Tuesday, December 24, 2019

Case Study for Trap Ease America (Marketing) - 967 Words

Case Study: Trap ­Ease America 1. Trap ­ Ease only has a once ­in ­a ­lifetime opportunity because the investors see that this product has big potential since the idea is great. The investors saw the product and automatically saw that people would buy it since it is such an easy and clean solution to something associated with messy and violent. The information needed to evaluate the opportunity is the study of the market, competitors, and other products. Also, the awards and buzz surrounding the Trap ­Ease also helped the investors see this as a high potential. The positioning of Trap ­Ease is centered around dead mice and the product. They really value their product and want to show its usefulness. The group’s mission statement†¦show more content†¦There should be ads in the department stores they sell in, tv commercial, and even the internet. If this was blended in with the other â€Å"P’s† , it will have a stronger presen ce in the market. 5. Trap ­Ease America, although being an all new and mess ­free way to get rid of mice and rats, has at least one major competitor: the original mousetrap. The mousetrap has a big advantage in that it has been around since 1876 so many competing companies, like Ortho,, distribute them. Iit has a big place in the market. Also, it has reached all of its possible market target. Whenever there is a rodent problem in a house, it is the first solution that comes to mind. Other competitors are companies that sell poisons and noiseless plug in devices that sell from Riddex and Motocomo. Trap ­Ease is in its inception and will fight its way through the competition with the idea of a mess ­free way to rid the pests. 6. The first thing I would do would be to applaud Martha for her work alone and then hire an actual marketing strategy team. Marketing strategy is too big of an area to cover with only one person. You need other people to focus on dif ferent areas that set up the marketing logic. The best control procedure would be the strategic control. The company needs to first set a better basic strategy and then continually check if it matches the opportunities. This changes how the company approaches the marketplace. Another control that would work well would be theShow MoreRelatedMouse Trap Cases1428 Words   |  6 PagesMarketing Management Trap Ease Case By : FAJRI RAMADHAN Magister Management – Eks XVII 1. Martha and the Trap Ease America investor feel they face a â€Å"once-in-a-life-time opportunity†. What information do they need to evaluate this opportunity? Information that they need is to see if there are any Companies ( competitors ) that produce similar products (mousetrap) do not have the similar technology with Trap-Ease product, that they have a better mousetrap, efficient andRead MoreTrap-Ease America: the Big Cheese of Mousetraps1483 Words   |  6 Pages Faculty of Business and Economics Graduate Program ADVANCED MARKETING MANAGEMENT, MKT.500 Case Study one: Trap-Ease America: The Big Cheese Of Mousetraps Presented To: Dr. Ziad Haddad Presented By: Shady Habboub Fall Semester 2009-2010 1- The Mission Statement of Trap-Ease America: â€Å"We want to free your homes from mice. Fathers: you can protect your families easily and safely. Trap-Ease America is your state of the art solution† 2- The opportunities thatRead MoreCase Study : Trap Ease America837 Words   |  4 Pages Aulus Argollo Case Study: Trap-Ease America 1. Trap-Ease only has a once-in-a-lifetime opportunity since the investors enjoyed the idea and that it has great potential.The idea for a product that takes care of a rodent in a very clean and effective way is excellent, and investors saw this an agreed. To evaluate this opportunity though, Martha and her group has to see if this is a product that people are in need of because regardless of it being a good idea, there was no search to see if thereRead MoreTrap-Ease America2828 Words   |  12 PagesPrinciple of Marketing(Mkt-101) Case Study on: Trap-Ease America Prepared For: Md. Anamul Haque Rubai Lecturer, Dept. BBA East West University, Dhaka. Prepared By: Abdul Wahed Saad Mahmud ID No: 2008-2-10-245 ID No: 2008-2-10-186 Hasibul Alam Jahid Bin Islam ID No: 2008-2-10-169 ID No: 2008-2-10-083 Fahmid Khan IDRead MoreAnalysis Of The Davis Service Group Case Study1405 Words   |  6 PagesAnalysis of the Davis Service Group Case Study The dynamic world of business presents opportunities and challenges to firms which can help or hurt them. When a business produces favorable results from its operations and has reached a pinnacle in their domestic market, a business may require expansion to new international markets. In the case of England’s Davis Service Group, such expansion limits in the mature markets had led the firm to explore international expansion options (The Times 100,Read MoreStarbucks strategy7015 Words   |  29 Pagesparts of the US. Howard Schultz later joined the company as a marketing executive and then acquired it in 1987.In 1992 Starbucks went public and was successful in marketing a regular everyday product as something premium. As of now Starbucks with over 20000 stores has a worldwide presence in over 50 countries which is an enviable global presence. It has presence in Europe, Asia, South America, Oceania, North America and Central America. The strategic expansion to China and now its emphasis on otherRead MoreBottom of the Pyramid9096 Words   |  37 Pagescharacterizing the BOP segment and ï ¬ nding the appropriate business model for attending the BOP can provide some answers to this issue. Practical implications – The article provides some guidelines to managers as to how they need to adapt their marketing strategies to sell to the BOP market, and what type of partnerships they need to build in order to succeed. Originality/value – The article presents a thorough analysis of the key elements involved in the BOP initiative: companies’ motivationsRead MoreClinical Trial and Joint Venture4995 Words   |  20 PagesPharmaceuticals to market GelTex’s first product, RenaGel. GelTex was an early-stage biotech research company with two products in its pipeline. GelTex had neither the capital nor the marketing organization to launch RenaGel. Therefore, the company had been looking for a partner that would contribute cash and marketing expertise in exchange for a share of profits in a joint venture. Genzyme had revenues of $518 million in 1996, and had grown rapidly through the innovative use of joint venturesRead MoreStrategic Development in Global Food Retail3706 Words   |  15 PagesCase Study – Strategy Development in the Global Food Retail Supermarket Industry Introduction In order to develop a global strategy, the deep understanding of the term ‘globalization’ is very important for every company. Globalisation: The globalization increases the mobility of goods. Globalization is a term describing different complex ideological, political, environmental and cultural forces as one world. During World War II, the national boundaries got faded and financial markets, informationRead MoreGlobal Business Plan9701 Words   |  39 Pagesitinerary. Excursions can be added to enhance the customers’ Italian experience including wine making and tasting, shopping for and cooking a meal, and cultural sights. Strategic Goals The strategic goal is to expand the existing company, Moto-America Tours, into the European tour market by specializing initially in Italy and later expanding into France, Spain and Portugal. Vision Statement To be the premier motorcycle touring company in Italy for people who want to travel as temporary Italians

Sunday, December 15, 2019

Deontology and the Categorical Imperative Free Essays

First, let us examine what it means to act in a deontological manner. Demonology is â€Å"the normative ethical position that Judges the morality of an action based on the action’s adherence to a rule or rules† (â€Å"Ethics-virtue†, Standard Encyclopedia of Philosophy). For someone to act in a deontological manner, he must follow a course of action not because it causes the greatest amount of good to either themselves or others, but because it is the â€Å"right† thing to do. We will write a custom essay sample on Deontology and the Categorical Imperative or any similar topic only for you Order Now A deontological believes that it is their â€Å"duty† to follow these moral imperatives, and it is these values which are the basis which Emmanuel Kant bases his Categorical Imperative on. In Kantian, a theory of demonology developed by Emmanuel Kant based on his Categorical Imperative, we should make decisions based on our duty to others and that it is not the action’s consequences which make it right or wrong, but the motives of the individual who is carrying them out (Kant, Emmanuel. 1780. â€Å"Preface†). For example, if I say, I do not murder other human beings because I would not wish others to murder, I am behaving deontological because as a society we would not wish murder to become a universal rule. Similarly, I would not wish someone to secretly defraud Investors and embezzle company money, but more on that soon. If a person is to act in this decidedly UN;deontological manner, they might have justified it in one of two likely other manners. The first non-deontological theory we someone could operate with is utilitarianism. In this moral theory, â€Å"the proper course of action is the one that maximizes utility, specifically defined as maximizing happiness and reducing suffering† (Utilitarianism. N. D. ) In Wisped. Retrieved January 20, 2013, from http:// ordering others, we still do not wish this to occur but this time it is because the act of murder does not maximize happiness as a society. The loss of an individual in this manner would detract from the whole be it either from a production stand-point, or because of the emotion detriment it brings others. Misuse of a corporation’s funds could be Justified in a certain scenario, so we will add this to our toolbox of motives for now. A second non-deontological moral theory we must examine is the idea of egotism. With egotism, a person’s primary drive is to enhance their own interests – be they intellectual, physical, societal, or otherwise – over the interests of others (Egotism. (n. D. ) In Wisped). Within the context of our example about murder, an egotist does not wish for murder to exist simply because he or she would not wish to be murdered. Within the scope of business operations, this ideology would seem to form the basis of most practices. While the advancement of a corporation would be paramount in the eyes of those with the most vested interest, this moral guideline can be disastrous in a society that does not share this belief as the rule of the land. Let us now look at two of the ethical problems raised by the Delphic Communications case. The first problem we will examine is the fact that Delphic was using two different sets of accounting books, one with doctored numbers that was given to investors, and one which showed the true finances and what was being manipulated for the fraudulent figures. This, according to testimony produced by James R. Brown, Dahlia’s former vice president of finance (Grant, 2004, p. CLC). Members of the Riggs family were ultimately indicted for looting the company of more the $100 million and aiding $2 billion in debt. Regardless of an argument of either this being a cover-up in order to hide the Riggs family’s personal use of company funds, or merely a tactic to delay investor outrage in order to settle outstanding debts incurred by Delphic operations, this cannot be considered a deontological based maneuver. Adherence to ones duty to the company and its core operations is contrary to these kinds of behavior. Also, under no circumstance would lying biblically about a company’s well- being in a capitalistic society be considered as being desirable as a normative rule. At best, if this were done as to buy the company time to right its finances, this action could be eschewed as utilitarian if the underlying goal was to prevent panic on Wall SST. And to maximize society’s net worth. Likelier, this was an egotistic based motive in order for the Riggs family to continue their practices of using the company as their personal â€Å"piggy-bank† as it were. There is evidence of this being the case based upon the next ethical issue we will address. During the course of investigations carried out in the course of this case, it was covered that members of the Riggs family had also used corporate money to finance a golf-course on private family property of theirs (The SEC, 2002). Much like the previously mentioned ethical problem, it is difficult to determine in what, if any, way this action could be eschewed as either a deontological or categorically imperative decision. If it were the norm for members of any company with access to corporate funding to use them on private projects without prior approval, there would be few corporations which would be able to operate in much of any capacity. Dominant having misappropriated funds that were allocated for actual business operations. Even when viewed in light of a utilitarian stand-point, the Jobs which would have been created through the construction and operation of said golf-course would not have warranted an unauthorized expenditure of this magnitude outside of the company’s normal business operations. The member of the Riggs family who authorized the use of these funds should have instead chosen to use his own capital in order to finance this endeavor if it was truly that necessary. Utilizing Dahlia’s none in order to build this project falls categorically within the scope of an egotist method of reasoning. These couple examples were but a few highlights that were uncovered during the course of the Delphic indictment. Members of the Riggs family might not have seen an end to their empire had they taken a step back and evaluated not only the consequences of their actions, but the rationale behind what they were doing. Demonology and categorical imperatives, like most morale methodologies, are difficult to apply in every scenario. Doing what is right for the sake of its rightness, or because t is your duty to perform in a specific way can fail in an instance of grave social importance. As instanced in the threaded discussion this week, if a programmer of nuclear missile technologies learns of an attack by his employer against another nation does his or her duty lie with the attacker or those who would be attacked? Of the moral decision making tools discussed in this paper, Egotism, Utilitarianism, Demonology, and Categorical Imperatives all provide a different answer to the question in hand. The members of the Riggs family might still feel they are in the eight if their ill gains were greater than the pain of imprisonment from a strictly Egotistic model. How to cite Deontology and the Categorical Imperative, Papers

Saturday, December 7, 2019

Saudi Arabia and Its Culture free essay sample

Society as a whole valued behavior displaying generosity, selflessness, and hospitality; deference to those above in the hierarchy of the family; freedom from dependence on others and mastery over ones emotions; and willingness to support other family members and assume responsibility for their errors. Chastity and sexual modesty were also very highly valued. Applied primarily to women, these values were not only tied to family honor but were held to be a religious obligation as well http://saudiarabiarafael. blogspot. com/2008/05/saudi-arabia-values. html Women is prohibited socialize with male native people that don? t have a parental relation, so they have the value of chastity, sexual modesty and particular deference for their relatives http://saudiarabiarafael. blogspot. com/2008/05/beliefs-and-values-similar-or-different_26. html Family dynamics: Family primary basis of identity and status for the individual and the immediate focus of individual loyalty, just as it was among those who recognized a tribal affiliation Families formed alignments with other families sharing common interests and life-styles, Families tended to be patriarchal Father in the family appearing as an authoritarian figure at the top of a hierarchy based on age and sex Men can have as many as four wives, but polygamy is no longer widely practiced. If wealthier men do have more than one wife, the wives and their children tend to live in separate units from each other. http://dpuadweb. depauw. edu/$1~mkfinney/teaching/Com227/culturalPortfolios/Saudi_Arabia/Family. htm Communication: Relationships Communication You will need a Saudi sponsor (wakeel) to enter the country. The sponsor acts as an intermediary and arranges appointments with appropriate individuals. Saudis do not require as much personal space as most western cultures. As such, they will stand close to you while conversing and you may feel as if your personal space has been violated. Saudis prefer to work with people they know and trust and will spend a great deal of time on the getting-to-know-you part of relationship building. You must be patient. Since Saudis will most likely judge you on appearances, dress and present yourself well. Meeting Etiquette Men shake hands. Good friends may greet each other with a handshake and a kiss on each cheek. Women generally hug and kiss close friends. Men and women would not greet each other in public I from outside the family. When Saudis greet each other they take their time and converse about general things. Gift Giving Etiquette Gifts are not the norm as in many other countries. If you are invited to a Saudis house bring something small as a thank you. Flowers do not make good gifts from a man, although a woman could give them to her hostess. Never give alcohol unless you are positive they partake. Gifts are not opened when received. Dining Etiquette Saudis socialize primarily in restaurants and international hotels when entertaining expatriates whom they do not know well. After some time you will be invited to the home. Entertainment will generally be same-sex only. If both sexes are included, they will be in separate rooms. If you are invited to a Saudis house: You would usually remove your shoes. Dress conservatively. Try to arrive at the invited time. Punctuality is appreciated but not crucial. Show respect for the elders by greeting them first. Accept the offer of Arabian coffee and dates even if you do not normally drink coffee. If you are invited for a meal, understand that there will be a great deal of socializing and small talk before the meal is served. Table manners If the meal is on the floor, sit cross-legged or kneel on one knee.. Eat only with the right hand as the left is considered unclean. Try a bit of everything that is served. Meals are generally served family-style. Honored guests are often offered the most prized pieces such as a sheeps head so be prepared! There is often more food than you can eat. Part of Saudi hospitality and generosity is to shower guests with abundance. There is little conversation during meals so that diners may relish the food. http://www. kwintessential. co. uk/resources/global-etiquette/saudi-arabia-country-profile. html Specific topics that are taboo in Saudi Arabia are marital relations, rape, and domestic violence. It is considered highly taboo to ask a Saudi how their family, specifically female members, is A persons foot is seen as the lowliest part of ones body, it is highly offensive to point ones toe or foot at someone, or to use ones foot to move an object. Therefore, crossing your legs or putting feet up on a table, practices that are common in America, would be seen as offensive in Saudi Arabia Women are expected to be reserved and conservative, with shoulders, legs, and other parts of the body covered In a male-to-male greeting, the two parties typically take part in a warm hand shake using their right hands, and then they embrace with two to three kisses on the cheeks of the other party Female-to-female greetings are similar, as they shake hands and kiss each other on the cheeks There is little to no touching between males and females (unless they are blood related or married), and even then, physical touching is held to a minimum In conversation and every day, eye contact between a male and female can be misinterpreted. Therefore, most women tend to avoid eye contact with males. Additionally, women are not supposed to speak out against the male authority figures http://hopeinterculturalcomm. weebly. com/language-taboos-what-not-questioned-veracity-humor. html http://www. iorworld. com/saudi-arabia-pages-498. php Illness and health practices: A rich body of traditional medicine previously existed in Saudi Arabia Physical ailments were treated with the use of herbs and other plants and also by cauterization or burning a specific part of the body with a hot iron Severe mental health problems were often addressed through special readings of the Koran http://www. everyculture. com/Sa-Th/Saudi-Arabia. html Some people wear amulets for protection against the evil eye or will burn incense to keep the evil eye away from the sick Prayers and reading from Al Quran or the Bible help give comfort to patients and family members and enhance the patients recovery Nurses are perceived as helpers, not health care professionals, and their suggestions and advice are not taken seriously Family members need to be with the body until it is ready to be removed from the hospital. Muslims prefer to bury the body on the day death occurs Most Arabs consider childbirth to be a female issue only. A woman in labor is usually surrounded by female relatives and friends. Fathers are not admitted to the labor room/

Saturday, November 30, 2019

THE SHIPS OF WWII Essays - Philippines, Battleship, Light Cruiser

THE SHIPS OF WWII World War II was the largest naval war in history. It was also the largest air war in history, but that's another story...Ships that fought in the second world war established technology, and patterns that would be used throughout the 20th century. thousands of ideas that would have never been tried on ships during peace time were applied in the then emergency state of the world. Different color writing than black indicates a link, click on it to learn more about. see picture of that topic. . Battleships. Well into the twentieth century Battleships were the most feared vessel in the sea. They were by those days standards very large, weighing in at a minimum of 20,000tons. Their armor was enormous in some cases 12 inch thick belts of steel along their sides! They were armed with 8 to 12 of the heaviest caliber cannon possible the largest of these were18.1 inchers that shot shells that weighed 3,200 lbs. To counter the threat of surface attack from light and extremely fast torpedoe boats was countered with a secondary armament, the mini gun. Which today has evolved into the phalanx gun system, which is a last resort point-defense weapon. There are three main types of battleships. The lightest of these being the battlecruiser. These were usually very light and therebye very fast. To obtain this maneuverability, they gave up a lot of armor, although they still had a deadly armament. These forms of battleships proved very unaffective. They were too light to do battle with a true battleship. and their speed mattered not against aircraft. Plus they were very expensive because of the engines, and light weight material they used. Thus, making them not only an east target, but a good one too. By the end of the war, only 1 of the 40 or so of these ships that were built was still in service. Next up from these we have the battleship battleships. These were the regular old descendents of the ship of the line, back from the day of Admiral Nelson, and John Paul Jones. They usuall weighed from 17,000 tons to 21,000. They were of medium armor, medium speed, and medium armament. But one must keep in mind that they were anything but a medium/normal ship. These ships were before the age of the carrier, the second most feared ship on the seas, as they carried roughly a dozen 12 inchers, and 1/2 a dozen 5 inchers. One step above this, and the king of all kings was the battlewagons. These were the equivelant of the 19th century Flag Ship. They were expensive, big, and could take an unbelievable amount of damage without going down. The two/three most famous of these were the USS Iowa, and the JIN(Japanese Imperial Navy)Yamato. 4 Yamato class battleships were scheduled to be made, but only 2 were, before the japanes realized that for the same price they could have 3 Shimanto class carriers including planes. The Yamato was 244 (800ft, 2 1/2)football fields meters long, had 9 18.1 inch guns! 12 6.1 inchers, for use against smaller, quicker ships, and 12 5 inchers, foruse as an Anti Aircraft, or Surface gun. Its crew was 2,500 strong. And it had 16.1 inch thick armor belting around its waterline. The Yamato class battleships are the biggest ever made. But they were not the best. The best was the USS Iowa. which was the last battleship ever to fire a shot in time of war. Doing so in the Persian Gulf as a part of Operation Desert Storm. The Uss Iowa was longer than the Yamato, went 7 knots faster (32 knots) and at the same time had roughly the same armament, and armor(a little smaller in both categories...9 16inchers, 13 inch belt). Cruisers Cruisers were and are the descendant of frigayes from the navies of past. Cruisers were much smaller than Battleships, but at the same time 2 or 3 times larger than a destroyer. Cruisers more than anything were to show the flag in places where locals needed to be impressed, as they otherwise did not have near as well defined role as the battleships, or destroyers. Their only real

Tuesday, November 26, 2019

Gender Role in Afghanistan

Gender Role in Afghanistan Introduction Culture entails defined norms and values of a particular community and serves as the foundation of many issues that constitute the structure of society. Different studies have been conducted by scholars with aim of identifying more variables that are related to culture. Ethnographers learn other people’s cultures by accurate identification of knowledge, behavior and artifacts.Advertising We will write a custom essay sample on Gender Role in Afghanistan specifically for you for only $16.05 $11/page Learn More The paper will discuss three aspects that are necessary in learning different cultures. Role of men and women in Afghanistan under Taliban rule will be well outlined in relation to Omidian’s ethnology. Omidian is an anthropologist who was hired to work in Afghanistan as a social worker and trainer. On the other hand, Spradley argues that anthropologists should not be community trainers but instead should learn from the people. Case Study The title ‘When Bamboo Bloom’ is symbolic as Taliban rule in Afghanistan oppressed the society as reported by Omidian who worked there from 1997 to 2007. Despite the oppression, citizens hoped that one day they would be liberated. 19th century was characterized by efforts to ensure gender equity, but were halted in 1994 when Taliban annexed Kabul. Women were not supposed to work away from home or wear white clothes. The Islamic law on Hijab ensured that women covered all parts of their bodies. Later there were increased cases of kidnaps, forced marriages that involved women. Women were supposed to be accompanied when leaving their houses and were not to interact freely with men. Health access was limited and poverty stroke households that lost their breadwinner who was supposed to be a man (Omidian 117). Notably, the role of women in Afghanistan is derived from the interpretation of Sharia in the Quran that forbids women from working away from home. According to Taliban, Sharia bans women from free interaction with men and are to be accompanied by male relatives any time they are not at home. Men were expected to work and provide for their women and children. The role of men rendered them prone to maltreatment in many ways. Many men were detained, tortured and killed in prisons under Taliban rule in Afghanistan (Omidian 120).Advertising Looking for essay on gender studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More Men were ordered to wear beards of certain length and severely punished if they did not. Punishments like stoning and amputation were employed when torturing prisoners so as to get them to confess. The idea of Omidian was to empower citizens with knowledge that would help them overcome the cruelty of Taliban rule in Afghanistan. Culture knowledge For ethnographers to be able to understand culture and norms of a given community, they must first identify what the people kn ow. According to Spradley people can only share common culture if they share similar knowledge. For example, there is a scenario of people in a train who were engaged in a common behavior of reading. Reading was a behavior that was common to all people in the train. For behavior to be shared all people had to be aware of what was involved in reading. People knew how to act when reading jokes, tickets and schoolbooks. For example, there was a man who underlined important points when reading a lecture book. A man reading a newspaper knew how to flap pages so as to get more information. A lady reading a paperback knew how to move her eyes so as to read. The only reason why a man reading a newspaper would understand the message by the author is if he knew the language used (Spradley and Mccurdy 9). In the case study, both men and women knew what was expected of them by the Taliban rule. Whether they felt oppressed or not, they obeyed the instructions given because they were aware of pun ishments for non compliance. For example, women did not go to work outside home because they knew they would be punished if they did. Consequently, the women could not go to work because they knew it was wrong according to Taliban rule. Taliban rule was aware of the Islamic law in regard to modest dressing and ordered all women to cover their body parts (Omidian 121). Culture behavior Spradley further postulates that for ethnographers to be able to learn different cultures, they must identify what people do. Cultures do not dictate but rather influence behavior. Activities are not dependent on culture but are influenced by its interpretation. Absolute learning of culture behavior can only occur if interpretation is similar. Spradley gives an example of a scenario involving police, crowd and a woman who had a heart attack.Advertising We will write a custom essay sample on Gender Role in Afghanistan specifically for you for only $16.05 $11/page Learn More Sin ce the police were aware of first aid that should be given to the condition, they started performing heart massage to the woman so as to save her life. However, a crowd nearby mistook the actions by policemen and thought they were killing the woman so they attacked them. The woman died before she was taken to the hospital. Notably, both the crowd and police had a common mission which failed due to misinterpretation of the activities (Spradley and Mccurdy 11). In the case study, Omidian argues that Taliban rule in Afghanistan is oppressive as both genders are maltreated. Ethnographers should be neutral but in the case of Omidian she sides with the society and is against Taliban rule. The situation is similar to that of the crowd that interpreted the activities of the police to be cruel to the woman. Cultural behavior in Afghanistan is manifested by what people do and how they react to activities by Taliban rule. For example, severe punishments like amputation of men who were seen as criminals were conducted publicly. Women and children cried and pleaded with Taliban officials because they were not happy with such actions. There are postulations that Omidian tries to liberate people of Afghanistan by ensuring that they are empowered and influenced by the western culture. According to other scholars all the efforts by humanitarian action and foreign policy have hidden agenda of replacing Afghanistan culture with western culture (Lassiter, 296). Culture artifacts Ethnography entails identifying what people use so as to be able to know and behave in a certain way. Spradley argues that for the ethnographers to be able to learn culture they must know what is involved in cognitive and behavioral development of the people involved (Kottak and Conrad 33). For example, a person reading a newspaper must be aware of grammar and style used so as to be able to understand the message. Further, police used oxygen mask and called on ambulance in attempt to save life of the woma n who had heart attack.Advertising Looking for essay on gender studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More In the case study, Taliban used Quran statements and Sharia to set and define behavior of the two genders. Stones and other tools used in punishing people who defied the set laws are culture artifacts. Painted windows that were used in the women apartments are also culture artifacts. Artifacts, knowledge and behavior are cultural aspects that are essential in the learning process of norms of a certain community. Further, culture can be defined by symbolism theory under three components in relation to explicit and tacit knowledge. Explicit knowledge is commonly known by people with common culture while tacit refers to unknown aspects. The first component postulates that cultural behavior is influenced by the meaning attached to the activities involved. For example, the pain expressed by the prisoners who were being stoned or amputated in Afghanistan made women and children cry. The second component postulates that behavior is dependent on the social interaction. Omidian’s idea of empowering citizens of Afghanistan by encouraging them to overcome intimidation by Taliban rule was based on the interaction with men and women. Thirdly, cultural symbols provide ethnographers with hints that are supposed to be modified in different ways before actions (Erickson and Liam 21). Conclusion Culture is an integrated topic that involves intensive scrutiny of various issues for learning process to be effective. Ethnographers aim at learning from the community and not educating them. Empowering the Afghanistan citizens will be a way of changing their cultural perspective and not learning from them. Culture behavior is essential in learning process as ethnographers get to know what people do in different situations. Ethnographers go an extra mile by trying to understand the reason behind any behavior. Culture artifacts are also important as ethnographers learn what is used in acquiring knowledge and behavior. Culture knowledge is broader than both artifacts and behavior as it defines all aspects known to the people. Consequently, culture knowledge influences the behavior and things that will be involved in maintenance of cultural identity. Erickson, Paul, and Murphy Liam. A History of Anthropological Theory, Toronto: Broadview Press, 2008. Print. Kottak, Peter and Philip Conrad. Window on Humanity: A Concise Introduction to General Anthropology, New York: McGraw Hill press, 2005. Print. Lassiter, Luke. â€Å"Toward a Collaborative and Reciprocal Ethnography.† Journal of Anthropological Research 5.2 (2001): 137-149. Print. Omidian, Patricia. When Bamboo Bloom, An anthropologist in Talibans Afghanistan, Sydney: Academy of Sciences publishers, 2011. Print. Spradley, James, and David Mccurdy. Conformity and Conflict: Readings In Cultural Anthropology, New York: Pearson Education press, 2009. Print.

Friday, November 22, 2019

Bloody Sunday 1972

Bloody Sunday 1972 On the afternoon of Sunday the 30th of January 1972 soldiers from the British Parachute Regiment, one of the fearsome UK militia units fighting the battle in the north of Ireland, attacked a civil rights march in the town of Derry, killing or fatally wounding fourteen civilians and injuring two dozen more in an event the international press quickly to be known as â€Å"Bloody Sunday Massacre†. That same group of soldiers had carried out similar murder spree just months earlier in Belfast, shooting dead eleven people in cold blood, including a local catholic priest, in a two day reign of terror known as the â€Å"Ballymurphy Massacre† of August 1971. Praised by their officers and British politicians for their work in the previous massacre much the same was expected of them in the western Town of Derry and sure enough they delivered on those expectations. However as in Belfast, the war crimes of the Parachute Regiment simply served to increase local support for armed resi stance to Britain’s continued presence in particular for the still Provisional Irish Republican Army,[I.R.A] contributing to making a temporary conflict all but permanent. Bloody Sunday was one of the most Brutal events of the Troubles because a large number of catholic citizens were killed, by forces of the British army, in full view of the public and the press. It was the highest number of people killed in a single shooting during the troubles in Northern Ireland. Bloody Sunday increased Catholic and republican nationalist hostility towards the British Army and increased the conflict. Support for the Provisional Irish Republican Army (IRA) rose and there was a surge of recruitment into the organisation, especially in Derry and Belfast. At 4:07pm, the soldiers were ordered to go through the barriers and arrest the republican protesters. The soldiers, on foot and in armoured vehicles, chased people down Rossville Street and into the Bogside. Two people were hit by the armoured British vehicles. Brigadier MacLellan had ordered that only one set of soldiers be sent through the barriers, on foot, and that they should not chase people down Rossville Street. Colonel Wilford disobeyed this order, which meant there was no separation between republican rioters and marchers. The soldiers disembarked and began arresting people. There were many claims of soldiers beating people, hitting them with rifle butts, firing rubber bullets at them from close range, making threats to kill, and shouting abuse. The Saville Report agreed that soldiers used excessive force when arresting people as well as seriously assaulting them for no good reason while in their custody. A large group of people were chased into the car park of Rossville Flats. This area was like a courtyard, surrounded on three sides by high-rise flats. The soldiers opened fire, killing one civilian and wounding six others. This fatality, Jackie Duddy, was running alongside a priest, Father Edward Daly, when he was shot in the back. Some of those shot were given first aid by civilian volunteers, either on the scene or after being carried into nearby homes. They were then driven to the hospital, either in civilian cars or in ambulances. The first ambulances arrived at 4:28pm. The three boys killed at the rubble barricade were driven to hospital by the British soldiers. Witnesses said paratroopers lifted the bodies by the hands and feet and dumped them in the back of their armoured vehicles, as if they were pieces of meat. The Saville Report agreed that this is an accurate description of what happened. It says the paratroopers might well have felt themselves at risk, but in our view this does not excuse them. In all, 26 people were shot by the British soldiers; 13 died on the day and another died four months later. Most of them were killed in four main areas: the rubble across Rossville Street, the car park of Rossville Flats (on the north side of the flats), the courtyard car park of Glenfada Park, and the forecourt of Rossville Flats (on the south side of the flats). All of the soldiers responsible insisted that they had shot at, and hit, gunmen or bomb-throwers. The Saville Report insisted that all of those shot were unarmed and that none were posing a serious threat. It also concluded that none of the soldiers fired in response to attacks, or threatened attacks, by gunmen or bomb-throwers. Thirteen people were shot and killed, with another man later dying of his wounds. The official army position, backed by the British Home Secretary the next day in the House of Commons, was that the soldiers had reacted to gun and nail bomb attacks from suspected IRA members. Apart from the soldiers, all eyewitnesses including marchers, local residents, and British and Irish journalists present maintain that soldiers fired into an unarmed crowd, or were aiming at fleeing people and those tending the wounded, whereas the soldiers themselves were not fired upon. No British soldier was wounded by gunfire or reported any injuries, nor were any bullets or nail bombs recovered to back up their claims. Although there were many IRA men both Official and Provisional at the protest, it is claimed they were all unarmed, apparently because it was anticipated that the British soldiers would attempt to draw them out. March organiser and MP Ivan Cooper had been promised beforehand that no armed IRA men would be near the march. One soldier who gave evidence at the tribunal testified that they were told by an officer to expect a gunfight and We want some kills. In the event, one man was witnessed by Father Edward Daly and others haphazardly firing a revolver in the direction of the paratroopers. Later identified as a member of the Official IRA, this man was also photographed in the act of drawing his weapon, but was apparently not seen or targeted by the soldiers. Various other claims have been made to the Saville Inquiry about gunmen on the day. This Sunday became known as Bloody Sunday and bloody it was. It was quite unnecessary. It strikes me that the Army ran amok that day and shot without thinking what they were doing. They were shooting innocent people. These people may have been taking part in a march that was banned but that does not justify the troops coming in and firing live rounds indiscriminately. I would say without hesitation that it was sheer, unadulterated murder. It was murder.

Wednesday, November 20, 2019

The Military Use of Drones by the US- a Risky and Wrong Choice Research Paper

The Military Use of Drones by the US- a Risky and Wrong Choice - Research Paper Example It is time when the policy and strategy groups and institutions ought to reconsider the success and importance of drones as the military weapons of choice. Indeed, pursuing warfare by means of drones is certainly not a good idea if one takes into consideration the harmful ramifications of this novel military strategy. Instead of furthering the US interests and aiding the nation’s strategic agenda, the military use of drones by the US has indeed curtailed the reputation of the US forces and accrued much negative publicity for the nation. It goes without saying that the US exploitation of drones as a military weapon is not a sane strategic option if one considers the civilian causalities it involves, the incumbent political outcomes, the dilution of the army’s moral and situational awareness and the inability of the drones to effectively curb and dilute international terrorism. It is a fact that if the drone warfare or the military usage of drones by the US forces is not backed by accurate and verified intelligence inputs, it could lead to much collateral damage. Experience has established beyond doubt that the instances when drones were used by the US as a weapon against the targeted enemies, they led to multiple civilian causalities (Whitlock 1).and it is only when one digs deeper that one is able to recognize the havoc drones wreck on the civilians that live near or in the vicinity of the targeted individual or group. Though the exact figures are not verified by the US military, as per the recent news reports, the use of drones as a weapon has led to the killing of a number of civilians in the tribal regions of Pakistan (Whitlock 1). If on the one side the killing of civilians in the drone attacks amounts to crimes against humanity, on the other side this trend is fraught with much serious consequences, as far as the reputation of the United States of America as a world power is concerned (Brunstetter & Braun 339).

Tuesday, November 19, 2019

Tenerife Airport Disaster Case Study Example | Topics and Well Written Essays - 2500 words

Tenerife Airport Disaster - Case Study Example Air travel is undoubtedly the safest way to travel. This claim is best expressed by a statement of an aviation researcher at the University of Miami, Earl Wiener who stated that in USA alone "There are 15,000 to 20,000 takeoffs a day. Half a billion passengers a year, in a hostile environment, get to their destination safely and quickly" (Chandler, 1996,p.52). While we encounter almost daily news about land transportation mishaps and regularly hear news of ships, large or small, sinking in seas, air transportation mishaps come far and in between. Thus, it is the best preferred means to travel, especially involving long distances. Because of such growing transport demand, the number of aircraft in operation is constantly on the rise while bigger, behemoth aircrafts which are capable of transporting a large number of people are being built. Thus, when air accidents occur, we hear of many people perishing in such accidents. Despite the fact that modern airplanes are now designed to be as safe as possible and are now built with stronger materials with more powerful engines and at faster speeds and are much bigger and heavier and with improvement in its equipment and its operation that practically ensures safety, yet airplane crashes still occur (Grolier, 1994). In January 2010 alone, 2 airplanes crashed i.e. one involving the Ethiopian Airlines that crashed in Beirut, Lebanon and killing all 90 people on board (Walker, 2010) and the other one involving the Alaska CentralAir Disaster 3 Express cargo airplane that crashed off Sand Point, Alaska and snuffing the lives of the 2 pilots aboard (Anchorage Daily News, 2010). It seems that airplane mishaps is inevitable and that people concerned have no option but prepare a good emergency response plan and management to mitigate the disaster and rescue whatever can be rescued. Statistics show that from 1954 to 2004, 1402 crashes had occurred and that 25,664 lives had perished in the process (1001crash.com). It is also a known fact that more than 50% of all accidents occur during the final approach and landing stages. But what is considered more dangerous is the climbing stage of the aircraft, where fatal accidents may occur. It is possible that airplane defects may go undetected as the plane leaves the gate but such defect will become apparent when the plane takes off the ground and begins climbing. When the pilots realize that such defect exists, they

Saturday, November 16, 2019

Biometrics Voting System Essay Example for Free

Biometrics Voting System Essay Biometrics is the term given to the use of biological traits or behavioral characteristics to identify an individual. The traits may be fingerprints, hand geometry, facial geometry, retina patterns, voice recognition, and handwriting recognition. In this paper we have used thumb impression for the purpose of voter identification or authentication. As the thumb impression of every individual is unique, it helps in maximizing the accuracy. A database is created containing the thumb impressions of all the voters in the constituency. Illegal votes and repetition of votes is checked for in this system. Hence if this system is employed the elections would be fair and free from rigging. Thanks to this system that conducting elections would no longer be a tedious and expensive job. DESIGN The design of the system consists of the following important parameters. 1. Scanning- using DSP Processor 2. Searching- based on the principle of GOOGLE SEARCH 3. Networking- all the election booths are connected in a network 4. Data transfer– using telephone lines.. The only pre-requisite for the use of this finger print scanner is a personal identification card. We hope that this system proves to be efficient and enables the people to be smarter in choosing their leaders. SUMMARY OF DESIGN The main aim in designing this product is to provide the concept of the personal identity for each individual. This is extended to a special case of electronic voting machine concept. The summary of the design can be briefly explained diagrammatically as follows. Fig-1. 1 : Block Diagram of Design As initially at time of distributing voting cards. At the time of voting, the option of the voter is taken along with the finger print. The finger print taken by the scanner is sent to the DSP chip through an in-built A/D converter. The processed image is transferred to hard disk with biasing of SDRAM. The option entered by the voter is transferred to chip through DEMUX and is stored in the memory. If the transferred image is matched with any of the records in the data base, then the interrupt is given by the HARD DISK to DSP chip. Then the option is considered in the count. After the acquisition of the count this is transmitted to the HOST computer or central server using telephone lines. As the count of each party is transmitted to the HOST from all the VOTING MACHINES present in the constituency, the HOST will add parallel count of particular party and makes the final count of each party in ascending order. The final count is transferred to the main HOST (head quarters) using either telephone lines or radio waves. DESCRIPTION OF THE VOTING MACHINE Fig:1. 2- Description of voting machine BLOCK DIAGRAM FOR THE WHOLE PROCESS IN BRIEF Fig:1. 3-Block diagram of the process. VOTING SYSTEM The detailed description of each and every internal unit in the VOTING SYSTEM is given below. It can be divided in to the following main categories. FINGER PRINT SCANNER The finger print scanner consists of the following parts: 1. FINGER PRINT SENSOR: This is used to scan the thumb impression. The data obtained from this is analog in nature. This is transferred to the A/D converter for further processing. 2. A/D CONVERTER: This is used to convert the analog data from the SENSOR into the digital data and transfer it to the processor. 3. FLASH ROM: This is for the storage of the data temporarily in the DSP processor. This will work until the data is transferred to the main memory of the HOST. 4. DSP CHIP: This is used to receive the data and process it. This is connected to the USB port for further transfer of the data. 5. USB PORT: The sole purpose of the USB port is to establish a communication link between the DSP processor and the MEMORY (DATABASE). Fig:2. 1-Scanning Process EXTRACTION OF THUMB IMPRESSION Fig:2. 2-Extraction of thumb impression The next step in the process is the extraction of the thumb impression from the memory. The features of the finger print are stored in the form of pixels. This is further sent for pattern matching where the finger print is then compared with the records in the database. If the pattern matches with any one of he records then the vote is accepted. If the feature doesn’t match with any one of the finger prints stored in the data base then the vote is rejected. Fig:2. 3- Storage of Database FEATURE EXTRACTION AND COMPARISON SCANNING AND PROCESSING The biometric sensor scans the image. This so scanned data is in the analog form. This is converted into digital form by using an A/D converter. Since the image is to be transferred quickly to the converter, it is interfaced in parallel with the DSP chip. The data received from the parallel in ports is further processed in the chip. Parallel interfacing is done to have a quick performance. TRANSFER OF PROCESSED DATA TO THE HARD DISK The data which is processed in the DSP chip (finger print) is transferred in parallel to the HARD DISK for searching process. The BIOS language of the HARD DISK is stored in SDRAM which is also interfaced in parallel with the chip. This helps the chip to transfer the image to the HARD DISK for further process. The image transferred to the HARD DISK is compared with that of the DATA BASE. The circuit connections for the process explained are as shown below. A DE-MULTIPLEXER is connected to the inputs in parallel to the chip. The option which is given is transferred to the chip in binary form. Fig:2. 4-DE-MUX used in the process. E. g. : 1. Party one, 2. Party two, 3. Party three, 4. Party four. Suppose if the option is two then the binary data transfer to the ports is 0010. DE-MULTIPLEXER is designed according to the number of parties present in the constituency. The transferred data is stored in a 16-bit register according to their option. After counting takes place the count of each party is transferred to the transmitter. A transmitter is interfaced serially to the DSP chip. The transmitter data is transferred through the telephone lines to the HOST. The counts of similar parties are added at the host and the data is transferred to the STATE HEAD QUARTERS (main HOST) to display the result of the particular constituency. VERIFICATION VERIFICATION OF VOTERS Fig:3. 1-Verification of Voters Here the identity of a person is checked whether heshe belongs to the particular constituency or not. The machine which takes the finger print of the person checks it with the data base already stored in it. If the finger print matches it will give access to the person to cast his vote and if it doesn’t match any of the finger prints stored in the data base then it will reject the voter. Thus his method will enable the members of that particular constituency only to vote. This can be taken as the first step to avoid rigging. To have a faster performance the searching technique is implemented on the basis of GOOGLE SEARCH. The process in the form of a flow chart is as given below. PROCESSING AND COUNTING Fig:3. 2-Counting Process. After the person gets the PROCEED symbol from the voting machine, there appears a screen on which all the parties names along with the symbols are present. The person should select any one of the party by giving the number allotted to that particular party as input through the keypad. After the option is selected the voter is prompted for a confirmation. In case the voter enters an invalid number, the screen reappears and heshe is prompted to cast the vote again. Then according to the option selected, the vote count of the particular party gets incremented by one. Finally, at the end of the day, the position of the parties in terms of the total votes cast can be known. A very simple flow chart for the above process is as shown below: REJECTION OF VOTER REPETITION Fig:3. 3-Rejection block diagram After we have emerged out with a solution to check voter’s identity in a constituency, our next task is to see that a particular person cannot vote more than once i. e. to avoid multiple votes. This task can be accomplished by simple software technique employed. It consists of two folders namely searched and unsearched. Initially the searched folder consists of no images. The thumb impression images of all the voters of a constituency will be present in the unsearched folder. As and when a vote is cast, the image of the particular voter gets transferred to the searched folder. The searched folder is programmed such that an image cannot be present more than once in this folder. So when a voter casts multiple votes the exception is generated and an alarm is raised and even the police can be informed about the identity of the intruder indulging in this illegal activity. This is shown in the block diagram given belowThe scanned vote is first checked with he acceptability of the voter as explained in the first flow chart. If the finger print is accessible then the data of the specified person is taken into account. The voter’s thumb impression is verified with the previously cast votes. If there is no match then the vote is accepted and the count is increased by one. If the vote matches with any of the previous votes then the vote is rejected and th e person’s identity is stored and it is given to the police for further enquiry. There is a flash ROM in which these details can be stored. NETWORK FORMATION OF THE NETWORK The voting machines present in a town are interlinked in the form of a highly secure LAN. This network is formed with the help of the telephone lines. All the data collected in the voting system is first stored in the voting machine itself. Then it is sent to the HOST which will be located at headquarters of the town. All the data is collected there and it is transferred to the main HOST. The purpose of saving the data in the voting machine at first is that even if there is loss of data by some means then it can be easily retrieved from the machine again. In this way all the things are bought into a network. Fig:4. 1-Formation of the network These hosts are again grouped into network through radio waves or again telephone lines. Host is a device which consists of a PROCESSOR and a RAM. It will accept the data from all the voting machines through telephone lines and it will store the data in RAM (count of all parties). Then it will add the count of similar parties and store the count in ascending or descending order and display the result whenever it is necessary. Thus all the voting machines in the state can be formed into a network. The network can make use of RADIO waves or TELEPHONE lines for the data transfer. CONCLUSION ADVANTAGES 1. The system is highly reliable and secure. 2. In the long run the maintenance cost is very less when compared to the present systems. 3. Illegal practices like rigging in elections can be checked for. 4. It is possible to get instantaneous results and with high accuracy. CONCLUSION Thus the advent of this biometric thumb impression voting system would enable hosting of fair elections in India. This will preclude the illegal practices like rigging. The citizens can be sure that they alone can choose their leaders, thus exercising their right in the democracy.

Thursday, November 14, 2019

East Asian Economic Crisis :: essays papers

East Asian Economic Crisis A large economic downturn in East Asia threatens to end its nearly 30 year run of high growth rates. The crisis has caused Asian currencies to fall 50-60%, stock markets to decline 40%, banks to close, and property values to drop. The crisis was brought on by currency devaluations, bad banking practices, high foreign debt,loose government regulation, and corruption. Due to East Asia's large impact on the world economy, the panic in Thailand, Indonesia, Korea, and other Asian countries has prompted other countries to worry about the affect on their own economies and offer aid to the financially troubled nations (Sanger 1). The East Asian crisis has affected almost all of the Asian nations, but the three hardest hit countries are Thailand, Indonesia, and South Korea. The panic began in Thailand in May of 1997 when speculators, worried about Thailand's slowing economy, exces sive debt, and political instability devalued the baht as they fled for market-driven currencies like the American dollar. Indonesia's economy soon fell soon after when the rupiah hit a record low against the U.S. dollar. Indonesia is plagued by more than $70 billion worth of bad debts and a corrupt and inefficient government. Thailand and Indonesia also suffer from being overbuilt during real estate booms that Reven2 were the result of huge influxes of cash by optimistic foreign investors. South Korea faltered under the weight of its huge foreign debt, decreasing exports, and weakening currency (Lochhead 4-5). Other major countries touched by the crisis are Japan, China, Malaysia, and the Philippines. Japan's economy is burdened by $300 billion in bad bank loans and a recession. Chinese banks may carry bad banks loans of up to $1 trillion. The banks lend 66% of China's investment capital to state-run industries that only produce 12% of China's industrial output (Manning 2). Malaysia and the Philippines are both faced with devalued currencies and lowered stock markets (Lochhead 5). The implications of the Asian financial crisis are many. A declining Asian economy will reduce demand for U.S. and other countries' exports. The devalued currencies of East Asia will make Asian imports seen cheap and will lead to increased American imports, thus increasing our trade deficit (Lochhead 2). A worldwide banking emergency could result if the embattled Asian economies failed to pay back their loans to the U.S. and other countries (Duffy 2). If the Asian economies fall further, in a desire to raise cash, they might sell the hundreds of billion dollars of U.S. treasuries they now own, leading to higher interest rates and an American recession (Lacayo 2).

Monday, November 11, 2019

Economic Practice Coursework Essay

My choice of article is the one relating to the oil crisis in Libya, and how it affects the economy of other countries. The article discusses the impacts of the oil cut of Libya, supplying it no more. It starts off by talking about the impact on shares and the price of oil barrels, which is the fastest and direct impact of the oil cut. As supply from Libya territory stops, supply to the entire world is crippled, as Libya is one of the countries that supply most worldwide used oil. As it stops supplying, it shifts the supply and demand graphs completely. In a short term, supply shifts to the left, as it is less. In doing so, for the same amount of oil, the price has gone to a higher figure. By doing that, the shares index of the western countries, such as European countries and the US have dropped, because of the adjustment via disposable income. That happens because of the effects of the shifting of the supply curve. As the price goes higher, the general public have less money to spend on the economy and firms, decreasing the firm’s profit, damaging that countries’ economy. That’s the reason for the index to go down, and that’s an example of mid-term effects of the oil crisis. In the midterm effect, the demand for oil will decrease, as people will cut back on the oil, and look for alternative routes. On the long term, the demand for the cars will decrease, as people will not want to buy cars, and try to sell their cars. This will affect the economy drastically, as the car companies are a big part of that countries’ economy. The general public will search for alternative routes to travel, as oil prices are higher. The car companies will have to spend much more money on researching alternatives such as hybrids and electric cars which are starting to appear. The public transport system will benefit from this situation, as more people would want to travel via train or bus, as it is much cheaper and faster. The government would get more money from this, so it would improve as much. The oil companies would want to drill and search for oil in more remote areas, causing more deforestation, and much more money spending by the companies and time. Thus some small oil companies will be closed down due to the high demand of oil, as they can’t compete with the oil monopolies. The oil monopolies will also be affected, as some major companies’ oil supply relies a lot on Libya’s supply. Regarding the oil companies, they had to pull out staff from troubled countries, not only Libya, but other countries that are getting affected by that state, and are choosing to cut off supply as well, such as Saudi Arabia and Kuwait. As they do this, the productivity drops to zero in those countries, and there is a high chance of the companies losing contact with their oil. The unrest in Libya may affect the Saudi Arabia, and that concern is affecting a huge majority of stock holders and companies, specified before, changing the stock markets, especially the European and Asia. Relating to airlines, as the supply and demand graphs change, the oil supply for airplanes gets crippled, so more money has to be spent to get the same amount of oil, making the costs bigger, resulting in a bigger price for the customer for the same flight compared to before the whole situation. There is also a chance of investors backing out from the airline business, resulting in smaller profits for the companies and much more monetary issues.

Saturday, November 9, 2019

Gross Indecency: The Three Trials of Oscar Wilde Essay

Oscar Wilde and his trials, both literal and figurative, has been the subject of quite a few films and plays apart from the considerable mass of writing that exist on this subject. This is because Oscar Wilde, as a metaphorical figure has never failed to capture the public imagination as the veritable revolutionary against society’s delimiting and deterministic conventions and a crippling value system. And yet, Moises Kauffman’s latest play Gross Indecency: The Three Trials of Oscar Wilde manages to turn the relatively familiar material – the trials and indictment of the legendary Wilde on charges of sodomy and pederasty – into a riveting and powerful document against social determinism. The theme of Kauffman’s play is the ever-continuing conflict between art and morality and of course with such a theme, Wilde, the martyr to nineteenth century morality, with his assertion that there are no immoral books, only badly written ones is the perfect hero. Drawing from a huge variety of sources that includes trial transcripts, journalistic articles, contemporary autobiographies (including the one by Wilde’s lover, Lord Alfred Douglas) and later biographies, Kauffman in the play successfully brings alive the past in a way that Wilde himself would have approved of. The play breaks all generic boundaries and has the elements of a historical drama, a docudrama, a courtroom drama, a social commentary, tragedy and comedy all rolled into one. The oft-repeated tale of Wilde’s fall from fame and fortune is by no means old wine in new bottle, primarily because the playwright’s in-depth research brings in new life into the tale by documenting new perspectives and exploring newer avenues and thereby problematizing the positions of victim and victimizer, secondarily because Kauffman concentrates in showing history in its own context and does not overtly attempt to make it contemporary, and finally because by showing Wilde’s plight in his confrontation with a world that found him fundamentally subversive to the interests of the society the playwright strikes an universal chord. Wilde’s passionate attempt to live a life on his own terms is superbly dramatized in the play. Most riveting are the dramatizations of those moments that change the life of the author for once and all. Such a fateful moment comes when Wilde denies kissing a young man with a witty putdown of his looks instead of a straightforward ‘no’. In the first of the three trials and in a climactic moment Wilde is asked by the prosecuting attorney Edward Carson, if he had ever kissed one of the young working class men with whom he was known to keep company. Wilde, with his suave and polished wit replies: â€Å"Oh, dear, no, He was a peculiarly plain boy. † Carson leaps victoriously at the implication of such a comment, that Wilde would have kissed the boy if he was a little more attractive and the author’s fate is sealed. From this moment onwards the play takes on a destructive momentum as Wilde’s entire life spirals out of control betrayed by his own wit. Never again is he able to gain control of his life. Through the presentation of Wilde, with support from his extensive research, Kauffman manages to subtly problematize the positions of victimizer and victim in the play. For as we find in the play, even before he stabs himself with his own clever tongue Wilde frittered away his prodigious talents by surrounding himself â€Å"with the smaller natures and the meaner minds. As he quotes from â€Å"De Profundis† towards the end of the play â€Å" I became the spendthrift of my own genius, and to waste an eternal youth gave me a curious joy. † Still, the intrinsic irony of the fact that it is his suavity, wit and incomparable craft with words that would bring his downfall is also highly symbolic as far as the theme of the play is concerned, for the play, among other things, engages with the typical Victorian debate over morality and art. Wilde refused to side with the dominant discourse of compartmentalizing his personal erotic longings and keeping it separate from the aesthetic side of his life. And the fact that he raised his personal sense of morality to the level of an art turned out to be the ultimate source of his tragedy in an age which preferred to look at art as a mode moral dispensation for social welfare. Apart from tracing the tragic downfall of this hero with a sincerity and passion that raises Wilde’s conviction and his untimely death to the level of a crucifixion so that the protagonist becomes a patron saint for all those whose life has been crippled by the narrow moralities of a compulsively prohibitionist society, the play also successfully and subtly presents a multilevel study in public perceptions of class, art and sexuality and this is what makes Kauffman’s themes universal. The playwright uses a chorus of actors, who appear both on stage and in front of it posing as the investigators in a hearing, almost classical in its simplicity. This modern chorus continuously reads, quotes or acts out from a huge variety of sources – fruits of the playwright’s research on his subject – establishing an ever-shifting mosaic of perspectives. This chorus takes up several convincing and often hilarious figurative perspectives. The multiple roles bring to the table the likes of Queen Victoria (the author of the Gross Indecency Law), and G. B. Shaw to name a few. The chorus quotes from the memoirs of Wilde and his lover, the accounts of Sir Edward Clarke and the editor Frank Harris. A particularly inspired scene is the one when a later day academic is brought into the play to deconstruct Wilde’s performance in court with insights that are nonetheless valid for being presented satirically. However the most hilarious of all these is probably the scene where the chorus dons long white underwear to display how Wilde procured his ‘gross indecencies’. The greatest success of Kauffman’s use of the chorus lies in the fact that by means of it, very subtly but surely, he manages to communicate a rather unsettling idea to the readers of the play: that even in our age of individual freedom, we are not very far from the social Puritanism that crippled Wilde during his lifetime.

Thursday, November 7, 2019

Gastrointestinal Notes Essay

Gastrointestinal Notes Essay Gastrointestinal Notes Essay GI System/GERD/Gastritis Class Notes –Tuesday April 22nd, 2014 GASTROINTESTINAL SYSTEM Gastrointestinal System Notes: Think about â€Å"what is going on with that particular system?† GI System digests food and excretes it. With GI issues, always look to prevent peritonitis, which is where intestinal fluids leak out into the perineal cavity causing bacterial sepsis and hypovolemic shock. Assess temperature as the priority! The type or characteristics of the blood in the stool tells you where the bleeding is occurring, i.e. Lower GI, Upper GI or Hemorrhage. RED Blood: Bleeding is in the lower GI area. DARK Blood: Bleeding is in the upper GI area. The AMOUNT of Blood: Determines if hemorrhaging is occurring. Nursing Assessment Data for Assessment of the GI System Weight changes Bowel habits Psychosocial or Stress (stress contributes to causing GI problems) What causes GI problems or what makes the symptoms better or worse? Past exposure to toxic substances in the workplace Diet/Caffeine Drugs/Medications that contribute to GI problems Smoking/Alcohol use (Alcohol thins the blood and increases risk for bleeding) Hydration status and habits/Fluid I/O Sleep habits/quality Timing and location of pain NSAID/Aspirin use (NSAID and Aspirin use causes bleeding) Stool characteristics/Blood color in stool Social economic status and changes contribute to ability to get treatment EGD (Esophagogastroduodenoscopy) is a visual examination of the esophagus, stomach, and duodenum. Assess for bleeding in the GI (see stool characteristics above) You must obtain a consent form from the patient before this procedure can occur! Preoperative and Postoperative Patient Management: Give NPO 6 to 8 hours before the procedure Avoid anticoagulants, aspirin, and NSAIDS for several days post procedure. (Anticoagulants increase risk for excessive bleeding) Hold all medications except cardiac medications. (call Dx for permission to hold or give meds) After surgery, place patient in the left side-lying position with a towel or basin at their mouth to catch excretions. Assess Vital Signs every 30 minutes postop until sedation wears off. Raise side rails for patient safety. Give NPO after surgery until patients gag-reflex returns (may take up to 2 hours to return). The #1 Nursing Priority is to Prevent Aspiration! Have respiratory support on standby. Laboratory Tests ordered for GI Assessments (Page 1186, Chart 55-3) Other Diagnostic Tests that may be ordered: Endoscopy ERCP (Endoscope Retrograde Cholangiopancreatography) †¦not tested on this. Small Bowel Capsule Endoscopy Colonoscopy Virtual Colonoscopy Sigmoidoscopy Gastric Analysis Ultrasonography (Possibly an MRI/CAT Scan) You must obtain a consent form from the patient before any of these procedures can occur! GERD (Gastroesophageal Disease) GERD is the result of the backward flow (reflux) of the gastrointestinal contents into the esophagus. The sphincter tone of the *lower esophageal sphincter (LES) is decreased, or it in inappropriately relaxed. Excessive relaxation of the LES is the most common cause of GERD. Chronic inflammation leads to hyperemia and erosion (ulcers). Priorities: elevate HOB to avoid aspiration, take V/S, and have Oxygen and Suction available. Assessment Questions: 24 hour ambulatory esophageal pH monitoring is the most accurate method of diagnosing GERD. Have you been newly diagnosed with asthma? (There is a correlation between asthma and GERD) Have any medications caused GI upset? Have you taken medications for GERD in your past? How long have you been experiencing the symptoms of GERD? Have you recently traveled out of the country? (Easy to contract bacteria/bugs in foreign countries) Common Symptoms of GERD: (Heart issues are often mistaken for GERD. Conversely, common symptoms of GERD could be a heart issue.) The 2 main symptoms are heartburn and regurgitation. Heartburn or esophageal pain Atypical

Monday, November 4, 2019

Manager and Leader Research Paper Example | Topics and Well Written Essays - 250 words

Manager and Leader - Research Paper Example They are likable due to their genuine interest in others more than in outcomes (DuBrin, 2010). Managers like doing things right whereas leaders like doing the right things. Managers are competent in following company protocol, enforcing rules, and ensuring employee performance owing to their position in the company. In contrast, leaders lack formal authority. However, their power comes from the natural desire of people to follow them (Ruiz, Ruiz, & Martà ­nez, 2010). Being a good manager is not necessarily being a good leader and likewise, being a good leader is not necessarily being a good manager. Nevertheless, there exists an overlap between leadership and management skills. Best managers can decide to become more than administrators and become leaders. Similarly, best leaders can decide to become more than visionaries and become managers. Based on the characteristics of a good leader and manager outlined above, I consider myself a good leader and less of a manager. I have a strong conviction of realigning my thought and decisions along the needs and attributes of the people around me. I find my orientation towards paying keen attention to what is done other that how it is as a big feature distinguishing myself as a leader. Nevertheless, the leadership position cannot be complete without management roles. Therefore, it is not possible separate the two aspects since a leader must be good at management as well because appropriate decision affecting people must be founded on the right things as stipulated by established

Saturday, November 2, 2019

In what ways would understanding the causes of crime aid offenders in Research Paper

In what ways would understanding the causes of crime aid offenders in the restorative-justice process - Research Paper Example includes: priority should be given to victim needs either through financial, material, emotional or social means; to avoid re-offending by re-integrating the offenders into the community; to make offenders accept their responsibility for their actions; and rehabilitation of offenders and victims by recreating the working community in order to avoid crime and to avoid the long process of the justice system and the related costs and delays. (Marshall, 1991). The Restorative Justice process is based upon the following assumptions: the root cause of a crime could be social conditions, the responsibility has to be shared by the local government and communities because they are also responsible for such social conditions, and in order to rectify it they have to accept some responsibility; collaboration of all parties in order to solve the problems present and to achieve resolution, along with including the collaboration among victims, offenders and community are essential factors that lead toward effectiveness and efficiency; The conditions of the legal outcome should be flexible enough in order to take proactive actions in any case; and lastly, justice is meant to represent balance between both the parties and no single justification will be allowed to dominate other. (Marshall, 1991). The process of victim-offender mediation provides the victims and offenders a safe and secure place with the purpose of holding the offender accountable for their misconduct. It is a platform provided to the victims where they can, with the help of a mediator, let the offender know how much they have been affected by the crime, to receive compensation and to get some answers to their questions. Victims can be a part of the restitution plan and may claim their losses directly. Therefore, the offender has to accept their responsibility for their behavior and assist within the process to develop a plan that provides compensation for the victim. It is through this stage that the

Thursday, October 31, 2019

A Short Insight Into The Life Of Some Of The Major Aztec Cities Essay - 2

A Short Insight Into The Life Of Some Of The Major Aztec Cities - Essay Example Texcoco was located east of the Lake Texcoco and was proud of its shared name with the lake. It had played a great part in history and the people were proud of their ancestry. Five provinces to the east of the river were under the rule of Texcoco by the start of 15th century and the lands it ruled over went as far as their enemies’ borders in the Highlands. It had flourishing markets, grand temples, and the people living there were educated. But upon attack from Tepanecs, Texcocan enemies, people of Tenochtitlan did not help them to defend them.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Tlacopan was joined with the Aztecs and Texcocans in to form the Triple Alliance in 1428. Founded originally by Tepanecs who arrived in the Valley of Mexico early in the 13th century, Tlacopan was not a very big city and only received one-fifth of the compliments received by the Triple Alliance. Tlacopan was seized over in 1521. When the Aztecs first arrived in the Valley of Mexico in 1300 A.D., it was nothing but a marshy island near Lake Texcoco. Out of that marshy island, the Aztecs gave rise to a magnificent city, which stood for centuries and whose temples and buildings were a sight to behold.

Tuesday, October 29, 2019

The Disappearing Data Center Case Study Example | Topics and Well Written Essays - 1000 words

The Disappearing Data Center - Case Study Example Along with the energy consideration, the environment in which the source lies must not pose to the stability of the energy supplied to the host platform. Nearness from the source to the premises must also be highly considered to ensure that no extra cost is incurred while targeting particular source of energy (Floracks 101). Virtualization of datacenters has been on the rise for various companies for the last few years probably because of the long-term beneficial implications. The cloud could be termed as software powered by superior hardware, pools of virtualized hardware running on software that enables to decommission resources and offer them the ability to provision within a short period. It offers great flexibility and more leverage to businesses, in this model for instance, the provider owns the entire assets, physical infrastructure, and allows companies to buy access to the resources for billing on bandwidth, storage or access time. Virtualization on a private cloud is a considerable option where an individual entity hosts the entire resources on a virtualized platform for exclusive utilization by the subject company. Among the beneficial implications include manageable resources, reduced overheads and eases on security management, compliance, and privacy. Other related risks are also easier to manage such as those emanating from shared resources and multi-tenant base but require significant ongoing and up-front investment by the firm’s private cloud consumer. Virtualized platforms allow users to provision quickly on new virtual machines above the existing pool of resources. Virtualization promises elasticity of computing and security of dedicated the involved servers and provides the ability to extensively optimize the utilization of computing resources, also applies to the single applications (Floracks 101). A combination of economic

Sunday, October 27, 2019

The Importance of Risk Management

The Importance of Risk Management Risk management is an important part of decision making process in a construction company. Risk can affect productivity, performance, quality, and budget of a construction project. This chapter gives an overview of construction project risks. Meanwhile, risks in construction project will be recognized and classified into several groups. Furthermore, the current trend in risk management researches will also be discussed in this chapter. It is very important to elaborate risks in construction projects for the purpose of this project paper as to fulfil the first objective of this research, which is to identify and classify the risks in construction projects. Risk is defined as the chance of an adverse event depending on the circumstances (Butler, 1982). Risk is perceived as the potential for unwanted or negative consequences of an event or activity'(Rowe, 1977 ), a combination of hazard and exposure (Chicken and Posner, 1998). Recent research tends to emphasize the two-edged nature of risks, such as a threat and a challenge'(Flanagan and Norman, 1993), the chance of something happening that will have an impact on objectives; may have a positive or negative impact'(AS/NZS, 2004), combination of the probability or frequency of occurrence of a defined threat or opportunity and the magnitude of the consequences of the occurrence. This study examines mainly the negative impacts of risks inherent in construction projects through a combined consideration of the likelihood of occurrence and the magnitude of consequence. Risk management is a system which aims to identify and quantify all risks to which the business or project is exposed so that a conscious decision can be taken on how to manage the risks'(Flanagan and Norman, 1993). PMBOK included risk management as one of the nine focuses in project management and described it as the processes concerned with conducting risk management planning, identification, analysis, responses, and monitoring and control on a project. Recently, AS/NZS defined risk management as the culture, processes and structures that are directed towards realizing potential opportunities whilst managing adverse effects'(AS/NZS, 2004). In line with these definitions, risk management in the construction project management context is a systematic way of identifying, analysing and dealing with risks associated with a project in an aim to achieve the project objectives (Zou et al., 2007). Owing to its increasing importance, risk management has been recognized as a necessity in toda ys construction industry, and a set of techniques and strategies have been developed to control the influences brought by potential risks (Zou et al., 2007). A variety of risk and risk-related definitions are applied to construction projects, and no standard definitions or procedures exist for what constitutes a risk assessment. In the construction industry, risk is often referred to as the presence of potential or actual treats or opportunities that influence the objectives of a project during construction, commissioning, or at time of use (RAMP, 1998). Risk is also defined as the exposure to the chance of occurrences of events adversely or favourably affecting project objectives as a consequence of uncertainty (Al-Bahar and Crandall, 1990). According to (Walewski and Gibson, 2003) as mentioned by Dias and Ioannou (1995) , there are two types of risk: 1) pure risk when there is the possibility of financial loss but no possibility of financial gain, and 2) speculative risk that involves the possibility of both gains and losses. CIIs definitive work on construction risks (Diekmann et al., 1998) uses classic operations research literature t o distinguish the concepts of risk, certainty, and uncertainty, and is consistent with the literature (ASCE, 1979; CIRA, 1994; Kangari, 1995; Hastak and Shaked, 2000; PMI, 2001; Smith, 2001) on what is considered as the sequential procedures for construction risk management: 1) identification, 2) assessment, 3) analysis of impact, and 4) management response. Increased concerns about project risk have given rise to various attempts to develop risk management methodologies. An example of such is the Risk Analysis and Management of Projects (RAMP) method produced by the Institute of Civil Engineers and the Institute of Actuaries in the United Kingdom (RAMP, 1998) . This method uses a project framework to identify and mitigate risk by using the accepted framework of risk identification and project controls by focusing on risks as they occur during the project life cycle. It requires users to follow a rational series of procedures and to undertake this analysis at scheduled intervals during the life cycle of a project. Traditional risk assessment for construction has been synonymous with probabilistic analysis (Liftson and Shaifer, 1992, Al-Bahar and Crandall, 1990). Such approaches require events to be mutually exclusive, exhaustive, and conditionally independent. However, construction involves many variables, and it is often difficult to determine causality, dependence and correlations. As a result, subjective analytical methods that rely on historical information and the experiences of individuals and companies have been used to assess the impact of construction risk and uncertainty (Bajaj et al., 1997). Project risk is an uncertain event or condition that, if it occurs, has a positive or a negative effect on at least one project objective, such as time, cost, scope, or quality (i.e., where the project time objective is to deliver in accordance with the agreed-upon schedule; where the project cost objective is to deliver within the agreed-upon cost; etc.). A risk may have one or more causes and, if it occurs, one or more impacts. For example, a cause may be requiring an environmental permit to do work, or having limited personnel assigned to design the project. The risk event is that the permitting agency may take longer than planned to issue a permit, or the design personnel available and assigned may not be adequate for the activity. If either of these uncertain events occurs, there may be an impact on the project cost, schedule, or performance. Risk conditions could include aspects of the projects or organizations environment that may contribute to project risk, such as poor proje ct management practices, lack of integrated management systems, concurrent multiple projects, or dependency on external participants who cannot be controlled. Successful project management requires the identification of the factors impacting project scope definition, cost, schedule, contracting strategy and work execution plan. However much of the research related to risk identification, assessment and management for constructed facilities is focused on specifics such as location, categories of risks aspects, or types of projects. For example lists of relevant construction project risks have been developed (Kangari, 1995, RAMP, 1998, Smith, 1999, Hastak and Shaked, 2000, Diekmann et al., 1998) as well as political risk are available (Ashley and Bonner, 1987, Howell, 2001) . The value of systematic risk management of project activity is not fully recognized by the construction industry (Walewski et al., 2002) . Since no common view of risk exists, owners, investors, designers, and constructors have differing objectives and adverse relationships between the parties are common. Attempts at coordinating risk analysis management between all of the project participants have not been formalized and this is especially true between contractors and owners. (Hayes et al., 1987) defined three phases for risk management process (RMP), namely: risk identification; risk analysis and risk response. (Uher and Toakley, 1999) indicated that out of three phases involved in risk management, the concept of risk identification appears to be the most known and practiced. (Lam, 1999), in his paper which discussed risks associated with major infrastructure projects, and defined risk identification as listing of most, if not all, the potential areas where an undesired outcome may result. Such listing should be done at the earliest possible stage of the project. Furthermore, the author listed some techniques that could be used in risk identification such as brain storming, prompt lists, structured interviews and hindsight reviewers. Another useful method is to simulate events and relationships using a hypothetical project life cycle so that the relevant risk factors are made apparent. Risk identification is normally done in a group.(Chapman, 1997) introduced three methods for risk identification, namely: brain storming; Nominal Group Technique (NGT) and Delphi. These are ways to collect judgments from the project team. However, brainstorming was the most commonly cited technique. (Tummala and Burchett, 1999) defined Risk Management Process (RMP) as a logically, consistent and structured approach to enumerate and understand possible risk factors and to assess their consequences and uncertainties.(Chapman, 1997) stated that a formal (RMP) should be applied at all stages in the project lifecycle by project owners and contractors. Alternatively, the process is referred to by many authors as (PRAM) Project Risk Analysis and Management. However, it is the authors opinion that (PRAM) and (RMP) are similar terms for the same concept and can be used interchangeably. (Uher and Toakley, 1999) resented a paper discussing the use of risk management in the conceptual phase of the construction project development cycle where uncertainty is at its peak. Furthermore, (Cano and Cruz, 2002) explained a generic risk management process to be undertaken by organizations with the highest level of risk management maturity in the largest and most complex construction projects. As a final validation, Delphi analysis was applied to assess the risk management methodology. (Fang et al., 2004) presented a risk assessment model for tendering of Chinese building projects on the basis of identification and evaluation of the major risk events in the Chinese construction market. The findings showed that the risk of a project can be assessed through analysis of factors such as: owner type; source of project financing; existence or lack of cooperation between contractors and the owner; the intensity of competition for tendering and the reasonableness of the bid price. (Charoenngam and Yeh, 1999) stipulated the importance of a proper contractual foundation to ensure successful project execution, especially in case of projects involving multidisciplinary teams.(Thompson and Perry, 1992) addressed the necessity of model or standard sets of conditions of contracts where risk is allocated to different contract parties, but the principals behind this allocation have not been stated . Construction contracts are one of the primary vehicles of risk allocation and management, Ibbs et al. (1986). Furthermore, (Bubshait and Almohawis, 1994) stated that when a contractor is working in an unfamiliar construction environment, one source of risk is the contract conditions. There is significant evidence in the literature that checklists are the most commonly used methods of risks identification.(Uher and Toakley, 1999, Akintoye and MacLeod, 1997, Simister, 1998), all stated that checklists recorded the highest use among practitioners of risk management as compared to other techniques. (Uher and Toakley, 1999) stated that the most commonly applied risk identification techniques were checklists, brainstorming and flowcharts. Other techniques such as questionnaires, scenarios building and case based approaches were less popular, while techniques such as influence diagrams and Hazop were largely unknown. (Akintoye and MacLeod, 1997) on the basis of the results of a survey of risk management techniques conducted on general contractors and project management firms, stated that checklists based on intuition, judgment and experience recorded the highest formality with the respondents. The authors also stated that checklists could not be considered as a formal technique. (Simister, 1998) indicated that traditional methods are still favored in the UK, even though the level of awareness of other formal and more complex techniques is high. The study listed 12 techniques and indicated a percentage of the current/past use as well as the level of awareness for each technique. Checklists were the most popular technique, followed by Monte Carlo Simulation, Project Evaluation and Review Techniques (PERT), Sensitivity Analysis and Decision Trees. (Hassanein and Afify, 2007) in their study about Risk management practices of contractors: a case study of power station projects in Egypt identified a marked lack of consistency in the contractors risk identification effort. Contractors possessing past experience in Egypt were far better able to identify the relevant risks. On the other hand, local Egyptian contractors with vast experience in Egypt but limited project management experience were shown to lack the necessary expertise to properly identify risks and to take the appropriate exceptions. Furthermore, the results revealed that bidders do not include in their proposals their true lists of exceptions which represent genuine risks to them.

Friday, October 25, 2019

Acting To Save Mother Earth Essay -- essays research papers

Everday we hear more bad news about our planet. Reports tell us that wildlife and forests are disappearing at an alarming rate. Newscasts give the latest word on how quickly earth is losing its protective shirld and warming up. Newspapers lament the pollution of our air, water, and soil. What can we do in the face of such widespread gloom? In fact, we do not have to feel helpless. We can each learn practical ways to better our environment. For example, saving and recycling newspapers has a number of positive results. First, recycling newspaper saves trees. The average American consumes about 120 pounds of newsprint a year-enough to use up one tree. That means close to 250 million trees each year are destroyed for paper in this country alone. If we recycled only one-tenth of our newpaper, we would save 25 million trees a year. Second, making new paper from old paper uses up much less energy than making paper from trees. Finally, this process also reduces the air pollution of paper-making by 95 percent. Another earth saving habit is "precycling" waste. This means buying food and other products packaged only in materials that will decay naturally or that can be recycled. The idea is to prevent unrecyclable materials from even entering the home. For instance, 60 of the 190 pounds of plastic-especially styrofoam-each American uses a year are thrown out as soon as packages are opened. Be kind to your planet by buying eggs, fast food, and other products in cardboard in...

Thursday, October 24, 2019

Managing People†Lenovo China Essay

Summary This assignment expresses and evaluates the Lenovo China’s human resource management from five parts. At stating, it introduces simply the history of Lenovo China. Then, describing and analysing approach of people management in Lenovo is the key point through five elements of overall approach, system of rewarding performance, employees’ recruitment, methods to improve development employees and the appraisal of individual performance. In particularly, the last three is talked mainly. However, the appraisal system has a little problem. Next, it mentions the leadership of Lenovo China which is mixture Chinese and western style. At end of the assignment, it gives some personal idea and recommendations on the appraisal system. 1.0Introduction The report will appraise human recourse management and give recommendations for Lenovo China. At beginning, it will introduce the background of Lenovo China. Then it will describe Lenovo China’s approach of people management from five aspects. Especially, it will focus on selecting and developing employees as well as the appraisal. Then it will talk about Lenovo China’s leadership and organizational culture. Finally, it will give personal opinions on Lenovo China and evaluation. 2.0People management in Lenovo China 2.1Introduction of Lenovo China The Lenovo China was established in 1984, turning the name of â€Å"Personnel Department† into â€Å"Human Resources Department† in 1995 when they had been an increasing awareness of the importance of persons (Ge, 2004). Nowadays, Lenovo China was a successful company because Lenovo China had ranked NO.450 in the ranking of the fortune Global 500 (CNN, 2011). 2.2Approach of People management in Lenovo China 2.2.1Overall approach The overall approach of Lenovo China is the mixture of classical approach and modern management theory with combination of X and Y theory (Mullins, 2010). In classical approach (Mullins, 2010), Lenovo China do not use absolute power and control over people. They think highly of human resource, because they know the importance of the talents (Ren, 2003). In addition, Lenovo China’s leaders also communicate with employees and listen to their opinions in order to gain their trust, which could obtain more ideas for development of the corporation. In spite of this, Lenovo China still have a complete set of the corporation system to manage people (Pi, 2011). In Lenovo China, as employees are doing any work, they must comply with these three principles: 1.insisting on working according to the rules if there are rules. 2. Working according to the rules in advance and coming up with recommendations timely, if the rules are not reasonable. 3. Applying and working according to the cultural value criteria of Lenovo China, if there are no rules (Pi, 2011). Employees of Lenovo China are in a condition of relative strict control, but they will be provided properly freedom to conduct activities and take responsibilities. For instance, technicians in Lenovo China have rights to adjusting their work hours with freedom (Deng, 2002). Thus, Lenovo China could offer opportunities to fulfil their ego needs. The overall approach is with Chinese and western characteristics of management and combine well these two management model. Lenovo China do not allow individualism like America, but they advocate collectivism. However, they are not like the old Chinese management model—centralization. Thus, the new generations can not only fulfil themselves but enjoy freedom at the same time. There are rules to control yet. 2.2.2System of rewarding performance Lenovo China apply mainly the Alderfer’s ERG theory (Mullins, 2010) to motivate employees, because they have two approaches which are physical satisfaction and psychological satisfaction (Pi, 2011). At beginning, for old generations of Lenovo employee, they have higher psychological demands. In addition to prove that their own knowledge can transform into treasures, their purposes are concerns about development of China. These people do not ask for much in physical satisfaction (Ren, 2003). On the contrary, there is a strong collective sense of honour between the old generations of Lenovo people. Hence, the motivation for them is development of collective spirit and motivation of goals (Ren, 2003). Further, at present, the new generations of Lenovo people is primarily motivated by physical satisfaction, because a plenty of foreign corporations and joints ventures were entering into China after the 1990s with offering high wage to attract diverse people, it threatened state-owned enterprises (Ren, 2003). However, nowadays, Lenovo China’s physical satisfaction includes several sides: salary, bonus, welfare and warrants. Bones have company’s, departmental and individual (Ren, 2003). For example, the half of the excess complete part shall be handed over to the corporation, and their department will dispose the rest of part to reward or give welfare (Pi, 2011). Welfare is normal welfare, such as insurance and housing public fund and so on. However, Lenovo China take the high standard. For instant, government has set a rule that each person have to save the 4 percent to8 percent of salary for the housing public fund, then Lenovo China will save the 8 percent for employe es (Ren, 2003). The advantage of method of motivation is that employee could be stimulated to devote oneself to fulfilment of overall objectives and personal expectations. In addition, the ways of stimulations of Lenovo China are very reasonable, because it is according to difference of various people to provide distinct stimulation, such as different personality, knowledge and features of jobs (Deng, 2003). Nevertheless, the more physical reward, the more expectations. Overmuch physical reward could not exactly stimulate improvement of employees, to the contrary, it perhaps leads the employee to be greedy and get private benefit without thinking of organizational goals. 2.2.3Recruiting and selecting employees The process of selecting employees in Lenovo China is very strict. There are two aspects which are inside recruitment and outside recruitment (Mullins, 2010). Inside recruitment involve choosing managers from within the organization, however, Lenovo China adhere to observe their abilities in same working conditions rather than proud achievements in the past (Deng, 2002), which is special. In addition, outside recruitment needs to hire new from outside by put up the information of campus recruitment at first (Pi, 2011). Then, beside testing of quality and evaluation of comprehensive capacityï ¼Å' Lenovo China also have a face to face conversation (Deng, 2002). There are nine questions Lenovo will ask: 1.self introduction, 2. what do you do in your company and what does your company do, 3. your superiorities and tell why Lenovo need you, 4. your weaknesses,5.do you have some suggestions for Lenovo,6.do you have wallet, 7.do watch the news, 8.what do you think of the job you apply and how to do well, 9.contrast with Lenovo and other brand, and the their advantages(Shi, 2008). Moreover, Lenovo China are willing to recruit the young who graduate from a higher institution, such as, Tsinghua University, Peking University and Beijing Science and Technology University and so on. In order to contest with competitors to seeking the persons with ability of professional technique and senior management, Lenovo China held recruiting activities in universities in advance, and conducting activities was earlier than foreign companies in each year. These activities included publicity of idea of Lenovo China and a meeting between students and outstanding employees with an on-site consultation of employment. Further, Lenovo China sponsored a competition of website designation for the national college students and set up a special award (Pi, 2011). Providing these opportunities helps Lenovo China to better promote their own and attract graduated students and graduands effectively. Moreover, nowadays, Lenovo china â€Å"focus on people who operate effectively on a global scale, regardless of their birth country†(Hegar and Hodgetts, 2011 p. 536). Lenovo China had appointed William Amelio who was an American executive from DELL in late 2005 (Schuman, 2010). However, in those years, â€Å"Lenovo was missing out on the faster-growing segments of PC markets† (Schuman, 2010 p.2). It demonstrated that foreign was not quit knowing about Chinese markets. 2.2.4Methods to improve development of employees Lenovo China emphasize training and retaining employees via four methods, because all of these trainings and results are associated with promotion (Wang, 2006). At first, each employee must be working from bottom of the corporation, then, having promotion step by step, due to organizational culture though this process being inherited and absorbed preferably(Ren, 2003). Secondly, they will choose those employees who are the most improved employees to training by experienced leaders teaching young challengers who will be the deputy jobs (Ren, 2003). Thirdly, it is essential to training coordinated operational capacity through teaching how to build teams (Ren, 2003). Finally, Lenovo China deem to be substance that is an assurance to attract talented persons, such as, giving ten present of stock of coordination, bonus and social welfare according to taking highest standards (Ren, 2003), especially, having vacation with salary and rewarding immediately (Deng, 2002). In addition, with regard to new employments, they all require to attend various oriented trainings. Then, they need to gradually accept trainings of organizational culture, generic skills and aspects of business and management (Deng, 2002). What’s more, though a series of trainings results, evaluation of specialists and 360 degree feedback analyse what aspects of the employees need to strengthen. Next, Lenovo China consider what aspects employees require to train according to their own development. Combination of two parts determines content of training of these employees and the whole year training plans. (Wang, 2006) On the other hand, the method of dismissal and post changing is an old way, but it is popular with employees. When an employee could not exactly exert his knowledge in his position, leaders will consider to giving his chance to check his ability by giving his specific objects. If he could deal with, it illustrates that the thoughts of leader has deviation. If he failed, the leader will have a personal talk when he admits his faults, the leader will continue to supply an opportunity to him. If he could not success until the third opportunity, he will meet refresh the position he stays at present. Then, even if the leader give him a demotion with the same wage as before (Deng, 2002), meanwhile, he will feel not uncomfortable. To conclude, it is a hommization management respecting for each member of the development, providing space of development and helping. 2.2.5The appraisal of individual performance Lenovo China pay attention to performance and ability with very strict appraisal of individual performance (Wang, 2006). Human resource department and every department of managers implement and control the appraisal through two ways which are performance measures and capability assessment. Performance was measured by quantitative evaluation of quality and quantity and cost of accomplished work and other contributions for company. Capability assessment involves work ability, work attitude and potential development (Wang, 2006). Moreover, there are four forms to apprise: superiors to subordinates, staff in the same level, subordinates to superiors, and the department to the department. Meanwhile, Lenovo China use questionnaires for departments evaluate each others in each year (Wang, Zhao and Li, 2009). Furthermore, each leaders and employees should set objectives they want to achieve in each quarter and year and describe what the goals are and list specifically. In the end of each year and quarter, Human resource department and every department of managers have to exam whether the work is achieved and how the quality of work results is (Wang, 2006). In a word, salary decision, promotion and content of trainings are based on these results of the appraisal (Wang, Zhao and Li, 2009). The advantage of the appraisal of individual performance is realizing the importance of taking responsibility by encouraging employees to put their own objectives into enterprise goals (Deng, 2002). In addition, it could supervise the accomplishment of the work. Further, organization could monitor and measure the performance with fairness. However, the appraisal of Lenovo China has disadvantages that employees are evaluated by managers. Due to unsteady factors like personal factors and environmental factors, the result of appraisal will be influenced. What’s more, sometimes emotional problems extremely affect results of evaluation in the process of the appraisal. Some performances are easy to measure like sales, but some are not. 2.3Lenovo China’s leadership Recently, the news said Liu ChuanZhi resigned Chairman of Lenovo China but be an honorary Chairman; what’s more, Yang YuanQing became the Chief executive officer and Chairman (Lenovo, 2011). Liu ChuanZhi, as one of pioneer of the Lenovo China, he creates lots of legends. Therefore, he has his own leadership style. He is more like a participative style of leadership. Liu ChuanZhi always let them raise their new idea, he just inspire them to bring up new thoughts without managing specific matters (Deng, 2002). Moreover, Yang YunQing’s management model is incomplete directive leadership, because he gives his advice at beginning, and then let employees give their views, and at last, he makes decision (Deng, 2002). Consequently, they have a common point which is allowing employees to participate in process of making decisions. They both wish employees’ creative power to get close to organizational goals (Deng, 2002). Hence, this way of encouragement is a great opportunity to fulfil ego needs. In addition, Liu ChuanZhi has distinctive personality and strong charisma which convinces employees, because he is a man of his words, which shows not only in high demands to him but his accomplished commitments for shareholders and employees (Deng, 2002). 2.4Lenovo China’s organizational culture Liu ChuanZhi pays more attention on organizational culture, because it is a representative of Lenovo China and has significance of goals accomplishment (Ren, 2003) like task culture (Mullins, 2010). â€Å"It is reflected in the statement: We do what we say and own what we do (Lenovo, 2011)†. There are four major organizational cultures. Firstly, Lenovo China quite advocate spirit of cooperation, because Lenovo China believe that it is a requirement of maintaining a consistent team (Deng, 2002). Secondly, they emphasize spirit of struggle, because Liu ChuanZhi said that five percent of hope turned into one hundred percent of reality. For example, in 1991, Lenovo Hong Kong had loss of more than fifty million Hong Kong dollars in three months, Lenovo overcame. As a result, Liu ChuanZhi suffered Meniere’s from syndrome (Deng, 2002). Thirdly, great reputation and credit is life of corporation. There are two types which are individuals and corporation. Individual reputation and credit means that working seriously and doing what they had said can win the trust of users, colleagues, subordinates and superior. The reputation and credit of corporation came from satisfaction of users. Lenovo China would rather lose money than lose credibility and reputation (Deng, 2002). For instance, in 2003, the rate of bad account is less than 0.005% (Ren, 2003). Fourthly, innovation and study are one of the cultural of corporation (Deng, 2002). Today’s successes are result from Lenovo China innovating and studying continually. Further, there is a special organizational culture; they have a â€Å"CTIME† for encouraging communicating like a friend. Meanwhile, CTIME means coffee time. Each afternoon at 1o’clock, employees and leaders go to the third floor and can talk easily. Especially, leaders will pay employees for coffee every Tuesday which is for encouraging friendly c ommunication from each other (Pi, 2011). Therefore, the culture of Lenovo China is successful to let employees have cohesions through communication and teamwork. In addition, the efficiency of execution is high because of nice teamwork. Overall, it is a relative perfect culture. 3.0Personal opinions on Lenovo China If there is an opportunity to work in Lenovo China, â€Å"YES† is the answer. At starting, this is a big and well-know corporation. For ego needs, it is based on satisfaction of physical needs at first, like food, clothes and so on. In addition, leadership in Lenovo China is different from other old state-enterprises, because it can produce a sense of belonging through each involvement of employees. When employees contribute to Lenovo China, it is important to embody the meaning of individual existence. They are not complete power control but participative style. Thus, there are more spaces to allow employees to develop strengths though proper freedom. Moreover, the relationship of colleagues is fair competitions instead of vicious and harmful competitions, which makes employments safety. Due to Lenovo China advocating friendly communication between leaders and employees, this policy can get rid of estrangement between people and give enough respect for employees which is attractive. Hence, ego needs could be satisfied. Then, for individual development, Lenovo China offer relevant help. They choose training employees to learn new skills for free, because they have their own training base. Apart from the theoretical knowledge, there are leaders passing on knowledge of their experiences which is treasure and cannot learn from books directly. However, the appraisal of individual performance has a little problem which is evaluation with personal emotions. Perhaps, it is unavoidable, but it can be evaluated through various channels. For example, individual evaluation could do like department appraisal which is evaluated by doing questionnaires in other departments, managers and employees. In other words, the appraisal of individual performance can be evaluated by colleagues, managers and users. 4.0Conclusion In conclusion, it can be seen then that Lenovo China’s people management is relatively successful. Success of Lenovo China is showed on three parts which are approach of people management, leadership and organizational culture. In particularly, in part of approach, it focuses on three aspects which are selecting employees and how to develop employees and the appraisal system. Especially, it indicates that the appraisal of individual performance has shortage. In addition, it mentions that organizational culture is the core of corporation. Finally, it gives opinions on human relation of Lenovo China and reasons. Reference CNN. 2011. Annual ranking of the world’s largest corporations [On-line]. CNN Money. Available from: http://money.cnn.com/magazines/fortune/global500/2011/full_list/401_500.html [Accessed 11 December 2011]. Deng, Z.H. 2002. The human resource management of legend. Hohhotï ¼Å¡Publication of the people of Inter Mongolia Ge, X. 2004. To discuss the Manpower Recourses Management of Legend Grow up. Journal of Liaoning Business Vocational College, 63(2), 18-19. [On-line]. Wang Fang Data. Available from: http://d.g.wanfangdata.com.cn/Periodical_lnswzyxyxb200402009.aspx [Accessed 11 December 2011]. Hegar,K.W.and Hodgetts R.M. 2011. Modern human relations at Work. Google Books. Available from: http://books.google.com.au/books?id=kleg0QYjidUC&pg=PA536&dq=Lenovo+China+human+resource&hl=zh-CN&ei=BL_lTuqtHMSaiAf9v8y2BQ&sa=X&oi=book_result&ct=book-preview-link&resnum=2&ved=0CEMQuwUwAQ#v=onepage&q=Lenovo%20China%20human%20resource&f=false [Accessed 12 December 2011] Lenovo. 2011. Our Company [On-line]. Lenovo. http://www.lenovo.com/lenovo/ca/en/our_company.html [Accessed 15 December 2011] Mullins, L.J. 2010. 9nd ed. Management & organizational behavior. London: Prentice Hall Pi. B.W. 2011. Liu ChuanZhi: Diaries of Managing Lenovo. Beijing: China Railway Publication. Shi,Y.Y. 2008. Analyses and Enlightenment of the model of human resource management. Industrial and science Tribune, 7(12), 250-251. [On-line]. Wang Fang Data. Available from: http://d.g.wanfangdata.com.cn/Periodical_cyykjlt200812123.aspx [Accessed 12 December 2011] Ren, X. 2003. Liu ChuanZhi discussing experience of Lenovo China. Beijing ï ¼Å¡Thread Binding Books publishing House Wang, J.P. 2006. Lenovo:How to turn students into elites. Computer Education, (9), 66-69. [On-line]. Wang Fang Data. Available from: http://d.g.wanfangdata.com.cn/Periodical_jsjjy200609021.aspx. [Accessed 13 December 2011] Zhang, Y.S., Zhao, M.X. and Li, J. 2009. Human Resources Management Cases Series. Beijing: China Social Sciences Press