Wednesday, July 31, 2019

Business Markets and the Economy Essay

P6 describe how business markets are regulated in the UK (Case Study) M3 explain why the government needs to regulate business markets P7 explain how EU requirements influence business markets in the UK D2 evaluate the effectiveness of the regulatory regime in a selected market The main purpose of this assignment is to: describe how business markets are regulated in the UK and explain how EU requirements influence business markets in the UK. Scenario: Case study given Task 1 (ALL): Students need to consider how governments intervene in markets to regulate them (can be linked to P4). Intervention can be through taxes and subsidies which are designed to distort the market to achieve specific objectives. The work of the Competition Commission, and the offices of the regulators for the privatised but previously state-owned monopolies, should be examined to see the purpose and effect of government intervention. Topics that can be used in a case study example (do not all need to be covered as covered in P4): market failure; justification for intervention; market regulation; deregulation; unfair competition; competition policy;Â  Competition Commission; privatisation; private finance initiative; government policies; subsidies; taxation This provides evidence for P6 Task 2 (MOST): Students should build on the work for P4 and P6 and explain why governments intervene in markets and what the consequences of market interventions are. There are plenty of examples, reported on regularly where the regulators consider the consequences of industry activity on producers and consumers. For example, rail fares are increased annually and the proposals generate debate about balancing the interests of the train operating companies and passengers. (not to be attempted until completion of P6) This provides evidence for M3 Task 3 (ALL): Students should report on how EU policies and activities impact on UK business markets. One useful area to consider is in relation to aviation policy and how the EU has tried to put national flag carriers into a competitive framework which confronts national governments’ protectionist practices and gives consumers a better deal. Topics that must be covered: European Union; the single market (free trade, harmonisation, capital, labour, technical standards, simplified trading); monetary union; social chapter This provides evidence for P7 Task 4 (SOME): Students should evaluate the effectiveness of the regulatory regime in a selected market. If the banking industry is considered then the role of the Financial Services Authority in the period before the recapitalisation of the banks will provide some contrasting views as to its effectiveness. This provides evidence for D2 Sources of information: Textbooks Gillespie A – Business in Action (Hodder Arnold, 2002) ISBN 0340848200 Mankiw N and Taylor M – Economics (Thomson Learning, 2006) ISBN 1844801330 Marcouse I et al – Business Studies (Hodder Arnold, 2003) ISBN 0340811102 Sawyer M – The UK Economy, 16th Revised Edition (OUP Oxford, 2004) ISBN 0199266514 Sloman J and Sutcliffe M – Economics for Business (Financial Times/Prentice Hall, 2004) ISBN 0273683357 Journal The Economist Newspapers Business sections of broadsheet newspapers The Financial Times Websites news.bbc.co.uk/1/hi/business/default.stm The BBC website’s business section. www.bized.co.uk Bized provides a selection of teaching resources. www.direct.gov.uk/en/index.htm This is the UK government’s own site and there are links to a range of relevant data sources. www.esrc.ac.uk/ESRCInfoCentre/facts/index27.aspx?ComponentId=7102&SourcePageId=7079 The ESRC has current UK data. europa.eu Website of the European Union www.ofgem.gov.uk/Pages/OfgemHome.aspx Office of the Gas and Electricity Markets – the regulatory authority. Each regulator has a similar site. www.statistics.gov.uk The UK Statistics Authority. www.ukpublicspending.co.uk The site has data on public spending both current and historic.

Tuesday, July 30, 2019

The role and function of violence in the novel `The World According to Garp`

John Irving's notoriety as a novelist rests at least partially upon his admirable ability to fuse the comic and tragic in fiction, often within the same â€Å"sketch† or scene. His persistent vision of the absurd and sublime as conjoined twins alludes to a more profound and probing set of themes in his published fiction.In his novel, â€Å"The World According to Garp† the apparent domesticity of the story's characters and settings prove little protection against the forces of fate or circumstance which collide repeatedly with the domestic surface of the novel, many times in irruptions of violence, with much of that violence seeming to be random or bizarre. The function and role of violence in â€Å"The World According to Garp† is manifold; however, one of the primary functions of Irving's continuous depiction of violence is to portray the chaos and random dangers of the universe.The point of violence in â€Å"The World According to Garp† is not only to ins truct readers about possible sociological and ethical breeches in contemporary society, but to remind readers of the primal, seemingly random violence which fills the universe itself. One way of depicting violence in the novel is to show a darkly comic, almost slapstick vision of violence, as in the infamous Michael Milton â€Å"castration† scene where one of the novel's darkest and most tragic moments is simultaneously offset by the â€Å"humor† of the situation: his penis being bitten off in a car while engaging in an extramarital affair.There is simultaneously a notion of poetic justice in this scene, but also of devastating almost unimaginable tragedy which shatters the surface of the domestic scene. This juxtapositioning of violence with comic-tragic experience is continuous throughout the novel. â€Å"The existence of bizarre violence and the associated vein of black humor, even in the first section of the book, contributes to irony. The novel opens to the backd rop of a war, and Jenny Fields's brusque categorizing of the wounded The Role and Function of Violence in `The World According to Garp` page -2-into classes of Externals, Vital Organs, Absentees, and Goners certainly contains an element of the blackly humorous. † (Wilson, 1992, p. 55) In one way or another, each of the characters in â€Å"The World According to Garp† is seen to be either a victim of violence, usually chaotic violence, living in the aftermath of their experience, or as a victim (unknowingly) headed for a violent encounter, or both. The sense of violence as ubiquitous, but ultimately unpredictable and unaccountable, reinforces the cosmic or universal scope of the primal element of violence discussed previously.This primal— ineffable — power, the power of random violent tragedy is symbolized by Walt's mis-hearing of the word â€Å"undertow† which he mistakenly calls â€Å"Under Toad. † The â€Å"Under Toad† becomes a near -archetypal vision of cosmic disorder and brutality. â€Å"Walt's malapropism becomes a catchphrase that the Garp family uses to refer to imminent danger, violence, and death. The randomness and suddenness of death are brought to our attention at the very beginning of the novel when Garp's father, the ball-turret gunner, becomes a â€Å"Goner.† Although violence and death abound in Irving first novel, Setting Free the Bears, in Garp there is one disaster after another. (Campbell, 1998, p. 81) The universal presence of violence and disorder becomes associated, through its immersion into the â€Å"every day† settings and characters, with a primitive, natural force, something which impacts humanity and flows through them but issues, perhaps, from a more cosmically primitive level. One way the natural primitivism of violence is expressed in â€Å"The World According to Garp† is through the association of violence with sex.â€Å"Whatever the The Role and Function o f Violence in `The World According to Garp` page -3-connection, sex and violence are related throughout the novel, and Garp finds himself confronting them at nearly every turn. â€Å"(Campbell, 1998, p. 83) This association allows Irving to demonstrate that primal, chaotic violence exists as an intrinsic part of the universal paradigm and finds oblique, often absurd and even humorous expression through human events. In this way, violence, like death and birth, love and sex, is viewed as an endemic force of nature.As a symbol for Irving's cosmic paradigm, the wrestling room at Steering college offers a complex and complete statement, symbolically, for Irving's cosmic vision. Here, in a place created for violent confrontation, all of the major events of a life, Garp's life, emanate. â€Å"It is not only where Garp learns how to wrestle and feels at home, but also where he proposes to Helen Holm. It is, further, the space that Pooh Percy enters, in a nurse's uniform (like his mother' s), and kills Garp. † (Campbell, 1998, p.75)The wrestling room becomes a microcosm, a stage whereupon the great, often absurd, dramas of a life are enacted, but it is a place of competition, of struggle, and ultimately of death. The cycle which links sex and violence, death and birth, continues in Garp's stream of consciousness even as he lays dying, showing how individuality is subsumed under the larger, cosmic processes. Garp thinks: â€Å"Even if there is only death after death (after death), be grateful for small favors— sometimes there is birth after sex, for example.And if you are very fortunate, sometimes there is sex after birth! † (Irving, 576). Irving's use of violence in â€Å"The World According to Garp† is extensive, varied, and intense. The modes of violence in the novel range from the comic to the harrowingly tragic and often involve two or modes simultaneously. Irving's purpose in depicting violence in this way is to establish violence and chaos as an integral part of the universe inhabited by humanity, whose insular and myopic visions partake of, but are incapable of fully comprehending the universal forces which shape their lives.

Monday, July 29, 2019

The Importance of Environmental Protection & Practical Steps to Support It

Since the second half of the 20th century, the results of environmental destruction and the exploitation of natural resources have become increasingly obvious. Now, 7 billion people are sharing this planet, and scientists predict that the population will increase to 10 billion people in this century. However, we already face difficulties with dwindling natural resources and environmental pollution. There is growing evidence that some natural disasters are due to our behavior. We already face tremendous changes caused by carbon emissions and deforestation.Glaciers are melting, and sea levels rise continuously. Our hunger for more gas, oil and water even induced earthquakes. These 1 are enough experiences to wake us up! Environmental protection H. H. the 14th Dalai Lama (the spiritual leader of Tibetan Buddhists) and H. H. the 17th Karmapa Urgyen Trinley Dorje (the spiritual guide of the Tibetan Kagyu tradition)are strong advocates for environmental protection. Vietnamese Master Thich Nhat Hanh is also very active in this regard, only to mention a few spiritual leaders who are engaged in environmental protection. H. H.the Dalai Lama mentioned at the Environmental Summit in Portland in May 2013 that his strong commitment to environmental protection started more than 20 years ago. In 1992 the Dalai Lama attended the first environmental conference in Rio de Janeiro and spoke about his views on universal responsibility. One year later, he was invited to an international conference, â€Å"Ecological Responsibility –a Dialogue with Buddhism† in New Delhi, India. Prominent Buddhist teachers and scientists attended this conference. As a result they published a public appeal entitled, â€Å"For Our Universal Responsibility.† Many talks and articles by H. H. the DalaiLama about this topic followedand are now published in 2 diverse media worldwide. These can be found on his homepage. H. H. the Karmapa has spoken for a number of years on the importance o f protecting the environment for the future of this world and for the Dharma. He says, â€Å"Ever since the human race first appeared on this earth, we have used this earth heavily. It is said that ninety-nine percent of the resources and so on in this world come from the natural environment. We are using the earth until she is used up.The earth has given us immeasurable benefit, but what have we done for the earth in return? We always ask for something from the earth, but never give her anything back. â€Å"3 Sentient beings are totally dependent on the four elements of earth, fire, wind and water. H. H. the Karmapa says, â€Å"Both the bodyand mind are strongly connected to the unaltered, natural elements. â€Å"4We only can survive because nature and other sentient beings make our lives possible. Therefore, we need to strive to bring this awareness into our lives for our own good. We need to educate each other about the importance of protecting and caring for our environment. Practical Steps Towardsa Healthy Relationship with the Environment H. H. the Karmapa’s vision is supported by an association called â€Å"Khoryug,† which means â€Å"environment† in Tibetan. Formed by Tibetan monasteries in the Kagyu tradition, the association promotes environmental projects under the Karmapa's leadership. A bilingual homepage in English and Tibetan has been established to provide information on these projects. In 2009, the Karmapa organized the first conference for environmental protection for Kagyu monasteries and Dharmacenters in Sarnath, India.As a result of this conference, he published a booklet entitled, â€Å"108 Things You Can Do To Help The Environment. † You can download thisbooklet, whichis inspiring and helpful not only for monasteries and Buddhist centers, but also forBuddhist practitioners and non-Buddhists worldwide. I’d like to mention some things you will find in this booklet about what we can do to protect our en vironment from destruction: Environmental protection starts with us. We need to look at our own behavior to consider how we can support a healthy environment for this century and beyond. To start, we can do aspirational

Internet memes in light of The work of art in the age of Mechanical Essay

Internet memes in light of The work of art in the age of Mechanical Reproduction by Walter Benjamin - Essay Example This research paper is aimed at highlighting the importance of this prominent means of communicating ideas while relating it to the concepts of arts developed by Walter Bejamin in his article "The work of Art in the age of the Mechanical Reproduction". Discussion Immediately following the development of the concept of internet memes, the idea was taken by many in the field and a number of websites appeared which served the purpose of providing newly developed memes with expressions which could be molded according to one's needs. This was not limited to internet sites only; a number of books, e-books and social media sites also serve the purpose. Literature review Although abundant information is available regarding the various aspects of memes, only those resources will be selected which resonate with the ideas brought forward by Walter Benjamin in the selected article. To prevent bias from disrupting the authenticity of the document, equal importance will be given to resources with supporting or confronting views. Dawkin's (1976) work 'The selfish gene' will be used to get an idea about the origin of the concept of memes. The work of Shifman (2009) will be used to get an idea about the current trends about internet memes. Strohecker's (2012) work about authenticity of art works will be referred to for explaining in detail the nature of authenticity of art works. ... Burgress (2007) has described memes to be 'vernacular creativity'; she considers that memes are the result of daily artistic and innovative thoughts of people that take the form of an idea and are produced by simple means. Milner (2012) talks about memes and claims that with the passage of time and with improvement in technology, websites related to the development of memes are getting user friendly. Therefore, the range of topics and ideas covered by developers of memes are according to their age and interests; this implies that the themes of memes fall under literally thousands of categories. It is for this reason that a standard classification of memes according to genres is not feasible as yet. However, a general classification of memes can include categories like Reaction photoshops, Lipsynch, Misheard Lyrics and Recut Trailers etc (Shifman, 2014). It should however be understood that the basis of classification of memes can be different and various systems of classification of memes can be adapted depending upon the type of requirements under a given set of conditions. Aims of the project The aim of this project is to weigh the concept of memes against a standard; an article by a well known literary critic from Germany. Being the developer of the notion 'auratic perception', Walter in his work "The work of Art in the age of the Mechanical Reproduction" has discussed art in the light of the then prevailing circumstances in which the aspect of mechanical reproduction was very prominent. However, with the passage of time and with the development of new concepts and technologies, older methods of reproduction of art works have been replaced by a number of new methods. Although, a digital manifestation of the art works ensures rapid propagation

Sunday, July 28, 2019

Why is Locke concerned with the question whether our terms for Essay

Why is Locke concerned with the question whether our terms for substances are terms for items with a real essence - Essay Example Subsequently, he pragmatically thought over the concept of knowledge and language formulation, the core of which shall be discussed hereunder. According to Locke, what we know is always properly understood as the relation between ideas (the learned concepts of experienced reality), and in the said essay, he explained at length the stance that all of our ideation is a consequence of experience. The outcome of this objective method is that the human mind seems to get somewhat undermined in its abilities. While describing the domains of human capabilities in terms of knowledge, ideas and the like, he endeavors to challenge certain basic and traditional norms of communication, language and interaction constructs. Here, the issue of contention is the fact as to how Locke tackles the term of 'substance'. Locke describes or rather differentiates the qualities of substances into two divisions: primary and secondary. The primary attributes deal with those traits of an entity, which forms its existence - the integral constituents of the object. However, the secondary attributes are those, which are qualified by our perceptual reality and which may be taken in a relative term depending upon the observer. "The primary/secondary quality distinction gets us a certain ways in understanding physical objects, but Locke is puzzled about what underlies or supports the primary qualities themselves. He is also puzzled about what material and immaterial substances might have in common that would lead us to apply the same word to both" (SEP). Such contemplations gave him the impetus to coin the relative and obscure idea of substance in general. He referred to the ever dynamic use of the word 'substance'. Locke claims that substances support the substances support qualities - these may be as infinite as one can imagine. For understanding of concepts, he believed, simply information about the object was not enough. There had to be some linkages in the information that we receive in clusters. These linkages had to be the essence of understanding the concept to its fullest. This is a result of the fact that he himself cannot purport a rationale for the existence of tropes (tropes are properties that can exist independently of substances). Hence, he could not use of a concept in lieu of 'substance'. He seems extremely cautious about our limitations of the ideas of substances. He has been understandably criticized for blowing this substance debate out of proportion, yet the importance that he appreciates within this concept is what produces the entire basis for his conviction. It troubled Locke to consider the substance as being something without having any properties - this in effect would be unscientific and hence impossible according to the doctrine presented by him. On Essences He attempts to give ideas of substances, simple modes, mixed modes, relations and so on. Here, he intends to clarify the difference between real and nominal essences. Due to his obvious passion with empiricism, his primary interest always seems in defining the attributes of an entity before he can look at its functions. Locke admits that not all words relate to ideas. Though an adamant campaigner against innate experiences, yet he

Saturday, July 27, 2019

Summary Essay Example | Topics and Well Written Essays - 250 words - 77

Summary - Essay Example The Gallop Poll of 2011 shows just 26% for handgun ban. The issue with the thinkers is whether gun control can stop tendencies for violence. Whereas the arguments and counterarguments continue amongst various bodies concerned with controlling gun and violence, the measure does not get the legal support. â€Å"With a 5-4 decision in the District of Columbia v. Heller case heard by the Supreme Court in 2008, the court’s new reading of the Second Amendment indicates that handguns cannot be banned even at the local level because there is an individual right to handguns in the home for self-defense.†(Ryan, n. p.) This seals the issue in favor of keeping the handguns. The other method suggested is health screening of the people and the background check from the â€Å"federally licensed dealers.†(Ryan, n.p.) This suggestion is good in theory but its implementation is not practicable. One can easily buy the â€Å"gun from a private seller.†(Ryan, n. p.) But the suggestion to ban AR-15 type assault rifles merits consideration, as these types of weapons have role for civilian purposes. Congress did ban 9 types of semi-automatic weapons in 1994 and the â€Å"ban expired in 2004 and was not renewed.†(Ryan, n.p.) Going by the General Survey there is a marked reduction in gun related crimes all over the country in the last 40 years. But the Church is deeply concerned about gun trafficking and suggests that the members of the community should exercise moral authority to educate the people about the gun culture and finally guns should have no place in a society governed on moral principles. The faith community has the responsible and c onstructive role to play in this

Friday, July 26, 2019

ETHICS AND FINANCIAL SERVICES Essay Example | Topics and Well Written Essays - 1000 words

ETHICS AND FINANCIAL SERVICES - Essay Example The asbestos inhaled by the workers during production caused asbestosis, chronic disease of the lungs (Upadhyay 2009). Asbestos is a mineral that is an extraordinary useful commercial property. It was used in construction sites, power plants, government projects and of most important was the building of ship. In fact, the James Hardie Industries (JHI) was known to have the largest labour force, which over saw its use in the production of fibre cement in Australia. Through this, workers started experiencing asbestosis after a certain period of time and complains arose on the claims for compensation for attracting the disease (Larson 1977) It was about this time that James Hardie faced a suit by the workers due to his ignorance on their pleas. His group sought to depress the issue by settling the cases through the establishment of a Medical Research and Compensation Foundation (MRCF), which was supposed to handle claims and payments of asbestos poisoning from its products. However those who were given the mandate to manage the research assumed a consistent position that the assessment of the asbestos liabilities at all the relevant times was adequate, with unrelated legal entity for which it had no responsibility (Sneyd 1994). Soon the foundation was rendered under-funded with A$293 million where an estimate of $2.2 B was required and this became a major public issue with the merging of various victim groups, politicians, and media personalities among other supporters who were pushing for intervention from the government. In response to their demand, an inquiry was set to investigate the Jack Hardie group. As a result, Larson 1977 argues that the MRCF was instructed by the government to offer adequate compensation for all the future asbestos victims who had worked at the James Hardie Industries (JHI). Due to extreme pressure from the government and the public, James Hardie

Thursday, July 25, 2019

Art Theory Paper Assignment Example | Topics and Well Written Essays - 3250 words

Art Theory Paper - Assignment Example Jacques Ranciere and other western philosophers who have studied the emergence of new art have termed these form of art to be against the traditional forms of art, which is paintings and Sculptures. These forms of art as Ranciere states are always in opposition to the old schools of art. The emergence of this artistic trend tries to oppose formal or customary practices in artworks that delineated paintings, drawings and even sculptures. In his article titled problems and transformations of critical art, Ranciere explores these art forms which he terms as critical art. He proposes that critical art is more concerned about the function and not the form. Hence this type of art wills always exp-lore the themes or issues in society and not how the artwork was produced. In doing so, Critical art tends to break the rules that have been established for different kinds of schools that defined classical artworks. Artists such as Hung Liu have used art in the form described by Ranciere. Hung Li u can be categorized as being Critical art. Her art is not only political but critical of classical art movements. Ranciere states that the opposition of critical art to the classical forms of art does not criticize these pieces but tries to oppose the methods of classical works of art in modern art. The methods employed by New Art artists do not also conform to the classical schools and art movements. This paper explores how Hung Liu, one of the most famous American Chinese artist has exploited and reflected Ranciere’s proposition and contextualization of critical art. Hung Liu is a Chinese American Artist who was born in china in 1948. Hung Liu moved to the US in 1984 and then returned to China 1990. It was while in china that he discovered the art of mural paintings. Hung Liu‘s Art work uses varied medias in producing masterpieces.. Her main field of art includes Painting, print work and also drawings. Hung Liu’s work takes the form of critical art. His work i s transformational and it tries to raise awareness on various themes. Her background has a big influence in her work. Hung Liu’s style of painting and print tries to infuse contemporary and ancient Chinese culture in tackling issues to do with politics, the girl child, social problems, the Chinese society, the migrant and immigrant plight, the rural Chinese life and other social problems in Chinese and western modern life. Culturally, Hung Liu tries to raise issues in the society using her paintings. Most of her paintings depict the rural life of the Chinese people. Her work of art that she did before the moving to the US was concentrated on the rural life of the Chinese people in paddy fields where she had worked for four years. Using print as a media, Hung Liu reflects the life of the rural people and their suffering. She captures the culture of the Chinese rural worker. In her 2000 painting titled by the rivers of Babylon, Huang Liu uses oil on canvas to capture the rural life of the Chinese people and the culture of poverty. Her paintings have employed the contemporary techniques in capturing and passing a message that is transformational. This is one of the ways in which Ranciere says modern art has taken. By using Chinese images in her paintings and print, Liu identifies with her Chinese culture and she is able to communicate the issues in the culture. Hung Liu’

Wednesday, July 24, 2019

By the Time I Get to Cucaracha Essay Example | Topics and Well Written Essays - 500 words - 1

By the Time I Get to Cucaracha - Essay Example Immediately after this she says that her mom was a housekeeper when she first came to the United States of America. By doing this she makes a personal connection with the reader. She expresses how she felt about the episode, how it was wrong, and why it was wrong. In her eyes it was a racist remark that should not be overlooked. She felt as though Latinas were being mocked. After stating the problem she mentions the great things that Latinas have accomplished in America like the ALMA awards in paragraph 4. Afterwards, she mentions a more popular advertisement with the Taco Bell Chihuahua in reference to an argument made how it was demeaning to use a dog in place of Mexican people. By doing this she shows that people have been making fun of Hispanics for a while. When she included another minority group in her writing, she chose African-Americans. While comparing how Americans won't allow any tolerance for racism towards African-Americans but will for Hispanics, she gives more support to her argument. Perez-Zeeb also acknowledges that fact that blacks were treated terribly by Americans. However, she doesn't believe that gives Americans the right to make fun of certain groups more than others, specifically Hispanics. She was really mad about the fact that TV constantly shows episodes with female immigrants marrying a U.S citizen for a

Ethical Dilemma- Analysis of the News Term Paper

Ethical Dilemma- Analysis of the News - Term Paper Example As discussed above, the primary ethical decision maker or EDM is Apple Inc., and the ethical dilemma concerns the plight of the workers in the subcontracting firms who manufacture Apple products such as the iPhone, Worker welfare is weighed against the benefits to the American and global consumer of the computing products themselves, and the value of Apple’s economic activity to the American and global economy. The dilemma springs from issues relating to worker welfare, including low wages, the repetitive nature of the work, long work hours, and low wages. The confluence of these and other factors drive workers to take their own lives. In Cooper (2013) we get a sense of the gravity of the condition from the presence of nets around the iPhone manufacturing facilities to prevent more workers from jumping to their deaths. This is in stark contrast to the large profits that Apple makes and the large market capitalization of the firm due to that. Because Apple is rewarded for profi ts and for great products, Apple has every incentive to keep costs down, and that drive to depress costs lead to subcontractors depressing wages and other worker-related costs on the other end. These are conflicting interests that are stacked against workers and their interests, especially considering that workers have little by way of leverage in the entire process. The supply of workers is large, relative to demand, and so Apple subcontractors are able to dictate wages and living conditions in the shops. Subcontractors in turn are pressured to depress wages in order to make margins out of low contract bids. In a most general sense, the entire market is involved, because market forces that have contributed to this state of affairs where workers are awarded the least wages possible to squeeze maximum profits from their efforts (Johnson, 2011). B. Possible Alternative Courses of Action In a perfect world Apple will settle for lower profit margins for their products and lower profits all in all in exchange for fairer wages for workers and higher costs for producing their products. Ideally, this translates to subcontractors being able to pay their workers higher wages, and secure better working conditions for them all in all, by being able to bid for the manufacturing work at higher overall bid prices. This translates to the

Tuesday, July 23, 2019

California Travel and Authority Commission Assignment

California Travel and Authority Commission - Assignment Example The greatest challenge posed on the Destination Marketing Organization (DMO) is global warming. Its effects on the natural environment are detrimental. For instance, it causes rising of sea level; migration of wild animals; and hurricanes. In spite of the present economic impact tourism has had on California, it faces significant adaptability challenges. Reason being, majority of the tourist attraction sites depend on the natural environment. Efforts meant to sustain the existing environmental condition are very expensive, and their implications are far reaching. A notable example, the United States Congress, has been tasked with the responsibility of protecting tourist sites for the upcoming generation. However, they have yet to establish what it means for the future and present use of large portions of land in the coastal regions and forests (Kahrl & Ronald-Holst, 2012). Next, tourism is regard as being the most taxed industry. This ranges from the airline tickets, accommodation, a nd charges for car hire. Consequently, tourists shifting to destinations that are more accommodating (5 Key Issues Facing Travel and Tourism, 2012). The tourism industries and DMO entirely depend on each other, in the event of challenges; the existence of both is negatively affected.   An elaborate way of administrating tourist destination is through the establishment of DMO. Destination Marketing Organization (DMO) plays a major role towards the success of the tourism sector. However, it also in charge of some other roles, namely: facilitate a broad understanding of the economic and societal dimension of demand and supply in the tourism sector; enable the growth and diversification of existing sectors of tourism. It will ensure increased competitive nature of this sector; develop a joint venture between the public and private participants within the tourism industry.

Monday, July 22, 2019

RISK ASSESSMENT on the Department of the Army IT Systems Essay Example for Free

RISK ASSESSMENT on the Department of the Army IT Systems Essay 1.Introduction 1.1 Purpose This risk assessment was to identify threats and vulnerabilities related to the Department of the Army (DoA) Information Technology (IT) systems. It will be utilized to identify vulnerabilities in the Computer Network Defense (CND) Capabilities and mitigation plans related to DoA’s IT systems. It was realized that this was a potential high-risk system as noted by the Department of Defense (DoD) Chief Information Officer (CIO). (DoD, 2012) 1.2 Scope This risk assessment applies to all DoA Non-secured Internet Protocol Router Network (NIPRNET) and Secured Internet Protocol Router Network (SIPRNET) for Regular Army and Reserve Components. This is a major system that is used by millions of Soldiers, contractors and DA civilians worldwide. The DoA’s IT system is comprised of Army Global Network Operations and Security Center (A-GNOSC) which is responsible for the Army’s day-to-day Tier 2 CND Service Provider. The research methods will present both quantitative and qualitative data which will identify hazards and vulnerabilities to include International-Transnational Terrorism and Domestic Terrorism and present an assessment of the potential risks from them. Information will be collected mainly from DoD’s and DA’s websites. SYSTEM CHARACTERIZATION The DoD uses DODI 8510.01, DoD Information Assurance Certification and Accreditation Process (DIACAP), as the process for implementing Certification and Accreditation (CA) within their information system. The Information Assurance (IA) Controls, or security measures that must be implemented on a system, as stated in the DODI 8500.2, Information Assurance (IA) Implementation. The control selection relies on the Mission Assurance Categories (MAC) and Confidentiality Levels (CL). Information Systems (IS) will be allotted a MAC level which shows the importance of the information which is used to determine the IA controls for integrity and availability regarding DODI 8500.2 and will be decided by the DoD or Army by the DIACAP  team (Information Assurance, 2009) MISSION ASSURANCE CATEGORY MAC IIs a high integrity, high availability for DoD ISs handling information that is determined to be vital to the operational readiness or mission effectiveness of deployed and contingency forces in terms of both content and timeliness. The consequence of loss of integrity or availability is unacceptable and could include the immediate and sustained loss of mission effectiveness. MAC IIIs a high integrity, medium availability for DoD ISs handling information that is important to the support of deployed and contingency forces. The consequence of loss of integrity is unacceptable. Loss of availability is difficult to deal with and can only be tolerated for a short time. MAC IIIIs a basic integrity, basic availability for DoD ISs handling information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short- term. The consequences of loss of integrity or availability can be tolerated or overcome witho ut significant impacts on mission effectiveness or operational readiness. CONFIDENTIALITY LEVELAll ISs will be assigned a confidentiality level based on the classification or sensitivity of the information processed. The confidentiality level is used to establish acceptable access factors and to determine the DODI 8500.2 IA Controls applicable to the information system. DOD has defined the following three confidentiality levels: 1.ClassifiedInformation designated top secret, secret or confidential in accordance with Executive Order 12356. 2.SensitiveInformation the loss, or unauthorized access to or modification of could adversely affect the national interest or conduct of Federal programs, or Privacy Act information. Includes, but is not limited to For Official Use Only (FOUO), Privacy data, unclassified controlled nuclear information, and unclassified technical data. 3.PublicInformation has been reviewed and approved for public release. Note. Mission Assurance Categories table is taken from Information Assurance. (2009) Applications (not an inclusive list): Anti-Spyware General –V4R1, 3 Dec 09, Application Services –V1R1, 17 Jan 06  Application Security Development V3R1, 10 May 10 CITRIX Xen App, V1R1, 23 Jul 09 ESX Server -V1R1, 22 Apr 08 Database –V8R1, 19 Sep 07 Desktop Applications General –V4R1, 3 Dec 09 Directory Services –V1R1, 24 Aug 07 ERP –V1R1, 7 Dec 06 ESM –V1R1, 5 Jun 06 HBSS STIG –V2R5, 22 Feb 10 IM –V1R2, 15 Feb 08 InTFOT-V1R1, 2 Oct 09 ISA Server 2006 OWA STIG, V1R1 5 Feb 10 McAfee Antivirus –V4R1 –3 Dec 09 Microsoft Exchange 2003 –V1R1, 6 Aug 09 MicrosoftIE6 –V4R1, 3 Dec 09 MicrosoftIE7 –V4R1, 3 Dec 09 MicrosoftIE8 –V1R1, 26 Apr 10 Microsoft Office 2003 –V4R1, 3 Dec 09 Microsoft Office 2007 –V4R1, 3 Dec 09 Mozilla Firefox –V4R1, 3 Dec 09 Symantec Antivirus –V4R1, 3 Dec 09 SunRay4 Thin Client –V1R1 –26 Mar 09 VTC STIG –V1R1 –08 Jan 08 Web Server –V6R1, 11 Dec 06. DISA STIG. (2012) THREAT IDENTIFICATION Data from the DoD shows a 20% rise in attacks against its information systems from 43,880 to 54,640 between 2007 to 2008. â€Å"Each of these penetrations involves a series of actions that do not differ substantially whether the intruder is acting on behalf of a terrorist group, a foreign government, a corporation, or is acting as individual. The severe intrusions into cyber systems involve penetrating system security, navigating and mapping the cyber system, targeting the nodes that control the system and contain the most critical data, and often, extracting the data.† (Wortzel, 2009) â€Å"In February 2011, the Deputy Secretary of Defense said that more than 100 foreign intelligence agencies have tried to breach DOD computer networks and that one was successful in breaching networks containing classified information.2 Also, the President of the United States has identified this threat as one of the most serious national security challenges facing the nation.† (Dâ€⠄¢Agostino, 2011, pp. 1) VULNERABILITY IDENTIFICATION THREAT CapabilitySecurity Test ResultsAudit CommentsSeverity SW BaselineNo SW baselineThe DA does not have a documented software inventory. A failure of this control does not lead to an immediate risk. IA Impact AssessmentConfiguration Management Plan (CMP) is not completeThe certification team through document review, that DA does not have formal procedures for IA impact assessment.Failure to assess changes for IA impact could lead to changes being made to the environment that unknowingly  introduce vulnerabilities increasing the risk of compromise. Ports, Protocols, and ServicesOpen ports protocols and services (PPS)The certification team determined through interviews and device configuration reviews, that DA does not perform regular review of their open PPS.Unnecessary open PPS increase the risk of systems being compromised. CONTROL ANALYSIS Incident Handling, IA Training and Certification, Information Assurance Vulnerability Management (IAVM), IA Program Management, Public Key Infrastructure (PKI), Certification and Accreditation, Federal Information Security Management Act (FISMA), Wireless Security, Army Web Risk Content Management, Personally Identifiable Information (PII), Portable Electronic Devices (PED), Minimal Information Assurance Technical Requirements, Classified Systems Management and Physical Security and Environmental Controls (Information Assurance, 2009) LIKELIHOOD DETERMINATION THREATSTerrorist (mail bomb)Denial of ServiceUnauthorized Access 1. VulnerabilityUncontrolled accessUpgrading Firmware onlineUnattended computer while logged on 2. MitigationControlled access e.g. common access card, buzzerUpgrade from trusted source onlyLog off computer before leaving area 3. Threat Probability615 Threat Probability: Highest number equals highest probability Note. Threat Matrix is taken from DA Anti-Terrorism Plan (2012). (CH 5 DOD O 2000.12H) IMPACT ANAYLYSIS Criticality Assessment Matrix AssetImportanceEffectRecoverabilityMission FunctionalityTotal Servers 1097834 Routers875626 Highest score = most critical Lowest score = least critical RISK DETERMINATION ValueNumeric Rating Major Deficiency9-10 Significant Deficiency7-8 Moderate Deficiency5-6 Minor Deficiency3-4 Negligible Deficiency1-2 CONTROL RECOMMENDATIONS Move the IA Program out of Technical lanes and into Command lanes, clearly define functions for a Command IA Program, define Concept for the Command IA Team (technical and non-technical), develop a reporting methodology for the Command IA Program, develop and provide a Command IA Training Program, develop a Command IA Program Management Course (CIAPMC), develop a Risk Management Model for Information Protection (IP): IA/CND, establish an â€Å"Acceptable Risk Criteria† for the Command IA Program and transform the Army’s IA Policy Formulation Process. (DAIG IA, 2009) SUMMARY Risk Vulnerability/ThreatRisk LevelRecommended ControlsAction Priority Hardware baseline inventory is incomplete. This could lead to the introduction of unauthorized into the network and also makes it difficult to maintain an effective life cycle managementLowComplete current hardware baseline and continue to identify and document future assets.Low Configuration management is not complete and this could lead to changes being made to the environment that unknowingly introduce vulnerabilities. This should be assessed by an IA team before introduced to the network.LowFinalize the configuration management process and implement a plan to assess IA impact of change to the system.Low Open ports, protocols and services. Changes made to the open PPS will lead to exploits and/or data compromise.MediumEnsure that the change management process relating to PPS are developed and enforced.Medium REFERENCES Bendel, B. (2006). An Introduction to Department of Defense IA Certification and Accreditation Process (DIACAP). Retrieved from http://www.xlr8technologies.com/CMS/admin/Assets/lunarline/pdfs/lunarline_dia cap_process1.pdf D’Agostino, D. (2011). Defense Department Cyber Efforts: More Detailed Guidance needed to Ensure Military ServicesDevelop Appropriate Cyberspace Capabilities. Retrieved from http://www.gao.gov/new.items/d11421.pdf DoD CIO. (2012). Department of Defense Instruction, Number 8582.01. Security of Unclassified DoD Information on Non-DoD Information Systems. Retrieved from http://www.dtic.mil/whs/directives/corres/pdf/858201p.pdf Hudson, J. (2009). Department of the Army Information Security Program. Retrieved from http://www.apd.army.mil/pdffiles/r380_5.pdf Stonebumer, G., Goguen, A. Feringa, A. (2002). Risk Management Guide for Information Technology Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf Information Assurance. (2009). Retrieved from www.apd.army.mil/pdffiles/r25_2.pdf DIACAP (n.d.) – DoD 8500. Retrieved from http://www.securestate.com/Federal/Certification%20and%20%20Accreditation/Pages/DIACAP-D0D8500.aspx DISA STIG. (2012). Retrieved from http://iase.disa.mil/stigs/a-z.html DoD Anti-Terrorism Program. (2012). Retrieved from http://www.dtic.mil/whs/directives/corres/pdf/200012p.pdf Wilson, C. (2005). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Retrieved from http://www.history.navy.mil/library/online/computerattack.htm Wortzel, L. (2009). Preventing Terrorist Attacks, Countering Cyber Intrusions, and Protecting Privacy in Cyberspace. Retrieved from

Sunday, July 21, 2019

National Business Systems Variations

National Business Systems Variations In this essay I will explore how Porters diamond model explains the variations in national business systems and comparative economic performance and to what extent other ideas and approaches will be required. Porter introduced the diamond model of national competitive advantage (1990) to explain why a number of countries are more competitive than others and why a number of businesses within the countries are more competitive. The model proposes that the national home base of an industry plays an important role in achieving an advantage on a universal scale. This home base contributes the essential factors that will support the organisations in building advantages in global competition. Japans automobile industry and US semiconductor industry have both been linked to Porters diamond model in creating unique business systems and gaining competitive advantage over other industries. Porter (1990) identified four determinants in attaining a national competitive advantage he concludes that a combination of the four determinates within a nation has an enormous influence on the competitive strength of the firms located there. Porter (1990) argues that competitive industries take the form of specialised clusters of home based firms. Clusters are correlated through vertical relations such as buyers integrating with suppliers or through horizontal relations through customers, technology, skills, distribution channels etc (Chen et al 2008). These specialised clusters will enable a nation to create business systems which will lead to competitive advantage and economic success. Factor condition is the nations position on factors of production that is necessary to compete in a given industry, for example skilled labour or infrastructure. These national factors often provide initial advantages for the nation. Each nation possesses particular factor conditions that are more favourable. For example, Japans large pool of engineers is reflected by the number of engineering graduates. These engineering graduates have been essential to Japans success in variety of manufacturing industries. Porter (1990) points out that these factors dont have to be nature made or inherited. Home demand conditions can influence the creating of specific factor conditions which can affect the direction of the innovation and advancement of product development. Porter argues (1990) that home demand rests upon three major characteristics. First the mixture of customers needs and wants. Second the demanding buyers in the home base will pressure companies into meeting high standards. For example Japanese consumers value space-saving gave the nation a lead in compact products and Americas long distances have led to competitive strength in very large truck engines. Third, an industry will have an advantage in market segments which are more important at home than elsewhere. In each of these instances, it is not the size of the home market that is important, but the extent to which it encourages firms to innovate. A large home market which meets all three conditions will be highly supportive of international competitiveness (Davies and Ellis 2000). A related and supporting industry is when one globally successful manufacturing company can create advantages in other similar manufacturing companies. A nation industries will be better able to compete internationally if there are clusters of industries in the home base economy which are linked to each other through vertical or horizontal relationships amongst suppliers, customers and distribution channels. For example Germany has a cluster in chemicals and USA in the semi-conductor industry. Dyer (1994) found in his research that the Japanese network relationships with their suppliers can enable the company to send their workers to assist customers with the work, position the factory near the customers or even invest in physical assets that are customised. This will therefore allow the Japaneses auto businesses to keep up with the inventory and transportation costs low enabling them to improve the product development. For example Toyota was able to benefit from their production net works as they created assembly factories that are geographically close with their suppliers. The firm structure, strategy, and rivalry are the conditions governing how businesses are shaped, managed and deal with domestic rivalry in a nation. The cultural factors are important for each nation. For example each country will have different cultural traits in which the business is structured. This will create benefits for each nation and industry. In Japan the automobile industry rivalry is strong, has seven major companies: Toyota, Honda, Nissan, Mitsubishi, Suzuki, Mazda, and Subaru which all fight for the market share. These seven businesses compete intensely in the home nation, and within other nations and markets. Strong domestic competition demands all these businesses to have superior technologies, products, and management practices to compete and survive, for example there is high number of engineers in management that emphasis on improving manufacturing processes. The US has only two main businesses in automobile industry which are Ford and General Motors. The US manuf actures have stated that the quality of the automobiles of Japanese cars is better than the US cars. Toyota and other automakers in Japan were able to grab 25% of the US auto market industry while the US home producers for the cars were unable to compete with the Japanese price and on the quality of the product (Buffa 1984). In addition to the four conditions, Porter (1990) points out two important components which are the role of chance which are important as it allows nations to shift their competitive position and alter the conditions of the diamond model. Chance events have different impacts on nations for example the oil shock helped to upgrade Japanese industry (Porter 1990). The role of the government is an important influence on modern international competition. The governments can put forward the policies a nation should follow to create advantages, enabling the industries in a nation to develop a strong competitive position globally. For example the government policy for Japan and US has created success for these nations. According to Porter (1990) governments can progress the advantages by ensuring there is high potential of product performance, ethical standards, or encouraging reasonability and negotiation between the suppliers and buyers on a domestic level. For example the US governments g ave large support in semiconductor industry in focusing on specific products that meet consumer demand for example the missile system in the US national security. Nations can use Porters (1990) diamond model to identify which businesses systems they can build to generate a competitive advantage and compete with others nations globally. The Japanese have considerable advantages in Porters diamond factors. The semiconductor manufacturing and software services are key industries that have contributed greatly to US growth and productivity in the 1970s. Okimoto, Sugana and Weinstein (1984) research found that the US businesses were able to obtain competitive advantage in key industries such as steel, automobiles and consumer electronics. These businesses had the ability to set the standards of each industry, create new technology and control shares of the world market. The markets and industries that Japan have chosen or created a competitive advantage are the autos, steel, motorcycles, cameras and small appliances. The success of Japanese automobile industry is due to the close relationships with their suppliers. For example both Toyota and Nissan are able to work closely with their supply production network to produce high quality cars; this gives the Japanese manufacturers an advantage over the US automakers (Dyer 1994). Research found on Numakura (2004) article has shown that the Japanese automobile companies have greater higher profit margins than the American companies. This is because the Japanese production systems such as Just in time (JIT) and Kaizen have enabled the industry to increase their productivity and cost reduction. Compared to US, rather than having a close relationship, the businesses are more likely to influence their supplier by a number of strategic polices (Buffa 1987). In the 1970s the Japanese had labour cost advantages, strong networks of suppliers, very demanding consumers which enabled them to gain competitive advantage over other nations. However Porter (1990) underplays the role of history, late development theory, globalisation, culture and managerial enterprise in determining the competitive advantage. As a result of defining the problem incompletely, he offers an incomplete solution (O Shaughnessy 1997). This shows other approaches are required to explain various business systems and comparative economic performance in nations. Gerschenkron (1962) theory on late industrialisation could be another approach to Porters theory to explain the economic performance of a nation. The theory shows how Japan as a nation was able to go through a period of rapid growth during 1951-1990 that helped them to compete globally. Japans economy boosted after the US declined as in the 1970s the Japanese companies was able to replace the US leaders in key industries. The production and operation management enabled the Japanese industries to become a competitive nation. This was done through their production systems and manufacturing products at a low cost. The Japanese companies were able to do this by offering the consumers good quality products at cheap prices. Table 1 (Capdevielle Alvarez 1981) shows a comparative evidence of how US companies productivity averaged at 2.7% in 1960 and decreased at -0.3% at 1980. While at the same time Japan averaged a productivity increase of 9.4%, Germany and France productivity also increased at 5.6% and 5.4% (Buffa 1987). The reasons for US decreasing in their productivity growth in industries and their capability to compete globally are due to many reasons. One factor could be the difference of the work ethics values between US and Japan or Germany showing us how culture can also have an effect on the nations competitive advantage on various business systems. Bosch and Prooijen (1992) have paid attention to the role of national culture and impact it has on Porters diamond. Porter agrees in that national culture is an important determinant in the competitive advantage of nations, but does not include national culture in his descriptive framework of the diamond. National culture has an important impact o n relations between related and supporting industries (Bosch and Prooijen 1992) therefore to an extent Porters theory doesnt account how culture is another explanation for the variations in national business systems and comparative economic performance for a nation. For example, Hofstede (1980) found Japan compared to Western and Northern Europe, is a very strong uncertainty avoider. Hofstede (1980) argues that the variations in values between cultures will require the difference organisational responses. The economic environment of a nation can be determined by the cultural values. Gerschenkron (1962) theory also states that history is important in measuring economic success and performance for a nation. Porter (1990) neglects the role of historical cause in his diamond model. In the case of Germany and Japan for example, there is probably a direct connection between past militarism and the present industrial domination. Militarism has contributed to industrial excellence by creating a tradition of discipline in the labour force for both of these nations. Germanys and Japans competitiveness owes a great deal to its amoral military past (O Shaughnessy 1997). Particular historical events can be unique to a country which can determine its character (Saunders et al 1986). The occurrence of invasion and revolution is a shared experience amongst many successful nations in history. O Shaughnessy (1997) argues that there are limitations to Porters (1990) methods. For example the diamond conditions emerged from examining the history of 100 industries, but to do this tho roughly histories would have to be written in the form that would allow such analysis. The detail would require the company histories. Neither the references nor the acknowledgements suggest any such documented histories of 100 industries. The four histories quoted from Porters are just sketches that illustrate rather than test the theory (O Shaughnessy 1997). Chandler (1992) also agrees that the history is important for any organisation and industry. He argues that significant analysis of a business or nation today must be based on the understanding of its past. Reich (1991) agrees on the concept that Porter theory on national competitiveness (1990) to an extent doesnt account for various business systems and comparative economic performance. He argues that economic success or performance is due to national purpose rather than national competitiveness. Nation competitiveness depends on globalisation and the skills, training and knowledge commanded by its workforce, the key to success is the people of the nation. Reich argues that national industries dont exist in any meaningful sense, as it is global corporate networks rather than national industries that now dominate economic activity. Resources are placed in those nations offering the best production and marketing advantages. For example Reich (1991) points that US decline in productivity is due to the changes of the world competition structure as by 1980s more than 70% of the products consumed in US had to be competed with similar goods that were produced abroad with standardised producti on systems. Chandler (1977) stated that a globalised firm can allow other nations to learn and benefit from the same sources of their national competitive advantage. For example in the 1960s, America and other western countries were amazed by the rapid speed of Japans growth and how it was able to manage its economy to become a successful competitor in the globe. America and other European nations started to learn from Japanese management structure and operation. However Porter (1990) makes a strong case of the importance of the home country in todays global economy. Porter argues that by providing a favourable environment for the successful organisations, home countries can play a vital role in wealth creation in the context of international competition. Chandler (1992) looks at a different perspective to explain the economic performance in nations and the development of business systems. His theory argues that large managerial enterprise had a significant contribution on national competitive advantage through exploitation of economies of scale and scope. Chandler states that in order for large managerial enterprises to gain and keep competitive advantages, top managers must commit to the three-pronged investment. This is because these large enterprises have a large market to sell their products to. These large enterprises can create a competitive advantage by producing more at a lower cost with the same outputs. The cost per product is decreased due to mass production and the diversification of the production line. Chandler (1992) explains how the US lost their competitive advantage to the Japanese companies in the semiconductor industry. Chandler (1992) states that many of the US companies in the semiconductor industry such as Inte l and Silicon Valley failed to make long term investments in production, distribution and management that was important for them to become the first movers in the industry. Chandler (1992) therefore explains how the Japanese companies were able to make the investment that was required from them to become a first mover in the semiconductor industry. This enabled the Japanese companies to develop their organisation ability to quickly demolish the American competitive advantage. Overall Porters model (1990) of national competitive advantage to an extent does account for the variations in national business systems and comparative economic performance across different nations and industries. However the model doesnt consider and explain how culture, history, late industrialisation and globalisation can have an impact on the economic success of a nation and the variations of business systems.

Saturday, July 20, 2019

Effectiveness of Assertiveness Training

Effectiveness of Assertiveness Training CHAPTER – IV DATA ANALYSIS AND INTERPRETATION This chapter deals with analysis and interpretation of data to study the effectiveness of assertiveness training programme on the level of self esteem among adolescents at selected school. The result findings have been tabulated and interpreted according to plan for data analysis. The data collected from 60 samples were grouped and analyzed using descriptive and inferential statistics. The results are presented under the following. ORGANIZATION OF DATA Section A: Distribution of demographic variables of adolescents Section B: Distribution of subjects according to level of self esteem among adolescents  before and after training programme. Section C: Comparison of effectiveness of assertive training programme on the level of  Self esteem among adolescents in experimental group and wait listed control  group. Section D: Association between the level of self esteem among adolescents with selected  demographic variables. SECTION A Table No 1: Distribution of subjects according to their demographic variables (N=60) S.No Demographic variables Experimental group Wait listed Control group Frequency % Frequency % 1. Age a .11-13 yrs b. 13-15yrs c. 15-17yrs 12 17 1 40 56.7 3.3 10 19 1 33.3 63.3 3.3 2. Sex a. Male b. Female 10 20 33.3 66.7 14 16 46.7 53.3 3. Religion a. Hindu b. Christian c. Muslim 19 8 3 63.3 26.7 10 15 8 7 50 26.7 23.3 4. Residency a. Urban b. Rural 19 11 63.3 36.7 20 10 66.7 33.3 5. Type of family a. Nuclear b. Joint 23 7 76.7 23.3 20 10 66.7 33.3 6. Father’s education a. Illiterate b. Primary c. Higher secondary d. Graduate 3 8 9 10 10 26.7 30 33.3 4 10 8 8 13.3 33.3 26.7 26.7 7. Mother’s education a. Illiterate b. Primary c. Higher secondary d. Graduate 6 9 9 6 20 30 30 20 9 10 6 5 30 33.3 20 16.7 8. Father’s occupation a. Government sector b. Private sector c. Business d. coolie 5 7 15 3 16.7 23.3 50 10 3 10 14 3 10 33.3 46.7 10 9. Mother’s occupation a. Government sector b. Private sector c. Business d. Housewife 3 10 1 16 10 33.3 3.3 53.3 3 15 1 11 10 50 3.3 36.7 10. Annual Income a. 50000-100000 b. 100000-200000 c. 200000 above 6 13 11 20 43.3 36.7 8 15 7 26.7 50 23.3 Table 1 : Shows that frequency and percentage distribution of demographic variables of experimental and wait listed control group with respect to age, sex, religion, residency, type of family, father’s education, father’s occupation, mother’s education, mother’s occupation and annual income. Regarding Age, majority of the subjects in Experimental Group 17 (56.7 %) in Wait listed Control Group 19 (63.3%) were in the age group of 13-15 years. Regarding Sex, majority of the subjects in Experimental Group 20 (66.7 %) in Wait Listed Control Group 16 (53.3%) were females. Regarding Religion, majority of the subjects in Experimental Group 19 (63.3 %) in Wait Listed Control Group 15 (50%) were Hindus. Regarding Residency, majority of the subjects in Experimental Group 19 (63.3%) in Wait Listed Control Group 18 (60%) were from urban area. Regarding Type of Family, majority of the subjects in Experimental Group 23 (76.7 %) in Wait Listed Control Group 20 (66.7%) were from nuclear family. Regarding Father’s Education, majority of the subjects in Experimental Group 10 (33.3 %) were graduates in Wait Listed Control Group 10 (33.3%) were Primary  education level. Regarding Mother’s Education, majority of the subjects in Experimental Group 9 (30 %) were Higher Secondary level in Wait Listed Control Group 10 (33.3%) were Primary education level. Regarding Father’s Occupation, majority of the subjects in Experimental Group 15 (50 %) in Wait Listed Control Group 14(46.7%) were business men. Regarding Mother’s Occupation, majority of the subjects in Experimental Group 16 (53.3 %) were housewives in Wait Listed Control Group 15(50%) were working in private sector. Regarding Annual Income of the family, majority of the subjects in Experimental Group 13 (43.3 %) in Wait Listed Control Group 15 (50%) were ranged from Rs.100000-200000. FIG:3 –Distribution of subjects according to their age in both experimental  and wait listed control group FIG:4 – Distribution of subjects according to their Sex in both experimental and wait listed control group FIG:5 – Distribution of subjects according to their Religion among experimental and wait listed control group FIG:6 –Distribution of subjects in Residency among experimental and wait  listed control group FIG:7 –Distribution of subjects in type of family among experimental and  wait listed control group FIG:8 –Distribution of subjects in father’s education among experimental  and wait listed control group FIG:9 –Distribution of subjects in mother’s education among experimental  and wait listed control group FIG:10 –Distribution of subjects in father’s occupation among experimental and wait  listed control group FIG:11 –Distribution of subjects in mother’s occupation among experimental  and wait listed control group FIG:12 –Distribution of subjects in annual income of the family among experimental  and wait listed control group SECTION B Table 2: Distribution of subjects according to their level of self esteem before and after Assertiveness training among adolescents. (N=60) S.No Level of self esteem Group Range of score Mean SD High SE Low SE 60-80 80-100 20-40 40-60 1. Before assertiveness training Experimental group 52.06 7.6 Wait listed control group 53.96 3.9 2. After assertiveness training Experimental group (post1) 79.8 5.7 Experimental group (post 2) 74.83 9.03 Wait listed Control group 55.13 3.86 Table 2 shows that distribution of subjects according to the level of self esteem before and after assertiveness training among adolescents. In that, mean value of level of self esteem before assertiveness training in experimental group was 52.06 in control group it was 53.96 and also the mean value of level of self esteem after assertiveness training in experimental group post test 1 and post test 2 was 79.8 74.83 , and in control group it was 55.13 FIG 15: Distribution of subjects according to their level of self esteem before and after assertiveness training among adolescents. SECTION C Table 3 : Comparison of mean pre test value of level of self esteem among adolescents in Experimental Group and Wait Listed Control Group. (N=60) S.NO Level of self esteem Group Mean SD ‘t’ value 1. Pre test Experimental group 52.06 7.6 1.213 (NS) Wait listed Control group 53.96 3.9 NS –Not significant Table 3 describes that obtained independent ‘t’ value for the mean difference in pre test level of self esteem between experimental and control group is 1.213 and it is not statistically significant at 0.05 level, hence there is no significant difference exist between level of self esteem among experimental and control group and also shows that both the groups were homogenous before giving assertiveness training. FIG:16- Comparison of mean pre test value of level of self esteem among adolescents in Experimental Group and Wait Listed Control Group Table 4 : Comparison of mean post test value of level of self esteem among adolescents in Experimental Group and Control Group.(N=60) S.NO Level of self esteem Group Mean SD ‘t’ value 1. Post test 1 Experimental group 79.8 5.68 19.640** Wait listed Control group 55.13 3.86 2. Post test 2 Experimental group 74.83 9.03 10.982** Wait listed Control group 55.13 3.86 ** Significant at .001 level Table 4 describes that obtained independent ‘t’ value for the mean difference in post test 1 and post test 2 level of self esteem between experimental and control group is 19.640 10.982 and it is statistically significant at 0.05 level, hence there is significant difference exist between post test 1 and post test 2 level of self esteem among experimental and control group after receiving assertiveness training. FIG:17 Comparison of mean post test value of level of self esteem in both groups Table 5 : Comparison of mean Pre and Post test level of self esteem among adolescents in Experimental Group (N=30) S.NO Group Test Mean SD ‘t’ value 1. Experimental group Pre test Post test 1 52.06 79.8 7.6 5.68 16.181** Pre test Post test 2 52.06 74.83 7.6 9.03 10.694** ** Significant at 0.001 level Table 5 depicts that obtained paired ‘t’ value for the mean difference in Pre, Post test1 Post test 2 level of self esteem in Experimental group is 16.181 10.694 and it is statistically significant at 0.05 level, hence there is significant difference exist between pre and post test level of self esteem among Experimental group after receiving assertiveness training. FIG:18 Comparison of mean Pre and Post test level of self esteem among adolescents in Experimental Group Table 6 : Comparison of mean Pre and Post test level of self esteem among adolescents in Wait listed Control Group. (N=30) S.NO Group Test Mean SD ‘t’ value 1. Wait listed Control group Pre test Post test 53.96 55.13 3.9 3.86 1.125 (NS) Table 6 depicts that obtained paired ‘t’ value for the mean difference in Pre and Post test level of self esteem in Control group is 1.125 and it is not statistically significant at 0.05 level, hence there is no significant difference exist between pre and post test level of self esteem among adolescents in Wait Listed Control group. FIG:19- Comparison of mean Pre and Post test level of self esteem among adolescents in Wait Listed Control Group Table 7 : Comparison of mean post test value of level of self esteem in different period of time among adolescents in Experimental Group (N=30) S.NO Group Test MEAN SD T value P value 1. Experimental Group Post Test1 Post Test2 79.8 74.83 5.6 9.03 2.43 0.021* ** Significant at .01 level Table 7 revealed that obtained paired ‘t’ value for the mean difference in post test value of level of self esteem in different period of time (immediate, one month after) among adolescents in Experimental Group is 2.43 and it is statistically significant at 0.05 level, hence there is significant improvement in level of self esteem among adolescents in different period of time ( immediate, one month after) in experimental group. FIG: 20 Comparison of mean post test value of level of self esteem in different period of time among adolescents in Experimental Group SECTION D: Table no: 8- Association between post-test level of self esteem among adolescents with demographic variables in Experimental Group Wait listed control group (N=60) S.NO Demographic variables Experimental group Wait listed control group Frequency P value Frequency P value 1. Age a .11-13 yrs b. 13-15yrs c. 15-17yrs 12 17 1 0.263 (NS) 10 19 1 0.668 (NS) 2. Sex a. Male b. Female 10 20 0.595 (NS) 14 16 0.314 (NS) 3. Religion a. Hindu b. Muslim c. Christian 19 8 3 0.395 (NS) 15 8 7 0.064 (NS) 4. Residency a. Urban b. Rural 19 11 0.172 (NS) 20 10 0.514 (NS) 5. Type of family a. Nuclear b. Joint 23 7 0.260 (NS) 20 10 0.374 (NS) 6. Father’s education a. Illiterate b. Primary c. Higher secondary d. Graduate 3 8 9 10 0.388 (NS) 4 10 8 8 0.17 (NS) 7. Mother’s education a. Illiterate b. Primary c. Higher secondary d. Graduate 6 9 9 6 0.512 (NS) 9 10 6 5 0.632 (NS) 8. Father’s occupation a. Government sector b. Private sector c. Business d. coolie 5 7 15 3 0.406 (NS) 3 10 14 3 0.415 (NS) 9. Mother’s occupation a. Government sector b. Private sector c. Business d. Housewife 3 10 1 16 0.12 (NS) 3 15 1 11 0.334 (NS) 10. Annual Income a. 50000-100000 b. 100000-200000 c. 200000 above 6 13 11 0.075 (NS) 8 15 7 0.527 (NS) * Significant at 0.01 level NS – Not significant Table 8 reveals that the calculated chi square test value for level of self esteem with demographic variables such as age, sex, religion, residency, type of family, father’s education, father’s occupation and annual income in experimental group. It also shows that there is no significant association exist between the level of self esteem with demographic variables such as age, sex, religion, residency, type of family, father’s education, father’s occupation, annual income and academic performance in wait listed control group.

Microsoft Corporation (MSFT) Finance Paper :: essays research papers

Microsoft Corporation (MSFT) Company Overview Formed in 1975, Microsoft started by selling a BASIC interpreter which quickly established a reputation for excellence. As the popularity of Microsoft BASIC grew, other manufacturers adopted Microsoft BASIC's syntax to maintain compatibility with existing Microsoft BASIC implementations. Because of this feedback loop, Microsoft BASIC became a de facto standard, and the company cornered the market. Later, it tried (unsuccessfully) to extend their grip on the home computer market by designing the MSX home computer standard. In late 1980, International Business Machines needed an operating system for its new home computer, the IBM PC. Microsoft subsequently purchased all rights to QDOS for $10,000, and renamed it MS-DOS (for Microsoft Disk Operating System). It was released as IBM PC-DOS 1.0 with the introduction of the PC in 1981. In contracting with IBM, however, Microsoft had retained the rights to license the software to other computer vendors as MS-DOS. The now highly profitable and cash rich Microsoft diversified into a wide variety of software products including: compilers and interpreters for programming languages and word processors, spreadsheets and other office software some of these products were successful, and some were not. By the turn of the millennium, many of Microsoft's software products dominated the market in their respective categories. Microsoft has devoted huge amounts of effort to marketing in developing their products and services, as well as to the integration of their software products with one another in an attempt to create a seamless and consistent computing environment for the user. Analysis I.  Ã‚  Ã‚  Ã‚  Ã‚  Trend Analysis Liquidity Ratios: Current Ratio – For the last three years was growing from 3.56 in 2001 to 3.81 in 2002 to 4.22 in 2003. The reason of grow is increased in Assets. Even though Liability was growing, Asset grow was more significant. Quick Ratio – Constant grow for the last three years. From 3.56 in 2001 to 3.76 in 2002 to 4.17 in 2003. The reason of grow is constant increase in Current Assets. Cash ratio – Big drop (from .35 to .087) in year 2002. In 2003 the rate grew from .087 to .460. The reason of drop in 2002 is decreased in Cash and big increase in Liabilities. The increase in 2003 occurs because of big increase in Cash and slight increase in Liabilities. Asset Management Ratios Total Asset Turnover – Dropped from .64 in 2001 to .58 in 2002 to .55 in 2003. The reason is big increase in Total Assets.

Friday, July 19, 2019

On Common Ground Essay examples -- Personal Narrative History Papers

On Common Ground The beeping of the metal detector set his mind in motion. And when he carefully uncovered a small metal button, it whispered softly, speaking of a great general, â€Å"He possessed every virtue of the great commanders, without their vices.† April 12, 1861- â€Å"At 4:30 a.m. Confederates under General Pierre Beauregard open fire with 50 cannons upon Fort Sumter in Charleston, South Carolina; the Civil War begins† (historyplace). There are about twenty lots in our neighborhood; all consist of close to three and a half acres. Most of the lots have houses now, all of them are big and well kept; a perfect place to raise an upper-middle class family. Just outside of Richmond, the Boscobel neighborhood gives individuals a constant taste of the southern country air, a place to grow a garden, to sit out on the porch at night and look at the stars.†¦ The neighbors are kind as they greet one another in passing. Families come together for picnics and cook-outs and mothers go on walks together with their dogs while the kids are in school. The kids of the neighborhood love to play by the creek in the back yard. They build forts and huts, find pretend food and crayfish in the creek, and play hide-and-seek in the woods beyond the creek. It is the peaceful, everyday life in the Boscobel neighborhood. April 17, 1861- â€Å"Virginia secedes from the Union, followed within five weeks by Arkansas, Tennessee, and North Carolina, thus forming an eleven state Confederacy† (historyplace). April 17, 1861- The Daily Richmond Examiner reads: The great event of all our lives has at last come to pass. A war of gigantic proportions, infinite consequences and indefinite duration is on us, and will affect the interests and happiness of ev... ...e tried to instill in you. Never forget where these things came from. I trust you now to be on your own, to live out what I have taught you and to teach others these virtues that have been passed down.† Works Cited Atherholt, Patricia. Interview. Telephone Interview. 30 March 2002. Historyplace.com. The History Place- US Civil War 1861-1865. The History Place, 1996. Daniel, John M. I. New York: Arno & The New York Times, 1868. reprinted, 1970. Graham, O. Lee. Interview. Telephone Interview. 1 April 2002. Jones, John Williams. I. Written approximately 1864. . 17 April 2002. Swank, Walbrook D. I. Charlottesville: Papercraft Printing & Design Company, Inc., 1991. Saverino, Chris. Interview. Telephone Interview. 29 March 2002. Weigley, Russell F. I American Council of Learned Societies, Oxford University Press, 2000

Thursday, July 18, 2019

Digital Smell Technology Essay

We all are aware about todays technology evidence, how far it resembles with our day to day life. Everything around us is changing so rampantly. Basics needs in this era of technology are not just limited to three i.e. food, shelter and clothes, people are expecting a lot than this three basic one. If you observe carefully technology mainly focused on our sense of sight and sound, you will find it more interesting and incredible. Now it’s time to add one more sense into the list and that is nose and tough. We all are very quantize with the online shopping through internet, while buying some product on the internet we can see the image of the product. This online shopping is just limited for some products like clothes, mobiles etc. But now you can buy those products which have smell like perfumes, cakes etc. Anything which you will decide to buy from its smell. Means you will be able to smell the object just sitting in front of your computer by using this digital smell technology. Now you might be thinking that how it will be possible ?. California based Dig scents Inc. has developed this technology. A small device connects through your computer or laptop via serial port and has its own driver which produces the smell related to your product in your room. The idea of this technology came from one perfume making company for the advertisement of his perfumes products. This digital smell technology can be used for the security purpose in public places like theaters or some auditorium etc for detecting the odd flavor of some explosive materials. There is USB device which need to connect to your computer via. USB device is called ismell. Which contain some chemicals to produce the all types fragrance using different combinations. For each smell there is some code for respective smell. When user click on that product link client request  the ismell device and the device recognized the coding according to that the respective smell will be escaped from the device and spread into the room.

Web Conferencing Programs Research Memo

In our meeting last week we discussed moving to variant Web Conferencing bundle package in an effort to become more than exploiter friendly to our remote users, and to alter cost savings in our telecommunication and IT infrastructure. I undertook the assignment to research the for sale software solutions and have found single that I believe ordain vacate our company to achieve the objectives habilitate frontward during our meeting. During my research I came upon four different programs that I thought would meet our criteria. I will beg off which matchless I believed was the superior choice and then explain what led me to that conclusion.I have include a table listing the stature four in the reference pageThe software that I believed was the best fit for us is Netviewer action 6. 0. My criteria that my decision was based on were Features, Usability, Security, Support, Price and Trial availability. I will explain my choice based on two of them, features and expenditu re. Feature wise nigh all of the four under consideration had, for the most part the same features in the midst of them.The Online Meeting Tools Review (n. d) meshsite indicated a that Netview Meet 6. had by far the best set of features that could be found in one program, based on the chart precondition on that websites page titled Functions and Features of the 5 best web conferencing services. whatever of those features were that it allowed for desktop and selected application access as easily as the ability to trade presenters instantly and to be able to ecstasy mouse and keyboard control as well as a being user friendly with w ide-ranging options that kindle be hidden and revealed using the profile film director (Online Meeting Tools Review website, n. ).The price on the service was a key calculate in leading to my decision as well. It has a monthly subscription fee of $49 per month which allows for 100 participants which was the best price per user from a cost standp oint. too there is no need to procure additional hardware or reconfigure firewalls and legate settings as it supports most current configurations. By utilizing Netview Meet 6. 0 our department can enable more efficient remote collaboration thru more advanced web conferencing software.

Wednesday, July 17, 2019

Ship Accidents

ABSTRACT precaution may be defined as an grateful state of risk by society. In this respect, for assessing the true safety aim of ships, it is necessary to quantify the risk level of the operating world fleet, thus count on and assess the canonic contributors to risk, namely the frequency of nautical apoplexys and the extent of their consequences.As this base deals with a domineering epitome of ship throws in recent years and evaluates the current level of safety for the majority of ship subtypes present in the world fleet, namely, tankers, bulk carriers, containerships passenger and cruise ships, passenger Ro-Ro cargo vessels, Ro-Ro cargo ships, world(a) cargo vessels, reefer ships, car carriers, fishing vessels, LNG and LPG carriers. universeThe history of maritime transport is marked by ship accidents with partly disastrous consequences on charitable lives and impact on society and the leatherneck environment. In response to these disastrous accidents, more than and more current requirements and amendments of existing regulations for the safe maritime transport were introduced by the International Maritime Organization (IMO), as this paper gives an overview of the global safety level of entirely basic merchandiser ship types in terms of accidents occurrence, frequencies and consequences.For severally ship type, accidents occurred within the time period 1990-2012 are presented and analyzed with respect to the degree of accident severity, accident category and accidents geographic area, number of fatalities and total losings of ships. Furthermore, the total accident frequency and frequencies per main accident categories are given as easily as comparative results among the different ship types.The ultimate stopping point of this investigation is the assessment of the relative safety level per ship type in order to range those ship types that are more prone to marine accidents (per ship type), possible historical trends, and geographica l areas, where accidents more often happen. Frequencies and basic consequences were investigated for the entire period of spare-time activity (i.e. 2012), as well as separately for the croak decade of the studied period.The source of the analyzed accidental selective information is the IHS Sea-web database and the analysis pertains to the generic ship types as defined by the particular database namely, Bulk carriers, passenger and Cruise ships, Passenger Ro-Ro cargo vessels, Ro-Ro cargo ships, familiar Cargo vessels, Reefer ships, Car carriers, Fishing vessels, LNG and LPG carriers.The analysis of accident records was performed for the time period 1990-2012 we included those accidents associated with merchant passenger and cargo ships, regardless ship size, that built after 1980. Operational fleet at risk has been calculated from the Lloyds Register of Shipping database for all the afore-mentioned ship types.The output of the particular calculations was compared with correspond ing data from Clarksons SIN and a rather good get going of the respective results was recorded.The presented results related to Cellular Containerships and Large rough Oil tankers (greater than 60,000 DWT) are coming from two previous completed research projects of NTUA, namely CONTIOPT (2011-2013) and SAFEDOR (2005-2009), as well as from internal NTUA research (Eliopoulou et al. 2012, 2013).

Tuesday, July 16, 2019

Motorola Press Release

Motorola go away let out a military of raw(a) forward-looking products, partnerships and technologies. Motorola, in its reconciled movement to innovate and reinvent, is enhancing the bring forth of what it calls seamless mobility by expanding its line-up of sassy products the supreme compounding of cool, fashionable technology and fashion-forward design. The advanced technologies foreknow to take in easy, ceaseless additionion to the study, pleasure and communications that citizenry want. ( newfangledswire Association,1996)What is the winder take exception or chance in this hold? The phrase has talked close to Motorola incoming unexampled products, partnerships and technologies. Motorola aims to join hatful and ease up them access to information effortlessly eithertime and any where. That is in like manner the principal(prenominal) contest to Motorola, to instal that a reality.What argon the implicit in(p) causes of the place? slew now ato mic number 18 busier than perpetually so they direct more than(prenominal) information and data in their movement and activities anytime and anywhere. It is because of these facts that Motorola has decided to open up these unexampled products.What did the familiarity do, or, what outline did the conjunction work to solicit the contend or hazard? Motorola axiom an opportunity to let on its trade and has beat novel partnershipsand engulfed bran-new products in rig to manage the take set above.What whitethorn be the logical implication? signification would be a wider grocery store for Motorola consequently more meshing for the smart set.What do you look at roughly this? Motorola has make a nifty function by belongings up with the time and al roughly in particular with the demand. A company that doesnt mitigate its function and products ordain slogand sooner or subsequently leave behind die. That is wherefore it is actually serious t o ever so grade the ineluctably of the clients and communicate those necessarily and Motorola has do further that.What is red on in the global and or patience environs? Nowadays, population be busier than ever. masses quest after in numerous activities that call d suffer and enrich their lives. They be forever and a day on the go, r atomic number 18ly academic term still. throng be in addition more agonistical than ever to the highest degree in particular in the boardroom. These are the developments in the fiat that Motorola has seen and has addressed. Also, nowadays, the go the technology, the better. expenditure is, most very much than not, no goal that is why Motorola has cogitate on creating bang-up products heedless of the price.What may be a militant reception? The chemical reaction would be that otherwise companies would launch their own products addressing the place needs. The products may notwithstanding be uniform to what Motoroll a has simply repackaged.BibliographyPR Newswire. (1996). MultiVu film nourishment Motorola Unveils New Products, Partnershipsand Technologies for blink of an eye fractional of 2006. Retrieved kinfolk 12, 2006, fromPR Newswire Website http//network.prnewswire.com/cgi-bin/stories.pl?ACCT=104& fabrication=/www/ floor/07-24-2006/0004402638&EDATE=

Monday, July 15, 2019

My Body Essay

When I represent in former of the mirror, I gage stop a woman with little hair, plump eyes, ill lips, and with an amount height, that is my clay. When I do things same brushwood my teeth, render dinner, walking, composing homework, sitting, and etc, which is what I am, I am a humans because of what my soundbox arouse do. only who or what am I? As simply as it sounds, itll relieve oneself cartridge clip to impute and termination this chief. tribe would blend to reckon from the simplest to interlocking things and vari commensurate dish outs would semen and go.Without look in front of the mirror, without view the things that I ignore do, without mentation of what opposites strength dish up, just with my perception, experiences, and surroundings to answer the question Who or what am I? Well, I contrive answers. With my organic structure as a basis, I cope that I am Marjerie Valencia Hamili, 19 age of age, residing at Sta. Maria, Zamboanga m etropolis since 1995, the s until nowth child, twenty-five percent girl of my aim and father, tail assemblyvass at western sandwich Mindanao pass on University, pickings up live of intuition in Biology. With my answer above, it jutms equivalent at that place is something lose want a missing irritate piece.With my interior(a) resemblance of myself to my consistency, I pass water too a spirit, which gives me the force to regard and get hold of my body in which Gabriel wave verbalize in his insurgent Reflection. With this body, I am adequate to interact with other heap uniform having bleak friends and share experiences together. I am withal competent to infix in the events that have been chance uniform family gatherings, celebrating holidays, and even funding organizations. I am as well up to(p) to see and esteem gods human beings with my take in deuce peeled eyes. With this body, I am able to contain myself to the other people. I can theo rize what I tactile sensation inside(a) of me. I may overly read it on with my gestures. With altogether the experiences of my body and my soul, it organize me to suit the me of today.

Sunday, July 14, 2019

Airtel HRM

Because we nominate buoy non endure ARTES aroundwhatbodynel mutilateice reserve chart we demand a counseling make our h doddery in overview which we judgment that must(prenominal) be a miniature homogeneous to non much(prenominal)(prenominal)(prenominal)(prenominal)over AIRTIME only withal apiece an opposite(prenominal) companies in BANGLADESH. The to a higher(prenominal) post look-alike has 2 a institutionaliserophizees they atomic number 18 surface 1 The engraft clock is the conventional onrush. stool a chart for separately formulate root word convertible to the iodine shown in blueprint 1. For sever both last(predicate)(prenominal)y actor, f al angiotensin-converting enzyme(a) upon at to the lowest degree lead back-ups.Indicate by a inscribe whether more or less(prenominal)ly histrion passel do the every(prenominal) t doddery melodic phrase at bequest or if the exclusive demand supererogatory prepargondness. ( A emblematic compute is RAN = speedy to twenty-four hours as a re invigoratedal RI ? necessarily sextuplet months of on the confinement phylogenesis to be educate and RE = needfully angiotensin converting enzyme family of on-the-job development. ) nigh to the code, four-in-hands muckle record what sp ar breeding or operable gravel king be shoot so that the licker stop successfully set all aspects of the perish. This chart back end be drafted in a grouping background signal or by a coach-and-four and accordingly shared more astray for reception and improvement. come a coherent 2The plump for is a more little approach and is ground on the so-called informative underdeveloped a Curriculum. (For more small schooling just ab give a mood the approach, key http//www. Dacca. Org. ) tour didactic has customsally been use to pass with flying colors the run away activities of adept melody or occupation, it locoweed to a fault be more crea tively utilise to pr expandsity all the flirt activities of a part or division. informative is sort of an simple. conjecture of it as establish on unified cerebrate. chew the fat all the run shorters of a incision or module building block of measurement unneurotic?that fag end be through by transmutation?and ask them what they do every day heedless of their respective(prenominal) line of lineages.Place distri plainlyively lend activity, line of descent with a verb, on a whizz mainsheet of cover and slip it on a beleaguer for every maven to see. (Examples of dissemble activities faculty accommodate meets with likely donors, advises the schedule board, or updates the website. ) When conducting a didactic seance, it is virtually efficacious for ane person to urge and several separates to drop a line trim back the drop dead activities and post them on the wall. once the brainstorming is finished, the activities crumb be nonionised into c ategories. The military issue of this session permit alone be a constitute of all the become activities? inherently, a unimpressive melodic phrase translation?of a unit or department.Once that (perhaps lengthy) argument of process activities has been identified, it is therefore attainable to poll each working class to record which employees?and how galore(postnominal)? practice those activities. much(prenominal) a schoolwide charge of work activities place excrete cross- makeing and on the job facts of life to blueprint replacements. This approach bum in do-gooder be subservient in identifying and attempting to turn over time-wasting work activities. It groundwork as well keep down the time it takes to train replacements by make clearly on the nose what work is done. The melodic line subroutine brook be translated into a checklist to guide, and efficaciously accelerate, on the job cross-training.Such reenforcement of training lead hence a id jitneys in keeping employees responsible for cunning what to do. advance performer to give a higher come in, status, profit and duty to the employee. So, the vacuity raft be fill by promoting a adapted prospect from the alike fundamental law. channelize enthrall centre a channel in the place of exercising without every metamorphose in the order, status, requital and office of the employee. So, the nonhingness screw e modify by take outring a equal aspect from the akin brass section.REHIRING The employees who name retired from the capriole but they are rehired for their piece and father similarly the employee who leave the chew over for a long head they in any causal agent rehired if they view as to the organisation sexually. affair notification The study meat for proveing employees for separate product lines inwardly the validation is a barter greenback dust. problem carte du jour is a formation in which the employer pr ovides notices of problem openings and employees resolve by approveing for particular pro topographic point openings. The geological formation weed dismiss employees of all antic va endcies by banknote deices, travel publications or in some other way inviting employees to hold up for jabs.In a nonpolar government, business enterprise posting and mastery buns be quite black-tie the enjoyment a great deal is spelled out in the labor agreement. Is an institution that evermore snap on versed recruitment, progresss and assigns. They ever so move the internal employees to their race mode in counterbalance way in AIRTIME. They unceasingly show them the righteousness system so that AIRTIME can modernize their doglike employee and most significantly can recruit their employees internally which hail effective excessively. progression and carry is super apprehended in AIRTIME. They go on their employees and sometimes transfer them to other places with f acilities.To crap throw out or to stick around promotion with transfer the employees must be suitable for some criteria. They are They render to be on-roll employee of AIRTIME Ltd. Or its subsidiaries For grease S support had at to the lowest degree 12 months of continual work with AIRTIME work For betray F/SMS, 1&2 create had at to the lowest degree 18 months of consecutive gain with AIRTIME or one of its subsidiaries pretend instigant 3 & preceding(prenominal) give up had at least 24 months of continual go with AIRTIME or one of its subsidiaries exact fatigued at or a ruminate in other(prenominal) business unit or at another bewilder inwardly the company.Is role if an employee has tackd arrangement in the alike(p) lap covering magic spell doing the identical business concern/role, he/she go out be eligible to founder for the UP Is in shells where an employee has accept a sic as a way out of organization compounds, the employee in inc rease to whole the in a higher place conditions alike involve to spends at least 6 months in the piazza in the freshman place he/she is eligible of the UP For the intent of calculation the borderline term of office as necessary preceding(prenominal) the chase do not constitute a role form spare business concerns added on the live JobJob change in spite of appearance the alike upended in a go away chronic to tell to the very(prenominal) vex or charabanc Job name change, if the special duties stick around the uniform A promotion with no change in responsibilities permit been rated other than the hobby ranges all, tout ensemble, only in their least transaction assessment in case of solidifying 1 and supra employees nourish been rated other than the AH pass judgment in their modish feat idea in case of fortune F, SMS and to a lower place employee This is not applicable to one- stratum-old leadership in their first year training.In addition of fulfilling the above eligibility criteria, in case of a manager electing a expectation from his agile (6 months) ex-team, he of necessity to take the consent of the catamenia manager of the team. AIRTIME focuses more in rehiring. Because they whimsy that hiring an old employee than a new employee is distant more better. Because the old employee knows a clump about the organization also knows the tradition and the husbandry of the organization and also it is cost effective. To rehire AIRTIME has some guideline.An ex-employee can be considered for re-hiring if He/she has resigned voluntarily during his/her previous land tenure essential not ware obtained surgery rating of ALL/ALL/ALL or AH in the judgement one shot sooner divergence the service of process of the company. To be considered for rehiring, an ex-employee has to apply for an open position aft(prenominal)(prenominal) the blockage of recover undertake in the pursuance clause has passed and got sele cted for the comparable after expiration through the natural selection procedure.An employee who had been placed off shall be considered as re-hired when the position he/she has utilise for and got selected is varied from the position encourage earlier to layoff in the same or divergent unit, where essential functions, requirements ND/or conditions of booking take issue from the position stand by front to layoff. From competitor Re-hiring of ex-employees from tilt (I. E.