Monday, September 30, 2019

How do Owen and Auden convey the negative effects of war in their poems ‘Disabled’ and ‘Refugee Blues’’?

In the poems Disabled and Refugee Blues, the writers, Owen and Auden respectively, convey the negative effects of war in a variety of ways. Through the use structuring, literary and figurative devices, Auden subtly shows the negative effects of war, whereas Owen does this it more explicitly, showing the de-humanizing, gruesome effects of war. In the poem Disabled, Owen displays the more gruesome, horrendous reality; he does this in a variety of ways.Firstly he uses a randomized stanza structure, the stanzas do not have a consistent amount of lines. The stanza structure is emphasizing how the soldier’s think, because most soldiers act upon their animalistic instinct, Owen has used this idea rely on instinct to create his structure, not only does this confuse the reader but Owen also tries to emphasize on how the war has affected the soldiers.Owen also uses a lot of different literary devices to help him, metaphor is used throughout the poem to help develop the poem, â€Å"Voic es of boys rang saddening like a hymn†, the voices of boys made the soldier feel sad; they make him remember his childhood, it was not long ago that he was like those boys, running freely, however it seems like a distant memory.Owen is emphasizing that the war robbed the soldier of his innocence and naivety, he is also a little jealous of them, they still believe in fairy tales and happy endings, whereas the soldier understands the true colors of reality. â€Å"In the old times, before he threw away his knees/All of them touch him like some queer disease† these two quotes, emphasize on the fact that the soldier threw away his legs when he enlisted in the army, if he didn’t sign up he wouldn’t be disabled and the girls would still be flirting with him.The girls do not want to be with someone who is crippled; heroes do not get injured. It seems like he has given up on life as much as life has given up on him, he has succumbed into the idea that he is not a r eal man anymore; others can sense this about him and stay away because they do not want to be dragged down by his self-pity. Granted, the women could be touching him in disgust, it is also likely that it is him who is projecting his own feelings of disgust on them.The war can affect both the social life and the personal life negatively, thus creating a very negative atmosphere in the stanza. Owen also makes effective use of alliterations, â€Å"Legless, sewn short at elbow†, not only does this quote tell us the exact extent of the soldiers disability, but during World War I it was common practice to sew shut pant legs and sleeves when someone is missing the limb or appendix, the quote makes us pity the soldier, moreover it is also common that soldiers lose a limbs during war, creating a very brutal and negative view upon war.Another alliteration that has been used, â€Å"And a leap of purple spurted from his thigh†, a leap of purple could relate to blood or bruises, th is quote indicates the severity of his injuries, although it was a large injury, the poem portrays it only as a ‘leap of purple’, this makes the injury seem small and insignificant, and which was likely how the government and the higher-ups viewed the disabled soldiers. Although W.H Auden wrote Refugee Blues half a year before World War II broke out, the Nazi’s (Nationalists) have already been hunting Jews and ‘exterminating’ them, Refugee Blues is a Jewish perspective on the war. W. H. Auden has structured his poem into tersets, and each stanza proposes a different theme and part of the Jewish refugees life, it also isolates the stanza, emphasizing each negative point Auden has made.Auden uses very effective metaphors to convey the different negative effects of Hitler’s rein, â€Å"Saw a poodle in a jacket fastened with a pin, /Saw a door open and a cat let in:/ But they weren’t German Jews, my dear, they weren’t German Jews. à ¢â‚¬  In this quote, W. H. Auden was comparing the Jewish with a poodle and a mere street cat, not only does it emphasize how un-wanted the Jews were, Auden himself degraded the Jewish into something that was utterly despised and negatively viewed.

Sunday, September 29, 2019

Robert Nozick’s Experience Machine

Good experiences are something that we spend our life constantly striving to obtain. Once we gain these good experiences, we look for the next opportunity in order to gain that same great feeling that we had in our last experience. What if someone told you that there was a way to have these good experiences all the time? You could quite literally plug yourself into a machine that would give you the great experiences that you have been searching for your whole life. The best part is that, once you have decided to plug yourself into this machine, you would feel and think that these false experiences you are having are real. Robert Nozick proposes this very scenario in his book Anarchy State, and Utopia. This scenario is known as â€Å"the experience machine†. (Nozick 1974, 165) Sounds great, doesn’t it? I would beg to differ. Is pleasure really the only thing that we spend our life searching for? I would argue that there are far many other important values other than pure pleasure; that is why I would not plug into the experience machine. While Nozick’s scenario may seem very tempting, there are several key elements to consider before making a decision to enter this experience machine. Does entering this experience machine correspond with one’s set of values? I would say that there are far more important things than just pleasure. It is fair to say that actually doing certain things, and not just simply having the experience of them is a good core value. We want to actually in our real world accomplish our own goals. Attaining these goals are what many people live their lives for. Aristotle claims, â€Å"Man is a goal seeking animal. His life only has meaning if he is reaching out and striving for his goals. (Aristotle, 163) Perhaps this is what we desire; to live our lives striving to achieve our goals. Whether all of our experiences are 100% pleasurable does not matter. As long as we know that we are actually living our own lives. Clearly, there is opposition to my argument. The opposing party may say something like, â€Å"What’s the value in the capacity to freely make decisions or the ability to be in the real world if neither of these things al lows us to feel good? † (Perry, 166) That is a fair question and one that Peter Unger cleverly answers. Unger mentions the tendency for us to buy life insurance as a claim that good experiences are not the only thing that matter to us. We do not get good experiences for paying our life insurance. In fact, we will never experience anything that happens to this money. We do this so that our dependents will benefit from this money. With all this said, we are still very rational in buying this life insurance. (Unger 1990, 166) Therefore, we should value our capacity to make free decisions in the real world over just having good experiences. The life insurance example, that Unger mentions, is a perfect example as to why there are things that matter to us besides pleasure. Nozick sums this up by saying, â€Å"Perhaps what we desire is to live as ourselves, in contact with reality. † (Nozick? 2010, 1) One can interpret Nozick’s statement by his insinuation that gaining pure pleasurable experiences are not as valuable as knowing that we are living in contact with reality. We should cherish and desire our lives in our realistic world; false pleasure experiences have no real value. In our lives, we want to BE certain people—to plug in to an experience machine is to commit a form of suicide. (Nozick? 2010, 1) Plugging into an experience in order for you to merely experience false happenings would be lying to yourself that this gaining false pleasure is actually being experienced. In the real world, we can actually mold ourselves into the person that we want to become through our real experiences. There is a certain value in actually accomplishing a goal that has been set for yourself. We have free will, unlike in the experience machine. This free will allows us live in contact with reality and gain real life experiences by our choosing. This in turn, allows us to become the person that we want to be. Robert Nozick’s experience machine can be extremely tempting when taken at face value. It offers us false pleasure experiences that could possibly entice and excite many to consider plugging into this machine. However, we must not forget that having false good experiences is not worth throwing away a reality rich world—a world in which we have the free will to decide who we will become as a real person. One must never forget this value. This s a complicated matter but Nozick puts it well by saying, â€Å"We learn that something matters to us in addition to experience by imagining an experience machine and then realizing that we would not use it. † (Nozick 1974, 165) When pondering this concept longer, we realize that we actually want to do certain things and not just have the false experience of hav ing done them. (Nozick ? 2010, 1) We come to realize that this experience machine, while being tempting, does not correspond with our values and desires. Losing our free will and all contact with reality is not more tempting than being the authors of our own lives. Reference List (Works Cited) 1. )Nozick, Robert. 1974. Anarchy, State, and Utopia. (cited in Introduction to Philosophy Fifth Edition. John Perry, Michael Bratman, John Martin Fischer. Oxford University Press. 2010. ) 2. )Aristotle. (Quoted in Genius! : nurturing the spirit of the wild, odd, and oppositional child . George T. Lynn, Joanne Barrie Lynn. 2006) http://books. google. com/books? id=LkNsXpMusnwC&pg=PA163&dq=Man+is+a+goal+seeking+animal. +His+life+only+has+meaning+if+he+is+reaching+out+and+striving+for+his+goals. &as_brr=0&cd=1#v=onepage&q=Man%20is%20a%20goal%20seeking%20animal. 20His%20life%20only%20has%20meaning%20if%20he%20is%20reaching%20out%20and%20striving%20for%20his%20goals. &f=false 3. )Perry, John; Bratman, Michael; Fischer, John Martin. Introduction to Philosophy Fifth Edition. Oxford University Press. 2010. 4. )Unger, Peter. 1990. Identity, Consciousness, and Value. (Cited in Introduction to Philosophy Fifth Edition. John Perry, Michael Bratman, John Martin Fisch er. Oxford University Press. 2010. ) 5. )Nozick? , Robert. (quoted in Lewis and Clark: Robert Nozick. The Experience Machine 2010. ) http://legacy. lclark. edu/~jay/Robert%20Nozick. pdf.

Saturday, September 28, 2019

Lockheed management Essay

We examined the decision to invest in the Tri-Star project by forecasting the cash flow associated with the project for a volume of 210 planes. We also asked what a valid estimate of the NPV of the Tri-Star project at a volume of 210 planes as of 1967 would be. We found this to be -$584 M. This was clearly an unacceptable NPV for capital budgeting on the project. A break-even analysis revealed that the project reached economic break-even with the production of 275 planes at $12.5 M per unit but did not reach value break-even at that level of production. Despite industry analysts predicting 300 units as Lockheed’s break-even sales point, at this level, net present value remained insufficient to cover costs at negative $274 million. If the company had performed a true value break-even analysis, management would have realized that roughly 400 Tri Star aircraft (about 67 per year for six years) costing somewhere between $11.75 million and $12 million per unit would have to be sold in order to break even. The investment decision made by Lockheed to pursue the Tri Star program was not a reasonable one. A true value analysis shows that at the production level of 210 units, the project would result in an economic loss of $584.05 million and a profit loss of $480 million. In addition to miscalculating the break-even level of production, Lockheed management overestimated the growth rate of air travel industry.

Friday, September 27, 2019

The Origin Of Christianity Research Paper Example | Topics and Well Written Essays - 1250 words

The Origin Of Christianity - Research Paper Example Davidmann bases the origin of Christianity on what Jesus really taught, whose standpoints are the social laws as they appear in the Torah. Early Christians followed those laws for they protected people from exploitation, subjugation, and enslavement. He observes that this is what Jesus taught. However, he points out that Paul changed what Jesus originally taught and this is what finally Christianity’s official doctrine became. The knowledge was transmuted through scrolls from the biblical archaeology and what was written there constitute the events of the very first time. Davidmann further points that the Pauline ideologies were first resisted and for Christianity to thrive, the later gospel writers had to alter the records in favor of Paul. Using what he calls â€Å"the law of the excluded middle,† Jackson asserts that either Christianity is of divine origin or it is of human origin and not both. Because Christianity claims to be of a sacred design, he focuses on a number of factors that argue for the sacred origin of the religious system initiated by Jesus Christ. Christianity had a remarkable point of beginning. There are no traces of its foundations in Assyria, Babylon, Egypt, Greece or even Rome. Towards the spring of A.D. 30, Christianity was nowhere. Christianity was a momentous religious force – not only in the Mediterranean world but also in inaccessible corners of the Roman Empire. Apparently, there is no exact place from where it came, yet gradually, it was everywhere. Nobody knows how that happened. It aroused the resentment of many Jews for the first forty years of its survival until the Jewish economy fell to the hands of the tyrannical Romans in A.D. 70 (Jackson, 1997).

Thursday, September 26, 2019

Woodrow Wilson's Fourteen Points Essay Example | Topics and Well Written Essays - 500 words

Woodrow Wilson's Fourteen Points - Essay Example He is particularly renowned for his fourteen points that developed a basis to the end of the war and the post World War I era. This paper explores the success Woodrow’s fourteen points and the points’ achievements. Overview of Woodrow’s fourteen points Woodrow’s fourteen points was a proclamation towards the end of the First World War. Having come just a few months away from the ultimate end of the war and their provisions that aimed at attaining a peaceful world indicate significance of the points in the consequently achieved peace. The fourteen points’ principles can be explored in three categories. The first category, consisting of initial five points, was general and concerned â€Å"international liberalism and free trade† (Rossini and Shugaar, p. 63). The points included a public approach to agreements towards international peace as opposed to private treaties, provision for freedom of navigation across international waters, elimination of trade barriers and equality in international trade, and appeal for disarmament. He also called for fair distribution of colonies (Yale, p. 1). Points that called for resolution of disputes over some territories followed these.

Globalization at general electrics Essay Example | Topics and Well Written Essays - 2250 words

Globalization at general electrics - Essay Example First, GE chose to invest aggressively in foreign expansion for the obvious reason of desire to grow the company. Foreign investment results in more branches of the company, and this is directly linked to increased revenues for the company due to the additional branches, which will generate additional profits for the company (Rugman & Collinson 2008). Therefore, GE bought other companies in various countries, which were in a financial jeopardy, and were on the verge of collapsing. GE bought the financially unstable companies at a faster rate, mainly because, this was the only opportunity it had to acquire those companies and expand, since these would be seized by other companies, if GE would not act fast. This is a strategy, which GE used to ensure that its expansion was rapid. Aggressive expansion of GE might have been aimed at ensuring that the company moves closer to most of its customers, since this would be easier and cheaper for the company to address the various concerns and n eeds of its customers, while increasing its total sales revenue. In addition, international expansion by GE was intended for the company to increase its customer base, since this would acquire more and new customers in the new geographical locations that it established itself. In addition, GE chose to expand because of the company’s wish to deal with their foreign markets on a higher level. By adopting globalization, GE wanted to prove that the relationship between the company and its foreign markets was strong enough to allow the country to directly invest in the foreign countries, while being assured of profits. Rugman & Collinson (2008) argued that it not enough for a company to be shipping its products to foreign countries. Instead, a company should consider getting closer to its customers in the foreign markets, and establish a close relationship with them, to boost revenue and address consumer needs appropriately. Finally, GE might have chose to expand internationally i n order to save on the costs it incurred in the form of wages for its employees. Employees in other countries outside the United States are paid lower salaries and wages, mainly because of the economic status of their country, which is usually lower, compared to the United States. Therefore, most American multinationals choose to expand outside the United States in order to explore these lower wages (Rugman & Collinson 2008). Question 2 According to Birkinshaw, Braunerhjelm, Holm & Terjesen (2006), the corporate headquarters of a company plays a valuable role in influencing the relationships between the company and the financial markets, as well as its stakeholders. Stakeholders of a company include customers, as well as the competitors of the company, which are the most important stakeholders of a company. Therefore, by moving its headquarters to foreign markets, GE wanted to influence the relationship with its customers in the foreign countries. This would result in a stronger rel ationship than the one that existed previously. Most companies claim that the decision to move their headquarters to foreign countries is influenced by their desire to be in close proximity with their international customers (Rugman & Collinson 2008). In the case of GE, like most companies, this company has moved most of its headquarters of its other businesses from the U.S.A. to other foreign countries.

Wednesday, September 25, 2019

Chapter 8-9 Essay Example | Topics and Well Written Essays - 500 words

Chapter 8-9 - Essay Example Mass media has been extensively impacted on. The modern information technology has seen new media behaviors and operations. Businesses have shifted to technologically-supported advertisement. Advertisers have used technology to conduct their researches and identify how they can deliver adverts that are effective. The development of technology has also provided the advertisers with diverse options to choose from as media stations have increased. As a matter of fact, advertisement has gone through milestones that have revolutionized it completely. It management has significantly changed. The rise of mergers, as well as mega-agencies has been noted over the years. The goal of advertisement also changed from what was perceived to be entertainment to focus on results. Today, businesses seeking for advertising services are more concerned about the increase in sales their promotion will bring. Advertising agencies have also responded to the changes in the economic activities by merging their companies to increase performance. With the growing globalization, several issues have also been noted by the players in advertising industry; questions that have raised serious concerns. The mistranslation of advertisements messages in different language is a critical issue. Consequently, the growing technology has escalated advertising as a corporate industry. Improvements in computer and television graphics are a major reason why advertisement has become commercial as it is. Historically, advertisement has been influenced by the subcultures as well as the wave of social groups; rights campaign. The increasing pressure to represent different cultures and social groups in the media and advertising industry gave it a new face. The media got specialized bowing to the pressure from the feminist movement and anti-racism campaigns. With the increasing of enlightenment on issues relating to media, advertisement

Tuesday, September 24, 2019

Business Ethic related to Kraft Essay Example | Topics and Well Written Essays - 750 words

Business Ethic related to Kraft - Essay Example Making enticing advertisements for children about unhealthy eating is unethical. This, in essence, is taking advantage of the minors to achieve business objectives. Several moral principles are relevant to the case study analyzed in this paper. According to Weiss (24), moral principles can play a great role in enabling a business to make informed choices that balance economic interests and social responsibility. A major moral principle that is related to the case study is the principle of common good and community. This moral principle indicates that individuals grow and achieve fulfillment in a community setup. As a result, their social life is greatly influenced by their relationship with other individuals in the community. Giving of wrong or inadequate information to people in the society violates this moral principle. This is because it is an exploitation of the other people in the society for one’s own benefits. The company in this case study violates this moral principle by giving wrong or inadequate information in its advertisements. Children below a certain age are not allowed to make major decisions about their lives. Parents or guardians are the ones who are supposed to make decisions on their behalf. The other moral principle relevant for this case study is treatment of every individual in the society with honor and dignity he/she deserves. Advertising to little children below the age of twelve is failing to treat them with dignity and honor. This is because children are not able to make good decisions related to their health. Therefore, advertising foods to them is like taking advantage of their state and position. This is contrary to the requirements of the Catholic Social Teaching (CST). Moreover, it is contrary to the expectations of the society. Therefore, this is a moral principle that is frequently violated by organizations like

Monday, September 23, 2019

Beauty Taste and the Sublime Essay Example | Topics and Well Written Essays - 2000 words

Beauty Taste and the Sublime - Essay Example Beauty has evolved into a freedom for expression. Contemporary art, especially questions the paradigms (fixed standards and canonical/classical examples) for judging aesthetic values (art that has a "moral" and ethical message and that is pleasing to the senses), with artists like Chapman Brothers or Justin Novak producing artwork that are clearly meant to provoke reactions and challenge notions of beauty, that had it's roots in Kant's "Critique of Judgment" (1790). It contemplated on the "pure" aesthetic experience of art consisting of a "disinterested" observer, pleasing for its own sake and beyond any utility or morality. Now, the very word 'pleasing' may have different boundaries and contemporary art is trying to escalate their claims. If Marcel Duchamp made a fountain out of a urinal in 1917, that hurtled the Dadaist movement and that later amplified into a surrealist tendency (where artistic expressions concentrated on revealing the amoral (un) consciousness of man/woman) there by looking into primitive art for such unconventional (or grotesque) subconscious inspiration, to help reveal the complex mental process, then the essential motivation behind the whole thing was subversion or countering basic notions of the human mind, and experiences. It became imperative for artists to reveal truth in a very graphic and straightforward fashion, and that was to become the fractured beauty of later avant-garde arts. If primitivism was motivating a new dimension by which beauty of the mind was revealed, then Picasso completely subjectified art and personal experience into a fourth dimension and created a cubist movement to claim a break down of a canon that no longer held on to techniques, symbols and least of all - universal criteria for judging the value or end of art. There are many socio-ideological forces behind the same and the destructive World Wars had many reasons to question the notions behind the traditional idea of Beauty, and it addressed the subjective, transcendental and alienated psyche of modern man and art became a pursuit of revealing the mysteries of the mind that was not always beautiful. Metaphysical hopelessness (with questions about the existence of God, and the pain of the war) gave way from beauty to absurdity, while the meaninglessness of man/woman's 'Being', made beauty dissolve into grotesqueness, either by derision or by the light of their tragic truth. Beauty vanish ed from the expressions of art, at least the classical expressions of it, but was re-born with a new makeover: grotesque beauty. What makes the question more intriguing is that, whether contemporary art has found a better form of beauty (constructed to please and create a certain discursive paradigm) in the grotesque, since it frees us from any moral

Sunday, September 22, 2019

Lonely Miss Brill the Eavesdropper Essay Example for Free

Lonely Miss Brill the Eavesdropper Essay Miss Brill by Katherine Mansfield is about a middle-aged English teacher who secretly listens to other peoples conversation due to her loneliness. Every weekend Miss Brill goes out to the parade in a park and listens to other peoples conversation because she has nobody to talk to but her fur coat. She treasures her fur coat as if its her pet and has conversations with it. Towards the end of the story, she realizes that nobody likes her, therefore she goes home into her dark room and cries. Katherine Mansfield, uses imagery, characterization, and point-of-view uses these three literary elements to inform the meaning of the lonliness. The author uses imagery for the reader to better understand the story and to create the apperance of her loneliness. In the beginning of the story, the author states She had taken it out of its box that afternoon, shaken out the moth powderrubbed the life back into the dim little eyes. (Mansfield 1)Here, Miss Brill takes out her fur coat and starts to talk to it and pets it as if it is her pet. From this, the reader can can visually interpret that Miss Brill had no friends or family to talk to when she was lonley. Furthermore, towards the end of the story, a girl at the park says, Its exactly like a fried whiting.(Mansfield 4) The reader can visualize the story the author intended on how the little girl at the park makes fun of Miss Brill of her fur coat saying that it looks like fried fish. After hearing this, Miss Brill goes home and cries in her dark room. In addition, the author uses point-of-view for the reader to step into the main characters shoes. In the beginning of the story, when Miss Brill went to the park to watch the parade, the author states Wasnt the conductor wearing a new coat, too? She sure it was new. (Mansfield 1) From this quote, the reader can see that she went to the parade often, enough to know what the bandsmen wore each weekend to perform. Furthermore, the author states But to-day she passed the bakers by, climbed the stairs, went into the little dark room- her room like a cupboardShe sat there for a long time. (Mansfield 4) After coming back from the parade, getting made fun of, she goes to her room in a depressed mood and cries by herself. Lastly, from the begininng of the story, the reader can tell that Miss Brill had a unique personality. From talking and petting her fur coat, to eavesdropping, her character is a bit different from others. Her lonliness could have lead her to eavesdrop on people and have a fur coat as her friend. The author states, This was disappointing, for Miss Brill always looked foward to the conversation. (Mansfield 1), to show her lonliness. In this quote, the reader can see that Miss Brill liked to talk to people and even if she wasnt in the conversation, she would like to listen to them. Furthermore, he author states How she enjoyed it! How she loved sitting there, watching it all! It was like a play. (Mansfield 3) This quote is explaining how she enjoyed the parade as if it was a play. The reader can see that she entertained herself by going to the park every weekend to forget about her loneliness. The author successfully used these three literary elements for the readers to better understand the story, to create the appearance of her lonliness and visualize interpret what the author was intending to say. Authors using literary elements in their story is important because they can send what theyre trying to say to the readers easily with the literary elements. Furthermore, it is important to the readers because the readers can better understand the story and relate the story to the world. Reading this story, readers can understand people who too are lonely and step into their shoes to understand their feelings.

Saturday, September 21, 2019

Reflecting On The Incident And Making Necessary Application Of Theory

Reflecting On The Incident And Making Necessary Application Of Theory Introduction The aim of this assignment is to identify and reflect on a critical incident that happened at my work place and making an analysis for learning experience. The following will be identified and defined: critical reflection, the value of critical reflection and health and social care theories to support my personal and professional development. The full description of the incident is available in Appendix.1. White et al (2006) defines critical reflection as a process which incorporates individuals analyses of thinking with regard to the influence of socially dominant thinking. The material reflected upon in critical reflection is screened through the analysis based on critical theory. Foook, (2002) in Pranee Limputtong (2008 p.266) points out that critical reflection is a process of identifying the ways in which we might unwittingly affirm discourses that work against us, and shape people we are working with through examining our implicit assumptions. The value of reflection is to generate evidence to confirm or contest the link between reflection and improvement in social care work practice and also has a potential to enhance the quality of care delivery (Burns and Bulman 2000). Reflection stems out of particular experiences of professionals, including their experiences of critical reflection in some of health subjects such as social care and social work. Critical reflection seeks out to engage professionals into their studies making them aware of situations that may have noticed and taken for granted in practice. The method of critical reflection is also interrogating and debating the aspects of a particular practice in order to generate an understandable study (White et al 2006). According to Palmer et al. (1994) reflection has been proven to be a key tool for practice learning, practitioners need more than experience knowledge for competence. Professional development is a way of equipping practitioners to be competent and be in a better position to respond well to changing needs in the world of practice. Pranee Limputtong (2008 p. 266) states that the reasons or aims of critical reflection is to dig how we participate in communicating our ideas which shape the existing power in relations. Johns and Freshwater (1998) cited in based learning.org (2008) points out that, the value of reflection is a way in which professionals can enhance their learning as it involves questions about self, actions beliefs and values. There are several models of critical reflection, only a few have been identified in this assignment. Kims (1999) model is a three phase of reflection which helps the practitioner to continue the journey of reflection as he or she gradually develops the abilities to reflect. This model is used to develop a novice reflective practitioner to begin with simple descriptive reflection and gradually progress to the more complex levels under close supervision and guidance (Rolfe et al 2001). Johns (2000) model for reflection is a cue of questions built into a very comprehensive framework for structuring reflection-on-action furthermore Rolfe et.al (2001) states that some consideration should be made, whether his fifth way of knowing of reflexivity is really reflective. His model does not make any provisions for making changes to an on-going experience. Gibbs (1988) model of reflection a cyclical cue of questions arranged in the similar way with Tandiwe Dube 0921769 Johns (2000) learning cycle. This framework is centred in learning from experience rather than attempting to change the experience. The model does not encourage any reflexive path back to the action from which learning is derived (Rolfe et al 2001) I have chosen this framework as it gives the foundation of reflection and has three cues of questions that are designed to be open and can be revised to meet specific needs for different practitioners in different situations. It pays particular attention to Bortons (1997) model as its macro structure. The three set of questions completes a cycle which enables the practitioner to continually improve on learning from experience for better practice. The first set of questions is the description level of the situation. The second level is the building level of reflection where the practitioner is encouraged to make a personal theory and knowledge out of the situation. The third level is for the practitioner to reflect on the consequences of their actions and considers how to improve on practice. This final stage is considered as the stage which can contribute more to practice (Rolfe et al 2001). Mr. B. was not offered his cup of tea and toast in the morning as he was incontinent of urine and faeces and needed to attend to his personal hygiene before being offered a cup of tea. This interrupted with his normal routine in the care plan which made him unhappy. As Mr. B was coming downstairs my colleague shouted from upstairs that I should ask Mr. B to go back to his bedroom. ( See Appendix) I used my voice and hand gestures to tell him to go back upstairs (Mr. B has learning difficulties), but he did not respond and continued coming down towards me. I felt intimidated and scared as I could not get through to Mr. B. I was concerned and I thought of my responsibility of duty of care, personal hygiene, respect, Tandiwe Dube 0921769 privacy and dignity as he was not appropriately dressed to come downstairs. I could tell that Mr. B was not listening to what I was saying as he seemed to be furious then hit the fish pond with his fist out of anger. Nazarko (2004) suggests that one should not repeat if the person does not understand what is being said but try to rephrase and speak a little more slowly when communicating with the service users. The way I raised my voice trying to be assertive and the way I used my hand gestures was wrongly interpreted by Mr B. In the process I have learnt that as a bank staff every time I get to a particular residential/care home, I need to first read the service user care plans before giving any nursing intervention to avoid putting myself and others to any risks as there might be changes in the service users care needs. As a social care worker, according to the GSCC (2002) I am accountable for the task delegated to me as well as my actions of carrying out the task. I should also identify my training needs as stated by Palmer et al (2000) that many practitioners suggested that reflection had encouraged them to identify their learning needs, assess their level of competence examine their accountability and articulate their concerns before undertaking a new task. When I saw that there was communication breakdown between myself and Mr. B, I should have called my senior, the manager or one of my colleagues before Mr. B hits the fish pond and gets hurt. According to the GSCC (2000) as a social care worker I have to work with others to protect the health and wellbeing of those in my care, seeking assistance from the employer or appropriate authorities if one feels not adequately able to carry out any task or not sure how to proceed. If this ever happened again I will call for assistance immediately when I realise that I am not Tandiwe Dube 0921769 competent to deal with the situation. As a practitioner I should recognise the limits of my professional competence and only undertake a task and accept accountability of those activities that I am competent in doing. In future I will make sure that I undertake necessary training to build my competence. To practice competently one needs the knowledge, skills and the required ability to lawfully, safely and effectively carry on a task without direct supervision. The senior came after hearing the noise and she spoke to Mr B using both verbal and non-verbal communication de-escalation technique. Through this incident I have learnt to continue developing my knowledge and skills as it is a requirement for every practitioner to take fresher courses to keep their knowledge and skills up-to-date. In conclusion critical reflection is quite important as it seeks out to engage professionals into their studies making them aware of situations that they may have noticed and taken for granted in their practice. Also the value of reflection is vital to generate evidence to confirm or contest the link between reflection and improvement in nursing practice and also has a potential to enhance the quality of care delivery (Burns and Bulman 2000). Reflecting to the incident one has learnt the importance of engagement and communication skills in that I could have used the de-escalation techniques situations before the situation got out of hand, and build my confidence and be more competent. Tandiwe Dube 0921769 References: Burns, S. and Bulman, C. (2000) The Growth of the Professional Practitioner. 2nd ed. Blackwell Science Ltd. Fook, J. And Gardner, F. (2007) Practising Critical Reflection. Open University Press Ghaye, T. And Lillyman, S. (2006) Learning Journals and Critical Incidents. Reflective Practice For Health Care Professionals. 2nd ed. Quay Books Division, MA Healthcare Ltd, St Jukes. Gould, N. and Baldwin, M. (2004) Social Work, Critical Reflection and the Learning Organization. Ashgate Publishing Limited Lmputtong, P. (2008) Knowing Differently: Arts- Based and Collaborative Research Methods. Nova Science Publishers. Palmer, A.M. Burns, S. Bulman, C. (1994) Reflective Practice in Nursing. The Growth of the Professional Practitioner. Blackwell Science. Ltd Oxford. Rolfe, G. Freshwater, Dawn and Jasper, M.(2000) Critical Reflection for Nursing and the Helping Professions. Routeledge White, S. Fook, J. and Gardner, F. (2006) Critical Reflection in Health and Social Care. Open University Press. http://www.practicebasedlearning.org/resources/resources.htm last updated on 04-09-2008 accessed on the 22-11-2010. Tandiwe Dube 0921769

Friday, September 20, 2019

Benefits of Linux Operating System

Benefits of Linux Operating System TASK 01 Evaluate the benefit of Linux operating system as interoperable and alternative NOS for the company in the form of a feasibility report to include the following: The comparative Networking features of Windows and Linux. Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. You need to install Ubuntu on a machine and configure network services for Windows and Linux mainly for file sharing and printing. Necessary screen shots have to be provided. Enumerate the various costs associated with the performance, security, support, and maintenance of the Ubuntu within the bank. Answers What is Windows? Microsoft Windows is a series of computer operating systems and GUIs (Graphical User Interfaces) produced by Microsoft Corporation. Windows was the first operating environment introduced by Microsoft in 1985 as an add-on to MS-DOS. Windows was introduced because of the growing interest in Graphical User Interfaces (GUIs). Then Windows dominated the worlds personal computer market, overtaking the Mac OS, which had been introduced previously. Microsoft has introduced two parallel routes in their operating systems. One route is for Home users and the other route is for Professional IT users. The home versions have greater multimedia support and less ability for network and security. But Professional versions have low multimedia capabilities and better networking and security. Windows operating systems are commercial products and we should purchase license in order to use the products. And also the source code of windows products are closed and owned by Microsoft. Linux is a free and open source Operating System referring to Unix-type operating systems originally created by Linus Torvalds with the support of developers all over the world. Linux source code is freely available to everyone and anyone can freely modify and redistribute both commercially and non-commercially. Linux kernel can be defined as one of the best kernels that uses today. And further, many organizations have begun to use Linux based operating systems because of its high security and low cost. Linux is well known for its use in servers. And also Linux can be installed on vast variety of hardware, such as mobile phones, watches, mainframes, supercomputers and etc. Fedora, Suse, Mandriva, Ubuntu, Kubuntu and Red Hat are some popular distributions of Linux. Comparative Features of Windows and Linux Malware Threats Security is a vital feature that every Operating System (OS) should provide. Because operating system is a key requirement of every computer system. Therefore everything depends on it. Malware or Malicious Software is a computer program that is designed by computer criminals in order to damage the systems and theft important information from computer systems. Therefore a network OS should have a thorough security. Without security, the network is vulnerable to larger number of threats. Windows Microsoft Windows OS is the most popular operating system in the world. It runs nearly 90% of desktop computers in the consumer market, and is the main operating system of the vast majority of commercial and institutional users. Therefore this makes windows equipped machines larger target of malware (or malicious software) which is written by computer criminals who want to cause much damage to the system. According to the surveys that conducted by Kaspersky Lab have revealed that more than 11,000 malware programs for windows were discovered just in the second half of 2005. And also nearly one million Windows based computers have been infected with Botnets (Botnet is a small computer program used to control other computers remotely). In windows based computer systems some malware are very hard to remove without using an Anti-Malware program. Linux In year 2006 approximately 800 Linux malware were discovered. Most of the malware are propagated through the Internet. Usually Linux based malware are extremely rare. But there may have a possibility of spreading malware to the Linux based systems if they are connected with Windows based systems. Because of the rarity of malware threats, there is no initial requirement for Anti-Malware programs in Linux based systems. But anti-malware software such as ClamAV and Panda Security are rarely used for Linux servers for more security. Resource Sharing Computer Network is a set of interconnected computers that is used to share resources such as printers, scanners, information, storage and etc. Therefore operating systems should support for reliable resource sharing. Reliable resource sharing increases the networks performance. Linux and Windows belong to two different platforms. Though they provide different facilities, they provide they initial requirements of a network. Usually Linux performs well for file sharing and Windows performs well for Printer, Scanner and other hardware resources sharing. Cost For desktop or home use, Linux is very cheap or free, and Windows is so expensive. For sever use, Linux is very cheap when comparing with Windows. Microsoft allows a single copy of Windows to be used on only one computer. In contrast, once we have purchased Linux, we can run it on any number of computers for no additional change. For instance in year 2005, Windows XP Professional Edition was sold for $200 and Windows Server 2003 Standard Edition with 10 Client licenses was sold for $1,100. But we can download Linux distributions freely from their web sites. Otherwise we can purchase a assorted distributions of Linux in a box with CD and manuals and technical support for around $40 to $80. Bugs All software has and will have bugs (programming mistakes). Linux has a reputation for fewer bugs than Windows. Windows is developed by faceless programmers whose programming mistakes in Windows are hidden from the outside world because Microsoft does not publish the particular source code for Windows. Microsoft believe that their source code as a trade secret. In contrast, Linux is developed by hundreds of programmers all over the world. They publish the source code of the operating system to the world. Therefore it is stronger and less vulnerable for threats. That is why most of the organizations use Linux for their networks. Linux is getting update from many talented programmers all over the world. Network Configuration When comparing with Linux network configuration, Windows configuration is easier. Because of generally Windows is based on GUI (Graphical User Interface). Therefore anyone can understand Windows based network configuration without having much knowledge. But Linux is generally based on Command Line or Terminal and there should have a good knowledge about Linux in order to implement a network by using Linux. File System In Windows based systems the support NTFS, FAT, ISO 9660, UDF and others. But in Linux based systems they use ext2, ext3, ext4, ReiserFS, FAT, ISO 9660, UDF, NFS, JFS, XFS, and others. When comparing with Windows, Linux supports for many file systems. But now Windows has 3rd party drivers for ex2, ex3, ReiserFS, HFS and others. System Stability Windows operating systems based on the NT kernel and it much more stable than the other older versions of Windows. But if we are using unsigned or beta drivers, it can lead to decreased system stability. Linux window manager is a key component of X-Windows based GUI system and can be highly stable. Mechanisms used to terminate badly behaving applications exist at multiple levels, such as Ksysguard and the kill command. If the GUI fails Linux can use a text based system. This feature is a powerful feature in Linux for network stability. Interoperability features of Fedora 12 with Windows Within this task I used Fedora 12 instead of Ubuntu. Windows and Fedora belong to two different platforms. Therefore their mechanisms are different. That is why the feature interoperability is needed. Interoperability can be defined as the ability to work with each other. In order to exchange messages between each different platform reliably without any errors or misunderstandings, there should have a common background between each platform. Likewise Windows and Linux (or Fedora 12) also has that kind of common grounds that support for exchange messages between each platform. Samba Samba can be defined as a re-implementation of SMB/CIFS networking protocols. It was developed by Australian Andrew Tridgell. It provides various facilities for file and printer sharing between Windows, UNIX and UNIX like systems such as Linux, Solaris, AIX, and Apples Mac OS X server systems. Samba runs on most systems and now it has become a standard of most of the distributions of Linux (such as Fedora, Redhat, Mandriva, Suse and etc). When we need to share files and printers between different platforms such as Windows and Fedora, we should have to configure Samba. That is how we make interoperability between each platform. DHCP DHCP is short for Dynamic Host Configuration Protocol, a protocol used for assigning dynamic IP addresses to devices on a network. With a dynamic addressing, a device can have a different IP addresses every time it connects to the network. Though some systems and devices are allow to change the IP addresses while it is still connected, DHCP also supports a mix of static and dynamic IP addresses. DHCP simplifies the network administration because the DHCP server keeps the track of IP addresses rather than requiring an administrator to manage the task. I consider that the DHCP is also an interoperability feature because it can assign IP addresses to any platform such as Windows and Fedora. When a LAN network has a mixture of a Windows and Linux based computers, DHCP can assign IP addresses to all computers without a barrier of the platform. X Windows System The X Windows system is a windowing graphical user interface that almost, but completely, entirely unlike Microsoft Windows and the Macintosh. This X Windows System is an open, client/server system that for managing a windowed graphical user interfaces in distributed network. Earlier UNIX based systems used Shell as an interface. Shell is an inbuilt special program that allows users to enter commands in a CLI or Command Line Interface. But the new versions of UNIX-like systems heavily use X Windows as a Windows like graphical user interface. Earlier it was very difficult to work with Windows and Linux through CLIs. Because of Window was completely GUI (Graphical User Interface) and Linux was completely CLI. But now the new distributions of Linux come with the X-Windows capability. Therefore now the both systems can work more reliably and easily as a whole. X Windows is also an interoperability feature that is provided by Fedora 12 in order to work with windows systems much easily. TCP/IP TCP/IP shorts for Transmission Control Protocol and Internet Protocol. Generally it is a protocol suit that is used for the internet. It provides easy communication across different platforms and provide basis for the global internet. And also it can be defined as a basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or extranet). When we set up with direct access to internet, our computer is provided with a copy of the TCP/IP program just as every other computer that we may send messages to or get information from also has a copy of TCP/IP. In an intranet there may have computers with different platforms such as Windows and Linux. But using TCP/IP protocol we can connect these computers. Both Windows and Linux distributions support for TCP/IP. Therefore it can also be considered as an interoperability feature of Windows and Linux. DNS DNS is Short for Domain Name System. DNS is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, theyre easier to remember. The internet is based on IP addresses. Every time when we use a domain name, DNS server must translate the name into the particular IP address. In intranets also some organizations use DNS servers to name their network computers. Though it is a Windows based computer or a Linux system, it carries out its task perfectly. Because DNS also has a interoperability feature to work with different platforms. Enumerate the cost associated with the Performance, Security,Support and Maintenance of Fedora 12 within the Bank. For this Task I used Fedora 12 instead of using Ubuntu. Because Ubuntu do not have an inbuilt a Samba server facilities and it should be downloaded as a third party tool. But Fedora 12 has those facilities for printer and file sharing. Performance Performance is a vital part of a network. The efficiency of a network depends on the hardware and software performance. To the banks network I used one of the distributions of Linux called Fedora 12 as the NOS (Network Operating System). Generally Linux based operating systems are lightweight and need low performances. As the other distributions of Linux, Fedora 12 is also a lightweight operating system that requires low performance hardware. Bank is a place where many transactions are taken place every second across their branches and other networks. Therefore the banks network should be stable and reliable. Due to these reasons a bank should use trusted and reliable hardware and software in order to increase their network performances. Usually the costs of network devices are relatively high in the modern market. And also the network operating systems like Windows are extremely expensive. Therefore by using a free and open source OS like Fedora 12 we can reduce the money wastage. Further it does not need high performance computers for installation and does not consume lots of hard disk space like Windows does. Fedora 12 provides online updations and does not have a limit on installation. One copy of Windows can be installed to a one computer only. Otherwise we have to buy license. But Fedora 12 can be installed to any number of computers without any limitations. According to those above reasons I think that Fedora 12 provides good performances and also it is more cost effective when comparing with Windows. Security Security is a key requirement of a network. Otherwise anyone and any malware can attack and theft the important information from the network. Therefore OS (Network Operating System) developers try to increase OSs security features. If theres no security within an OS, then it is totally fails. Fedora 12 is a distribution of Linux and it is categorized as Free and Open Source Software. Linux based systems and their source codes are freely available to anyone and can be modified as required. Fedora 12 has also been developed by many programmers all over the world and it is a strong operating system. But windows based systems are commercial OSs and they do not publish their source code to the public. Therefore it is developed by limited programmers and there security is also limited. That is why we need third party security tools to protect windows based systems. The third party trusted and reliable Anti-Virus guards or third party security systems are more expensive and it is an additional cost to the windows based systems. But Fedora 12 has a strong in-built security mechanism (but Windows dont have) such as DPI (Data Packet Inspection) and ISD (Intrusion Detection System). Because it is developed by many programmers all over the world. Therefore it doesnt need any third party virus guards. The cost for additional security efforts has reduced in Fedora 12. Therefore Fedora 12 is a cost effective operating system when comparing with Windows. And also it is the best choice for a cost effective banks network system. Support Computer operating systems and other software are not 100% perfect. That is why the manufactures provide support for their products. When a problem is taken place in a system, we can get the manufacturers support to solve the problem. And also manufactures provide patches and other updations to reduce the vulnerabilities of their products. Microsoft Windows also provide free updations and online support for their products after they are purchased. Though Windows provides free online support services for their products without any payments, Fedora and other Linux based operating systems do not provide free support services. If we need to get a support from Linux based system, we should pay some amount of money for their service. But they provide 24 hours update service for their products. In Fedora should have to pay for their services. Though the support service is not cost effective for the bank, the OS is totally free for download. Maintenance After installation and Configuration every computer system need to be well maintained. Windows systems are much easy to maintain because it doesnt need well trained persons (compared with Linux). But Linux systems are more complex and cannot install, configure and maintain if theres no knowledge of it. In order to maintain the Fedora system in the bank, the bank needs a well trained personnel or network administrator. Anyone cannot maintain a Linux system; therefore the cost of a Linux based network system administrator is higher when comparing with a Windows Network System Administrator. Manufactures support is always need for system maintenance. But we need to buy the service advices in Fedora form its manufacture. TASK 02 Research and produce a comprehensive project plan for the implementation of a VPN within the company. This should include the following: A brief overview of current VPN technologies (both hardware and software). Design a suitable VPN using appropriate Internet Service Providers (IPS) for the requirements of the bank. Identify and list the hardware and software required to implement the banks VPN. Produce a schedule for the implementation of the VPN, detailing the installation of any necessary hardware, network operating system upgrades and associated applications software required. Write a section of the report on the responsibilities and level of service required from an ISP in order to implement a successful VPN within the company. Answers Although the topic VPN or a Virtual Private Network is a much complex subject in networking field, the basic idea of a VPN is quite simple. A corporation may have a number of officers (or group of officers) in different locations, and each of these locations can have its own local network. In many corporations there are many employees working remotely by connecting to the corporations local network at home or on the road. And also business partners can join together in extranets to share business information. Interconnecting these separate networks and locations over a public network is called a VPN or a Virtual Private Network. The apparent simplicity of VPN makes us think that it is a simple concept. But there is an ever-increasing number of VPN types, and a huge range of technologies for implementing VPNs are available today. This makes us easy to decide the most appropriate VPN solution for our need. The most common way to interconnect sites has been to use ATM or Frame Relay (FR) leased lines supplied by a service provider. The following parts of this task describe the VPN technologies, cost effective hardware and software solutions and responsibilities and level of services required from the ISP (Internet Service Provider). VPN Technologies As I mentioned above, VPN is a complex subject in networking. Therefore different sort of VPN technologies are introduced for different purposes. These technologies provide secure and cost effective solutions for telecommuters, home based workers, road warriors, remote sales people, mobile executives and also for global business. Within this task I expect to provide a short description about the current VPN technologies that are widely used today. I divide these technologies into two major parts such as Hardware Technologies and Software Technologies. According to my perception, I believe that the VPN protocols that are used to establish a VPN connection should also be a part of the software technologies. Because these protocols are created by using specialized algorithms and programming languages. Therefore I consider those protocols as Software Technologies within this task. Software Technologies PPP (Point-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) protocol technologies are heavily based on this PPP (Point-to-Point protocol) technology. PPP was designed to send data across dial-up or dedicated connections. PPP technology is used to encapsulate IP packets within PPP frames and then transmits the encapsulated packets across a point-to-point link. PPP was specially designed to use between dial-up clients and NASs (Network Attached Storage). PPTP (Point-to-Point Tunneling Protocol) PPTP is one of VPNs first protocols built on PPP (Point-to-Point Protocol) to provide remote access for VPN solutions. PPTP technology encapsulates PPP frames in IP datagrams using GRE or Generic Routing Protocol. PPTP uses authentication techniques within PPP. PPTP can be used for remote access and router-to-router VPN connections. The Point-to-Point Tunneling Protocol (PPTP) uses TCP (Transmission Control Protocol) connection for tunnel management and GRE for encapsulation. L2F (Layer Two Forwarding Protocol) L2F was designed to transmit data from corporate sites to their users by using tunnels. This protocol or VPN technology was first implemented in CISCO products. L2F doesnt depend on IP and its the only way that it differs from PPTP. This protocol accepts other authentication mechanisms and allows tunnels to support more than one connection. L2F uses PPP for authenticate the remote user and its done twice at the ISP and then the second at the gateway to the connecting LAN. This is a Layer-2 protocol and handles IPX and NetBEUI as well. L2TP (Layer Two Tunneling Protocol) L2TP is a combination of L2F and PPTP and it exists in the second layer of the OSI reference model. That is why it named as Layer 2 Tunneling Protocol. L2TP is defied for packet media, Frame relay, ATM and X.25. It has its own tunneling protocol and uses PPPs PAP and other advanced mechanisms for authentication. Its encryption method is based on IPSec (Internet Protocol Security). IPSec (Internet Protocol Security) IPSec is a solution for VPN security and it exists in the third layer of the OSI reference model. IPSec uses number of encryption technologies to provide confidentiality and integrity of data. IPSec allows senders to authenticate and encrypt each packet. There are two modes of IPSec such as Transport mode and Tunnel mode. These two modes depend on the situation of security and traffic. Transport mode authenticates and encrypts the transport segment of an IP packet, and tunnel mode authenticates and encrypts the whole IP packet. VPN Client Software VPN Client software provides protected access to corporate resources via wireless, broadband, and dial-up connections with robust encryption and broad support across multiple connection types. Most of the modern VPN software simplifies the configurations of security policies and management of certificates through its graphical user interface. Microsoft, Netgear, Stone Gate and CISCO are some popular manufactures for VPN client software (But each of these manufactures use different sort of technologies to implement these VPN client software). Hardware Technologies VPN Router In network communication, data are transferred in the form of packets. Usually a router is a hardware device or a computer that looks at the IP packets and decides how to forward it. Routers operate at the network layer of the OSI reference model and that is used to connect networks or connect the networks to the internet. When a packet is received from the NIC (Network Interface Card) card, the router reads the IP address on the packet and forwards it to the appropriate network interface. The packet forwarding depends on the IP address and routing information that contains in the packet header. Even if the network architecture differs, the router has the capability to connect them. Though it can connect different network architectures, I cannot transform data from one data format to another (TCP/IP to IPX/SPX). Software for VPN router functions or normal router functions can be added to a server or a specialized computer that is optimized for communication. VPN Concentrator VPN Concentrator is a device that is used to combine several communications channels into one. And also it is further used to tie multiple terminals together into one line. Although a device called Multiplexor carries out the same function as VPN concentrator, the total bandwidth of the concentrators inputs is not equals to its outputs. The concentrator has the ability to store data temporary but the multiplexor does not have this ability. An Ethernet hub, which is a multiport repeater, is sometimes called as a concentrator. VPN Gateway Although a VPN Gateway can be implemented as both Hardware and Software, I consider this as a hardware technology because for the ease of categorization. VPN Gateway is a device (can be a Hardware/Software) that is used to convert packets from one network protocol to another. Gateway acts as an entry and exit point of data where some kind of processing is done on the information that passes through it. Sometimes the VPN Gateway also called as a router or Layer 3 Switch. Gateway is a device that is used to join two networks together. It can be implemented completely in hardware, completely in software or as a combination of both. VPN Firewalls Firewall can be implemented as both hardware and software or as a combination of both. But I included VPN Firewalls in the VPN Hardware category because for the ease of categorization. Network security is a major need of an organization. Firewall is one such solution that allows the computer to prevent unauthorized access of any application on the computer. Firewalls monitor traffic in the computer or the network. This monitoring can be done by the software in the computer or router. When using a VPN in an organization, the organization has a great requirement of using a firewall solution. Because of there may have a possibility of unauthorized access to the organizations confidential information. By using VPN firewall technology we can reduce the outside threats. Even though the above technologies directly look like just software and hardware, they all have a complex technology encapsulated within them. The above VPN technologies are widely used within the modern VPNs. Description of Banks VPN Due to the requirements of the bank I designed a VPN that provides cost effective networking solutions. The bank needs their agents and branches to connect to the banks network secure through VPN. Therefore I designed a network that provides the above facilities. When designing the banks network I assumed that the particular bank is the head office and the agent is another organization. Although the bank may have many agents and branches, Ive mentioned only one agent and a one branch within this network overview. Banks head office is the place where many of the confidential information about the transactions are stored. Therefore its network should be more secure than any other else. According to my VPN design I connected the banks network to the internet through an ISP (Internet Service Provider) in order to get the VPN access. The bank connects with the ISP directly using a VPN Router (this router is highly configured and cannot be accessed by the unauthorized VPN clients). Then I added a DMZ (Demilitarized Zone) in order to secure the LAN network from the unauthorized access. If the File server was implemented within the DMZ, it may vulnerable to the threats and there may have a possibility of information thefts. Therefore I implemented the File Server far away from the DMZ and its secured with two highly configured firewalls. Though someone can get into the DMZ in order to access the Web Server, he/she cannot penetrate the other firewall without proper authenticate information. All the co mputers within the Banks network can access the WEB server and File server according to their assigned privileges. Other agents and branches have rights to access the banks network (using Router to Router connection). Even though the VPN Routers and Firewalls (Hardware) are much expensive, they provide a great security to the Bank network. In order to reduce the software cost I recommend free and open source software for both servers and clients such as Linux, Open Office and etc. Hardware and Software required to implement the banks VPN According to my VPN design I need several kinds of software and hardware to implement the network. Therefore Ive chosen some products to which supports for VPN. Some products are little bit expensive but provide high security and reliable service to the banks network. When choosing the software to the network implementation, Ive chosen some widely needed software. Hardware VPN Router SMC Barricade VPN BR21VPN Router SMCBR21VPN The Barricade router which has built-in VPN support is an ideal networking solution for VPN. This router consists of load balancing WAN ports, DMZ (Demilitarized Zone) port and a 10/100 LAN port. It has a built in firewall to protect the network from the edge. This router supports protocols such as TCP/IP, VPN connections with PPTP and IPSec. The in-built firewall provides a great protection against DOS attacks (Denial of Service attacks) and also it provides flexible Access Control. This router has the ability to access remote corporate network securely through an authenticated and encrypted tunnel over the internet. Switch NetGear Pro-Safe switch is suitable for high-speed network on a small scale. This switch consists of five auto-speed-sensing 10/100/1000 Mbps UTP ports. And also this it has the capability to handle huge workloads (this feature is more useful because of the Web Server is connected to this switch within my VPN design). This switch can move large files across the network instantly and let devices to connect to the network painlessly. The metal chassis protects the interior working parts from physical damages. Hub Cisco FastHub 424 Ethernet Hub (WS-C424M) The CISCO FastHub 424 10/100 of high-performance Fast Ethernet repeaters deliver unmatched flexibility and low-cost managed connectivity to the desktop. The FastHub 424 10/100 provides ultra low-cost 10/100 autosensing desktop connectivity where dedicated bandwidth is not required. The FastHub 424 will be deployed as a high-performance solution for providing 10/100 Fast Ethernet connectivity to the desktop. This hub provides dedicated connections over extended distance (up to 2Kms) to upstream switches or routers. Firewall NetGear ProSafe FVS338 Firewall supports for 50 VPN Tunnels for Encrypted Remote Access. This VPN firewall with 8 Port 10/100 switch and Dial Back-up is an SNMP-Manageable, High Performance network solution that furnishes multidimensional security. Broadband capable VPN firewall comes with connection ins

Thursday, September 19, 2019

Comparing the Orpheus Myth and Conrads The Secret Sharer :: Comparison Compare Contrast Essays

Parallels in the Orpheus Myth and Conrad's The Secret Sharer The myth of Orpheus and his descent into the underworld is paralleled in Joseph Conrad's "The Secret Sharer," revealing a common theme, the narrator's self-fulfillment through the conclusion of his symbolic and inward quest. This parallel, which may be called archetypal, serves to increase the reader's sense of identification with Conrad's narrator, and it lends an otherworldly tone to the work as a whole. Likewise, these echoes of Orphic material lead the reader through three stages. These are a modern and secular rendition of the descent into the unknown, followed by a symbolic rebirth or rejoining of the fractured portions of the complete self, and finally the parting with the previous 'self' that ostensibly existed in the initial state. The reader finds an initial parallel between the myth and story through Conrad's 'sea,' as compared to Orpheus' 'underworld,' along with the surface of the quest motif. The ship in "The Secret Share" is described as "at the starting point of a long journey" (Conrad 273), and as being "very still in an immense stillness.... [where] nothing moved, [and] nothing lived" (273). I read the stillness of the sea and the absence of life is an allusion to the stillness of death, which is the realm Orpheus takes his journey to, before turning homeward. Moreover, the stars are described in this opening scene, but do not reappear in the story until after the departure of 'the secret sharer'; the narrator's Euridice or hidden self (this hidden self aspect closely reflects the 'double' nature of the 'sharer' as well). Between these two appearances of the stars, which could only visible in an 'overworld,' the ship and its crew as consumed by "the tide of darkness" (273) that encompasses the vessel, much as Orpheus leaves behind the stars when he descends into the realm of death in Hades. On a symbolic level, both the Orpheus myth and "The Secret Sharer" use the journey as a rite of passage, or a rebirth into a greater state of self-knowledge. Orpheus comes to know the reality of death and the limitations of his powers, while Conrad's narrator makes a transition from "being a stranger to the ship..., untried as yet by a position of the fullest responsibility" (273) such that "the comfort of quiet communion... was gone for good" (273), to "the perfect communion of a sea with his first command" (113; italics mine).

Wednesday, September 18, 2019

Reward systems Essay -- essays research papers

CHAPTER 3 Reward systems RESEARCH METHODOLOGY 3.1.  Ã‚  Ã‚  Ã‚  Ã‚  INTRODUCTION The aim of this chapter is to explain, justify and account for the research methodology that has been selected in this study. In conducting the investigation, the researcher intends to proceed from a quantitative-descriptive design. A number of issues related to the research methodology will be extensively discussed below. 3.2.  Ã‚  Ã‚  Ã‚  Ã‚  METHODICAL ACCOUNT (RESEARCH:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   QUANTITATIVE-DESCRIPTIVE) Thyer as cited by De Vos and Fouchà © (1998: 77), defines a research design as a â€Å"blueprint or detailed plan for how a research study is to be conducted – operationalizing variables so they can be measured, selecting a sample of interest to study; collecting data to be used as a basis for testing hypotheses, and analyzing the results.† Hussey and Hussey (1997: 54), also point out that research methodology refers to the overall approach evident in the research process from the theoretical foundation to the strategies that are used in the collection and analysis of the data. So research methodology can be said to indicate the answers to questions as to how research should be designed, structured, approached and executed. In this study, the researcher has opted to conduct his investigation through the quantitative-descriptive paradigm. A randomised cross-sectional survey design will be used to investigate attitudes of employees with regard to reward systems. According to De Vos and Fouchà © (1998: 127), the randomized cross-sectional design is written as follows:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  R O1 Where, R = randomized selected subjects   Ã‚  Ã‚  Ã‚  Ã‚  O1 = administration of the questionnaire It is through the relevant and appropriate quantitative research paradigm that the researcher hopes to conduct a controlled, purposive, accurate, systematic, and scientific research on the impact of reward systems on employee attitudes. The researcher also hopes that the quantitative research approach would enable him to arrive at findings that would have greater validity and less artificiality as a process of measuring the impact of rewards on employee attitudes. 3.3.  Ã‚  Ã‚  Ã‚  Ã‚  RESEA... ... caring professions. Pretoria: J.L. van Schaik. Du Plooy, J.L., Griesel, G.A., and Oberholzer, M.O. (1993). Fundamental pedagogics for advanced students. 4th Edition. Pretoria:Haum. Greengard, S. (2004). Employee surveys: ask the right questions, probe the answers for insight. Workforce management [online], December, 2004, pp76 – 78. Available from: http://www. Workforce.com.html [Accessed 15 April 2005]. Hussey, J and Hussey, R, (1997). Business research: a practical guide for undergraduate and postgraduate students. London:Macamillan Locke, L.F., Spirduso, W.W., and Silverman, S.J. (1993). Proposals that work: a guide for planning dissertations and grant proposals. 3rdEdition. London: Sage Publications. Mancosa. (2003). Research methodology. Study guide diploma in management studies. Durban. Schurink, E.M. (1998). The methodology of unstructured face-to-face interviewing. In De Vos, A.S. (ed.) (1998). Research at grass roots: a primer for the caring professions. Pretoria: J.L. van Schaik. Strydom, H. De Vos, A.S. (1998). Sampling and sampling methods. In De Vos, A.S. (ed.) (1998). Research at grass roots: a primer for the caring professions. Pretoria: J.L. van Schaik.

Tuesday, September 17, 2019

How does John Steinbeck use language in different ways in “Of mice and men?” Essay

John Steinbeck uses language in different ways throughout the story. It creates imagery and helps you understand the story even better. Also it indicates differences in characters and the setting of the story. Steinbeck uses non-standard English for dialogue. Lennie is portrayed to be a slow childish character; he acts like a child asking George lots of questions about there ‘dream’. Lennie repeats this quite a lot â€Å"George how longs it gonna be till we get the rabbits?† This is Lennies dream to have rabbits, and Steinbeck repeats this dream it’s a kind of rhythm throughout the book. Also Lennie is more of a listener he doesn’t speak much to other characters apart from George unless he has too. He asks George frequently to â€Å"tell† him â€Å"about that place† where they are planning to move to when they have enough money, Lennie listens to George as though he was a parent or guardian and gets excited while George tell him. This gives us the impression that George looks after Lennie and keeps him safe. Steinbeck makes George seem rather parent like. George is a talker, he tells the story of him and Lennie moving away to a place of there own often to Lennie. We get the impression that George sometimes gets rather sick of Lennie as he repeats things and asks George to tell him â€Å"the story† we can see this by â€Å"I jus’ tol’ you, jus’ las’ night† this is wrote in an American way of speaking, he uses imagery as when you read this you say it to yourself in your head and you can imagine the way George is speaking. Also George seems to swear quite a lot and mainly towards Lennie where he calls him a â€Å"crazy bastard† this use of profanity and pronunciation portrays George to be rather uneducated, we can expect this as Steinbeck was a farm labourer for a time. The story was set in the 1930’s black people where very disrespected and used for slaves in these days. Also they wouldn’t be referred to as ‘black people’ it would be much more racial as we can see from what they call Crooks â€Å"nigger†. When crooks addresses Slim he calls him â€Å"Mr slim† none of the other characters address him in this way, this shows us that he has respect for Slim and that he believes Slim is a man of importance rather like the boss. Slim is portrayed to be â€Å"almighty† we get the impression that Slim is looked up to by the other men, they respect him and when they need answers or advice it is usually Slim to whom they turn to. As when Curley and Lennie fight it is Slim who everyone turns to. George asks him â€Å"Slim will we get canned now?† This shows he has power and the men believe he can take authority in situations like this. Steinbeck makes the characters dialogue very brief and it lacks detail they say what is necessary without detail, whereas when Steinbeck is describing a character or a place he uses descriptive language and Standard English, also he uses American dialect for certain words. Throughout the book there is few long sentences he uses short sentences. The way he describes places and characters is very different to the dialogue, he uses imagery in both but in different ways in dialogue he uses the shortening of words and there simple ways to help us imagine, whereas in his exposition he describes things in much detail and uses colours effectively. Also for certain words he uses an American dialect to replace them.

Monday, September 16, 2019

Proposal Submission Letter

Sample Cover Letter The Virtual Community Group, Inc. 17 Park Road Rural Town, NH July 1, 1995 Jane Smith, Executive Director Xavier Foundation 555 S. Smith St. Washington, D. C. 22222 Dear Ms. Smith, I am pleased to submit this proposal from the Virtual Community Group, Inc. , requesting an investment of $50,000 per year over two years from the Xavier Foundation to support our Enterprise 2000 initiative.This grant would provide part of the funds needed for us to train at least 1200 low-income entrepreneurs in rural New Hampshire, helping them acquire the computer skills they need to create sustainable local businesses as we enter the twenty-first century. As elsewhere in the U. S. , the economic health of New Hampshire's rural communities has suffered steady decline since the early 1900's. Family farms, which once formed an economic base supporting large numbers of rural inhabitants, have been all but eradicated by large-scale agribusiness.Moreover, since 1960, New Hampshire has los t xx% of its manufacturing jobs, as corporations or local factories have shut down or moved operations out of state. As a result, many thousands of individuals from New Hampshire — particularly our young people — are moving to cities to seek jobs, not only depopulating and further impoverishing rural communities, but contributing to the growing pool of urban unemployed.By tapping the energy of the small local entrepreneur, and linking it to the explosion in communications technologies, we believe it is possible to reverse this trend, enabling rural inhabitants to retain viable, high-quality jobs far from industrial and urban centers. Small towns would again offer a wide spectrum of employment opportunities — from small manufacturing to services to retail — and develop sound, diversified economies for the first time in generations. Unfortunately, many small entrepreneurs cannot afford either the training or equipment needed to participate in the rewards of the Information Revolution.Enterprise 2000 was designed explicitly to address this lack of parity, and help level the communications playing field. Working in collaboration with microenterprise organizations, community colleges, and agencies which recycle computer hardware, Enterprise 2000 will offer disadvantaged entrepreneurs the following services at low or no charge: †¢Day-time or evening classes in basic, intermediate, and advanced computer skills †¢Training to use the Internet and other information networks †¢Assessment of MIS needsAccess to reconditioned computer hardware After two years of experimentation and program development, the Virtual Community Group has fashioned a superb, easily replicable model in Enterprise 2000, and established a high degree of credibility among community groups, policy makers, and funders. Our collaboration with other agencies leverages every dollar invested.Given that the Xavier Foundation has already made a number of strategic investments to improve the lives of the rural poor, we are calling on you to help us advance our joint objective one step further. I appreciate your consideration of this proposal. Please feel free to call me if you have questions or would like us to arrange a site visit. I look forward to meeting with you soon. Sincerely, Executive Director (This sample cover letter was created for AGM by Molly Clark Associates. )

Sunday, September 15, 2019

Game shows Essay

Game shows were dwindling down and were a thing of the past, but recently they have been making a sharp comeback. Television entertainment is now being focused on game shows such as â€Å"Twenty-One,† â€Å"Greed,† and â€Å"Who Wants to Be a Millionaire. † I for one am obsessed with these new shows on television. They bring the fun back into television and makes people want to win. In the pages following, many facts, reactions from the public and comparison’s to other game shows will be discussed as they relate to the recent popularity of the game shows. As a result of the increase in game shows, there is a greater quality that is brought back into television for the audience. New values and creativity have been sparked by the demand for these game shows. Regis Philbin, host of â€Å"Who Wants to Be a Millionaire,† has started this game show craze off with a bang. The first five airings of his show averaged nearly 29 million viewers (Bauder, â€Å"ABC’s Game Show†). In January, â€Å"Who Wants to Be a Millionaire† averaged an extra 5 million viewers than it did in November (Bauder, â€Å"ABC’s Game Show†). In fact, this craze sure doesn’t show any signs of slowing down. Host Regis Philbin knows how well it is doing because he is looking at getting a raise, at least two times the amount he is making now. Philbin is currently accepting a $100,000 paycheck for each episode of â€Å"Millionaire† that airs, which is currently three times a week. He wants to double his income so he will shortly be looking at around $20 million a season. His income is already up in the same range as movie stars Tom Cruise, Mel Gibson, and Jim Carrey (Sikles). Host Philbin is able to make such a big salary because the game shows do not cost much to produce. They are much cheaper to produce than sitcoms and dramas (Consoli). Since these shows have become so popular, television stations would be crazy not to produce them. â€Å"Millionaire† was the first game show that led to all of the major networks creating their own version of an interactive game show. As a result, some stations are getting better ratings off of these popular game shows than they do from their regular weekly dramas. The game shows have gotten positive feedback by bringing families closer together. Families have said they now feel as if there is a common ground between them and their teenagers. Bauder goes on to explain, â€Å"Experts say it has revived the concept of families watching TV together after a decade’s worth of forces pulling them apart† (Bauder, â€Å"Millionaire†). Parents have stated that instead of everyone going to their own separate rooms to watch television shows made for their age range, everyone gets to play along with shows such as â€Å"Who Wants to Be a Millionaire. With the questions ranging from easy to difficult it gives everyone a chance to play along at their own intelligence level. Four-year old Walker was especially delighted when he correctly completed the name of the children’s game â€Å"Duck-Duck Goose† (Bauder, â€Å"Millionaire†). Although many people say they have watched more television than normal since these shows have started, it is said not to be a bad thing. â€Å"It’s fun to be able to actually enjoy something together† (McKinney qtd. in Bauder, â€Å"Millionaire†). Another reason parents like watching â€Å"Millionaire† with their sons and daughters is because it stimulates conversation. By watching these shows they have something to talk about with their kids; in some cases they feel this is an easier way to bring up some â€Å"harder to talk about† topics (Bauder, â€Å"Millionaire†). With this big break in bringing families together, NBC’s top entertainment executives have said that establishing new family shows are their top development priority. The public has reacted toward these shows tremendously because they contain questions in which the average person knows the answer to. My whole apartment got so excited the first time we watched someone get the million dollars, I can’t imagine how the winner felt. The game shows are exciting and are interactive for everyone. There is a sense of addiction to these game shows because of the drama and suspense, which is why they are so successful. Great Britain who originated â€Å"Millionaire† was upset with the United States’ version of the game show because the questions on America’s version were not very difficult. Great Britain creators thought the questions in the newer version should raise in difficulty. Britain’s creators were unhappy and were thinking about filing a lawsuit. Another show that is being imported from Sweden is getting ready to air in the United States this summer. This show will be on CBS and is called â€Å"Survivor. † It will take 16 contestants and drop them off on a deserted Malaysian Island with camera crews following them. Every three days the players will vote to expel one of the members of their group until there are only two contestants left. Then all the players except for the two left on the island will be able to choose which contestant they want to walk away with the $1 million dollar prize. The contestant with the majority votes wins. Internationally, game shows are also in demand and in popularity. In comparison with the game shows from Great Britain, United States’ has it easy. The shows in which viewers are drawn from Great Britain are much harsher. Their quiz questions are much tougher and their contestants have to be more daring in some cases. In one game show in Great Britain, people go on the show to face their biggest fears. They work as a team and each member has to do something that frightens them. For example, one contestant was scared of spiders and she had to get a clue for her team off of the back of a tarantula. In this case she never ended up getting it because it terrified her too much. Her teammates were hurt overall. Another example of a game show from Great Britain involves contestants getting hooked up to a bungee cord and then they jump from a high bridge. While in the air, they have to throw a ball into a Santa’s hat in the water. If the contestant successfully gets the ball in the Santa’s hat then that person wins. It is apparently a tough thing to do because not many people end up winning. Who Wants to Be a Millionaire† is definitely breeding new shows in the United States. â€Å"Millionaire† is creating theme shows, by having football focused questions around the time of the Superbowl and movie-themed questions around the time of the Academy Awards. This has proved to be highly successful and more exciting and fun for the viewers (Bauder, â€Å"ABC Takes Lead). The success of â€Å"Millionaire† has led to other stations providing the same type of entertainment to their viewers. â€Å"Greed† has become a big game show since it aired shortly after â€Å"Millionaire† got high ratings. This show has a $2 million jackpot and gives its contestants the opportunity to challenge their other teammates if chosen by the terminator. Although one wrong answer from any team member is all it takes to lose the $2 million for the team makes this show more difficult to win the jackpot. The television game show â€Å"Twenty-One† has also been revived from the 1950’s. Being taken off the air years ago due to some scandals, NBC has brought it back and it has regained itself in the television market (Gray). Other game shows in the works of coming back on the air is â€Å"The $64,000 Question† and possibly â€Å"What’s My Line† by CBS (Gray). I believe these shows might be able to make it for awhile as long as the TV station can dish out what the audience demands of them. Once the viewers have had enough of the craze, then these game shows will most likely go off the air for another fifty years or so until they get revived again by another curious generation who wants to win big. Next time, the stakes will most likely be higher than $1 million and they will raise the curiosity and greed of the fresh viewing audience. Personally, I would like to see many more game shows on the air because they are very exciting and fun to watch.

Saturday, September 14, 2019

The Use of Magical Realism in Gabriel-Garcia Márquez’s Chronicle of a Death Foretold

Gabriel-Garcia Marquez is an author known for the use of Magical Realism in his novels. Throughout the novel â€Å"Chronicle of a death foretold†, the novelist Gabriel-Garcia Marquez uses magical realism as a genre frequently. Magical Realism is defined as being the juxtaposition of realism with fantastic, mythic and magical/supernatural elements. Marquez reflects magical realism by exploring both natural and supernatural worlds and illustrating traces of the culture the characters have, which is Latin American. The magical elements that are present within the novel are: superstitions, exaggerations, dreams that come true and the coincidental bizarre situations. Exploring the use of magical realism will give an insight to the characters’ personality, thoughts and actions. On top of that, it will also give an insight to what the author’s thoughts are. Therefore, the thesis question will be answered and analyzed â€Å"The Use of Magical Realism in Gabriel-Garcia Marquez's Chronicle of a Death Foretold†. Gabriel-Garcia Marquez uses magical realism in Chronicle of a Death Foretold to illustrate the narrative in prose and verse or details about character that are not relevant. In the opening of the novel, the narrator discusses the dream that Santiago Nasar has right before his death. The narrator states â€Å"He’d dreamed he was going through a grove of timber trees where a gentle drizzle was falling, and for an instant he was happy in his dream, but when he awoke he felt completely spattered with bird shit†[1]. This cynical detail does not support the style of narrative of investigative journalism.

Friday, September 13, 2019

Research on student debt management and budgeting in Canada Paper

On student debt management and budgeting in Canada - Research Paper Example The poll shows that 6 out of 10 students will graduate with a debt to pay. Likewise, 75 % of the Canadian students do not use a budget (Glasby, 2009, p.152). In addition, the Canadian federal government offers financial assistance through the Canada Student Loans Program (Johnstone, 2010, p 180). There are two Canadian bank loan prerogatives for the Saint Mary’s University’s students. Royal Bank offers student loans (www.rbcroyalbank.com). The bank does not collect interest payments while in school. The Royal Bank manages the Federal loans in Quebec and Nova Scotia, Canada. The bank helps the students with their repayment options, responsibilities as well as obligations. Further, the Toronto Dominion Bank offers student line of credit loans (www.tdcanadatrust.com). The student loans cover tuition fees, books, and living expenses. The bank offers different payment terms that fit the students’ payment capacities. The bank does not collect monthly fee s and annual fees during the student’s student life. Furthermore, the National Student Loans Service Centre helps the students with their student loan inquiries (https://nslsc.canlearn.ca). The Centre offers several student loan types. The student can process the student loans from the bank’s National Student Loans Service Centre. The Centre offers different payment terms. The terms fit the students’ capacity to pay the loans on time. The government offers loan forgiveness to academically intelligent students (Mutimer, 2012, p. 209). Canada’s nature and level of student debt. The Royal Bank’s website (www.rbcroyalbank.com) offers readable online student loan materials to Canadian Citizens, through the federal student loan program (Council of International Schools, 2009, p. 37). Likewise, the Toronto Dominion bank (www.tdcanadatrust.com) can easily be understood by the student loan applicant. The can easily find the

Thursday, September 12, 2019

Conclusion and recommendations Research Paper Example | Topics and Well Written Essays - 500 words

Conclusion and recommendations - Research Paper Example The management and Human Resources Department of Green Kitchen is qualified and possess the skill to allow the organization to become successful. A good amount of experience is possessed by the management and this would lead them to improve the weaknesses that have been identified for the firm and polish their strengths as well. Green Kitchen most importantly needs to work upon their capital and their promotion strategies to increase their customer base and also their market share. Green Kitchen, as stated in the analysis needs to make proper expansion plans and also work upon building a strong competitive edge as competition is increasing on a regular note. The marketing strategy focused by Green Kitchen is on the pricing factors and the distribution channels. The use of ERP will improve the operations management of Green Kitchen to a large extent. Green Kitchen needs to ensure that all the business management functions are running in a systematic mode so that it can achieve all its milestones successfully. Green Kitchen needs to work on their marketing and promotion strategies so that they can attract a huge customer base. They need to advertise in their ads about the importance of using environment friendly products and its benefits. They need to ensure that the mediums used for advertising is effective enough for the target market to view the advertisement. They can have alliances in the foreign market to promote their products in the international market and hence this would help them in increasing their capital. Production and manufacturing setup may be reduced this way in the international market. They can work upon increasing their target market such as the kitchen cleaning products can be used in commercial businesses such as hotels and restaurants and other such places. When businesses buy their

Wednesday, September 11, 2019

Communication in Business Report Lab Example | Topics and Well Written Essays - 1000 words

Communication in Business - Lab Report Example These will be elaborated in detail in this report. It is with great concern that Nike is committed to abide entirely with the United Nations Global Compact as guiding principles in all operations of the company. This not only improves the social status of the company but ensures a better working environment that supports innovations and new ways of operations in the company. These are our aims at Nike Company. Compared with Adidas and other competitors, Nike has a more than 47% of market share in sport shoes, though companies such as Adidas produce other products such as Jewelry, the company has a leading market share compared to its competitors. 2.0 Compliance with principles 6 and 8 2.1 Compliance with principle 6 on respect to discrimination and employment Nike is an equal opportunity employer across all its factories. Currently the company has more than 450,000 employees across the globe. This is in addition to thousands others who are indirectly employed by the company. Incident ally among the 450,000 employees, 85% are women (Boje, 1999). The company believes in affirmative action in improving the status of the female workers unlike other companies that have a higher population of males among their employees. In addition, the company is spread in various parts of the glob; in America and Asia and among these factories, Nike employs all races of employees without discrimination. The company to ensure leadership ensures that promotions and appointments in all positions are on a competitive basis disregarding race, gender, religious or any other factor that might be discriminative to employees. The company has put up policies and measures to ensure that it is fully compliant with the Health Code of Conduct and Equal Opportunity Acts and the Occupational Safety and Health Acts that would guide in ensuring a positive working environment (Buckley, 2011). Adidas on the other hand has no scandals relating to poor wages and child labor in overseas markets, and this puts the company much ahead of Nike in customer’s image and perception (Boje, 2001). 2.2 Compliance with policy 8 on environmental responsibility To achieve environmental responsibility, the company has over the time involved experts in analyzing the production process in a review that would enhance improvements in areas where pollution is indicated (Boje, 2009). The company has also initiated policies that would reduce pollution. These include recycling, adoption of greener technologies in the manufacturing process and have in the meantime phased out all PVC plastics in shoes and other products since 1998 (Tamara, 2001). The company has put in place measures and policies and is working towards certification in ISO14000 environmental standards in all the 600 subcontract factories (Tamara, 2001). T