be understood by the public in order to carry meaning but is still used to reinforce or question understandings, there is an interactive cause and effect relationship involved in each symbol. Using semiotic analysis on a single cultural symbol, such as the apple, can reveal how different worldviews can be shaped in different cultures. Semiotics can be defined as an examination of symbols to discover its meaning at various levels. â€Å"Semiology therefore aims to take in any system of signs, whatever their substance and limits; images, gestures, musical sounds, objects, and the complex associations of all these, which form the content of ritual, convention or public entertainment: these constitute, if not languages, at least systems of signification† (Barthes, 1964). The concept of semiotics considers how symbols combine to target a specific group and to convey meaning to them. Analysis breaks images down into signifiers, signified and sign. David Chandler (2006) defines the signifier as â€Å"the form which the sign takes† and the signified as â€Å"the concept it represents.† The ‘sign’ is the meaning that emerges. This meaning provides clues, in the form of denotation and connotation, as to the culture’s dominant worldview. It has been determined that for every symbol, there is some further meaning and often the possibility for multiple interpretations. Denotation and connotation communicate about the ideological myth behind the message. These ideas are best explored by analyzing a symbol such as the apple. Within a Christian-dominated culture, including the modern-day Greek culture, the symbol of the apple has an instant connotation of temptation, evil and destruction. These ideas are conveyed early through stories such as popular children’s shows. As is discussed by Trish Carden (2005), Disney’s production of

Tuesday, September 24, 2019

Week 2 Hand-in Assignment Essay Example | Topics and Well Written Essays - 500 words

Week 2 Hand-in Assignment - Essay Example It consequently follows your every activity on the website that initiated it and the website proprietors receive this information. In E-commerce websites, cookies can and are frequently used to help in keeping the purchase details of each customer. E-commerce website requests for any present cookies when a customer accesses a page. The cookies tell the sites shopping cart what items are in the cart, and when the customer adds a new product or removes it, the server sends a new cookie to the browser that is up to date. When its checkout time, the updated cookie, tells the shopping cart what products have been purchased (Greenstein, 2001, p 35). The transport control protocol (TCP) is a connection-oriented service. This means that it usually has the client and server exchange transport-layer information with one another prior to the flow of the application level messages. Consequently, the client has the responsibility of starting the communication with the server and in order for the server to be able to respond to the client’s first communication, the server needs to be ready. This means that the server application cannot afford to be in an inactive state and must be running even before there is an attempt to generate the communication by the client. Thus, the server application must be executed before the client program (Rajinder, 2007, p

Monday, September 23, 2019

The role of federal agencies in fighting digital crime Essay

The role of federal agencies in fighting digital crime - Essay Example These agencies have to be up to date about all the digital networking so that they can help protect the common people, businesses and governments from getting cheated or played by digital criminals. They know that it is the requirement to keep their strategies in dealing with this threat more innovative so that this problem can be handled appropriately. Mostly the security agencies that work under the government are more influential in countering digital crimes because they have more financial support and thus are more technologically advanced. Political assistance also plays a vital role in increasing their significance. High priority is given to prevent digital crime and efforts are being made to spot crimes before they occur. There are various agencies that are working to prevent this problem. One of these agencies is the Secret Service. This agency is responsible for the prevention of three digital crimes, which are financial institutional frauds that include savings, loans and banks, the access devised frauds that include credit cards, personal identification numbers and passwords, and last but not the least digital crimes conducted on the national level. Another agency that works to prevent digital crime is the Department of Justice. This department takes care of the investigations related to computer hacking, electronic privacy laws and various other digital crimes. It basically takes care of all the legal implications of digital crimes. The department of Homeland Security agency is the combination of two agencies: U.S Customs Service and Immigration and naturalization, and the digital crime that is investigated here with highest level of priority is the child exploitation case (Wiles, 2007, p.90). Federal Bureau of Investigation is one of the largest criminal investigating agencies in the United States and in digital crimes it handles the hacking, fraud via the internet, sending of illegal material across the state borders etc. It works with the

Sunday, September 22, 2019

Oppression in the Twentieth Century Essay Example | Topics and Well Written Essays - 1250 words

Oppression in the Twentieth Century - Essay Example Much of the definition of oppression is attributed to its nineteenth-century roots. Particularly, the works of Georg Wilhelm Friedrich Hegel, Karl Marx, and John Stuart Mill were pivotal in outlining the systematic nature of oppression, which has tremendous influence in its modern forms. On the one hand, the works and philosophies of Gandhi, de Beauvoir, Malcolm X, among others, have added dimensions to oppression, updating its conception to contemporary twentieth century. Imperialism and colonization dominated the discourse on oppression especially during the early part of the 20th century. From Africa, Asia to Latin America, there was a wave of liberation movements that demonstrated various experiences of oppression and the attempts to be free from it. One of these experiences is the emergence of conflicts such as World War II wherein colonies were expected to provide warm bodies to fight in the frontlines as well as supply the raw materials and augment the war chest of their masters. The wartime sacrifices underscore a form of oppression that has permeated since the previous century and has spilled over to the 20th. Then, individual experiences amidst the dawn of modernity and the increased contact of people from various part of the globe gave rise to the growth of nationalism. This aspect is highlighted in the case of Gandhi. He is one of the most vocal advocates of decolonization in Asia. Gandhi’s crusade for India’s independence fro m Britain was inspired by personal maltreatment as he was building his career in Africa as a lawyer. As a non-white person, he experienced being thrown out of first-class train car, barred from certain hotel rooms and beaten for no reason but his color. Gandhi’s philosophy behind the liberation movement he launched underscored a kind of oppression India experienced in its relationship with Britain.  

Saturday, September 21, 2019

Changes in technology Essay Example for Free

Changes in technology Essay Technology enhances globalization. In past two decades, technology burst out like an explosion, definitely, the improvements of technology make our lives much more convenience. And, the advanced technology in microprocessors, Internet, and transportation enable the spreading out of globalization. Hill, C., (2001) stated Globalization has two main components: the globalization of markets and the globalization of product. In other words, the changing in technology would lead to an influence on globalization of markets and globalization of production. The widely use in microprocessors and telecommunications increasing the amount of information being transferred, but lower its cost. This is very helpful in merging markets. The opportunities for companies to expend businesses are raised, due to plummeting in global communication cost. Updated data can be collected, and monitoring overseas markets trend would become easier. Moreover, population of using Internet grows continuously since 1995 (Hill, C., 2001). This helps to create a global audience; advertisings are not restricted by geographic region anymore. Products can sold at overseas, such as Hill, C. (2001) pointed out customer can buy Levis jeans in Paris; McDonalds restaurant located in Tokyo. And, the cost of transportation plummeted, due to the revolutionized in transportation business, also helpful for expansion of business. Manufacturers can transport products at a lower cost and in a shorter time. As the trendy of globalization of production, productive activities spread out over the world, invention and widely use of microprocessors and Internet help supervisor to control the productive activities, and easier to communication to other in the process. The dispersal of production, for instance Hewlett-Packard separated its operations activities to different places, but reducing cost at the same time (Hill, C. 2001). As the decreasing cost in transportation, many businesses move their manufacturing plants to nations that provide cheaper raw materials and nature resources, in order to diminishing their production cost. Summering the above points, the three main changes in technology (microprocessors, Internet, and transportation) have a great supportive to  the globalization of markets and production. If the lower cost of communication does not exist, people around the world would not have so many chances to connect with others and business would not be willing to put money to widen their markets. If the world without Internet and the World Wide Web, people might not able to get the most updated information, the production skills cannot be improved and productive activities cannot be shared. Without the convenience transportation system, customer and provider would not connect each other; products cannot transfer to overseas market. Therefore, people would lose the opportunities to enjoy different products from all around the world. Finally, markets from different countries should not be merged together, and the production process should not spread out. Thats why the technology essential and enhance globalization. The above assignment is coming from the resources of Hill, C., Globalization, International Business, 2001, 3rd ed, McGraw-Hill Higher Education, New York.

Friday, September 20, 2019

Indias Tata Steel Company Analysis

Indias Tata Steel Company Analysis By acquiring Anglo-Dutch steel firm Corus, Indias Tata Steel is now one of the worlds top five steel makers. Professor Tarun Khanna says the fact that the deal is the largest out of India and generated by the private sector makes this a notable event. But now comes the hard part-making the merger work. Can Tata avoid mistakes made by Chinese companies? Key concepts include: * Tatas acquisition of Corus is notable not only for creating a new steel giant, but also because this deal was a private sector venture far from Indian government influence. * Tata should be able to make the merger work by virtue of its position of financial strength as well as previous cross-border experiences. The West should not underestimate this heretofore relatively unknown competitor. Contents INTRODUCTION TATA STEEL C0MPANY:- Tata Iron Steel Company Ltd. (TISCO) is the iron and steel production company associated with the Tata group of some 80 different industrial and other business enterprises in India, founded by members of the Tata family. TISCO operates as Indias largest integrated steel works in the private sector with a market share of nearly 13 present and is the second largest steel company in the entire industry. Its products and services include hot and cold rolled coils and sheets, tubes, construction bars, forging quality steel, rods, structural, strips and bearings, steel plant and material handling equipment, Ferro alloys and other minerals, software for process controls, and cargo handling services. Through its subsidiaries, TISCO also offers tinplate, wires, rolls, refractories, and project management services. Tata Steel was established by Indian Paris businessman Jamsetji Nusserwanji Tata in 1907 (he died in 1904, before the project was completed). CORUS STEEL COMPANY:- Corus Group was created in October 1999 through the merger of British Steel and Koninklijke Hoogovens, and consists of mills and service canters, that produce and distribute steel products to customers worldwide. Corus service Centres, part of Corus Group with sales of over $2 billion, process and distribute products such as coil, sheet, structural sections, bar, tube, and plate products. They provide a variety of processing services such as slitting, levelling, shearing, sawing, and a range of multi-step plate processes. 1 LITERATURE REVIEW CHANGE MANAGEMENT AND LEADERSHIP: CHANGE MANAGEMENT: It is a organized approach to trade with change, both from view of an organization and on in the individual level. This of change management assignment relates to transformation theory. As in an organization changes transform by the leader Mr.RattanTata (CEO) for the reputation and profitability of an organization. CHANGE MODEL: The three stages of change that are still the basis of many approaches today. Unfreeze:- The term change ready is often used to describe people who are unfrozen and ready to take the next step. Some people come ready for change whilst others take a long time to let go of their comfortable current realities. Changing:- may be hard for the individual, often the hardest part is to start. Even when a person is unfrozen and ready for change, that first step can be very scary. Transition can also be a pleasant trap and, as Robert Louis Stephenson said, It is better to travel hopefully than arrive. People become comfortable in temporary situations where they are not accountable for the hazards of normal work and where talking about change may be substituted for real action. Refreeze At the other end of the journey, the final goal is to refreeze, putting down roots again and establishing the new place of stability. In practice, refreezing may be a slow process as changing seldom stop cleanly, but go more in fits and starts with a long tail of bits and pieces. There are good and bad things about this. 2 LEADERSHIP: It is the influencing process of leadership and followers to achieve organisational objectives through change. For achievement and growth of the company, Mr.Rattan Tata change the leadership with employees. STYLE OF LEADERSHIP: Transformational leadership in terms of how the leader affects followers, who are intended to trust, admire and respect the transformational leader. He identified three ways in which leaders transform followers: Increasing their awareness of task importance and value. Getting them to focus first on team or organizational goals, rather than their own interests. Activating their higher-order needs. 3 OBJECTIVES OF CHANGE The main objective of Merger Acquisition transaction is as follows: Proper utilization of all available resources. To prevent exploitation of unutilized and underutilized assets and resources. Forming a strong human base. Reducing tax burden. Improving profits. Eliminating or limiting the competition. Achieving savings in monitoring cost. REASIONS FOR MERGING FOR CORUS:- Total Debt Of Corus Is 1.6 Ban Gap. Corus Needs Supply Of Raw Material At Lower Cost. Though Corus Has Revenue Of $ 18.06 Ban Its Profit Was Just Of $626 MN. Corus Facilities Were Relatively Old With High Cost Of Production. Employee Cost Is 15% While That of Tata Steel Is 9%. Tata had a strong retail and distribution network in India and SE Asia. This would give the European manufacturer an in-road into the emerging Asian markets. FOR TATA:- Tata Was Looking To Manufacture Finished Products In Mature Markets Of Europe. A Diversified Product Mix Will Reduce Risks While Higher End Products will add to bottom line. Corus Holds A Number Of Patents And RD Facility. Tata Is Known For Efficient Handling For Labour And It Aims At Reducing Employee Cost and Improve Productivity. It Will Move From 55th Position In World To 5th In Production Of Steel Globally. Tata was a major supplier to the Indian auto industry and the demand for value added steel products was growing in this market. Hence there would be a powerful combination of high quality developed and low cost high growth market 4 CHANGES:- Corus legal identity was changed last November to Tata Steel Europe. Kirby Adams, MD and CEO of Tata Steel Europe. With the transition to Tata Steel name our customers have the reassurance that the technical ex annual revenue and work force of 50,000 employees Valuing the Acquisition. Method used Enterprise Value Multiple. (EV represents a companys economic value the minimum amount someone would have to pay to buy it outright) Precise and capability earned over a long and successful period will be enhanced by aligning a world-class product with a global leader in steel production. IMPLEMENTATION OF CHANGE MODEL: Market has not responded well to this deal as the price of the stocks fell. Investors are worried about cash outflow and the resultant strain on companys balance sheet. Of the total cash to be paid in the deal $4.1 billion will be forked by Tata steel, rest of the money will be as debts and will be returned from Corus cash flows. No merger is riddle free and almost every has a bit of it. Tata steel needs to concentrate on bringing down the production cost, which is high now. They need to use the best of their management skills. Rattan Tatas dexterity has worked out for the benefit of the group and this time will be no exception. The shareholders need to keep their faith intact in the group and this will pay as it has before. 5 AFTER MERGER: THE GLOBAL STEEL INDUSTRY:- The current global steel industry is in its best position in comparing to last decades. The price has been rising continuously. The demand expectations for steel products are rapidly growing for coming years. The shares of steel industries are also in a high pace. The steel industry is enjoying its 6th consecutive years of growth in supply and demand. And there is many more merger and acquisitions which overall buoyed the industry and showed some good results. The subprime crisis has led to the recession in economy of different Countries, which may lead to have a negative effect on whole steel industry in coming years. However steel production and consumption will be supported by continuous economic growth. 6 CONTRIBUTION OF COUNTRIES TO GLOBAL STEEL INDUSTRY The countries like China, Japan, India and South Korea are in the top of the above in steel production in Asian countries. China accounts for one third of total production i.e. 419m ton, Japan accounts for 9% i.e. 118m ton, India accounts for 53m ton and South Korea is accounted for 49m ton, which all totally becomes more than 50% of global production. Apart from this USA, BRAZIL, UK accounts for the major chunk of the whole growth. The steel industry has been witnessing robust growth in both domestic as well as international markets. In this article, let us have a look at how has the steel industry performed globally in 2007. 7 CAPACITY:- The global crude steel production capacity has grown by around 7% to 1.6 ban in2007 from 1.5 ban tonnes in 2006. The capacity has shown a growth rate of 7% CAGR since 2003. The additions to capacity over last few years have ranged from 36 m tonnes in 2004 to 108 m tonnes in 2007. Asian region accounts for more than 60% of the total production capacity of world, backed mainly by capacity in China, Japan, India, Russia and South Korea. These nations are among the top steel producers in the 8 AFTER MERGER: BENEFITS:- Corus well known strength is the production of high-end steel-used in construction automobile and aircraft as well as its impressive research and development will complement Tata Steel. The merger will also give it access to the important markets of Europe. All that will benefit Corus is the management expertise of the Tatas and their cost advantage in producing steel. With their acumen they will bring down the production cost of Corus. Tata Steel expects to earn $300 million per year through cost savings. Market has not responded well to this deal as the price of the stocks fell. Investors are worried about cash outflow and the resultant strain on companys balance sheet. Of the total cash to be paid in the deal $4.1 billion will be forked by Tata steel, rest of the money will be as debts and will be returned from Corus cash flows. No merger is riddle free and almost every has a bit of it. Tata steel needs to concentrate on bringing down the production cost, which is high now. They need to use the best of their management skills. Rattan Tatas dexterity has worked out for the benefit of the group and this time will be no exception. The shareholders need to keep their faith intact in the group and this will pay as it has before. 9 CHANGE AGENT: I believe this will be the first step in showing that Indian industry can in fact step outside the shores of India in an international marketplace and acquit itself as a global player. RATAN TATA RESISTANCE: Takeover defences include all actions by managers to resist having their firms acquired. Attempts by target managers to defeat outstanding takeover proposals are overt forms of takeover defences. Resistance also includes actions that occur before a takeover offer is made which make the firm more difficult to acquire. The intensity of the defences can range from mild to severe. Mild resistance forces bidders to restructure their offers, but not prevent an acquisition or raise the takeover price substantially. Severe resistance can block takeover bids, thereby giving the incumbent managers of the target firm veto power over acquisition proposals. A natural place to begin the analysis of takeover defences is with the wealth effects of takeovers. There is broad agreement that being a takeover target substantially Increases the wealth of shareholders. Historical estimates of the stock price increases of target firms are about 20% in the mergers and about 30% in tender offers. The large gain for target stockholders in takeovers seems to imply that all takeover resistance is bad. Resistance makes the firm more difficult to acquire. If the defence works, it lowers the probability of a takeover and stockholders are thus less likely to receive takeover premiums. Takeover resistance can benefit shareholders. Stockholders are concerned about the market value of the firm 10 CONCLUSION:- Conclusion With Corus in its fold, Tata Steel can confidently target becoming one of the top-3 steel makers globally by 2015. The company would have an aggregate capacity of close to 56 million tonnes per annum, if all the planned Greenfield capacities go on stream by then. We can conclude that if the acquisitions well planned, Executed and the necessary precautions taken for the deal a company can achieve its strategic objectives and thus ensure its growth through Acquisition. 11 REFRENCES 1 www.tatabolaji.com/opinionbymihirmishra 2 www.invera.com/new/corus/indexshtm 3 www.tatasteel.com>company 4 www.scrib.com/doc/mergeoftatasteelandcorus 5 www.barometer.edlman.comtrust/2009/ 6 www.sixsigmail9.com/article.cfm 7 Leading Change by John P. Katter 8 Managing Change and Transition by Richard Lucked 9 Change Management by Jeffrey Hiatt and Timothy Crease 10 The Change Management Pocket Guide by Kate Nelson and Stacy Aaron 11 Leading Change by James OToole. 12

Thursday, September 19, 2019

Looking out for number one Essay -- essays research papers

Looking Out for Number One: Conflicting Cultural Values in Early Seventeenth-Century Virginia   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  By: T.H Breen   Ã‚  Ã‚  Ã‚  Ã‚   The main focus of Breen's essay the focus is on the fact that colonists in Virginia were driven and motivated to come to the New World, predominantly for monetary reasons. Virginia's soil was found to be unusually well suited for growing tobacco, which is why it drove such a variety of people to migrate there. The colonists, though said to be religious, were extremely individualistic, selfish, as well as primarily drawn in by the economic opportunity in Virginia. These attitudes and ideals are what consequently resulted in numerous military defeats and massacres. They avoided their military obligations, thus naming them the vulnerable â€Å"poorly defended white settlements.† These settlements were very easy for the Indians to take advantage of, as Breen writes.   Ã‚  Ã‚  Ã‚  Ã‚  Early Virginia's flourishing cultivation of tobacco drew a diversity of people, from fresh war veterans and former soldiers, to adventurers and ordinary people looking to recoup from former monetary losses. However the tobacco did not only alter the country culturally and economically, but it â€Å" threw more wood into the fire.† It strengthened the infamous individualistic attitude the colonists had. The advent...

Wednesday, September 18, 2019

Purpose :: essays papers

Purpose The purpose of this paper is to review and understand the different ways technology can enhance physical education. The use of technology has a great influence on the strategies and teaching methods used by physical educators. Method/Results One way is to use electronic pedometers. Electronic pedometers allow students to determine the distance they walked ran or used other locomotor skills to move. Pedometers are widely used in fitness evaluations. With the use of these digital electronic pedometers, students can understand how far they have moved using the various locomotor skills done in physical education. It also allows students to determine the various distances for each activity they have completed in Physical education class. That technology can enhance physical education is with the use of hearth rate monitors. Students will learn how to wear, use and gather data form the heart rate monitor. With the use of heart rate monitors students will become knowledgeable of how and where they should be with their level of fitness against the fitness level of other students. â€Å"Heart monitors provide a way to measure improvements in fitness levels, below maximum effort, and recovery. â€Å"Online technology for physical education keeps students and teachers up to date with the latest developments in the use of technology in physical education†. (Siedentop, 2004, p.274) The internet also gives students different ways to interact in physical education; they can look up spots, games, and fun things to do when they are not in the classroom. It is important that students continue to participate in physical activity even when they are not in school. The computer revolutionized the way we live, work, and go to school. The use of a computer is very important to the physical education teacher. The greatest value of computers may reside in the ability to provide improved support to classroom instruction, and the variety of software programs that can be used in conjunction with physical education. Some programs are available to track grading, student fitness performance. Technology is such a big resource to physical education, and the reason that we need to have these forms of technology in physical education, is due to the fact that the nation is staggering through life with the worst health problems that it has ever faced. Cardiovascular disease is the number one killer in America. Lack of exercise is considered to be one of the major risk factors for heart disease. Conclusion Adopting a physical lifestyle early in life increases the likelihood that young children will learn to move and become more physically fit.

Tuesday, September 17, 2019

The Great Depression Essay -- essays research papers

Carmack 2 The Great Depression   Ã‚  Ã‚  Ã‚  Ã‚  The Great Depression is known as a time of economic disaster, and for its impact on the social structure of families. As times got harder, the family way of life changed. Families that were well off did not suffer as much as those that were already struggling. When men lost their jobs they also lost the ability to support their families. Children were forced to leave home and find work without adequate schooling. The Great Depression affected people both physically and psychologically. It was an era of unemployment, family struggles, and the way they survived.   Ã‚  Ã‚  Ã‚  Ã‚  The Great Depression was an era of unemployment. One of the main causes of unemployment was the combination of the greatly unequal distribution of wealth throughout the twenties. The unequal distribution of wealth had gone on forever. Money was distributed disparately between the rich and the middle class, between the United States and Europe, and even between industries and agriculture. The unequal distribution of wealth had created an unstable economy. Companies were losing money because of this unstable economy so there for they had to make some changes. The first thing that had to be done was to save money and they did this by cut the pay role. Employees of many years were fired or took massive pay cuts. The employers only kept a select few workers that they had to have. Carmack 3 If one did not make the employer’s expectation, they were fired.   Ã‚  Ã‚  Ã‚  Ã‚  Monte Cristo had a list, a little roll call. And one by one he took them each for a ride Saying One and Two and Three and so on Till the names were all crossed off And he had cleabsed the world of a giving number Of betrayers who had personally wronged him. He was judge, jury, and executioner   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (Sandburg 445) Finding a replacement was not difficult since everyone; men, women, children, and even grandparents, were looking for work. I’m not asking for social equality, †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ All I want is a job with a decent wage, To exist now and provide for old age. So kindhearted employers, my case is up to you, Give me something to do. (Proudberg 9-16) With few job openings and so many people looking fo... ...yday study the buffalo on the nickel, †¦. Study before the nickel, the dime is spent.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (Sandburg 456) A lot of the people today have long forgotten the lessons that their parents had taught them. Today people really do not appreciate the value of a dollar, but they know all about â€Å"plastic,† or commonly known as credit cards. I think a small dose of depression would do people today some good but not too much, because I think we would have a lot more people killing themselves and others just because people have fewer moral values today. Carmack 8 Worked Cited Hawes, Joseph M. Children Between the Wars. Ed. Joseph M. Hawes., N. Ray Hiner. New York: Twayne Publishers, 1997. Proudbeg, Jim. â€Å"Poor Nut Ambitious (too Proud To Beg).† 21 Apr. 2000. http://www.mudcat.org/!!-song99.cfm?stuff=fall99+9902682. Sandburg, Carl. The Complete Poems of Carl Sandburg. New York: Harcourt Brace Jovanovich, 1970. Underwood, Mark. â€Å"Black Thursday.† The New York Times on the web. 1 May. 1996. 4 Apr. 2000 . The Great Depression Essay -- essays research papers Carmack 2 The Great Depression   Ã‚  Ã‚  Ã‚  Ã‚  The Great Depression is known as a time of economic disaster, and for its impact on the social structure of families. As times got harder, the family way of life changed. Families that were well off did not suffer as much as those that were already struggling. When men lost their jobs they also lost the ability to support their families. Children were forced to leave home and find work without adequate schooling. The Great Depression affected people both physically and psychologically. It was an era of unemployment, family struggles, and the way they survived.   Ã‚  Ã‚  Ã‚  Ã‚  The Great Depression was an era of unemployment. One of the main causes of unemployment was the combination of the greatly unequal distribution of wealth throughout the twenties. The unequal distribution of wealth had gone on forever. Money was distributed disparately between the rich and the middle class, between the United States and Europe, and even between industries and agriculture. The unequal distribution of wealth had created an unstable economy. Companies were losing money because of this unstable economy so there for they had to make some changes. The first thing that had to be done was to save money and they did this by cut the pay role. Employees of many years were fired or took massive pay cuts. The employers only kept a select few workers that they had to have. Carmack 3 If one did not make the employer’s expectation, they were fired.   Ã‚  Ã‚  Ã‚  Ã‚  Monte Cristo had a list, a little roll call. And one by one he took them each for a ride Saying One and Two and Three and so on Till the names were all crossed off And he had cleabsed the world of a giving number Of betrayers who had personally wronged him. He was judge, jury, and executioner   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (Sandburg 445) Finding a replacement was not difficult since everyone; men, women, children, and even grandparents, were looking for work. I’m not asking for social equality, †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ All I want is a job with a decent wage, To exist now and provide for old age. So kindhearted employers, my case is up to you, Give me something to do. (Proudberg 9-16) With few job openings and so many people looking fo... ...yday study the buffalo on the nickel, †¦. Study before the nickel, the dime is spent.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (Sandburg 456) A lot of the people today have long forgotten the lessons that their parents had taught them. Today people really do not appreciate the value of a dollar, but they know all about â€Å"plastic,† or commonly known as credit cards. I think a small dose of depression would do people today some good but not too much, because I think we would have a lot more people killing themselves and others just because people have fewer moral values today. Carmack 8 Worked Cited Hawes, Joseph M. Children Between the Wars. Ed. Joseph M. Hawes., N. Ray Hiner. New York: Twayne Publishers, 1997. Proudbeg, Jim. â€Å"Poor Nut Ambitious (too Proud To Beg).† 21 Apr. 2000. http://www.mudcat.org/!!-song99.cfm?stuff=fall99+9902682. Sandburg, Carl. The Complete Poems of Carl Sandburg. New York: Harcourt Brace Jovanovich, 1970. Underwood, Mark. â€Å"Black Thursday.† The New York Times on the web. 1 May. 1996. 4 Apr. 2000 .

Monday, September 16, 2019

Choir Concert Review Essay

Music has been a part of my life since as far back as I can remember, it is something that I truly enjoye and find to be very therapeatic. I have always had a love for music , going back to the days of elemantary school when I had been in music class , I always knew that music would be womething that was in my blood. Actually I am from Mongolia which is so different country compare to America . I always wanted to join singing club or choir. But i have not gotten a chance to join such a thing because of my religion. Basically , It was my first time , I had opportunity to show Choral Concert which was held on the October 9 , on the Immanuel Lutheran Church. Everyone who was in attendance was dress up so nice and they were singing from heart. I enjoyed listening to the our friends as they sung the different melodies. As i was sitting there listening to the singers sing , i think about how strong there voices are and how strong they must be to get over the big space of the performance ce nter. The choir performed a variety of songs, new spins on classic hymns and spirituals, modern treatment of old texts and a taste of pop and jazz. Songkar and Schola Contorum provided piona accompaniment for some of the songs and performed beautifully. I was extremely impressed by the talented choir members from Waldorf College and their ability to sing such a varied range of songs. The music I really enjoyed was piece by Lord of Dance and Voice Dance were a much happier song and those songs had a faster tempo than the other songs and was a great way to conclude the concert. The concert demonstrated the vocal capabilities of the Choir members. The songers were able to express different emotions through the traditional spiritual song such as † Elijah Rock † and the more torch song such as † Beautiful Savor† . The solos allowed particular students to display thier talents and the piona accompaniment provided a pleasent background for choir concert. I enjoyed watching the way the conductor conducted the choir and I noticed how much effort goes into conducting. At first , I thought that he was just waving his hands in the air, but then I realized there was a pattern to it and that not only keep it on beat but it also did other things as well. I like how when the Choir was singing that different parts of it would stop and other parts would keep going and then it would switch and the parts that stopped would start again and the ones that were singing.

Conclusion on Poem in the Bazaar of Hyderabad Essay

Summary: It is a beautiful poem written by Sarojini Naidu. She has used good language and fluent English which is quite surprising as she is an Indian poetess. She has described the beauty of a traditional Indian market or â€Å"bazaar†. She has touched upon all five senses. We can hear the music produced by our traditional Indian musical instruments played by the musicians and the chantings of the magicians. Delicious fruits like citron, pomegranate and plum are being sold by the fruit-men, while the vendors are weighing saffron, lentil and rice (Indian staple food). The pleasant fragrance of sandalwood an henna can be smelt. Also the smell of flowers which are woven into chaplets and garlands is in the air. One can see the richness of wares in the bazaar. The poetess has metiond colours such as crimson, purple, silver, amber, azure and red. The shows what all goods are sold in an Indian bazaar. Turbans of crimson and silver, tunics of purple brocade, , mirrors with panels of amber, daggers with handle of jade, chessmen, ivor dice, anklets, wristlets, rings, bels for the fet of blue pigeons, girdles of gold, and scabbards for the king are all examples of the expensive wares sold in the bazaars of Hyderabad. Message: First of all, one must know that this poem was written during the freedom struggle of India, So Sarojini Naidu has been trying to unite the Indians to drive the British out of India. She is trying to encourage the Indians to buy goods from their traditiona bazaars rather than purchasing foreign goods. She is telling her country men to take part in Gandhiji’s Swadeshi movement and boycott all British goods. At that time the publication of Indian newspapers were banned, so writing a poem was the best way to spread this message.

Sunday, September 15, 2019

Aircraft Solutions Essay

SecurityAircraft Solutions Security and Policy Assessment Table of Contents Executive Summary1 Company Overview1 Security Vulnerabilities1 Decentralized Anti Virus1 Access Control List Policy3 Recommended Solutions6 Bitdefender6 AlgoSec Security Management Suite7 Impact on Business Processes7 Budget8 Summary8 References9 Executive Summary As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours. Company Overview Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered. Security Vulnerabilities Decentralized Anti Virus In reviewing the software utilized by Aircraft Solutions, it is stated that security is handled by anti-virus software that is independently operated for all workstations and servers. This seems to be a continuation of the host centric theme as evidenced by host based IDS. Whereas host based IDS can be seen as a more viable alternative to network based IDS, the same cannot be said for anti-virus software in this scenario. Given that the company operates two individual physical locations that run the gamut from design to production, it can be assumed that their employee pool is not small despite actual numbers not being mentioned. With these numbers, it is quite unlikely that all employees are maintaining their due diligence in ensuring that they are properly updating their anti-virus applications and operating them in such a manner that they are being used efficiently. The primary weakness of this policy is that the end user is responsible for its upkeep. It is reasonable to assume that someone working in a loading dock may not have the same level of computer aptitude as an engineer and would be more likely to cause a break in security by allowing a virus into their computer and threaten the network (Department of Homeland Security, 2012). As security is only as strong as the weakest link, this opens the proverbial floodgates of illicit access to the company network. This is problematic in that official statistics gathered in 2012 estimated that the United States ranks third in the world with 50. 1% of all unique users detecting threats from a virus (Kaspersky Security Bulletin, 2012). The most common virus credited with 75. 01% of all online attacks with 712,999,644 instances are malicious URLs (Kaspersky Security Bulletin, 2012) that can infect a computer without the user even realizing what has occurred. Not even anti-virus software will keep a user completely safe as it is reported that 32% of all users have been infected with a virus despite such protection measures (Zorz, 2010). Once infected, viruses can either cause extreme lag with the network, slowly gather information to be used against the company or sold to anyone willing to purchase it, or even cause damage to physical components used in the business (Weinberger, 2012). There are many other nefarious effects of an infected computer within a network that can cripple productivity and cut into the revenue generating capacity of the company. When you take into consideration that a slower network will cause a decrease in company production and will not reduce the cost of daily operations in terms of equipment, utilities or workforce then you must look at the financial ramifications of such an event. The creation and dissemination of viruses has become big business that will grow exponentially as it has moved from the stereotypical basements of hackers into the realm of organized crime and legitimized aspects of armed services for many nations the world around (Fisher, 2012). It is reported that worldwide, viruses have stolen approximately $1. 6 trillion (CMP Media Inc. , 2013) from the global economy. Access Control List Rule policy Security policy at Aircraft Solutions dictates that all firewall and router access control rules pertaining to packet flow be evaluated on a bi yearly basis. Network infrastructure documentation for the company lists one firewall and two routers that are currently in operation that fall within these parameters. Within the San Diego headquarters, all of these devices act as a bulwark against any unwanted intrusion from the Internet at large. Documentation also details there are contractors and suppliers along with customers to contend with regarding external access to the network through these devices. Looking at the internal physical topology it is seen that there is a single router providing packet control for all traffic between the Defense Division in Santa Anna and the rest of the company consisting of Human Resources, Accounting, Direct Computer Numerical Control, Sales and Marketing, IT, and information from the database. Conversely, this same router would also have to act the single point of control between all internal departments at San Diego as it is the only piece of equipment that possesses layer three functionality before passing the firewall. Given these relationships this demonstrates these three devices, particularly the router connecting Santa Anna and San Diego, require extremely detailed and expansive routing rules to effectively run the business. Departmental access list rules could for the most part remain static and not require a great deal of attention once implemented as IP schemas would be established ahead of time for each department. Issues begin to arise when you take into account that over the course of two years, multiple projects will most likely be spun up, numerous â€Å"unique circumstances†, and growth of the network will create a myriad of antiquated access control rules that will represent gaping holes in security that can allow unauthorized access to sensitive company materials and intellectual property. This would also lead to a lack of documentation of access control rules so that there would be no manner in which to simply reference which rules were in place and for what reason. Each annual security review will then sideline the IT department as it analyzes the access control list rules and begins to path them out to their respective devices. At this point, ownership of the device would have to be established, the purpose of that device, and then verifying if access was still warranted. Disagreements at this juncture would result in managerial oversight as department heads would then have to present their cases for and against access. Obviously, this would draw management, especially that of IT, into contracted deliberation that would distract from day to day business. A lack of an overall firewall policy, a bi yearly evaluation of access control list rules, and the previously mentioned issue of non centralized anti-virus software creates a very dangerous environment for data security. A port that is opened for user access is a window into the company’s network that can ultimately be exploited. The more ports that are left open, the greater the opportunity for intrusion. This same lack of a detailed firewall policy also entails that these multiple holes in security can vary in scope since there is not a set control in place to reign in the extent of the security exception being asked (Hogg, 2011). These open ports make the company susceptible to port scanning as outside entities search for network soft spots that can be exploited to gain entry. These scans occur with such constant frequency that they are referred to as Internet background radiation (Notenboom, 2008). Given these factors it is a foregone conclusion that there will inevitably be a breach of the network as a result. Such an event would result in loss of intellectual property, decrease of production, and repeated incidents would create a devastating loss of trust in the eyes of customers. An ancillary security risk is derived from the time and energy spent by IT during each manual review of all access control listings in the firewall and routers. It is feasible that each rule will take an average of an hour to complete if all goes smoothly with tracing the routed path from beginning to end, complying with internal ticket work, verifying the device, and accepting a reason for the route to be in existence. More time would be expended by both engineering staff and then management if there was a dispute as to if a rule should be left in place or not. In terms of just the basic work to go through all the established rules that will accumulate over the course of 2 years, a conservative estimate of 25 requests for new rules per week (based on personal experience within a mid-sized company) would yield a total of 2600 new lines to be analyzed. Assuming approximately a third of these rules could be associated together as projects are increased or decreased, that leaves roughly 866 lines that translates into as many employee hours that will be occupied for this task over the course of 108 days. A team of five in the IT department would require just over 21 full working days to effectively handle this task at a cost of $2,898. 75 to have entry level Network Engineers (Salary. com, 2013) dedicated to the task . If a quarter of these rules are disputed, then the company will pay out another $9,964. 70 (Salary. com, 2013) of lost productivity as the IT manager has to contend with other managers to mediate the need for the rules. It is likely that this endeavor would constitute a major departmental project at the end of the 2 years instead of being worked on throughout the duration. During this time, other work will be assigned to secondary status and put projects and perhaps updates that could be critical in risk of being done on time as all energy and focus resides on the access evaluation. Recommended Solutions Bitdefender To effectively control antivirus from a central source that will push updates to all network devices, demand all equipment connecting has antivirus and allow for mobile devices to be used without issue, Bitdefender small business pack would be the ideal choice. Given that this application suite will provide service to all Windows OS’s from XP to Windows 8 along with Macintosh and Linux support [ (Squidoo. com, 2012) ], it is perfect for allowing outside vendors who may not conform strictly to the Windows platform adopted by Aircraft Solutions. Support for the product is offered by email, and phone coupled with configuration assistance free of charge. As it was not definitely declared how many employees are with Aircraft Solutions, there is a pricing scale of $449. 95 per year for 20 computers and 20 mobile devices [ (Bitdefender, 2012) ]. AlgoSec Security Management Suite In terms of Access Control List management on the firewalls, industry reviews would recommend a single piece of software, Algosec Security Management Suite. With this application, all a user is required to do is simply enter in the IP of the device wanting entry to the network as well as the IP of the device is wishes to access. Algosec will then compute the path from source to destination, provide a listing of all firewalls in the path, and then list out what changes would need to be made to firewall configuration. With a click of a button, it would even implement these changes thereby freeing an inordinate amount of time on the part of IT staff and management [ (AlgoSec, 2012) ]. Cost of the application is approximately $10,000 [ (AlgoSec, 2013) ] which also include support of the product and updates. Impact on Business Processes Implementation pains felt as both Bitdefender and AlgoSec are introduced will be minimal at best. In each instance, less work will be required of employees as they are no longer responsible for their own antivirus and the process by which firewall flows are drafted and put into configuration will be dramatically increased. The point of contention that might make itself known will be at the onset of these applications being installed as they will require some new policy changes. At first, there will most likely be an uptick in questions asked of IT as employees want to know what is required of them with Bitdefender antivirus. It will also require new policy on the part of IT in terms of management of the application as well as procedures for pushing updates into the network. AlgoSec will be almost entirely without incident as it will create a process by which a request is put in for access and instead of being delayed as the path is verified, it can move directly into managerial oversight for approval. Budget Product| Features| Cost| Bitdefender| Centralized AV updatesScalable user supportInternal firewallIntuitive GUIApplication supportInstallation assistance| $449. 95 per year per set of 20 computers/20 mobile devices| AlgoSec| Firewall path operation automationFirewall configuration change automationNegates access control rule auditsProduct support and updates| $10,000 (approximate quote)| Summary Without changes made to IT policy, requests upon the IT department for access to the network and the bi yearly audit of existing rules will eventually grind all departmental progress to a complete stop for months at a time. Automation in this arena as well as a universal standard for antivirus are dire in maintaining a secure network with the necessary resources to make changes as needed. In the face of company growth, if automation is not embraced, then it will become necessary to increase the IT staff by at least 50% within the next 2 years to simply maintain the status quo. Assuming an employee pool of 100, an investment in Bitdefender and Algosec at this time will cost $12,249. 75, with reoccurring annual fees of $2,249. 75. Such an amount if a far cry from an extensive uptick in staff. The end result will be a far more efficient IT department that will be able to accomplish more sustentative work with existing staff at hand. References AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec. com: http://www. algosec. com/en/products/products_overview AlgoSec. (2013, January). How to Buy. Retrieved February 18, 2013, from algosec.

Saturday, September 14, 2019

Comparison Tom and Gatsby in “The Great Gatsby” Essay

In â€Å"The Great Gatsby,† written by Scott Fitzgerald, Tom Buchanan and Jay Gatsby are two characters that struggle with the idea of losing their shared love interest, Daisy. Tom and Gatsby’s attachment to Daisy is differently justified due to their contrasting views, personalities, attitudes, actions, backgrounds, and other factors, some of which they do share and concur in. Fitzgerald did a great thing here. He created two purposefully different characters- one that is easily despised, the other that although not perfect, is likable- and united them in their love for money, the power that comes with it , and their haunt for the ultimate prize – Daisy. In this essay, we will analyze Tom and Gatsby’s differences and similarities in several areas, and decide whether or not they are perfect foils of each other like they are commonly perceived to be. To describe who Tom and Gatsby are, we must first analyze where they come from. In this area, Tom Buchannan and Jay Gatsby couldn’t be more different. Tom comes from an old and wealthy Chicago family, hence his residence in East Egg where the old aristocracy of the country’s richest families reside. Tom symbolizes the idea of being born into a golden crib, a prestigious family name, and into old money. Tom is one of those privileged few who never had to work for anything in his life, but is â€Å"privileged† the right description for him? Fitzgerald says in the story, â€Å"They were careless people, Tom and Daisy—they smashed up things and creatures and then retreated back into their money or their vast carelessness, or whatever it was that kept them together, and let other people clean up the mess they had made.† Tom’s past never allowed him to learn how to own up to his mistakes, accept fault, and deal with difficult situations, but rather made him unable to adapt to the real world. Because of this, I use the term â€Å"privileged† loosely when describing Tom. On the other hand, Jay Gatsby was born into what some of us call â€Å"the other side of the tracks.† Gatsby faced an impecunious childhood in rural North Dakota, but was an ambitious small town boy with big dreams who thought himself to be superior to the farming life, and simply rejected the lot he had been dealt in life. Gatsby’s father says to the narrator, Nick, â€Å"Jimmy was bound to get ahead†¦ Do you notice what he’s got about improving his mind? He was always great for that†, and that is exactly what Gatsby did.  Gatsby left his home town and set out to find his fortune, and although some of his actions were not too admirable, James Gatz, the poor farm boy, used his ingenuity to reinvent himself and become Jay Gatsby, the self-made millionaire. Fitzgerald makes Gatsby’s residence in West Egg, where the newly rich reside, a place for a class of vulgar and ostentatious people who will always lack the social grace and taste that the r esidents of East Egg possess, and can only be achieved from birth. Although the green light in Daisy’s garden is symbolic for hope, I think it also symbolizes the â€Å"green-eyed monster†. It symbolizes the envy and frustration Gatsby must feel through the realization that even though he achieved an incredible amount of wealth, he will never be an East Egger. Gatsby’s impoverished past makes him unacceptable to this socially elite East Egg society that Tom was born into, and is naturally an accepted part of. Now that we know about their contrasting pasts, let us take a look at their personalities. Tom is an overpowering, large man who uses his presence to intimidate people. It says in the book , â€Å"two shining, arrogant eyes had established dominance over his face and gave him the appearance of always leaning aggressively forward. Not even the effeminate swank of his riding clothes could hide the enormous power of that body†¦it was a body capable of enormous leverage†¦a cruel body.† On the other hand, Gatsby seems to be shy and reserved to the point where he is not even acknowledged at his own parties. In my opinion, Gatsby did not do so well when attempting to pull off a defying front during his confrontation with Tom. Tom also comes off as a racist bigot who fears that the Black race will eventually submerge the White race, a sexist, and an abusive, insensitive, â€Å"brute†, like Daisy calls him. Gatsby’s open house parties which contain very colorful characters, on the other hand, seem to show little prejudice or judgment in his persona. Gatsby’s action of waiting outside the Buchannan’s home all night just to make sure Tom would not physically harm Daisy, show just how sensitive Gatsby is to Daisy’s well being. Tom seems to be very blunt and crude, while Gatsby’s distinguishing feature is the enigma that is his life. Jay Gatsby holds himself to high expectations and lived his life chasing a single dream, while Tom Buchanan seems to have no direction, goals, or dreams, other than to waste away his wealth, and please his selfish needs. In my opinion, the fundamental difference between Tom and Gatsby is how Fitzgerald  decided that justice would be served to each concerning part. Tom is the definition of selfishness, arrogance, cruelty, and ultimately, the ugly side of inherited wealth. Despite all his faults, Gatsby is more good than he is bad, and is a clear rags-to-riches success story. However, Tom ends up getting away scot free, never facing any consequences for his actions or immorality, while Gatsby ends up killed for a crime he did not commit, to save a women who did not love him back. As always, the poor man gets the short end of the stick. Now that we stated some clear differences between Tom and Gatsby, lets look at some of their similarities. Tom and Gatsby are both dishonest and deeply flawed men who commit consistent shows of indiscretions. For example, Tom condemns Daisy’s affair, but does not have the decency to be discreet about his own. Gatsby’s shady business dealings with Wolfsheim and illicit ways of acquiring wealth can, without a doubt, compare to Tom’s unscrupulous character. Both Tom and Gatsby lie and cheat, but Tom does it for the sole purpose of self-indulgence, while Gatsby does what he does in pursuance of his dream. Tom and Gatsby both have controlling personalities, and will do what they can to get what they want, regardless of the consequences. Another similarity between Tom and Gatsby is that both men seem to be playing a role when every they’re in public, by putting on a facade for others to see. With his good looks, education, horses, polo shirts, riding pants, and boots, Tom tries to impress and dissemble others, while hiding the monster he really is. On the same token, the ostentatious parties, mysterious past, and made up stories are all used by Gatsby to hide his hum ble beginnings, and corrupt ways of attaining his wealth. Without a doubt, Gatsby and Tom’s most obvious connection is their link to Daisy. Beautiful, educated, and well groomed, Daisy is the personification of feminism in the 1920’s, and women of an elite social class. Although Daisy is the object of their affection, or better yet, desire, I do not think that either Tom or Gatsby are in love with her. Tom is so pompous, that he married Daisy not because he loved her, but because everyone else wanted her. Tom wants to keep Daisy now because he knows how socially unacceptable divorce would have been, and she looks good under his arm. Gatsby is not so much in love with her, as much as he is with the idea of her. Gatsby places Daisy on this pedestal, and wants her to live up to expectations that she neither can, wants, or deserves. In a way, both Tom and Gatsby see Daisy as  a highly desirable prize that will attest to their own self-worth. In conclusion, because Tom and Gatsby do share some characteristics with each other they may not be â€Å"perfect† foils, but looking at the big picture, they are like oil and water. Tom is a despicable character who embodies everything that is wrong with society, and flies through life unpunished. Gatsby is a man who came from humble beginnings, and made something out of himself for the sole purpose of recuperating the one thing that ever made him feel alive – Daisy. Gatsby lied, cheated, and took part in organized crime, so what can possibly him great, you may ask. Well, in my opinion, Gatsby’s never-ending optimism, simplicity of heart, and power to make his dreams into reality is what makes him â€Å"Great†. In reality, Gatsby never cared for the glamorous parties, the nice clothes, or the fast cars. Acquiring these luxuries were only important to him because he felt like they were necessary for him to accomplish his ultimate goal- winning Daisy’s heart back. Daisy embodied Gatsby’s American dream, and unfortunately for him, his search for her was somewhat more of a fatally romantic idealism that seemed to be best suited in a world of fairy tails and happy endings. I agree with Nick when he tells Gatsby, â€Å"They’re a rotten crowd†¦ you’re worth the whole damn bunch put together.†

Friday, September 13, 2019

The World of Abstract Art Painting Research Proposal

The World of Abstract Art Painting - Research Proposal Example The paper "The World of Abstract Art Painting" aims to describe the abstract art by looking at the intended as well as created meaning from the artist’s and viewer’s perspective respectively. The artist in focus when it comes to contemporary abstract painting is John Walker, an English printmaker, and painter, and the work is entitled ‘Oceania – My Dilemma’ painted in the year 1983. The work is presented on triptych: oil on canvas and its dimensions on the overall are 217cm by 513cm by 4.3cm. His current collections include Maine landscapes and Seal Point Series. ‘Oceania – My Dilemma’ is a series presented in triptych formation, which uses motifs from his earlier works. The monolith motif is taken as a representation of the Duchess of Alba from the portrait of Goya of 1797. The quotation on the left panel of St. John is a representation of spiritual transcendence. The complexity of imagery in the painting reflects the painter’s Australian experience, which acknowledges European legacy contact with indigenous landscape and people. Incorporation of Aboriginal and Oceanic art elements like spirit figures, masks, barks, skulls, biblical references, and the Alba figure show a collision between traditional beliefs and the introduced Christianity. Therefore, the abstract form of art has grown over the years to take a dominant position in the world of painting. It has helped artists to break from the traditional forms and be free to include word and image in their paintings.

Thursday, September 12, 2019

CLOUD COMPUTING Research Paper Example | Topics and Well Written Essays - 1750 words

CLOUD COMPUTING - Research Paper Example Mork et al. (2011:13) say that â€Å"cloud computing should be distributed and interactively accessible as it provides interoperability between the new and legacy technologies† Cloud computing is technollogy that utilizes the central remote servers and the internet to mantain applications and data. Cloud computing makes it possible for businesses and consumers to use aplications without the accesss and installation of their files using any computer that is connected to the internet. Therefore, it this technology permits for a more efficient computing by centralizing, data storage, and bandwidth. As the potential benefits of cloud computing are many, they are faced with numerous legal, proffesional, and ethical issues. The paper will discuss how cloud computing has impacted on the legal, social and proffesional spheres with regard to storage and transformation of data and inforrmation. The main objective of cloud computing has been to apply the high performance computimg power mostly used in research, health and military facilities to perform trillions of computations in a second, in consumer oriented apllications, and to deliver personalised information. This infrastructure of shared IT consists of a large pool of sytems that are interlinked. This creates legal and ethical isssues within the cloud (Buyya, Broberg, & Goscinski, 2010:23-26). Discussion As highlighted earlier, cloud computing is a type of technology that utilizes the internet and one remote server so as mantain data and different applications. This makes it a very young concept that is yet to be embraced by the global workforce. Cloud computing provides a cost effective IT resource as the cost on demand IT based on the actual customer’s usage. As a result of the rapid growth, numerous companies have been unable to handle their IT requirement even after having a data center that was inhouse. The usage of cloud services helps to enhance the IT capabilities without investing huge amount s in the new datacenters. As a consequence, this tpye of technology aids companies with an efficient way of computing by centralizing processing, memory, bandwidth, and storage. To show that cloud computing has began having mass appeal in the corporate data centers, it has enabled the data centers to operate on a similar internet through the process of enabling the computing process of computing resources to be shared and accessed as virtual resources in scalable and secure manner. Unlike showing proffesionalism, this virtualization is a compromise to security and ethical issues. Ethical issues are not separable with cloud computing. The major areas of concern are resource/stoarage virtualization, scalability and elasticity, usage optimization, ease of usage, fast information sharing delivery, and control, accessibility, and anonymity. The first ethical issue is privacy. The concern with regard to privacy is that the service providers of cloud have total control over the data and co mmunication stored between user and the host company (Racoma, 2012). This is attributed to the fact that service providers have complete over the data the are storing, and as a conseqence, they are responsible for a lot of private information and data. Once this is out of reach of the users, the fear is that it can be utilised for purposes the user doess not desire. As such, of late there have a push by the privacy advocates for a higher level of transparency from the

Wednesday, September 11, 2019

A comparison of Still Lifes by Paul Cezanne and Francisco de Zurbran Essay

A comparison of Still Lifes by Paul Cezanne and Francisco de Zurbran - Essay Example Most impressionist paintings were done out of doors, many depicting scenes from everyday life, often with several figures and using bright, vibrant colors, and without any emphasis upon exact details. This is more unusually is an indoor scene and a still life, but there are still the bright colors and the lack of exact detail. It is exactly what it was meant to be – an impression of a kitchen scene. The items are very casually laid out, on what appears to be a kitchen table, almost with the appearance of being thrown down, and the background looks as if the artist has used it to clean his brushes, including as it does tiny amounts of many different colors, yet at the same time the viewer is able to distinguish exactly just what is being depicted as clearly as in the much more formal and realistic work earlier work by Zurbà ¡ran. Impressionism was not abstract art.

Tuesday, September 10, 2019

Discuss whether or not plea bargaining should be abolished Essay

Discuss whether or not plea bargaining should be abolished - Essay Example However, this fact can not be ignored that plea bargaining is an essential component of the justice system because it allows the trial convictions, to be more thoroughly considered when the judges are not under the pressure of too many cases. Plea bargaining reduces the number of cases that would otherwise go for trial conviction to less than half, thus improving the efficiency of the trial conviction cases. Without the facility of plea bargaining, the whole justice system is likely to collapse under the immense and unbearable work load. If the option of plea bargaining is eliminated, this would overcrowd the courts and the attention will have to be focused also on futile and pointless cases along with potentially strong and complicated cases that genuinely require trial convictions. Every day, thousands of cases of petty crimes are taken to the court, and if each and every case was given the highest consideration, the idea of a functional justice system would become unapproachable. Therefore, it is important to have a system in place that would cater for crimes of petty nature, and plea bargaining sufficiently serves this purpose. Plea bargaining allow the defendants to enter into reasonable agreements in a very short period in comparison to the lengthy trials that are conventionally conducted in cases of severe crime cases.

Monday, September 9, 2019

Importance of skin moisturizers Essay Example | Topics and Well Written Essays - 1250 words

Importance of skin moisturizers - Essay Example It includes assuring an optimal functioning of the vital organs to caring about the body parts that were conveniently ignored just a couple of decades ago. Human skin is one such body organ that has found a new found respect and focus in the last few decades and it goes without saying that skin moisturizers are one such health aid, which immensely add to the human sense of well being by assuring the much needed proper skin care. Perhaps most of the people don’t know that skin tends to be the largest human organ. In an average human adult, the skin comprises of a total area of about 1.5 to 2.0 square meters (Baumann 17). No other organ happens to be so large and extensive. Besides, skin performs many important functions in the human body. It is the body’s first line of defense against any damage caused by pathogens and the external environment. The nerve endings embedded in the skin are responsible for registering sensations of heat and touch. The blood vessels and sweat glands in the skin are responsible for heat regulation. Skin also helps store fats, water and aids the synthesis of vitamin D. It facilitates the excretion of body wastes like sweat and urea. It also helps in the absorption of many vital elements and health aids like ointments and medicines. It prevents the loss of vital nutrients from the body. Last but not the least; skin is an indispensible component of body aesthetics and c ommunication. Considering the multifarious relevance of skin in the human health, there is no denying the fact that skin care ought to command a pivotal place in human well being and health. Once it is agreed upon that skin care is important, one needs to delve upon as to what constitutes the salient features of skin care. Good nutrition is the first step in assuring a healthy and robust skin. Not to mention that high stress levels do negatively impact skin as other organs. So, adequate rest and relaxation are of

Sunday, September 8, 2019

Currency Options and Their Role in International Trade Essay

Currency Options and Their Role in International Trade - Essay Example In order to deal with the problem of changing market prices, the trader needs to continually evaluate and analyze the functions of the market and the goals of the business enterprise (Stanley 1998). In addition, the business must be in a position to put in place new market rules and to be monitoring the trade trends and its development. In most of the world states, trade has emerged as one of the key sectors of the economy and most of her citizens depend on the trade for their source of living. The growth of the energy markets and the strategies of the energy providers have been the driving force of these trade improvements over the recent years. A number of commodities in the energy sector such as power, gas, carbon dioxide and even the weather have found their way into the trade market in societies. This has led to the improvement of the use of the scarce resources and increased complex organizations, process interfaces and the system infrastructures. The increased demand for data quality has led to most organizations to adopt the need for risk management that reduces the operational costs during the production process and the actual trading exercise (Dell’Ariccia & Marquez 2010). The international trade is finding its way in society and people have actively been involved in the same and this has led to the emergence of new market models such as market coupling are being discussed and this has made it easier for cross-border trading. On the other hand, the international trade implies that different rules and procedures must be followed and this has led to a change in the trading system that bring on board a number of challenges that require adaptation into existing risk management mechanisms. Exchange Traded Currency Options Foreign exchange traded currency options give a company or an individual the right to exchange the currency of their country into another currency of another country at pre-agreed exchange rate at a given time in the future. This i s the world’s market option although most of the currency trade is done in private and hence it is not possible to determine exactly how large the market is. This form of trade is regulated however in a minimized way and most of the transactions are over the counter. With a few exceptions that are traded on exchanges such as the International Securities Exchange, the Philadelphia Stock Exchange, or the Chicago Mercantile Exchange that has options for future contracts (Dong-Hyun & Gao 2003). In the past, the universally accepted currency option was valued by the Bank for International Settlements. For any business enterprise that wish to grow in the international market, there is the need to value the Foreign Exchange factor. Most of the organizations often do not take this risk factor into consideration during their contracts hence the delayed growth, and success in the international market. The international market often fluctuates in value and a given asset or commodity val ued at a given price at a present time might be valued at a higher or lower price in the future due to the exchange rate factor (Manzur, Hoque, & Poitras 2010). In the currency option therefore, the product that is to be traded called a derivative is based on a universally acceptable instrument that