Saturday, August 31, 2019

Evaluation of Voluntourism Essay

A trend has started in the recent years, where people participate in organizations that commonly claim to be helping developing countries. This trend is fuelled by the gap year phenomenon, which is defined as â€Å"a period of time between 3 and 24 months taken out of education or a work career.† (Jones, 2004) With enthusiasm of â€Å"making a difference†, more and more people choose voluntourism, combination of tourism and volunteer projects, as their gap year holiday option. Despite the well-intended enthusiasm, opinions regarding the contribution of voluntourism on local community are divided. The primary issue of debate is whether voluntourism provide help to the local communities. While some researchers using surveys find local people satisfied with volunteer tourists, other research investigating quality, tasks, motivation and local need of voluntourism have found it doing more harm than good. Such a harmful trend has made the UK director of VSO, one of the baggie st and earliest international development charity, warn â€Å"Young people want to make difference through volunteering, but they would better off travelling†¦rather than wasting time on projects that have no impact†¦Ã¢â‚¬  (Ward, 2007) In this paper, we will evaluate both side of the debate and carefully assess the value of voluntourism for local community. In order to assess the benefit given by volunteer tourists, it is essential to look at the quality of the helpers. Unskilled volunteers may be a burden to local communities that have to take care of them. As Stephan peck, operations director at the Scout Association, puts it â€Å"[bad volunteers] are like a cancer† (Ainsworth, 2012). Therefore, the volunteer selection process is critical in recruiting needed and appropriate volunteers that benefit local communities. While supporters of voluntourism claims those volunteers as satisfying, looking into their selection experience shall make it clear that these tourists are hardly qualified as helpful volunteers. Research done by Richard Forsythe in Ghana vlountourism showed that only 36% of all studied volunteer applicants in various fields went through application process more complicated than filling appli cation forms, and â€Å"no individuals remarked upon the selection process as a particularly challenging experience, and indeed several of the organizations interviewed admitted to accepting ‘almost all volunteers’ having ‘very few requirements, and taking ‘anyone who is interested’†(Forsythe, 2011). Recruitment through application forms or basic information can only depend on the self-evaluation of applicants, who probably had no volunteering experience, as to whether they will be helpful to the local community. With such a lenient selection, the volunteers selected are much more likely to be burden than help to local volunteers and community who cry out: â€Å"A lot of people have very unrealistic expectations about overseas volunteering, and they want to be there for only a month or less and have no skills that are critically needed in the developing world† (Huang, 2012). People may expect those unqualified volunteers to receive some training before starting work, but research has also showed that volunteer tourists receive almost no training. When they do receive information, much of it is about the culture and language, safety and packing with little attention toward the skills and duties involved within the volunteer placements (Forsythe, 2011). Furthermore, no more than half the volunteers received supervision or guidance during the placement (Forsythe, 2011). The organization’s local presence is indispensible for placements’ appropriate, long-term effectiveness and safety of volunteers. With the growing number of teenagers participating in volunteer tours, supervision and protection by organization are vital. However, some volunteers set out with enthusiastic motivation ends up in a awkward situation as Hannah Saunders, a gap year volunteer: â€Å"When I arrived†¦they didn’t know I was coming or what to do with me.† (Ward, 2007) Although the volunteers’ intention maybe beneficial, they are unqualified, untrained and unguided. Such groups of volunteers can hardly provide any high-quality help that is needed by local communities. Supporters of voluntourism may cling onto the motivation behind voluntourism to justify the trend. Indeed, motivation is also a factor often discussed when talking about the benefits of voluntourism. Supporters of voluntourism argue actions that come from altruistic intension to help, although may not provide substantial help, are at least better than nothing. The supporters say that by just participating and showing concern, it is already helping the people in dispair. It is literally, â€Å"you are the difference!† With the belief in altruism, people advertise voluntourism, â€Å"in which enthusiasm and good intentions are allowed to prevail† (Simpson, 2004). However, it seems the good intension behind voluntourism is not enough to be allowed to â€Å"prevail†. While many people wish to believe that motivation behind volunteering abroad is purely altruistic, research using evolutionally, social psychological, organizational and game theoretic literature as fram ework, has found that, in general, people volunteered most often when personal benefits are high (Murnighan, Kim, & Metzger, 1993). Consistent with this result, almost all authors of articles about voluntourism, even the supporters, agree that voluntourism does not come from purely altruistic motivation. Despite the difference in motivational factors concluded by different authors, all of them agree that these motivations outweigh altruism (Forsythe, 2011;Corti, Marola, & Castro, 2010;Wearing 2001; Brown, 2005; Cohen, Reichel, Shwartz, & Uriely, 2002; Tosun, 2000; Unstead-Jones, 2008). It is commonly agreed that volunteer tourists plan to satisfy the needs of communities through meeting their own needs such as â€Å"experiencing cultures†. If actions from altruism intention are the ones that give hope and â€Å"prevail†, voluntourism with self-centered motivation is not one. Furthermore, less concern in local community than in self-gain may result in idealized, incorrect assumption about local needs. Reflecting this worry about incorrect assumption, Sacha Brown, Program Manager of World Youth Intern ational, a NGO taking volunteers overseas for their development projects says, â€Å" there is a lot of development that is useless and is based on erroneous assumptions around what is ‘best’ for the community or country† (Huang, 2012). Inexperienced volunteers’ erroneous expectations on local needs, together with their self-centered concerns, make them concentrate on their own enjoyment without examining what help is needed. Organizations that seek to profit from voluntourism may increase rather than reduce neglect of local need. The director of VSO is worried that competition between organizations may lead to more emphasis on volunteer enjoyment and â€Å"may not deliver the maximum benefits to the communities these people are working in†. (Huang, 2012) Indeed, one of the organizations interviewed by Forsythe implied that its placements were driven by preferences of volunteers rather than local needs. It is not only researchers who are concerned about whether volunteering tourists’ helps are actually needed. Some volunteers interviewed by Justine Tillon express their feeling of lack of acceptance by local government and citizens. Some of them felt that â€Å"the government and local citizens are forced to be helped by the participants†. When there is evidence that help is â€Å"forced† on local people, maybe we should really ask ourselves: â€Å"Does this kind of help make a peaceful word?† All has been said, some supporters may provide research that show local satisfaction toward volunteer tourists. One of such research about Moroccan students’ satisfaction toward foreign volunteer teachers of French and English showed 79% of appreciation (Corti et al., 2010). The rate is indeed high, but we should look closer into this study. The job of the volunteers studied is to give English and French classes during vacation of school year. Out of 253 students who enrolled, 32.41% left to travel with their parents in the middle of classes (Corti et al., 2010). Although the desistance rate already implies that local community regards the classes as unserious holiday childcare rather than structured learning experience, several other questions can be raised against results of this and similar other studies. First, does the rate actually reflect the work done by volunteer teachers? The improvement in student’s language skills is not measured in the study. Since it was students who answered those surveys, it is questionable whether they looked at bigger picture and thought the experience educating or they were just excited to see foreigners. Inferring from previous evaluation of quality, training and supervision of volunteers, these teachers are likely to be unqualified as teachers. Of course supporters may say that the satisfaction rate is indeed the proof that the volunteers are qualified. That raises a second question. Is it voluntourism per se that is benefiting? Do they have to be volunteer tourists or they can be anyone? Considering that English and French are both official language of Morocco, classes given by mixture of nonnative and native speakers of the languages may hardly made any difference from that by local Moroccans who speak both languages. It is not clear whether the 79% satisfaction was toward â€Å"volunteers from abroad† or â€Å"people who helped†. Questions about the tourists’ help per se have been studied in different contexts. Study in Gahanna showed that many volunteers are placed in daily tasks and traditional chores such as bathing, dressing, feeding and supervising of children, that can be done by anyone else (Fosythe, 2011). To justify voluntourism itself, studies about unique benefit of voluntourism need be carried out. Through this paper, we have evaluated the quality, motivation and local need of voluntourism. While there are some studies showing satisfactions toward voluntourism presented, several essential questions are raised. Through evaluation, it became clear that volunteer tourists are unskilled, authentically motivated, and to certain extent, unwelcomed. Although it may be a valuable experience for tourists, it seems that voluntourism carry few value, if not harm, to local community. Whether or not it is primary desire, the desire to volunteer is laudable. However, we need to tread more carefully, especially when dealing with people who are already suffering. Unless we have enough knowledge and transferrable skills, we might do better to travel and bring money into developing countries. Works Cited Ainsworth, D. (2012). Bad volunteers are like a cancer, says Scout Association director. Third Sector Online . Brown, S. (2005). Understanding the motives and benefits of voluntourists: What makes them tick? Retrieved from http://www.voluntourism.org/newsstudyandresearc h1005.htm Cohen, E., Reichel, A., Schwartz, Z., & Uriely, N. (2002). ). Rescuing hikers in Israel’s deserts: Community altruism or an extension of adventure tourism? . Journal of Leisure Research . Corti, I. N., Marola, P. N., & Castro, M. B. (2010). Social Inclusion and Local Development through European Voluntourism: A Case Study of the Project Realized in a Neighborhood of Morocco. merican Journal of Economics and Business Administration 2 . Forsythe, R. (2011). Helping or hindering? Volunteer tourism in Ghana and its critical role in development . Huang, A. (2008, 8 1). Voluntourism: Benifit or Harm? Retrieved from Yahoo! voices: http://voices.yahoo.com/voluntourism-benefit-harm-775403.html?cat=9 Jones, A. (2004). Review of Gap Year Provision. Murnighan, J. K., Kim, J. W., & Metzger, A. R. (1993). the Volunteer Dilemma. Administrative Science Quarterly . Simpson, K. (2004). ‘Doing Development’: The Gap Year, Volunteer Tourists and a Popular Practice of Development. Journal of International Development . Taillon, J. (2007). The Identification of Motivation in Voluntourists: Particularly Extrinsic Motivators in Vacation-Minded Volunteer Tourism Participants. Retrieved from http://justintaillon.com/FINAL% 20PAPER.doc Tosun, C. (2000). Limits to community participation in the tourism development process in developing countries. . Tourism Management . Unstead-Jones, R. (2008). An Analysis of Volunteer Motivation: Implications for International Development. The Journal of the Institute for Volunteering Research . Ward, L. (2007). You’re better off backpacking-VSO warns about perils of ‘voluntourism’. The Guardian . Wearing, S. (2001). Volunteer tourism: Experiences that Make a Difference. CABI Publishing.

Friday, August 30, 2019

How Do You Get People to Like You Essay

Be polite. Be yourself. That way, people like you for who you are. Many of us mistakenly believe that it’s wrong or conceited, to think we have any good qualities. We may spend a lot of time berating ourselves for our negative qualities, thinking that self criticism is the key to improving our performance. However, a constant focus on our supposed shortcomings can hinder our efforts to make friends with other people. How can we have the confidence to make new friends if we think we don’t have much to offer? How can we believe that others could like us if we believe our inner being is flawed? Or if we think we are too boring to interest anyone else? We may wonder what anyone else would see in us if we don’t see any good in ourselves. In order for others to be attracted to us, they must be able to easily see our best qualities. If we focus on our good qualities we will have much more confidence that we have something of value to offer in a relationship. If you wish to be socially successful, it’s important to accept the fact that not everybody is going to like you under all circumstances. Not everyone is going to like the package you come in, especially on first meeting you. Every person has a unique pattern of likes and dislikes which were formed long before they met you. Don’t think you have to condemn yourself as a failure if it seems that someone else doesn’t like you. If someone seems to dislike you, the reason for that dislike might have little or nothing to do with you. The person who doesn’t like you might be fearful, or shallow, or busy or shy. Perhaps you and that person are simply a mismatch for each other at this particular time. Don’t take yourself out of the game by deciding that your flaws are bigger than your assets. In fact, some of the very qualities you consider to be flaws may be irresistible to someone else. For all the factors that might cause one person to reject you, there are at least as many factors that will work in your favor with someone else. You might be thirty pounds over your ideal weight, but you may have a wonderful laugh and a huge zest for life. There are many people to whom your extra pounds will literally be invisible. You may drive a shabby car, but you might be a great dancer and a loyal friend. There are people out there looking for loyalty, or fun, or sweetness, or wit, and the package it comes in is not important. If you are worried that you are not beautiful enough to attract friends, keep in mind that not everyone is looking for physical beauty in their friends. You can decide to feel inferior because you don’t have much money and you don’t drive a nice car. You can believe that this is the reason that you don’t have many friends in your life. On the other hand, if you are very wealthy you may be suspicious that everyone is after your money and that nobody really likes you as a person. The point is, you can fixate on just about anything and believe it’s the reason you do not have friends and cannot make any. Here is an easy way to remind yourself of what your good qualities are: write down a list of your good qualities and review it often. Don’t just think in your mind about what your good qualities might be, actually make the effort to write the list. The act of writing helps to reinforce the strength of the ideas in your mind. Don’t be embarrassed to give yourself credit for your good points. If you don’t have any idea what your good points might be, you might want to ask some of the people you know. When you compile your list of good qualities, be as generous in your praise as your best friend in the whole wide world would be! If you don’t have any best friends yet, imagine in your mind a wise and loving friend who knows you truly and appreciates you. What would that person say are your good points? Here are some ideas that might be applicable to you. Feel free to adjust this list for yourself and add to it. My good qualities are: †¢I’m kind †¢I never gossip †¢I go out of my way to help others †¢I’m good with numbers †¢I have a calm disposition †¢I know a lot about sports You can keep your list with you and read it over every day. Add to it whenever you think of new good qualities you discover in yourself. Be alert for compliments that other people give you. The positive qualities that others see in you can go on your list as well. When you are out there meeting people, frequently remind yourself of all the wonderful qualities you have. It’s only a matter of time before you meet other people who will appreciate them too! Learn to relax. Instead of berating yourself for some perceived shortcoming, concentrate on the good qualities you have to offer. Realize that there is an audience for your particular combination of gifts, and go looking for those people who will appreciate them.

Thursday, August 29, 2019

Henkel

Bob Simmons – Strategic Transformation Case Summary: Henkel was a German manufacturer of laundry products. Went public in 1985. In 2008 it was 14 Billion pounds in 125 countries. Majority in EMEA. Most of exe team were German. Organized into three major business units: Adhesive Technologies 48%(glue stick), Laundry and Home Care 30%, Cosmetics/Toiletries 22%. Industry leader in adhesives. Rorsted took over as CEO in 2008. Henkel was reporting comfortable growth and profits with 8% growth.Second half of 2008 global financial crisis and economic slowdown had negative effect on Henkel’s key markets. Shrinking demand and rising costs caused business untis to fall in second half of 2008. Rosted vowed to transform Henkel into a leaner, more performance driven company. â€Å"staying where we are is no longer an option. We either move up or move down: we either become relevant or we will be made irrelevant. â€Å" This case illustrates the transformation of a CEO-led organiza tion driven stretch goals, performance measurement and accountability.Kasper Rorsted become CEO of Henkel, the German personal care, laundry, and adhesive products manufacturer, in 2008, he was determined to transform the â€Å"good enough† corporate culture focused on to win in the fierce competition in the market. In history, Henkel is a comfortable, stable workplace. Many employees have never received a negative performance feedback. To overthrow a generally complacent attitude, Rorsted implementation of a multi-step change initiatives, aimed at establishing a â€Å"winning culture. First, in November 2008, in 2012 he announced a series of ambitious financial goals. With the financial crisis to disrupt the global economy, he reiterated his commitment to these goals, sent a clear signal, Henkel employees and external stakeholders an excuse is no longer acceptable. Rorsted duties launch a new set of five values replace the previous 10 values, these employees can recite the first memory an emphasis on the customer. He also set up a new, streamlined performance management system for evaluating management performance and progress of a four-point scale of potential.The system also includes a forced ranking requirements, requiring a defined percentage of the various business units and company-wide staff was named the top, strong, medium, or low performance. These ratings significantly impact management’s bonus compensation. In this case, where it is needed at the end of 2011, when Henkel is a good way to achieve its 2012 target. Shed nearly half of the senior management team, as the site of many products and brands, Henkel seems to be a leaner, more competitive, â€Å"win† the organization. Hide This case illustrates a CEO-led organizational transformation driven by stretch goals, performance measurement, and accountability. When Kasper Rorsted became CEO of Henkel, a Germany-based producer of personal care, laundry, and adhesives products, in 2008, he was determined to transform a corporate culture of â€Å"good enough† into one singularly focused on winning in a competitive marketplace. Historically, Henkel was a comfortable, stable place to work. Many employees never received negative performance feedback.Seeking to overturn a pervasive attitude of complacency, Rorsted implemented a multi-step change initiative aimed at building a â€Å"winning culture. † First, in November 2008, he announced a set of ambitious financial targets for 2012. As financial turmoil roiled the global economy, he reaffirmed his commitment to these targets, sending a clear signal to Henkel employees and external stakeholders that excuses were no longer acceptable. Rorsted next introduced a new set of five company values-replacing the previous list of 10 values, which few employees could recite by memory-the first of which emphasized a focus on customers.He also instituted a new, simplified performance management system, which r ated managers' performance and advancement potential on a four-point scale. The system also included a forced ranking requirement, mandating that a defined percentage of employees (in each business unit and company-wide) be ranked as top, strong, moderate, or low performers. These ratings significantly impacted managers' bonus compensation. In late 2011-the time in which the case takes place-Henkel is well on its way to achieving its 2012 targets.Having shed nearly half its top management team, along with numerous product sites and brands, Henkel appears to be a leaner, more competitive, â€Å"winning† organization. High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales. [email  protected] com to buy additional rights. http://www. ft. com/cms/s/0/6a85b182-1128-11e2-a637-00144feabdc0. html#ixzz2ODYNf8Gg The story.In 2008, Henkel, the German group with well-known brands ranging from Persil to Loctite, had reported comfortable growth and earnings. But its new chief executive, Kasper Rorsted, a Dane who had made his career in big IT companies, thought the 132-year-old, family-controlled company needed to shake off some of its complacency if it was to safeguard its success. * * * * More On this story * Case Study How a publisher exploited a bestseller * Case Study How an outsider institutes change * Case Study If P&C’s improved staff performance Case Study Microsoft Lync’s bottom-up restructure * Case Study How to build a low-cost brand The challenge. Henkel faced several serious issues. For instance, while reporting solid sales, it was less profitable than its industry peers – by a margin of up to 10 percentage points. But the majority of employees did not see any need for change. In fact, one analyst commented that it was characterised by â€Å"complacency and lack of competitive spirit†. Mr Rorsted determined to change the way the company was run and to create â€Å"a winning culture†.The strategy. Mr Rorsted and his new, young team set about introducing changes that would include both tangible financial and performance targets, and an overhaul? of? company? culture. ? Ambitious targets. In November 2008, Henkel announced challenging targets for 2012 that would improve performance but would also energise the organisation by creating a sense of urgency. Targets included an increase in pre-tax profit margins to 14 per cent; in earnings per share; and in sales, to above the market average.In addition, the share of sales in emerging countries would be required to rise from 33 per cent to 45 per cent by 2012. ? Efficiency and focus. With more than 1,000 brands, at least 200 production sites globally, and three separate business units, Henkel was ripe for proposed efficiency measures. These included cutting the number of brands in order to put more m arketing resources behind its strongest labels; consolidating manufacturing sites; and shifting tasks to shared service centres. ? New vision and values.Henkel had a vision statement and a set of company values. But they were neither well-known nor relevant to either day-to-day decision-making or evaluation of employee performance. In 2010, Henkel replaced the original list of 10 values with five new ones – such as: â€Å"We put our customers at the centre of what we do. † To make sure these were communicated to the 48,000 employees, more than 5,000 workshops were held in which managers and teams discussed how the new values could apply to their work and how they could build a more positive company culture. Performance management. Henkel introduced a process to evaluate consistently the performance and potential of all management-level employees. They would be ranked on relative performance, which significantly affected managers’ bonuses. Each individual is revi ewed in â€Å"development roundtables†, interactive meetings where managers review and evaluate their direct reports across teams to create a broader perspective on their achievements, development needs and promotability. What happened.For fiscal 2012, Henkel’s global sales are forecast to exceed â‚ ¬16bn ($20bn), a rise of more than â‚ ¬2bn since 2008, and reach its profit margin target of 14 per cent. Emerging markets now represent 43 per cent of global sales, and more than 50 per cent of employees work in those territories. The number of brands is less than 400 and manufacturing sites have been consolidated by around 25 per cent. Key lessons. To boost performance across a company, communicate a clear strategy that is backed up by setting ambitious targets.Simplify your vision and values, and take time to communicate them to all employees to ensure they provide practical guidance, especially when tough decisions may be needed. To focus everyone on successful ex ecution, use performance management systems that link the evaluation and compensation of key employees to achievement of the new strategy Write down in a sentence or two your definition of a winning culture. What are the things that you like about Rorsted’s approach? What are the risks? Assuming that the 2012 EBIT margin goal is achieved, how should Rorsted

Wednesday, August 28, 2019

Consolidation Research Paper Example | Topics and Well Written Essays - 750 words

Consolidation - Research Paper Example Throughout the article, KWG, or the German Banking Act, which has detailed regulations on how consolidation accounting for financial institutions should be carried out is used to demonstrate these regulatory discrepancies with regard to the IFRS (International Financial Reporting Standards) (Xuccess Reply, 2012). The article goes on to recommend that extensive changes in the way procedures are implemented and data processing is carried out when it comes to consolidation accounting be implemented in order to overcome some of these challenges. Getting rid of these challenges, the article proposes, will result in better conversion of consolidation accounting processes. The chief issue being discussed in the article is how discrepancies in accounting for consolidations in relation IFRS (International Financial Reporting Standards) poses challenges that require considerable changes in how procedures and technical data processing takes place. German Banking Act (KWG) is used to demonstrate how these differences pose numerous challenges. KWG and IFRS differ in how they view consolidation groups. Some companies that are part of the regulatory consolidation group under KWG regulations do not qualify as consolidation groups under IFRS regulations. This presents challenges since deconsolidation as well as other changes are necessary to reconcile the regulatory provisions of one body with the other (Xuccess Reply, 2012). KWG refers to a subsidiary in the context of consolidation accounting as a company that presents the possibility of being controlled by the parent company through majority voting rights, executive control, and so forth. These conditions are also subsumed under the IFRSs definition of a subsidiary company (Xuccess Reply, 2012). However, the concept of control under IFRS regulations distinctively says that the parent company has to have

Tuesday, August 27, 2019

HomeLand Security Strategies Research Paper Example | Topics and Well Written Essays - 1750 words

HomeLand Security Strategies - Research Paper Example This reaffirms that America is committed to pursue its interests by the use of an international system where all countries have specific rights and responsibilities. The paper will discuss the homeland security strategies focused on the safety and security of the citizens of America. This is attributed to the fact that there have been enormous threats to American citizens than weapons of mass destruction, especially the danger posed by the pursuit of nuclear weapons by violent extremists and their proliferation to neighboring states. As noted by Reddick (2010) the National Security Strategy which was released in May, 27 2010 rolled out a strategic approach for the advancing American interests including the security of the American citizens, improving American economy, and supports their values, as well as an international order that tackles the challenges of the 21st century. The strategies include: Defeating terrorism globally After the September 9/11, terrorism attacks the United S tates has made significant steps in ensuring the safety of the nation. It formed the foundation of Department of Homeland Security (DHS), whose functions took a new organization and urgency. Their approaches now included: restricting hostile actors the capability to operate within the American borders; shared efforts to determine and interdict threats; maintaining effective control of our physical borders; ensuring national resilience in the face of the hazards and threats; safeguarding lawful trade and travel into and out of United States of America. The DHS and many of its partners locally, regionally, and internationally as well as the communities have strengthened the homeland security enterprise to mitigate and defend against dynamic threats. Their core strategic objectives include: comprehending the threat, deterring and disrupting operations, protecting against terrorist capabilities, stopping the spread of violent extremism, and increasing community participation in order to deter terrorists and alleviate radicalization towards violence. According to DHS (2012) it reported that its efforts to prevent terrorism are centered on a layered risk-based approach to the security in the cargo and passenger systems of transportation, borders, and ports of entry.   It consists of new technologies to: help detect explosives and other dangerous weapons; aid in the protection of critical infrastructure and cyber networks from attack; build partnerships in information sharing. According to Guiora (2011) found out that DHS works in corporation with many partners in countering violent extremists. These extremists cause a great threat to national security. The DHS has initiated the following programs to counter violent extremists: international partnerships with other countries like Canada, Spain, Belgium, and Germany; conducting joint workshops and conferences of law enforcement agents; and provision of grants to the support of law enforcement efforts. Terrorist acti vities that may occur due to explosives are cut out by DHS’s work through enhancing the counter-IED capabilities of the nation and reduce the threat of explosive attack. Moreover, terrorist activities are prevented through: building of the homeland security enterprise which has fusion centers, nationwide suspicion activity reporting initiative, presence of homeland security

Press Release on Bhp Billiton Issue Essay Example | Topics and Well Written Essays - 500 words

Press Release on Bhp Billiton Issue - Essay Example He also hinted that Woodside has a current petroleum project in the pipeline which will greatly benefit from this take over during its current final stages. Woodside Chief Executive Peter Coleman readily agreed with the statement of Nasser. He explained to the gathered press people that the current project is currently on hold due to budget constraints. Continuing the project would entail another $900 million, an amount which Bhp readily agreed to produce in order to continue the project Nasser and Coleman detailed that the acquisition will start with the 24% holdings purchase of Royal Dutch Shell on Woodside. A move which shall ramp up into the full-blown take over of Woodside in the span of one year. Drawing on an example of a good merger, acquisition or takeover press release you have found on the internet, identify three elements you think are important in a press release of this type. (This is worth 25 % of this assignment and must be no more than half a page in length). A: The elements of a good press release commonly follow the 5 Ws. That is: Who, What, Where, When, Why. Answering these 5 basic questions will already make up the whole press release as these are the pieces of information that the readers are interested in finding out. Another element of a good press release would be the factual element. A press release is not a piece of advertising. Instead, it is all about accurate information dissemination. Finally, a press release must carry an aura of authority in its news.  

Monday, August 26, 2019

Examine the role of social media in customer relationship management Essay

Examine the role of social media in customer relationship management 02221 - Essay Example Twitter, Facebook, etc (Holzner, 2008). The complete interactions that take place through the social channels provides various information to small companies, which can be utilized to enhance their services, products, as well as overall approach towards their business (Evans, 2012). Companies are required to value social media as well as realise that it is a two-way or joint process. If they choose to utilize social media like the customer centric stage, they can’t avoid complaints or the negative comments. In reality, one in three Twitter and Facebook user consider that companies should reply to the social grievances within two hours. People have some hopes, and companies should meet those hopes or expectations. Social media is considered as the newest channel by which companies can interact with the target customers (Sponder, 2012). Customer relationship administration/management is referred to the tactics, practices, and technologies, which organizations or firms use to record, manage, and assess customer interactions or communications to drive the growth of sales by enriching and deepening relationships with their entire customer base. The systems of customer relationship management are designed in order to collect customers’ information across various channels such as company’s website, live chat, marketing materials, telephone, social media, and live chat (Boulding et al, 2005). The systems of CRM can also provide customer-facing employee detailed data, buying preferences, and purchase history. Companies need to make sure that the analysis and storage of their customer facts and data must encompass a highest degree of security against identity theft, cyber criminals as well as other violations of securities (Chen and Popovich, 2003). From the company’s viewpoint, the whole relationship includes the direct communication aspect, for example service and sales related processes, and

Sunday, August 25, 2019

Social Contract Theories of Thomas Hobbes and John Locke Essay

Social Contract Theories of Thomas Hobbes and John Locke - Essay Example Thus, in a social contract to which they voluntarily consented, they created the state for the purpose of promoting and preserving their natural rights to life, liberty and property. It was John Locke who painted a picture of liberty of citizens and authority of government in tones which were far moderate than that of Thomas Hobbes. Men in a state of nature could make use of their perfect freedom for their own good, since they were reasonable men. To John Locke, men did not abuse their Liberty. They did not threaten the lives of their neighbors. He wrote: Though this is a state of liberty, yet it is not a state of license. The state of nature of nature has a law of nature to govern it, which obliges everyone; and reason, which is that law that teaches all mankind who will but consult it, that being all equal and independent; no one has a right to harm another in his life, health, liberty of possessions. 1 Locke's social contract favored men quitting the state of nature to form themselves into a civil society. In this society men instituted the state where a social contract or covenant was formulated between citizens and government, a trustee which they could dismiss if it did not maintain the freedom and equality that men originally knew and enjoyed. In other words, when government no longer served the citizens' interests and welfare, it might be resisted or overthrown. Why, because government had violated its obligations under the social contract to the extent that it had broken it. What were these obligations The government as trustee had to protect and preserve people's rights, especially natural rights as explained above. Otherwise, the contractual agreement which was the basis of government's existence would be without substance and meaning. Locke asserted that men should retain their natural rights in civil society and that political powers or sovereignty should not be assigned to the monarch, but to the people's representatives in parliament who should be supreme. In Locke's view, the legislative power could never be arbitrary, since under the doctrine of popular sovereignty, the people had the supreme power to change, through peaceful election or revolution, their representatives in the parliament whenever such representatives acted contrary to the trust reposed in them. Locke's social contract puts in perspective the parliamentary democracy of limited government that many states have today, which stresses the protection and promotion of individual rights to life, liberty and property. Locke's reason for favoring a civil government to impose upon man some restrictions of government authority was that men after all were not impartial judges of their friends' shortcomings. He admitted that human frailties could lead to abuse of power. 2 Popular sovereignty is supreme authority of the state which resides in the people. This authority means that the people are the ultimate source of power and so they possess coercive power to control government through which they allow themselves to be governed. It was said that sovereignty resides in the people and all government authority emanates from them. This view is embodied in Locke's theory of popular sovereignty in which the citizens have the vested right and power to choose their representat

Saturday, August 24, 2019

Discussion topic Assignment Example | Topics and Well Written Essays - 250 words

Discussion topic - Assignment Example Then the researcher randomly select study subjects proportionally from these different strata or subgroups. For example, if a researcher wants to know the performance rate between male and female in a nursing class he/she shall divide the population of the class into two genders, which is male and female. Then the researcher shall select proportional number randomly from the two gender groups (strata) and calculate the rate of performance. This method of sampling techniques involves arranging the study subjects in an orderly manner and then selecting from the subjects at a stated regular interval. Even though this technique has got a random start, but it follows a sequence after the start. For example, when a nurse wants to carry out a study in a medical ward he/she can state that she/he will select a patient on every third bed from the previously selected. A heterogeneous population that is having homogeneity between clusters mean is divided into different groups/clusters in this sampling technique. Then a simple random technique is used to select the study subjects from different clusters. For example, when one wants to study knowledge of hand washing among public primary school children. They shall be divided into different proportionate clusters/groups and then simple random sampling employed to choose the required sample size from the clusters. This is a method of sampling whereby the study subjects are selected because they are easily available or volunteer. For example a nurse performing a study in a hospital, that is near his/her residential

Friday, August 23, 2019

Engine Management Systems Coursework Example | Topics and Well Written Essays - 1750 words

Engine Management Systems - Coursework Example The FADEC controls the fuel injection and timing; hence, optimize engine power. This adds the considerable amount of wiring to the system due to the needed separate power supply for backup from the alternator. The extra weight of parts of FADEC system has to be checked and recalculated for adjustment. FADEC has cockpit controls and other extra switches added to this system to control the fuel pump. These systems are protected by the FADEC power supply (Gunston, 1990)). The ECU has a 3D memory map, which controls fuel injection under varied circumstances for instance, air pressure density and the air temperature, with respect to throttle settings and the RPM. The Electronic Control Unit can sense barometric pressure and respond by injecting fuel. The spark plug ignition timing is controlled depending on load for each throttle settings. The ignition timing variations yields faster engine starting and smoother operations with the variable loads. The FADEC engine does not need chocking d uring starting since the ECU controls fuel for every cylinder and assists in retarding the ignition. FADEC system does not use the carburetor and the ignition and does not also depend on aircraft electrical system (Guttman, 2009). On the other hand, in the hydromechanical control system, the driver is in control of the aircraft power plant using an internal combustion engine. The sensors and control are the alternator and the battery masters. The battery master activates the battery contractor that connects the battery to the electrical bus aircraft. Alternator master applies power to the field circuit of the alternator to activate the circuit. The two switches provide power to the aircraft systems. The throttle sets up the required power level and controls the massive air-flow rate in the carbureted engines that are delivered to the cylinder. Pitch control adjust the speed unit, which then adjusts the propeller pitch and controls the load required by the engine in maintaining the R PM. The mixture control will in turn set the needed fuel to add to the airflow intake. At high altitudes, the oxygen levels reduce and, therefore, volume of the fuel must readjust to the required air-fuel mixture. The ignition switch opens the ‘P’’lead circuit by activating the magnetos. The magnetron maintains the process of sending the output voltage to spark plugs and connects the engine through the gearing. Movement in the crankshaft causes the magnetrons to generate voltage for sparking (Hispano-Suiza, 2001). TASK 2: FADEC SYSTEM The FADEC system is connected to inputs and outputs as illustrated in the diagram 01 Diagram 01: INPUT AND OUTPUTS OF A FADEC FADEC system is the most current system used to control the aircraft engines. The computers form part of its components and have the ability to process more data than the hydromechanical control system. This, therefore. enables the FADEC to optimize the operation of the engine system, as well performs other f unctions. This includes fuel control, power management, Sourcing data for ECM controlling of thrust reverser, shutting down, detecting of faults for the system, monitoring all components of the engine, as well as sourcing data to be used for engine indication. In order to achieve these tasks, the FADEC has various components. These components include Electronic Engine Control (EEC) and the auxiliary components. These auxiliary components include the sensors, ignition systems the stator valves, the actuator controller, FADEC Alternator, the Reverser

Thursday, August 22, 2019

Self Reliance Paper Essay Example for Free

Self Reliance Paper Essay Part I Author- The author of this document is Ralph Waldo Emerson. Emerson was an American essayist, lecturer, and poet, who led the Transcendentalist movement of the mid-19th century.   Audience- The audience of Self-reliance would be people reading Emerson’s literary works around the year 1841. Also, Self-reliance was a speech before it became an essay so many people listening to Emerson speak at events would have most likely heard it. He is targeting his audience at young and medium aged men. Message- The message of this essay is that humans should trust themselves and not be slaves to society. They need to think and act for themselves instead of leading lives controlled by others. Context- Self-reliance was written around 1836 in America. Emerson’s wife had just died about five years before and he was preparing a series of lectures. America was a new place for people and ideas and Emerson flourished there because he could take advantage of the easily influenced minds of the Americans. Part II a) The claim that Emerson effectively advances is that humans should not conform to society, but rather they should think for themselves and believe in what they do. He writes, â€Å"To believe your own thought, to believe that what is true for you in your private heart is true for all men, that is genius.† This quote supports Emerson’s main argument that each person should think for themselves and to not just accept what is written in a history or literary book. Emerson plays on the reader’s pathos, or emotions, by saying, â€Å"Trust thyself: every heart vibrates to that iron string.† This statement appeals to the reader because Emerson is creating a bond between his words and the reader by relating to the audience on a personal level and telling the audience to trust them. Emerson uses logic by stating, â€Å"Who so would be a man must be a nonconformist.† Emerson feels that to be a man, one must not conform to the format set out by society. He believes that a man should follow his own ideas and beliefs instead of conforming to the popular belief. Ethos is appealed because Emerson is a very well respected author who has published well over dozens of essays. b) Emerson implements many rhetorical devices in his essay such as parallelism, diction, and repetition to further advance his argument of being independent and not conforming to society. Emerson uses parallelism by stating that, â€Å"Envy is ignorance; the imitation is suicide†. This quote is very powerful because it conveys the message that a man is only what he makes of himself, not what others make of him. Throughout his essay, Emerson uses outstanding language to control the audience. Using great diction is very effective because the audience trusts Emerson because of his knowledge of literature. Finally, Emerson uses repetition to prove his point about society. Emerson starts a sentence off with the word Society, and then starts the very next sentence with the same word. He is talking about how society is a conspiracy against the manhood of every one of its members, and without repeating the word society; the point would be not as effective. Part III This argument is overall effective because as a reader, I was captivated by his language and examples of how society was affecting the human person. The text is very persuasive because he provides clear and well throughout examples to support his main argument. This is a very well written essay and it has led me to question my own beliefs about society and whether it is positive or negative. When he stated that every person must trust thyself, it was really effective for me because I believe every single person needs to trust their actions and believe that what they are doing is right. Part IV Admonition- An act or action of admonishing; authoritative counsel or warning Naught- worthless: useless Firmament- the vault or arch of the sky Bards- a tribal poet-singer skilled in composing and reciting verses on heroes and their deeds Vanity- something that is vain, empty, or valueless

Wednesday, August 21, 2019

Computing project Essay Example for Free

Computing project Essay The system will require a user name and a password to view or edit anything! Only one person is permitted to use the system, no-one else requires access   All files will also be password protected. Database   The instructor will be able to add or delete any records as needed   It will hold all necessary details Specific Objectives   The database will be able to create reports to show what stage the student is at   The database will calculate how many lessons a student has had and how much they have paid with plus if there are any outstanding balances remaining. My system is designed to help the instructor, the instructor has many problems with the current system, and many times it has cost him jobless hours. The current system is very old and has a lot of potential problems and I wish to make a system that eradicates these obvious problems. My system for a start will store the entire student details carefully and properly in line with all data protection acts. The main thing is that these details should not get lost and the instructor has access to this all the time so that he can contact the student at any time. The details should also be available so that it can be updated any time it needs to be. By having all these details stored onto the system it is kept safely and in one place rather than having paper forms lying about getting lost and muddled up, these forms will only be accessed only in one place so if the instructor needs these back in the office or at to work from at home then it is not possible to have multiple copies as it will not all be up to date. For example if a student changes the home phone number then the instructor will have to update every sheet of paper he has with the students phone number if he does not then it will be inconsistent and this can cause problems. The main reason for my proposal of this system is to ensure that the instructor does not continue double booking and not booking students at all. Currently at the end of a lesson the student asks for a booking and the instructor will look in his diary and book appropriately, many times what happens is the instructor looks at the wrong date, for example if the student asks for April 21st 2008 then the instructor may accidentally open may 21st 2008 and tell the student he is free. But in reality on that day an on that time he is busy. This is one of the things the instructor is complaining about and also another thing that has been drawn to my attention is that he misreads the time, so he tells the student that he is booked at 13:00 tomorrow but he is actually free he has a lesson at 3:00 not 13:00 so this is one way the instructor is loosing out on money. I wish to remove this issue and avoid these mistakes happening. GCE A2 Computing CPT 6 Ram Bhojani EXISTING SYSTEM Instructor Bookings | Ram Bhojani 13HAN PROPOSED SYSTEM DESIGN OVERALL SYSTEM Input Processes Student Name Calculate the number of lessons so far Student Number Calculate the total amount spent. Student Address Add a student Lesson Code Edit a student Price Per Lesson Delete a student Date and time of next lesson Search a Student Day Booked Search Availabilities Time Booked Edit a booking File Outputs Student Details Student details Availability Details Number of lessons each student has had Total spent Balances FORMS General Name Purpose Main Menu This allows the instructor to access the student details and availability details. Student Details This allows the instructor to view all details about a student. It also allows the instructor to print a report on the student progress Availability Details. This allows the instructor to see what dates and times are available in the next two weeks and make a booking. USER INTERFACE DESIGN MAIN MENU STUDENT DETAILS MENU AVAILABILITY DETAILS DATABASE DESIGN INCLUDING ER MODEL STUDENT (StudentName, StudentNumber, StudentAddress, LessonCode, PricePerLesson, DateAndTimeOfNextLesson) Availability (AvailableSlots, NextLessonBooked) RECORD STRUCTURE Instructor Field name Data type Size format Description AvailableSlots Date/time, Date time Shows what dates and times are available NextLessonBooked Date/time, Date time Name of student and the day, date and time of their next lesson. Student Field name Data type Size/format Description Student name Text, 20 The first name and last name of the student. Student number Number, 8 A Unique number given to each student for easy reference. Student address Text, 50 Full address of student, including postal address. Lesson code Number 5 A code that determines what sort of lesson they take, they can have an hour lesson, one and half-hour or pass plus. Price per lesson Number, Decimal 5,2 How much the student pays for each lesson Date and time of next lesson Date time Date time The next lesson student has booked. VALIDATION. I will use validation on some of the fields on the tables so there is less chance of wrong data being inputted. There are only some fields that can have validation but by ensuring they have a working validation it will mean that the system will not be wrong. Things that I can validate are numbers or specific number of characters. This is to make sure that the data entered conforms to a certain standard. The user cannot see the validation rules, so when they make a mistake they find out as an error message appears. VALIDATION Field Name Validation Type Validation Rule Error message Student Number Type Check. 8 digits The student number must be 8 digits Lesson Code Type check 5 Digits The lesson code must be 5 digits. STORAGE AND MEDIA FORMAT For my system I need to know how large each file will be so I have calculated the size of each field, and multiplied that but the amount of fields ii may get, to get an estimate of how large the file could get. Storage and media format Field name Number of records Size of record/ bytes Total size of records/bytes Student name 30 32 960 Student number 30 8 240 Student address. 30 65 1950 Lesson code 30 5 150 Price per lesson 30 8 240 Date and time of next lesson 30 16 480. Available lessons 31 20 620 Next lessons booked 6 134 804 Total 5444b 5. 4kb I have calculated that the approximate maximum size that I will need for the data to be stored will be around 6kb, which is small enough to fit on almost any data storage type. The most suitable storage device for this will be the hard disk drive on the laptop to be used. This means that the system will not be lost easily as it is not a portable storage device but on a actual laptop, which would be looked after carefully. There is a large amount of space on the hard disk meaning that there will be available space for expansion if necessary. Also the laptop can be connected to a computer in the office via a USB cable meaning that the data could be backed up and if needed archived. IDENTIFICATION OF SUITABLE ALGORITHMS FOR DATA TRANSFER Process to calculate Total number of lessons so far = ([Student Lessons])*([Total]) Process to calculate Total spent so far =([Total lessons])*([Price Per lesson]) Produce report of students ready for test Search through student details with criteria field Ready students to find matching records. If there are no matching records output an error message to the user. PLANNED VALID OUTPU.T. For my system outputs I have decided to create a report for students to see their progress. This will need to be created in Access. DESCRIPTION OF MEASURES PLANNED FOR SECURITY AND INTEGRITY OF DATA. The data must be kept secure and correct as this informations is very confidential, if details of the student were to get lost or misplaced then this would be in breach of the data protection act. To keep the data secure I am going to make sure that the user backs up the data at the end of every working week and keeps this disc either safely at home or in the office. There will also be a back up of the main system so if it happens to crash or is damaged then it can be replaced. If the system does crash then the files will have to be manually transferred back into the system from the backup. DESCRIPTION OF MEASURES PLANNED FOR SYSTEM SECURITY The system will not be secured with passwords however the computer will have a password this will be set to expire every 28 days to ensure that the data is safe even if someone gains the password, the user will generally have to be careful and keep the laptop besides him at all times or lock it in a glove compartment. When the instructor goes home he can either take it with him and store it at home carefully or leave it at the office in a safe place. As my system is only designed for one person the password on the system should be a sufficient security measure. TEST STRATEGY The system must be thoroughly tested to make sure that no errors occur the system is up and running. This is logical because if errors occur when the user starts to use the system, it can cost time to get it fixed. Hopefully if my testing strategy is good enough, it will not have any errors when it goes live. I am going to use bottom up testing, to test the system. This involves testing each individual module using prepared test data, which includes normal data, extreme data, upper and lower limits and individual data after this is done I will test the program to see if every route through the program is tested, every statement is executed, accuracy of the processing and that the program fits the original specification. This will make sure that the system is running correctly as this is basically using the whole system. I am also going to test the system in a beta testing method, although this will be a small scale. I am going to give the system to the user for a week just to make sure that everything works correctly. IMPLEMENTATION Login Screen Main Menu This is the main menu of my programme from here there are three options availability details and student details. Finally you can exit. Testing Test ID Test Data Test/Type Reason for test Expected Results Actual Results Data Entry 1. My system does conisit of tables and menus, both the student details and availability detail screens are very simple, it just displays details about these two entities. The booking screen is more complex because it needs to be live, so when the instructor makes a booking it needs to update on the next lesson booked screen and the availability screen. PROCEDURE AND VARIABLE LIST/ DESCRIPTIONS FOR PROGRAMS OR LIST OF PACKAGE ITEMS DEVELOPED Type of item Item Name Descriptions Table Student Details Holds all the details of the students that the instructor teaches, this includes first name, last name, address, phone number and the details of their next lesson that has been booked. Holds the details of all the available time slots in the coming fortnight, this allows the instructor only to see what is available, he can liaise with the student and once a slot is agreed a booking can be made. Form Make A Booking This form allows the user to make a booking for a lesson, he will need to enter the student number, and then first of all select a time and then the date. Once all these are selected the appointment is made. Form Next lesson Booked Has a list of students and the date and time of their next lesson, so the instructor can check on this if he receives a query from the student. CREATION AND CUSTOMISATION OF THE DATABASE TABLES I created all my tables in Microsoft access; I then linked it up to visual basics, The table below is the Student Details table. It consists of mostly text and one field of number, the reason that the telephone number is a text field rather than a number is because telephone numbers usually start with a 0 and if I put the data type as numbers then it will not let me add a 0 at the front. USER MANUAL BRIEF INTRODUCTION The instructor database is a simple system to handle bookings given to the instructor. The system allows the instructor to control appointments already made and allows him to make new appointments. It allows him to keep electronic records of all students, past and present. The students all have unique student numbers that the instructor can use to search for them. It stores details about students names, addresses, telephone numbers and the lessons they have booked. There is a very easy to use form that allows the instructor to make a booking. Microsoft Access 2007 or later. To install the system one must either move the file onto the hard disc of the computer. This can be done by selecting the file Instructor Database System and copying and pasting it into an empty folder on the hard disc, this maybe the best idea as there is a possibility a removable storage device could get lost or corrupt. This system could be also run from a removable storage device by opening the file and run it straight away. To back the system up the system the database file can be copied onto a USB pen or CD-R. When the system is going to be backed up, the file should be copied onto the USB pen, when this done a message box may appear asking if you want to replace the existing file just select yes or yes to all. This would mean that the backup would be separated from the main system, meaning less chance of losing both the original and the backup. USING THE SYSTEM Here is a simple short set of instructions to use the system. When the instructor opens up they will be asked to log on, The username at the moment is Ian and the password is Burleigh. Once they enter all these details correctly it allows them to use the system. Once the instructor logs on, he will come to the main menu of the system, I am going to show him to basic things in this tutorial, how to find the phone number of a student and then how to make a booking. Below is the main menu, to get to the student phone number he has to select the student details button, then the screen will have three buttons saying details, he can select any of these three, they all do the same job. Once that is selected at the screen below will appear, there are no details at the moment, but once show details button is pressed all the details will appear. The instructor now needs to press the back button until he arrives back at the main menu, and then select availability details. Then select make a booking. Once the make a booing screen appears first he has to select the date that he wants, then the time and finally the student number. Once that is done press save and then it is saved. Appraisal Comparision of project performance against objectives. To compare the objectives and the performance , I will put the original objectives down and compare against each one. General Objectives Security. The database will be able to create reports to show what stage the student is at   The database will calculate how many lessons a student has had and how much they have paid with plus if there are any outstanding balances remaining. My system is designed to help the instructor, the instructor has many problems with the current system, and many times it has cost him jobless hours. The current system is very old and has a lot of potential problems and I wish to make a system that eradicates these obvious problems. My system for a start will store the entire student details carefully and properly in line with all data protection acts. The main thing is that these details should not get lost and the instructor has access to this all the time so that he can contact the student at any time. The details should also be available so that it can be updated any time it needs to be. By having all these details stored onto the system it is kept safely and in one place rather than having paper forms lying about getting lost and muddled up, these forms will only be accessed only in one place so if the instructor needs these back in the office or at to work from at home then it is not possible to have multiple copies as it will not all be up to date. For example if a student changes the home phone number then the instructor will have to update every sheet of paper he has with the students phone number if he does not then it will be inconsistent and this can cause problems. The main reason for my proposal of this system is to ensure that the instructor does not continue double booking and not booking students at all. Currently at the end of a lesson the student asks for a booking and the instructor will look in his diary and book appropriately, many times what happens is the instructor looks at the wrong date, for example if the student asks for April 21st 2008 then the instructor may accidentally open may 21st 2008 and tell the student he is free. But in reality on that day an on that time he is busy.

Tuesday, August 20, 2019

Resolving Problems with a Local Area Network

Resolving Problems with a Local Area Network Network user problems: Explain different problems that a user of a local area network may faces while accessing the network. Poor or bad cable issue: Poor or bad cable issue is problem of a local area network which faces by user while accessing the network. In this problem, if the client computer is capable forconnect to the network, the performance might be reducing. Everyone could not be able to attach to the computer. Moreover, the current Gigabit network to the desktop is general, so that is why Gigabit category 5 will not work for less than concert and four pairs of cable as well. Cant get an IP address: The system is disconnected or ineffective. The operating system that can alert an address of the DHCP server (Dynamic Host Configuration Protocol) has not received. Furthermore, afterwards verifying the status of the system adapter can be configured to it. DHCP server could be out and server service will be interrupted as well. In addition, the device never reached the server for the first time. Printing problem issue: Printing problem is also of user area network which faces by user while accessing the network. Printing does not constantly work on network. To determine if a user is experiencing this problem, many people have the same problem. Moreover, only one problem, so it may be that the computer is not properly mapped to the printer server. If it does not cause the network between the client and the printer can be responsible for it. Provide a scenario as an example to explain a user having difficulties accessing the network. I am going to explain the scenario of a company difficulties which faced by user. AWI is a company and which company have so many computers.   There is some problem like poor or bad cable printing problem, can gets IP addresses. After that, user did find the issues and solve it with the help of internet. Identify and describe the potential solution to any 2 two of the problems mentioned above. Solution of Poor or bad cable: First of all, user should check cable, after that if any cable issue. Then user should change the cable. The cable has become untwisted; re-terminating the cable may resolve the errors. While following new advancements like power over Ethernet and Gigabit. The category 5 should be improved. Printing problem issue: In the beginning. Verify the configuration of printer, ensure it has a good IP address and can access the printer server as well. Apart from this, the print driver has settled printed problems. Create a form to document the problems and their solutions in knowledge base.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Knowledge Base-Form Name of the CompanyAWI Clients NameRajwinder Kaur Date and Time09/02/2017 -12.00pm Problem Detail:In this company, user faced local area networking problem while accessing the network. This is poor or bad cable.   In this problem, if client computer is capable for connecting to the network, then performance can reduce. Gigabit cat5 will not work for four pairs of cable. Name of the Technician Lakhwinder Kaur Date and Time10/02/2017- 12.00pm Service Hours 30 minutes Proposed Solution: First of all, user should check the cable and find out the errors. Then, if problem in cable so, change the cable. ResourceInternet,   Crimping   Tools, Cable Costs$20 Procedure Personal First of all, I did find the problem and Then, got the information from internet,   Ã‚   How we can solve the problem. Finally, I did solve my problem. Company ContactAddressAWI International Education Group Information Phone02232078935   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Website[emailprotected] Fileserver problems (Application server): Explain different problems associated with setting up a file server. Hard disk failure: A hard disk failure issue of fileserver. A hard disk failure problem happen while a disk drive malfunction and accumulated the information and that cant be accessed correctly configuration to computer. Moreover, Due to this problem, heats up the desktop and laptop when starts. Due to inadequate or defective fan ventilation of the CPU, hardware equipments damage. Slow speed: In file server issues second point is slow speed. In slow speed issue when server is not working properly then, processor takes too much time for downloading the files and so on. Moreover, sometime this issue occur when we keep extra data in computer. Security Issues: -In security issue, server folder security used for the   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   client to offer the access to the file in the group. Moreover, on the file   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Server if the safe information is passed on the server and then user   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   should look after the data on the server. Provide a scenario as an example to explain problems related with file or application server. Spark is a company in Auckland (New Zealand). This company have lots of computers. Users faced so many problems like hard disk failure, security issues and slow speed as well. Find the issue with the help of internet and then, installed antivirus software and got information how can fix it. Finally, I resolved the problem. Identify and describe the potential solution to any two of the problems mentioned above. Solution of Hard disk failure issue: Firstly, system should be shut down properly. It also is stay away from the installing supposed software. Hard disk ought to be clean commonly. Structure do update time to time. Moreover, should swap the HDD after three to four year. Solution of security issues: -There are so many good antivirus programs for the solution of securityissue. Update the antivirus software version to secure the computer system for malware and provide security providers on the internet against viruses, Trojans etc. Create a form to document the problems and their solutions in knowledge base.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Knowledge Base-Form Name of the CompanySpark.com Clients NameChris Date and Time10/02/2017- 12.30pm Problem Detail: Hard disk failure issue of file server. This problem happen whiles a disk drive malfunction and accumulated the information and it cant be configuration to computer properly. Name of the Technician Tiago Date and Time10/02/2017- 12.30pm Service Hours 25 minutes Proposed Solution: In beginning, I got information from internet how we can find this problem and fix it I did start find the problem.   Then, installed the software for remove the problem. Structure should update time to time. ResourceLaptop, Internet, Costs$20 Procedure Personal Computer, Internet, Antivirus software Company ContactAddress123Welson Street, Auckland InformationPhone0224356737 Website[emailprotected] Performance issues: Explain different issues related to network performance. Hard drive usage: Hard drive usage is first and the foremost issue of network performance. Mostly information exchange starts and finishes with a hard drive.Specifically, if at least two projects attempt to get to the hard drive in the meantime, information throughput will drop exponentially. Moreover, it is normally the slowest part inside the machine. CPU usage: CPU must be shared by grater part of the product running on a framework. Framework with different CPUs is not quicker than those of single CPU. In present day working frameworks, there are regularly twenty to sixty projects running when the client is not doing anything. Window is here and then slower on different CPU. RAM: -In spite of the fact that system information exchange does not ordinarily include much direct memory utilization. Moreover, user computer accidently start again as user in the central of something.   The folder structure of hard drive might be gradually deteriorated and user will not longer be able to boot user machine. Provide a scenario as an example to explain performance problem related to a local area network. Identify and describe the potential solution to any two of the problems mentioned above. Solution of CPU usage problem: In addition, user should update to your computer. Some programs are doing slow your computer, so that is why should remove that programs. As well should keep antivirus in your computer for remove the virus. Ought to be changing the power settings that will help in growing the processor capacity. Solution of RAM problem: First of all, user should test the memory modules and should check which module is not working. After that, also ought to be checking the memory slots. If any problem in memory slot so user could restore the motherboard. After change the memory slot module the lined up should be correctly on the bottom. Create a form to document the problems and their solutions in knowledge base.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Knowledge Base-Form Name of the CompanyVTNZ Clients NameAnil Verma Date and Time10/02/2017-1.00pm Problem Detail:RAM problem is related to network performance. Due to this issue, user computer start again and folder structure of hard drive might be gradually deteriorated. Name of the Technician Lakhwinder Kaur Date and Time10/02/2017    1.00pm Service Hours 20 minutes Proposed Solution: Firstly, did check the memory modules which module is not working. Then, find the problem in memory slot and finally change the motherboard and solve it. ResourceLaptop, Internet, Motherboard, antivirus Costs$50 Procedure Personal In addition, I find the problem of RAM. Then ,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Search on internet how we can fix it. Company ContactAddress20 Queen Street, Auckland InformationPhone0221451737 Website[emailprotected]   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   TASK 2 Monitor and maintain the performance of a local area network: 2.1  Ã‚   Identify and list any 5 network monitoring tools. Also  Ã‚  Ã‚  Ã‚  Ã‚   describe the features of those tools which deal with the performance issues of a local area network. Monitoring tools and features Total network monitor: -This device is the non-stoppable host, monitors network services. They also informed us that all issues need attention. Apart from this, this trouble is given a full report. The device is fixed to troubles successfully or negative consequence or still using the color code was imperfect. Nagios: -A flawless network to run all applications and all services must be up and running on the network at all times. An application, services, helps administrators to maintain critical systems at all times. Furthermore, to keep all this time is going to be good and also we need special control equipment i.e Nagois. This application is the core monitoring engine acts as a heart. The dude: -This dude monitoring tool is responsive device. Everyone can create automatic analysis for the device. Apart from this, it detects the trouble and alerts you while monitoring devices. Microsoft network monitor: Microsoft network monitor is local area network monitoring tool. This tool monitors the performance issues of a LAN network. Moreover, the operation control, to analyze and to capture the flow of traffic in the network allows to administrator. Mostly a device that network administrators must find easy to control.   This device is helpful for troubleshoot the networks problems and applications as well. Advanced IP scanner: In advanced IP scanner monitoring tool perfectly an administrator in a local area network, like network, wireless, routers devices for example mobile phones must be monitored. Moreover, this monitoring tool to share databases on a remote machine if HTTP and FTP has been able to connect as it helps us. This device allows starting the computer and shutting down the remote computer as well. 2.2  Ã‚   Install any available network monitoring tool on a computer having Windows Server 2008 and monitor the bandwidth usage over a period of at least 5 minutes. Figure1. It shows the dashboard IP addressed by bytes. Figure2. This picture represents the summary of capsa. 2.3  Ã‚   Analyze the information showed in the bandwidth monitoring graph to explain if the usage of network is reaching to its limits. First of all, I did install the capsa software. This software examines according the Internet protocol address. This represents the traffic buffet information. Moreover, this software gives information of summary and shows bytes, packets and bps so on. 2.4  Ã‚   Explain different technique for preventing performance problems to occur in a local area network. There are so many different techniques for preventing performance of a local area network. First, incline the number and speed of hard disk. Second,for load the balance of server should be added new servers and network functions. Increase to server memory is very vital for preventing the performance of a local area network.Also, should be setting of operating system. One thing is more; user should files moves from the server to the client PC.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   TASK 3 3.1  Ã‚   Identify and explain different security exposures and violations concerned with the security of a local area network. Probes: Probes confirm for protected servers or services so as to might be successively on computer on user LAN.   These tests are generally completed through programs that get a collection of IP addresses selected by the individual running the program. Moreover, there are some common services like mail, web and so on. Apart from this, when set up of other services then program try to observe. Furthermore, if it know how to login or else get access to that service. Probes are not to run some servers which you cannot recognized. Worms: A worm is a separate malware computer program. It is very harmful for network. Worm replicates itself to spread one system to another system. It does not require human intervention to spread.   It makes unusual to storage devices. Virus: Viruses are normally not security threat in a local area network to PCs. Virus can create lots of troubles. Moreover, it can be change the implementation of processor. It can transmit the virus one computer to another computer as well. Furthermore, virus can do loss the data.Due to the virus processor working slowly. Trojan Horses: Trojan horse is any malicious computer program which is used for hack into a computer through misleading client of its correct intention. This threat attackers use for private information like as banking information, passwords and personal identity as well. Moreover, this threat use for spreading malware across the network. Also, it can be corrupt the data and deletion to files. 3.2 Determine the possible solutions to these exposure and violations by giving at least 1 example each form an industrial perspective. Solution of Virus: Malicious software is very helpful for removing the virus, because without malicious software is very to remove the virus. Apart from this, there are some removal tools as well. User should install antivirus software for removing the virus. As well, user ought to be keep antivirus application for updating the computer. Solution of Trojan Horses:- Firewall software could compose invisible to user PCs.Firewall software too advise to user while programs on user PCs try to the attached with internet without significance. It will give information if user gets some virus.User should remove problems which are affected by Trojan horses threat. TASK 4 4.1  Ã‚   The sender in a LAN send 10110110; a hacker alter the data and the receiver receive 10100110. As a network expert analysis to find out the position of error bit. P1 P2 1 P4 0 1 1 P8 0 1 1 0 1 2 3 4 5 6 7 8 9 10 11 12 P1 = 10101  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Odd  Ã‚  Ã‚  Ã‚  Ã‚   P1=1 P2 = 11111  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Odd  Ã‚  Ã‚  Ã‚  Ã‚   P2=1 P4 = 0110  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Even  Ã‚  Ã‚  Ã‚   P4=0 P8 = 0110  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Even  Ã‚  Ã‚  Ã‚   P8=0 Transmitting data 1 1 1 0 0 1 1 0 0 1 1 0 1 2 3 4 5 6 7 8 9 10 11 12 Hacker attack the receiver data 1 1 1 0 0 1 0 0 0 1 1 0 1 2 3 4 5 6 7 8 9 10 11 12 P1= 1 1 0 0 0 1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Odd P2=1 1 1 0 1 1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Odd P4=0 0 1 0 0  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Odd P8=0 0 1 1 0  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Even Add parity bit: P1+P2+P4+P8= P7 So, P7 position is wrong. 4.2 Analysis a 10 bit sequence 1010011110 and a divisor of 1011 for error checking using CRC. Data: 1010011110 Divisor:1011 1001000111 1 0 1 0 0 1 1 1 1 0 0 0 0 1 0 1 1 0 0 0 1 0 1 1 1 0 1 1 0 1 1 0 0 1 0 1 1 0 1 1 1 0 1 0 1 1 0 1 0 1 0 1 0 1 1 0 0 0 1   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   1001000111 1 0 1 0 0 1 1 1 1 0 0 0 1 1 0 1 1 0 0 0 1 0 1 1 1 0 1 1 0 1 1 0 0 1 0 1 1 0 1 1 1 0 1 0 1 1 0 1 0 1 1 1 0 <

Aviation Industry Essays -- Informative, Aviation

General Aviation Brief History: The civil aviation world consists of two categories according to the Federal Aviation Administration (FAA): scheduled airline service and general aviation (FAA, n.d.). The Aviation industry as we know it today was born from General Aviation (GA), and both their histories are inextricably linked. People’s ambition to fly stretches back to ancient times, of tales and legends passed down from Greek civilizations, and a passionate drive to master the sky. It is in this same spirit that GA currently resides. The enthusiasm people have for aviation is arguably, unrivalled. There’s a strong sense of camaraderie within the GA industry, a sense of bravado that lends itself to any such death defying occupation. The current GA industry is comprised of two parts: Private operators, described as those who fly without compensation and Charter operators, describes as those who operator for compensation (FAA, n.d.). As of today, general aviation makes up more than 1 percent of the U.S . Gross Domestic Product and supports almost 1.3 million high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry and the economy as a whole (AOPA, n.d.). The aforementioned divisions of GA can be further defined, per the FAA’s Federal Aviation Regulation (FAR), as Part 91 and Part 135 operators: ïÆ'â€" Part 91: These regulations are in place for aircraft owners that operate for non-commercial purposes. These are typically private individual or corporations that fly without compensation. ïÆ'â€" Part 135: These consist of aircraft that fly for commercial, ‘for-hire’ purposes. These are typically ‘charter’ flights which are compensated. Comparable to Part 121(Commercial Airlines... ... a ‘grass-roots’ approach by which each individual is given a portion of the responsibility for security. This method commonly practiced in airports, where regular concerned citizens report suspicious activity and items to security personnel. This method has proven successful in the realization of lowered accident rates in the GA community as stated by Associate Administrator for Aviation Safety Nicolas Sabatini "This record is due to a dedicated commitment to safety by everyone in general aviation." (Sweet 2006) It is important to keep a level headed perspective when dealing with issues of security, especially in the aviation field. At times, the knee-jerk reactionary rules imposed by the TSA may, very well, ensure the security of the issue, but a careful balance must be struck between this dogged need for security and essential opportunity for nurtured growth.

Monday, August 19, 2019

Smith, the amount of Smith it takes to become a Smith :: essays research papers

SOCIALSECURITY.COM The web site for social security and retirement information. The purpose of this site is to provide up to date social security and retirement information and how to get answers to your questions. This website is a private web site and is not associated, authorized, affiliated with, or sponsored by any goverment, nor do we claim to be. Official worldwide government links for social security can be found on our questions and answers category located on the socialsecurity.com home page. If you have any ideas for enhancing this site or if you have any information you would like posted, please email us at webmaster@socialsecurity.com Please choose ONE of the following links: 1 -To receive the Social Security Benefits Handbook click here. This comprehensive guide answers many of the questions individuals seek regarding social security benefits. Easy to read. Highly informative. If you are looking to maximize your benefits, get everything you deserve and minimize the red tape, then this book is a must. Ordering is handled through Amazon.com at a substantially discounted price. After ordering please use you browsers back button to return to this page and then click the Socialsecurity.com home page link. 2 - FREE HEALTH or LIFE INSURANCE QUOTES. It's Absolutely FREE for all SocialSecurity.com users. You can even get FREE QUOTES for AUTO INSURANCE. You may get quotes for all your insurance needs. No obligation whatsoever to purchase. 3 -Go to Socialsecurity.com home page. You can use your browsers back button to return here from any linked sites. REMEMBER TO BOOKMARK THIS PAGE e-stablished 3/16/98. Disclaimer DISCLAIMER This web site is designed to provide information in regard to the subject matter covered. It is provided with the understanding that the publisher of this information is not engaged in rendering legal, or other professional services. The publisher is not responsible for any misrepresentations or errors regarding information listed here or on any linked sites. All information provided is for informational purposes only. We are not responsible for the reliance on this information. If legal advice or other professional assistance is required, the services of a competent professional person should be sought.

Sunday, August 18, 2019

The Causes Of World War I :: essays research papers

The first world war had many causes, the historians probably have not yet discovered and discussed all of them so there might be more causes than what we know now. In this essay I would discuss the main causes of the war—the ones that were discussed in the textbook. In the time before the war’s outbreak (before 1914—in the beginning of the century) the world was separated into big empires that had colonies around the world (European countries ruled most of Africa). There were fights and disagreements between the major empires. Usually, when there are many arguments between countries, people start fear of war and prepare for it (for example, today in Israel, after Benjamin Netanyahu winning the elections, Israel’s policy towards the Arabs and the Palestinians have changed. There is fear from war with Syria, because of threats from both sides, so both countries arm themselves and ready for war, just in case it would break). In the beginning of the century Britain was the largest empire in the world, it also had the largest navy. The navy was so big and strong because the Britons needed to protect their empire and maintain the sea routes between the different colonies. The Kaiser William II of Germany hated and envied Britain for having a stronger navy than his. He increased the German navy and built many warships. Britain responded with building more ships and increasing its navy too. This started a race for building more and better warships and it created tension and competition between those two countries. Germany and France were rivals for centuries and at the beginning of the century and at the end of the 19th century the rivalry increased. This happened because of the war between those two countries in 1870-71 when Germany defeated France. Germany took over the areas of Alsace and Lorraine and the French people wanted to revenge Germany and retrieve those lands. France could not start a war against Germany since Germany had more resources and a stronger army than France. France needed allies to help it fight (the subject of alliances would be discussed later). There was another quarrel between France and Germany—about controlling Morocco. In 1905 France thought that it should have more influence in the western Mediterranean Sea area as it already controlled Tunisia and Algeria, it wanted Morocco too. The Kaiser of Germany visited Tangier (a big city in Morocco) and said that Germany would protect Morocco in case of a French attack. In 1911 France increased its control over Morocco and Germany sent a warship. The Germans withdrew at last but the French gave them a part of Western Africa in exchange.

Saturday, August 17, 2019

Blanche’s Madness Essay

Blanche DuBois in Tennesse William’s A Streetcar Named Desire suffers from living in a culture dominated by men, the human condition of desire and the insecurity and madness that follow; sexuality and her self-pressure to maintain self worth are the source of her cast off from society. The madness is launched when she loses her money, family, husband, job, and continues to lose her youthful appearance. Blanche’s insanity can be deemed acceptable from the surface because of her losses, but the way in which Blanche handles her situation oozes insecurity and hints that the loss of sanity is inevitable in Blanche; her insecurity stems from her dependence on men and hergluttony to fulfill her whims which escalates to society’s lack of acceptance. A true sign of extreme insecurity in Blanche is her creation of a false, dignified persona based on lies. She builds herself a world of fantasy to escape from the troubles that surround her. A symbol of this in the play is the paper lantern Blanche places over the â€Å"bare lightbulb† (Willaims 42). She tells Stanley â€Å"It’s only a paper moon, just as phony as it can be – but it wouldn’t be make-believe if you believed in me! † (Williams 100). The light bulb of the lamp signifies Blanche’s inner essence and the â€Å"paper moon† is the artificial personality she lays on top of herself. This is mainly in attempts to receive compliments and thus assurance of self from the men around her. She goes so far as to admit she was â€Å"fishing for a compliment† (Williams 89) from Stanley. Blanche’s total inability to reassure herself is a piece in the puzzle of her impending madness, and a sign of the male dominated and run society of the 1950’s. The human condition involves attachment and therefore desire; this is a major factor in Blanche’s regression process that she cannot control. Both Stella and Blanche desire freedom, beauty, love and most of all, sex. To satisfy her desire Blanche puts forth her sexuality. As her regression thickens she festers and does not know â€Å"how much longer [she] can turn the trick† (Williams 79) a fact that propels her insanity. Blanche’s encroaching on the young man and exclaiming â€Å"it would be nice to keep you, but I’ve got to be good—and keep my hands of children† (Williams 84) is one of the ignals of her desire to remain young and relive her teenage bliss, which also propels her downfall. Blanche pines for an escape from the financial and personal woes she has created for herself; the only road she sees to escape is with a man. Blanche uses her sexuality to reassure herself and head for an escape. This is another example of Blanche’s inability to care for herself and to become accepting of her situation without a man in the picture. She says â€Å"I want to deceive him enough to make him—want me†¦Ã¢â‚¬  (Williams 81). This statement from Blanche provides insight on her insecurity and dependence on a man to rescue her. William’s uses a dash and an ellipsis in her statement to create the uncertainty of her speech. Mitch and Blanche are not compatible but Blanch desperately seeks an escape from the difficult circumstances of her life. Even when Blanche is being taken away she refuses to listen to the Matron but says to the male doctor â€Å"I have always depended on the kindness of strangers† (Williams 142). Blanche’s final vision consists of a male taking her to safety—or rescuing her, because she cannot rescue herself. This could be seen as rational, however, because the doctor is a licensed professional and Blanche has suffered through a difficult time. Blanche is in fact shrouded with insecurity and immaturity, but through her the loss of her plantation and job this could be deemed reasonable. She has nothing left in the world, and due to the time period the only way out she sees is with men. While she is floundering between her losses she turns to her sexual desires to keep herself afloat. Blanche could have handled her situation with more grace, but her madness could be seen as reasonable on the surface.

Friday, August 16, 2019

Discuss the increasing importance of HRM in today’s businesses Essay

With the emergence of a highly dynamic global economic system, and with new competitors constantly arriving on the scene, businesses are constantly finding ways to increase efficiency and effectiveness to stay viable to meet present and future work demands. The Human Resource Management (â€Å"HRM†) function exercised effectively in many businesses has overtime proven to have significant impacts on business results, thus becoming increasingly influential in the formulation of business strategies. This paper seeks to discuss the increasing importance of HRM in today’s businesses, with a focus on the four key roles identified by Dave Ulrich (1993) that Human Resource (â€Å"HR†) managers of today should play to rise up to impending challenges, in response to the purpose of this assignment. This paper will also attempt to define and interpret existing HRM concepts and theories and to highlight their differences and respective roles in the shaping of today’s businesses. It will also draw some examples of good strategic HRM practices in some of today’s most successful global companies. In today’s businesses all around the world, the fundamental attributions for a business to thrive in an ever-changing and demanding society have drastically undergone an overhaul in recent years to suit and adapt to change. With vast advancements in technology and better infrastructure in place, businesses are able to operate more efficiently in today’s society than before. However, the most essential ingredient in all successful businesses is its people, or what is termed today as ‘human asset’. Good staff are the heart and blood of businesses, driving them to achieve strategic objectives and goals. With such realisation, the HRM function in a business has been identified as a key role in the sustenance of business success and how it can be better positioned to gain a competitive stance through the effective management of its people. To attempt to precisely define HRM will result in more confusion and contradiction, particularly due to the case of its constant comparison with Personnel Management (â€Å"PM†). Worthy to note, Noon (1994:23) states that though HRM is comparatively new to many countries, in the USA the HRM term has been used over fifty years as an alternative name for PM and that the two terms are synonymous. Pre 1980s, PM was largely viewed as the human face of management. Torrington and Hall (1991) puts forth that: Thus it can be seen that PM is more work-force-centred, directed primarily at the business’s employees; sourcing and training them, arranging for remuneration, defining management expectations, tending to employee’s work-related needs, dealing with their problems and seeking to modify management action, which tend to produce unhappy employees and unwelcomed responses. Such is the ‘hard’ approach of managing people, viewing an organization’s employees as a cost, which needs to be tightly budgeted. People under the PM system are viewed as resources in the same way as any other business resources, and thus, indisputable never totally identified with the management interests. Thus surfaces a â€Å"gap† between human resource and business strategies, with the management and employees mediating the needs of each to the other. Tichy, Fombrun and Devanna (1982) state that: It was during the 1980s that HRM took on a new meaning as it grew and broadened as it focused on strategic and business concerns according to Tichy et. al. (1984) and Freedman (1991). It was identified with a strategic approach, bridging the link of managing of people to the achievement of business objectives. HRM was becoming more influential across regions like South Africa and Australasia and soon, it found itself being integrated into the local business cultures. HRM took upon the role of strategically managing the utilization of human resources at its optimum level. It strived for a seamless link between business policies and HR policies, and looked upon employees as resources distinct from the other resources, striving for a more humanistic approach. Drawing on such ideas, Alan Price (2004) defines HRM in the new age as: As such, HRM is viewed as a more resource-centred approach directed primarily at managing the need for human capital. This could be attributed to the ‘soft’ approach of HRM, which view its employees as a core asset. Human capital is thus defined not only to include employees of the business, but also to encompass the management as a whole unit whose interests can only be enhanced through the inclination of effective and integrated overall management of all the business’ processes and units. Henry and Pettigrew support this belief that the strategic character of HRM is distinctive. HRM is said to be based on a management and business-oriented philosophy. This is perhaps the most significant point differentiating HRM from traditional personnel management in today’s organizations. With more upcoming challenges ahead in an unpredictable future working environment, businesses are shifting their paradigm to adopt the HRM approach for its flexibility and proven means of producing results in the long run. If HRM is going to rise to such challenges, Dave Ulrich (1993) identified a four-pronged approach that managers can undertake to make the transition successfully. They are to play the roles of: * Administrative expert Ulrich asserts that HR needs to add value by acting as a partner with line management. He notes â€Å"HR professionals add value to a business when they use their expertise to link internal organization and management practices to external business requirements.† He reckons that HR managers must be effective through their management so as to create value within the organization. * Employee champion Ulrich reckons that a good HR manager is one who is able to relate and meet the needs of employees, at the same time be their voice in the organization so as to provide assurance and seeking of new resources for their betterment. Jack Welch, CEO of General Electric (2001) formulated the â€Å"Boundaryless† concept in the company where he took ideas to the bottom line of his thriving organization. He successfully removed barriers within the organization functions, encouraged employees to voice out any new ideas they had and assigned managers who were committed to the sharing of these ideas with the board and realizing them. As a result, employees were not only rewarded and recognized, but gained much credit for contributing to the company, thus boosting levels of employee confidence and commitment. * Change Agent Ulrich points out that HR managers must be able to manage change, simultaneously acting as a catalyst for change. In the ever-changing global economy, change is inevitable in organizations where staying cost-effective to gain competitive advantage is of priority. Change is seen as a means of psyching the business up to possible uncertainties in the present and future environment. HR managers thus must be able to lead functional change and exert influence over the organization by being observant and responsive towards change to ensure that the business stays viable. They need to constantly monitor the organization to determine the need for change and implementing it successfully alongside organization objectives and values. Ulrich further states that the distinction between those who succeed and fail is â€Å"the ability to respond to the pace of change†. Bill Hewlett and David Packard who founded Hewlett Packard said of managing change and growth: * Strategic partner Ulrich states that HR managers should shoulder the role of being a strategic business partner in the translation of business objectives into action. They must thus be able to develop new ideas and contribute to the making of business decisions within the organization on top of effective people management. HRM is thus seen as part of an integrated and coherent function in the business process. Ulrich highlights the increasingly complex and paradoxical roles the HR professionals must perform to better understand HRM functions and to add value in the organization by helping line managers align strategies and processes with the business needs of the organization. Legge (1989) also provides that that HRM concentrates more on what is done to managers than what is done by manager to the employees. He also reinforces that there is a more proactive role for line managers and for top management to manage culture. Thus is the focus on the true effectiveness and value of the HRM function and if streamlining its processes and redefining HR manager relationships with line managers would define new competencies for HR managers. But is definitely sufficient to say that the role of HR is dramatically changing as how Ulrich (1993), Schuler (1990) and Walker (1992) have recognized it to be. The HR function has systematically gained prominence. Senior HR professionals have made the shift from just being just ‘another functioning role in the organization’ to being key members of the senior management team. Noble (1994) captures this transition by stating, â€Å"competition has taken human resources from the backwater to the boardroom.† Since then, several formal theoretical models of Human Resource Strategy have started to appear as early as 1984, which served as analytical views to better comprehend the development of HRM and are loosely regarded as representatives for the profession. Among them are: * Fombrun, Tichy and Devanna’s Matching Model It seeks to internally unify activities with the HR function and business strategy. It aims to achieve a ‘match’ or ‘fit’ between the two functions. It has its focus on work systems and job designs, making HRM seem to evolve in a social vacuum. * The Harvard Model Produced by Beer, Spector, Lawrence, Quinn Mills and Walton (1984), it provides a broad yet casual depiction of the determinants and consequences of the implementation of HR policies. In this model, situational factors together with stakeholder’s interests are taken into account to influence the formulation of HR policies and outcomes. It concentrates on high commitment as the ideal state of the work force. The Stakeholder theory in this context sets out to prove the varying degrees of influence and impact that stakeholders can have on the conduct and progress of the organization. The main aim is to commit and coordinate the interests of an organization’s stakeholders while directing the organization’s primary activities. * The Warwick Model An extension of the Harvard Model by Hendry and Pettigrew (1990), it emphasizes the importance of external and internal environmental impacts on HRM and is more oriented to the process of change. * Guest’s Model Guest (1989) adapted the Harvard Model by basing his analysis on the four HR outcomes, and developing these into four policy goals: commitment, flexibility strategic integration and quality. This prescriptive model seeks to see these goals as a coherent package that needs to be achieved for desired organization outcomes. * The Storey Model John Storey (1993) stated that â€Å"the ability to take, and implement a strategic view of the whole range of the personnel practices in relation to business activity as a whole† is the basic distinction between traditional personnel management and HRM. Storey’s theoretical model is based on conceptions on how organizations have been transformed from predominantly personnel/IR practices to HRM practices. These influential HRM Models serve as a means of developing strategies and formulation of policies to support current business infrastructure and provides a framework of current concept, assumptions and theories of HRM practices in the real world today. Ulrich (1993) asserts that HR needs to add value by acting as a partner with line management. He notes â€Å"HR professionals add value to a business when they use their expertise to link internal organization and management practices to external business requirements.† To assess HRM outcomes and to define its processes in this new day and age is subjected to numerous debates as to the use of the ideal method in the effective management of people. HRM is evolving in tune to the gradual yet subtle phasing out of traditional PM in most modern organizations today. It can thus be concluded aptly that a successful organization is nothing without good staff, emphasizing once again, the importance of good HRM practices in today’s businesses and the integral role it plays in the with regards to the management of an organization’s core asset – Its people.    REFERENCES Price, Alan. (2004), Human Resource Management in a Business Context, 2nd Edition, Thomson Learning. Stone, J. Raymond. (2002), human Resource Management, 4th Edition, John Wiley & Sons Australia, Ltd. Torrington, Derek. and Hall, Laura. (1998), Human Resource Management, 4th Edition, Prentice Hall Europe. Torrington, Derek. and Hall, Laura. (1991), Personnel Management: A New Approach, 2nd Edition, Prentice Hall. Ulrich, Dave. and Smallwood, Norm. (2003), Why the Bottom Line Isn’t!, John Wiley & Sons, Inc. Welch, Jack. with Byrne A, John. (2001), JACK: What I’ve learned leading a great company and great people, Headline Book Publishing Great Britain. MGW2430 Human Resource Management Averil Chan Si Wan (19603363)