Thursday, October 31, 2019

Drafting And Design In The Field Of Industrial Engineering Entails Essay

Drafting And Design In The Field Of Industrial Engineering Entails - Essay Example The field of industrial engineering entails engineers determining the best methods of using factors of production such as energy, materials, machines people and information to make products. Industrial managers form a link between operational performance and goals. Industrial engineers have the concern of maximizing production by managing people, technology methods of business planning and other factor inputs. They differ from the rest of the engineers who only deal with products or processes. As much as most of the industrial engineers serve in manufacturing firms, healthcare companies, communication, and consulting services (Sloan Career Cornerstone Center, 2015). Industrial engineers study products and their requirements carefully and use complex mathematical skills such as research and installation of manufacturing systems. They do so while attempting to solve problems that relate to production, organizational and related problems. Industrial engineers also design systems that help in management control for efficient coordination of activities, which maximizes production. They also improve or develop the physical distribution of services and goods systems. Their work also entails the determination of the best combinations of raw material, transportation services, costs and availability of factors of production (US Department of Labor, 2015). They use the computer and other technology systems in controlling and simulating different activities and devices. The work of industrial engineers may also be the development of systems for salary and wage administration as well as job evaluation programs. For one to be an industrial engineer, they require having a bachelor’s degree in the field of engineering. Such a requirement is the most common for many entry-level jobs in engineering. In addition to this credential, one may become an industrial engineer if they are a college graduate with a degree in mathematics or physical science.

Tuesday, October 29, 2019

Principles And Applications Of The Financial Management Assignment

Principles And Applications Of The Financial Management - Assignment Example Constructing new office building now at a cost of $4,000,000 from funds the business currently has; ii. Investing the $4,000,000 until 2017 when the business is ready to start construction of the building, at which time it would either use all of the $4,000,000; or iii. Obtain a bank loan for $2,000,000 to help finance the cost. The returns or expenditures on the various options need to be calculated and assessed in order to arrive at the best decision. The return on investment for the 4 year period is approximately 11 percent which represents a total of $434,872. Table 1 below shows the calculations. Option - Invest the $4,000,000 and construct building in 2017 Year Amount Interest    2013 4,000,000 3.50% 4,000,000 2014 4,000,000    4140000 2015 4,140,000    4284900 2016 4,284,900    4434871.5 Interest accumulated ($4,434,872 - $4,000,000)       434,872 ROI       11% Table 1 This return of 11 per cent is considered low when the inflation rate is taken into considerat ion. The forecasted inflation rate for 2013, 2014, 2015, 2016 and 2017 was 1.7, 1.8, 1.9, 2.0 and 2.2 respectively (IMF 2013). This represents inflation of 9.2% for the 5 year period and 7 percent from 2013 to 2016. (See Table 2 in the Appendix for calculations). Therefore the real return on the $4,000,000 if invested would be 4 percent (11% minus 7%). If the building is constructed in 2017 the estimated value to construct it would be $4,415,252. See Table 2 for additional information. Computation of Value of Building in 2017 Year Amount Rate Value 2013 4,000,000 2.50% 4,000,000 2014 4,000,000 2.50% 4100000 2015 4100000 2.50% 4202500 2016 4202500 2.50% 4307563 2017 4307563 2.50% 4415252 Increase in value       415,252 Table 2 The table indicates that the change in value represents an increase of $415,252. Based on the interest calculated in Table 1 this would suggest that if the $4,000,000 was invested enough interest would be earned to cover the expected increase in the value o f the building.

Sunday, October 27, 2019

World Leaders And Their Leadership Styles History Essay

World Leaders And Their Leadership Styles History Essay Adolf Hitler is recognized worldwide for his leadership in the Nazi Party and also as the chancellor of Germany during the early period of 1930s. His leadership style was autocratic leadership as he believed in acting like a dictator and focused on making decisions on his own. He never trusted his generals and felt no need of having two-way communication as he wanted to have complete legitimate power in everything. Hitler believed that the ultimate authority resides with him and it should never be extended downward. He made decisions that were supportive in enhancing his legitimate power. Any mistake made by the followers was unacceptable and punishments were given for wrong doings (Megargee, 14). Since Hitler was reluctant to take advice from anyone and made all decisions on his own, his followers did not like this attitude and started developing ill-feelings towards him. From the analysis of Adolf Hitlers leadership style, the leaders of the todays world have realized that they cannot be a dictator and cannot get the work done by forcing their followers (Popper, 64). The modern leaders and managers in organizations have ensured that they implement collaborative methods so that the followers and subordinates are part of the team and the joint efforts will ultimately produce positive results. The leaders who have adopted this style of leadership have faced strong resistance from their followers and even received less support from them in accomplishing the ideal objectives. Mahatma Gandhi is among the favorite personality of most of the leaders worldwide and majority of them want to follow the leadership style followed by such an inspirational man (Barnabas and Paul, 135). Mahatma Gandhi had a servant style of leadership which is described as the style in which a leader takes care of his followers even before they start taking care of themselves on their own. This inspirational leader emphasized that the struggle should be done in non-violent manners without using any harmful weapons; the leader had to face severe problems such as beating by the British police and getting locked up in the prison when he started fighting with British for independence of India. Gandhi had a clear vision about the independence of Hindus and was able to communicate this vision effectively to dispersed people by using simple and inspiring language. One aspect that was stressed by the leader was never to accept defeat and keep on striving hard because success will eventually; the moral is that people should never lose hope and continue the efforts until the goal is attained (Nojeim, 30). His personality is a source of inspiration for the leaders and managers of todays world that no matter how challenging the situation gets it is important to boost the morale of oneself and the followers. As a leader, the person should motivate his/her subordinates until the victory is gained in the particular mission. Abraham Lincoln Abraham Lincoln had the desire of serving his country so that he could bring revolutionary changes that will be beneficial for its people in the long-run. Abraham Lincoln had a servant leadership style; one of the vital components of this form of leadership is the importance of ethical values i.e. working for the benefits of the people and this aspect was evident in the leadership style of Lincoln (Hubbard, 21). The servant leader wants to lead the people because he/she has internal desire of serving the people; the person does not need any legitimate power to bring the changes. Abraham Lincoln focused on the sustainability element which meant producing a lasting change that will finally lead to the transformation of others. The leader was provided the opportunity of demonstrating his leadership traits during the American Civil War; he had two lasting impacts on the world i.e. freeing the slaves and preservation of the Union (Polelle, 40). During his Presidency, Lincoln followed a prudent and careful leadership to bring about mandatory reforms in the United States of America. The leader also set the example of the paramount democracy in the world and even extended the liberty opportunity to every American. In present times, Americans have been given the full liberty of expressing their feelings and fighting for their rights and it has revolutionized the way in which democracy should be implemented by the leaders so that projected results are successfully accomplished. Even in organizations, the work culture has been changed i.e. employees are motivated to share their ideas and claim their rights as the organization is compelled to fulfill all the requirements of its workforce. Alexander the Great At the age of twenty, Alexander became the king and in eleven years of his journey he fought more that seventy battles and never lost any one of them. The leadership style of Alexander the Great is visionary leadership as he shared the vision with his people to motivate them to inspire them in achieving the well-set goals (Polelle, 23). From the analysis of the leadership traits of Alexander the Great, it is evident that he had set certain set of principles to inspire his followers such as show people that they are considered to be valuable and are given importance in every decision by seeking their opinions, lead by example so that people are inspired to follow the leader, innovation should be encouraged so that something new can be done and every action should be taken after creating a vision so that there is clarity about the goal that will be achieved (Cartledge, 14). In todays world, the leaders have realized that they need to first follow what they tell their followers so that the leaders can gain their trust. When any decision is made, it should be done on a consensus manner so that everyone agrees to it and they can see the big picture clearly. A visionary leader communicates to his followers the effectiveness of the entire process and their importance in this process so that their production level gets accelerated. Julius Ceasar Julius Ceasar was an exceptional general and one of the important leaders in ancient Rome. In his life, he held almost every vital title in the Roman Republic such as tribune of the Roman people, consul, well-known priest and high positioned commander of the army (Freeman, 32). He dared to introduce new laws that were easily approved by the Senate and he is recognized globally for improving the ways in which the provinces were governed and he even developed his own army. After conquering the Rome, he became the master and started ruling the place like a dictator. Caesar used his power for carrying out the needed reforms, relieving huge amount of debt, revised the calendar and enlarged the Senate. He was assassinated by his enemies in 44 B.C. (Popper, 70). It shows that a dictator has less chances of gaining appreciation by the followers as all other leaders who have followed the dictatorship style of leadership have never been able to get the support of their people and have faced unfortunate deaths in the form of assassination. Hence, the dictatorship leadership is not acceptable by people as the leaders tend to focus on their own benefits rather than on the followers needs. Napolean Napolean was among the best conquerors of the world and his efforts are recognized globally. During the French Revolution period, the leader took various important decisions that proved to be harmful for his followers (Blaufarb, 42). Although the positive aspects of his personality were that he had a clear vision about his goal, had the ability of motivating the people to achieve the desired goals and ensured that he took proper care of his people. However, his followers believed that the leader made decisions that were beneficial for himself and cared less for them. Napolean has received a lot of criticism for being a dictator as many wrong decisions were taken by him that severely impacted the lives of people. Since he was an ambitious person, he started making decisions without taking consent of his followers and started giving commands to his army (Polelle, 62). When he got carried away in the lust of power, he had to face defeat by the Russian Army on his way back to Austria; it shows that the dictators or autocratic style of leadership is among the least preferred styles of the leader. When a leader becomes a dictator, his/her relationship with the followers starts to get deteriorated and eventually it breaks. Napoleon is still considered to be the best conqueror in the world as he had the highly exceptional intellectual capabilities. Genghis Khan Genghis Khan was among the noteworthy leaders of Mongolia who conquered most of the Asian and European areas; his style of leadership is classified as a combination of autocratic leadership and participative leadership. Genghis Khan was considered a dictator because whenever he conquered any of the regions he would give only two options i.e. either surrender or get killed. However, when working with his army, he used to take their opinion and share his ideas with them so that they can develop a strategy for the implementation of the plan successfully (Ratchnevsky, 26). Genghis Khan moved to the loyalty to himself and he even started to deal with his adversaries in an inappropriate manner. Anyone who opposed to his conquest and power had to suffer from an extreme blow. Since Genghis Khan started treating people in a brutal way, he was assassinated later by his enemies (Man, 51). It has become important for todays leaders to realize that they can be successful only when they have cordial relations with their followers and they try to incorporate their demands so that a healthy relationship is created which will last for a long period. The autocratic leaders will face strong resistance from their followers so it is advisable to use it to minimal extent to ensure control within the organization or legal body but it should not be followed excessively as it will create problems such as retaliation from subordinates in the long-run. George Washington George Washington had a servant leadership style as he had the vision of revolutionizing everything in US during his presidency. He knew that he can motivate the people only by developing an inspirational personality and he did extensive efforts for creating the desired image. He even motivated his people to provide him support in attainment of the goals so that the set vision can be accomplished (Northouse, 72). The main characteristics of his personality as a leader were that he was willing to accept any challenge and face it; he was persistent in achieving the set targets; and was brave enough to handle all the issues and provided help to his people in resolving them. Since he had no lust for power and wanted to work for the benefits of his people, he always ensured that the decisions made by him were in accordance with the requirements of the country. As he was a trustworthy president, people started showing their loyalty to him and provided their complete assistance so that they could successfully implement any necessary change in the country effectively (Bongilla, 35). The leaders who want to gain the support of their followers have to develop their personality that has certain key traits such as confidence, integrity, courage, self-discipline and clear vision. George Washington is the best example for all those leaders who want to do something beneficial for the country and get the support of its people. Franklin D. Roosevelt Franklin D. Roosevelt is recognized for helping U.S. to get out of the Great Depression period in 1930s by helping the people in rebuilding their self-confidence. His leadership style is a combination of charismatic leadership and transformational leadership as he inspired the people to get back on their feet and initiate the activities to help the country get out of the dark times. Roosevelt provided his people various avenues to do a lot of creative thinking but with a focused approach; he first set out the vision so that everyone was aware of the final goal that has to be attained (Greenstein, 45). The best lesson learnt from the leadership of Franklin D. Roosevelt is that fear is something that needs to be conquered and there is nothing to fear about. The leaders can take inspiration from such an extraordinary leader who taught people how to maintain their focus on specific vision and face the challenges with courage and bravery. It is mandatory for every leader to accept the challenge of life and work and be prepared to handle them with confidence and will power to counter the challenge. Since the changes happen at a fast pace these days, the leaders have to remain alert all the time for the problems that can arise and they should react to them in a calm and an organized way. Winston Churchill Winston Churchill leadership style is classified as transformational and charismatic leadership; he was among those leaders who always kept the people motivated by delivering inspirational speeches. During the World War II, Winston Churchill provided immense support and guidance to the Great Britain by developing strength and courage among the people (Nordquist, 2). As a leader, he focused on three important aspects for developing a charismatic personality that comprised of elements such as excellent communication skills, creating a vision so that everyone is able to keep a focus on single goal and developing trust so that people are willing to provide their support to the leaders. From the leadership style of Winston Churchill, it is evident that the leaders have to develop a charismatic leadership by strengthening the bond with their followers so that everyone is part of the team (Axelord, 34). When the entire team shares a common vision, only then conflicts, problems and issues can be resolved. As most of the organizations have to undergo changes, they will face resistance from the people; communication is the key to resolving this issue by sharing with them the purpose of the change along with showing them the vision. Hence, excellent communication and well-designed vision can inspire people to work hard and support their leaders in achieving the desired goals. Conclusion The world leaders have demonstrated different leaderships and they have been successful in accomplishing various challenging tasks. Regardless of the dictatorship style, some of the common features that are important for the leaders and organization in todays world are creating a vision so that everyone has an idea about the goal that will be achieved in the long-run, motivating people to make valuable contributions and developing excellent communication skills so that a clear, concise and right message can be communicated to everyone. Therefore, the leaders and managers have to realize that they can achieve their objectives by getting support from their followers and subordinates and showing them appreciation for making valuable additions by offering them excellent rewards. The leaders have to develop a charismatic personality so that they can inspire their followers and should lead by example so that positive results can be attained.

Friday, October 25, 2019

Essay on Gertrude and Ophelia’s Death in Shakespeares Hamlet

Gertrude and Ophelia’s Death in Hamlet  Ã‚   The Queen gives a remarkably detailed account of Ophelia’s death leaving one to believe that she may have witnessed the event. We know that she emphasized with Ophelia’s suffering to such an extent that perhaps she realized that the kindest action to take would be to let Ophelia decide her own fate, although she clearly was not in a fit state of mind to do this and was barely aware of her surroundings â€Å"incapable of her own distress.† Ophelia’s death is â€Å"beautified† as she dies in a romantic and beautiful scene befitting her character where she was surrounded by her garland of flowers. (Ophelia herself was â€Å"beautified† in a letter from Hamlet which Polonius found to be a â€Å"vile phrase.†) There is much detail, leading me to believe that Gertrude is trying to soften the blow for Laertes who is already enraged over his father’s death and his sister’s madness; the King says, â€Å"How much I had to do to cl am his rage.† This is a typically selfish reaction of Claudius which serves to emphasize the need for Laertes to control his grief, as he is an extremely fiery character. Ophelia died after collecting flowers from over a brook. I think that she was collecting them to distribute to the court, as she did after her father’s death. Flowers are a symbol of innocence, pure and easily destroyed. The tree she was crawling along whilst collecting these garlands was a willow, which is usually associated with weeping and grief, something we have assigned to the â€Å"watery† (perhaps with tears) character of Ophelia. The branches of a willow hang down towards the ground in a downcast fashion, indicating grief. The personification even extends to her garments that were â€Å"too heavy with heir drink.† The ... ...h his actions do not reflect this thought now, he had previously written her a note saying, â€Å"But that I love thee best, O most best, believe it.† Apart from the ambiguity surrounding her death and her love for Hamlet, Ophelia is described by all as an innocent child, grappling with situations her youth is unprepared for. Even if she had consummated her love for Hamlet, I can still picture Ophelia as a vulnerable and innocent child who has to cope with situations beyond her control in a world where the role of the female is passive. It is this helplessness which Gertrude wants to look after as she â€Å"hoped thou should’st have been my Hamlet’s wife† and her madness which Gertrude wants to save her form by allowing Ophelia to make the decision over life and death. Work Cited Shakespeare, William. Hamlet. 1600? Ed. Sylvan Barnet. New York: Signet Classic, 1998

Thursday, October 24, 2019

Mark Twain Research Paper

Name — Professor Reber English 1113 10 October 2012 Mark Twain Mark Twain was a world renowned novelist and a beloved American Writer. He wrote things about what was happening in the world around him and is also a huge part of American Literature. Although Mark Twain is a famous novelist his home life, background/achievements, and greatest accomplishments are what made him who he is today. Mark Twain was more than the man we all know.For one thing, he was born as Samuel Langhorn Clemens on November thirtieth eighteen thirty-five and given the nickname â€Å"Little Sam. † In addition, his birthplace was â€Å"a two-room frame house in Florida†¦Missouri† (Cox, 7) to a John and Jane Clemens. After reaching the age of eighteen he took on an occupation in Philadelphia. Incidentally, he started working â€Å"as a cub and later as a captain for four years† (Lasky, 25) on a ship. In time, he achieved a certificate for being a Mississippi Pilot.When the Civil War broke out, Twain somewhat became a part of it. Likewise, he joined a group of friends, although none having any knowledge about fighting, war, or of the military, to fight â€Å"on the Confederate side with a small militia called Marion Rangers† (Lasky, 26). By the way, Twain was twenty-five when he moved back to Hannibal to be a part of the Militia. Mark Twain, even having little achievements, had quite the background. The root of where all this started wasn’t just at his birth, but also in his home life.Thus, Twain and â€Å"his family moved to†¦Hannibal, Missouri† (Biography of Mark Twain, 1) where he befriended slaves of his dad and uncle. As a result, this had started Twain’s negativity towards slavery when he grew older. Twain loved his family though he wasn’t so fortunate of the mishaps that were to come. For instance, he lost his father when Twain was eleven and his brother, age twenty, was â€Å"fatally scalded†¦ [when Twain ] found him on a mattress† (Cox, 43) on the Pennsylvania after the steam boat exploded killing one hundred fifty people, his brother included.On the other hand, Twain married lovely Olivia Langdon on February second eighteen seventy which follows his quote,† when you fish for love, bait with your heart, not your brain† (Brainyquotes, 2). Twain and Olivia, just like any happily married couple, also had children of their own. That is, little Langdon was their first child, born prematurely and with brittle bones, only lived nineteen months and second daughter Olivia Susan (Susy) even living up to age twenty-four had unfortunately â€Å"died from spinal meningitis† (News, 1).Twain always had problems with his middle daughter Clara, who overtime became distant to her family, and his youngest daughter, who he had the most struggles with, suffered from epilepsy (nearly trying to kill the maid during her attacks) and died at the age of twenty-nine from a heart attac k. Some things that happened in Twain’s home life marked as either turning points or became the center for some of his works. Mark Twain, unlike any other famous novelist/writer, has his very own accomplishments. The two of his greatest accomplishments is what everyone knows him famous for.The Adventures of Tom Sawyer and The Adventures of Huckleberry Finn as being his greatest and most popular works were also to quickly become his greatest accomplishments. Likewise, both books corresponded with the other about adventures of both low class, Huck Finn, and middle class, Tom Sawyer, had together and of their friendship. Another believed greatest accomplishment was his hidden eulogy that hadn’t surfaced until about two years ago. Furthermore, about his daughter Susy â€Å"a passionate eulogy† (News, 1) is guessed to have been written around the time of her death.In addition, this eulogy shows the fondness he had towards his daughter, ultimately showing she was his favorite daughter, he described â€Å"her as being ‘full of fire’† (News, 1). His occupation changed later on in his life. Therefore, he had begun to write his works â€Å"under the pen name of Mark Twain† (Synopsis, 1). In addition to all his greatest accomplishments, he had obtained the title of a sailboat pilot, novelist, journalist, lecturer, entrepreneur, and inventor. Among everything, his greatest accomplishment was him himself.Today, Twain is known for his popular works, or greatest accomplishments, thus making him a huge character for American Literature. What made him so great is through his experiences growing up, his background, and what he achieved that made up his motivation and within his works he writes of some of his incidents, his opinions, and similar adventures. All-in-all, Mark Twain may have believed his novels were his greatest achievements, but the true answer to that is what he created as himself – a legend. Works CitedBiogr aphy. CMG Solutions, 5 Jul. 2006. cmgww. com. 26 Sept. 2012. Web. Biography of Mark Twain. The Mark Twain House & Museum. marktwainhouse. org, n. d. 26 Sept. 2012. Web. Cox, Clinton. Mark Twain. New York: Scholastic Inc, 1995. Print. Lasky, Kathryn. A Brilliant Streak: The Making of Mark Twain. Orlando: Harcourt Brace & Company. 1998. Print. Mark Twain. A+E Television Networks, LLC, 2012. biography. com. 26 Sept. 2012. Web. Mark Twain. Xplore Inc, 2012. brainyquote. com. 26 Sept. 2012. Web.

Wednesday, October 23, 2019

Rough Draft

One of the points that the article talked a out was having a strong personal characteristic such as integrity and to be motivated. The defied notion for integrity is to be honest and fair and to be complete or whole. Integrity is one of the m ajar keys while on this journey. It's notes making sure you avoid plagiarism or cheating, but eke ping your nose the grindstone and keeping yourself motivated when you want to quit Everett inning. Another strong characteristic that a student will need to have is being able to be an in dependent learner.There are going to be many hours to devote to homework and studying. The more classes a dent takes the more hours they will have to carve out of their already busy schedule, so long distance learners need to possess clearances to develop the independent lea ran inning characteristic (Termini, 201 0, pig 58). The article talks about a couple of factors that come into play with long distance students as well. The first factor of being an online succ essful s dent is environmental, where family can help and support the online learners.Family can help with multiple things, like fixing dinner, doing laundry and doing errands riff there AR e any other licensed drivers in the home. This will give the online student a chance to use time management a must have to keep the student on track. If the student does not manage the IR time they will not be able to turn in their work in on time to get the adequate help from the insist rector if it is needed. The second and equally important factor is the technical aspect. To be success useful in the online structure, it will help if the student is somewhat tech saws.Everything from c immunization with the instructor, taking tests, turning in homework and watching any discs session is done with the connection of the internet. It is imperative to have the right kind of soft re to protect your computer. Also making sure the learner has the correct word processor, became use of all the research pa pers that will be written. Ill. Reflection After reading the article was surprised to find out that Titration stated † t here are certain kinds of students that can learn online†. (As cited in Boyd, 2004, pig 3139).SST dents, much like myself, getting ready to take online courses may think it is going to be far more easier then in a classroom setting, but that is not necessarily true. If the online learner do sees not have the right learning characteristic, like being self reliant and highly motivated, they ay find out that they are not able to be successful and be among the many that have dropped out. That is what challenges me. I don't want to be another drop out statistics, yet again. The SST rarities in the article are similar to the course that I'm taking.They talk about the important e of time management, setting goals, and learning to be a motivated, independent long distant student. A scripture that have for this as a reminder for me to stay strong and determine Ned is; Sec 8:6 For there is a proper time and procedure for every matter, though I person may be weighed down by misery. (NIB) IV. Application The most important thing that I have taken from this topic is that there are many factors that can help or hinder me. I have already begun the steps of good time manage meet, which in the most important key to online learning. Eve filled out a calendar with all my lessons and all my daily activities and printed it. I keep it by my laptop at all times, so I'm able to see what the day brings. Sometimes I have had to adjust a few personal activities around, so the at can make more time to study and keep ahead with my homework The calendar has also help my in my daily life. Its had kept me motivated to make time for the gym. For years have off get with myself to stay motivated in that area, but now can see it,in writing, and have to do that first thing in the morning.Another motivating factor for me will be to stay in connected with t he advisor s at my University. They can help guide me to which courses are the most important t o take first. I plan to keep connected to the university community website. Living across the coo net makes it hard to feel any kind of connection with the campus, but chatting with classmates online or watching events on the web will bring the connection closer. V. Conclusion In conclusion, have found out that it is very important to not lose hope as an online learner. Rough Draft One of the points that the article talked a out was having a strong personal characteristic such as integrity and to be motivated. The defied notion for integrity is to be honest and fair and to be complete or whole. Integrity is one of the m ajar keys while on this journey. It's notes making sure you avoid plagiarism or cheating, but eke ping your nose the grindstone and keeping yourself motivated when you want to quit Everett inning. Another strong characteristic that a student will need to have is being able to be an in dependent learner.There are going to be many hours to devote to homework and studying. The more classes a dent takes the more hours they will have to carve out of their already busy schedule, so long distance learners need to possess clearances to develop the independent lea ran inning characteristic (Termini, 201 0, pig 58). The article talks about a couple of factors that come into play with long distance students as well. The first factor of being an online succ essful s dent is environmental, where family can help and support the online learners.Family can help with multiple things, like fixing dinner, doing laundry and doing errands riff there AR e any other licensed drivers in the home. This will give the online student a chance to use time management a must have to keep the student on track. If the student does not manage the IR time they will not be able to turn in their work in on time to get the adequate help from the insist rector if it is needed. The second and equally important factor is the technical aspect. To be success useful in the online structure, it will help if the student is somewhat tech saws.Everything from c immunization with the instructor, taking tests, turning in homework and watching any discs session is done with the connection of the internet. It is imperative to have the right kind of soft re to protect your computer. Also making sure the learner has the correct word processor, became use of all the research pa pers that will be written. Ill. Reflection After reading the article was surprised to find out that Titration stated † t here are certain kinds of students that can learn online†. (As cited in Boyd, 2004, pig 3139).SST dents, much like myself, getting ready to take online courses may think it is going to be far more easier then in a classroom setting, but that is not necessarily true. If the online learner do sees not have the right learning characteristic, like being self reliant and highly motivated, they ay find out that they are not able to be successful and be among the many that have dropped out. That is what challenges me. I don't want to be another drop out statistics, yet again. The SST rarities in the article are similar to the course that I'm taking.They talk about the important e of time management, setting goals, and learning to be a motivated, independent long distant student. A scripture that have for this as a reminder for me to stay strong and determine Ned is; Sec 8:6 For there is a proper time and procedure for every matter, though I person may be weighed down by misery. (NIB) IV. Application The most important thing that I have taken from this topic is that there are many factors that can help or hinder me. I have already begun the steps of good time manage meet, which in the most important key to online learning. Eve filled out a calendar with all my lessons and all my daily activities and printed it. I keep it by my laptop at all times, so I'm able to see what the day brings. Sometimes I have had to adjust a few personal activities around, so the at can make more time to study and keep ahead with my homework The calendar has also help my in my daily life. Its had kept me motivated to make time for the gym. For years have off get with myself to stay motivated in that area, but now can see it,in writing, and have to do that first thing in the morning.Another motivating factor for me will be to stay in connected with t he advisor s at my University. They can help guide me to which courses are the most important t o take first. I plan to keep connected to the university community website. Living across the coo net makes it hard to feel any kind of connection with the campus, but chatting with classmates online or watching events on the web will bring the connection closer. V. Conclusion In conclusion, have found out that it is very important to not lose hope as an online learner. Rough Draft Identity is what defines us as a person. Everyone one on earth has their own unique identity. To showcase my identity, I created a collage of images and descriptive words, called an identi-kit. This identi-kit shows what I feel like is my identity to myself and the others. My identi-kit identifies me as a mixed martial artist. The identi-kit has images of a deadly shark with mixed martial arts gloves on that say mixed martial arts on the front and fight shorts with the words competitor and warrior on them.It also has descriptive words like â€Å"killer instinct† and â€Å"fight† which describe my spirit. There are three assumptions that come to question when asking about one’s identity. The first is if you were born with this identity? The second is if this identity was shaped because of culturally influences? The third is if the identity was created because of personal choices in your life? My identity was formed by all three assumptions of identity. orn with. M e joining and training in mixed martial arts were both culturally influenced and a personal choice.My brother and brother-in-law influenced me in mixed martial arts and then it was my personal choice to train and experience mixed martial arts. My never give up and go for the kill attitude was what I was born with. My identi-kit shows that my identity is a mixed martial artists that is disciplined and has a killer instinct when it comes to competition. The images and words on the identi-kit were carefully chosen to fully project my identity. One image that was chosen is an image of a shark that looks ferocious and ready to go one more round.This image displays that I am the same way. When it comes to training and competing I am mean and will go one more round to win. Quitting is not an option in my life. There is a phrase on my identi-kit and it says â€Å"Killer Instinct†. This phrase was chosen because it is very descriptive and shows that I have the killer instinct to fight through the pain and suffering. There are many images of fight shorts that have words on then that are very important in my life. The two that are my favorite have the words â€Å"Warrior† and â€Å"Competitor† on them.These words were chosen to reflect my identity as a competitor and a warrior when it comes to mixed martial arts and life in general. One image on the identi-kit shows the word â€Å"Hayabusa† which is the fastest falcon in the world. To me hayabusa means to be fast and quick but do not hurry. The Hayabusa is the fastest bird in the world that is fast and quick but does not screw up. My life revolves around working fast and quick but not to mess up at the same time. The images and phrases put together on the identi-kit help others to identify me because they are all very descriptive and imaginative.The identi-kit forms my identity to other people because to train and compete in mixed martial arts you have to be much disciplined, self-motivated, a nd have the killer instinct to go and fight with another human being. I was born with my identity and at the same time influenced and made the choice to do what I do. My identity was created by all three assumptions of identity while with others it could be just one or two assumptions that made who they are. I was born with me living my life in the fast lane. I have to keep on moving and trucking without ever stopping.I was born with my killer instinct and passion for competition. My involvement in mixed martial arts was influenced and a choice. Everyone has their niche in life. Some people are good at football, others in academics, while I was good at mixed martial arts. I was not interested until my family started to getting me involved by watching live mixed martial arts events on television. As I watched more events the more I became interested and encouraged to get involved. Then came my personal choice to start training in mixed martial arts and I never regret making that deci sion.To some extent identity is a performance. For some people it’s to satisfy the likes of others. For some it’s trying to join a certain community. For most identity is not a performance. Identity is not something you can â€Å"put on† or â€Å"take off†. Sadly for others identity is exactly what was just stated. In order for some people to be happy and impress others they put on an identity in order to fit in. For some it’s a personal choice and for others they are influenced by the culture that surrounds them. What is cool to some may be uncool to others.To some smoking dope is cool and if you do it you are cool but to others like myself I do not think smoking dope is cool. I do not think it is cool but I do not hate anyone that does smoke it because that is their identity and a personal choice. My identity is not to impress anybody or to fit in with a certain crowd, my identity is what makes me happy and what labels me to other people. People want to be cool and be liked, so they commit to an identity that is not who they really are. The thing that makes us is us. For me my identity is what it is and others may not think it is cool or not right but it is who I am and what makes me.My identi-kit showcases who I am and what I am like. It displays my label to me and others. It shows that I love the aspect of competing and having the killer instinct to do so. This is important because it shows my identity is not something you can just put on and then later take off. Every image and phrase on my identi-kit is a little piece of who I am and what I offer to others. My images and phrases were the perfect strategies to display my identity and in doing so helped me to identify myself. What makes us who we are?

Tuesday, October 22, 2019

Videoconferencing Saves Money and Time

Videoconferencing Saves Money and Time Free Online Research Papers A common obstacle in the business world with regards to budgets and time management is the issue of travel. Many corporations have several locations world wide that require live or â€Å"real-time† communication. Some other scenarios are: those who are trying to sell their products or close deals, consultants, companies that have corporate trainers, global colleagues that are on a team assignment or to demonstrate a product. While we understand that the lifeblood of business is personal contact- the human voice, the human face, and real-time interaction it is not always economical to physically be there. Also, the environment has never been of greater concern than it is today. We all have a responsibility to protect the environment and reduce the need for travel to try and drive down CO2 emissions (or carbon footprint). In the past, people didn’t have many effective alternatives for meetings and information exchange. They would travel via automobile, plane or train to be there in person. This becomes extremely expensive, time consuming and detrimental to a companies bottom line. An exhausted, stressed out employee will not always perform as needed under these circumstances. Times are tough all over right now and I’m sure companies would rather spend their money in research and development area than on travel costs. There were also telephone conferences, but they are not as effective due to the lack of visual reactions and body language interpretation. Lastly, disks or CD-ROMs with recorded presentations were mailed. This lacked personal connection and was not real-time information. In the past video teleconferencing was achieved by closed circuit television technology. This was a very expensive method and required a sound proof studio and a whole lot of expensive paraphernalia. This also required a trained staff at both or all stations of the video conferencing. That made this technology available only to the very large business in the private sector as well as government agencies. The cost implications were prohibitive for small industries and companies who found flying across the globe to meet their business partners a more economical way of communication. The Internet has changed all that. Desktop conferencing has become a reality with the advancement of the Internet. Business executives, government heads and even homemakers can turn on a videoconference at the flick of a button through the computers on their desktops. The technology is easy to use with even elementary students being able to use it. Through desktop conferencing, people can connect to another group of people and discuss various subjects ranging from what movie they just saw to North Koreas nuclear program. Videoconferencing uses telecommunications of audio and video to bring people at different sites together for a meeting. Videoconferencing, at its most basic, refers to communications technologies that integrate audio and video in real time, and help people in multiple locations stay in contact. It’s a lot like a teleconference, but it’s more flexible and provides for more options in your conversation. All you need is a browser, a computer, and a high-speed Internet connection, plus a functioning web cam and a good microphone to talk to people across the world. There is a couple of different ways web conferences work. How it typically would happen is a â€Å"host† prepares all the necessary documents and material that he or she will need throughout the meeting and set a date and time. Then the initiations are sent out via email or other methods giving the other individuals the time, date and if needed the access code for security reasons. Which one you choose is really up to you. The first is the invite and pass code version where the host of the meeting tells or sends and invite to all the members of the meeting giving instructions on how to login to the meeting. There are given and required to have a pass code which are prompted to type in. This is the step that allows the meeting to be kept private for security reasons. Then there is the sever based web meeting. This type of conference is kept on an internal server protected behind a firewall for the entire meeting. This means that the meeting is secure because it is held internally and behind various firewalls; therefore there is no password or code needed in order for the members of the party to participate. You can either use the software and use their servers or purchase the software license and use it on your own servers. There are several areas where videoconferencing, webconferencing or telepresence has shown its value. In the business world, there have been studies that showed a 30% decrease in travel in the first year it was implemented alone. That money saved can be used for other important needs. (like keeping benefits from evaporating) In addition to business, the following areas have also proved this technology to be invaluable. Ø Hearing impaired: Deaf and hard of hearing individuals have a particular interest in the development of affordable high-quality videoconferencing as a means of communicating with each other in sign language via long distance. Ø Education: Teachers and lecturers from all over the world can be brought to virtual classes in remote places. Students are able to explore, communicate, analyze and share information and ideas with one another. Through videoconferencing students can visit another part of the world to speak with others, visit a zoo, a museum and so on, to learn. These virtual field trips can bring opportunities to children, especially those in geographically isolated locations, or the economically disadvantaged. Small schools can use this technology to pool resources and teach courses (such as foreign languages) which could not otherwise be offered. Ø Telecommuting: Companies that do not want to lose employees due to relocation or other reasons that prevent them from physically being in the office, now have the technology to â€Å"virtually† be there. The following link in an ABC News report that give one such example. Very interesting! Ø Telemedicine/Telenursing: Videoconferencing is very useful technology for telemedicine and telenursing applications, such as diagnosis, consulting, transmission of medical images, etc., in real time in countries where this is legal. Patients may contact nurses and physicians in emergency or routine situations. Physicians and other paramedical professionals use this as a resource to discuss cases across large distances. Rural areas can also use this technology for diagnostic purposes, thus saving lives and making more efficient use of health care money. UnitedHealth Group and Cisco are partnering to build the first national telehealth network This will give patients access to physicians and specialists when in-person visits are not possible. Cisco will be one of the main technologies to help people using video, audio and medical information to create an experience similar to an in-person visit with a doctor. I have a personal experience to relate to this topic. A couple years ago, I applied for a Purchasing Manager position with a company that was recently acquired by a German global corporation. After I had interviewed with the local management, they called me back in to meet with the Global Purchasing Director who was from Germany. I expected to see him in person, but instead I was seated in front of what I thought was a television. It was actually a real-time videoconferencing system. The only thing we couldn’t do was shake hands†¦it was a neat experience. For individuals whose families have great distances between them, they can now stay in touch via real-time videoconferencing on their personal computers if they have the Internet and a web cam. Companies such as Skype and Yahoo offer such services. The military is also using this technology for it’s soldiers and their families by using a company called Polycom. This service has better security and quality of service and is widely used in large coporations and the government. This technology not only benefits corporate businesses, but even educational institutes, medical groups, security agencies, emergency response centers and others can use video conferencing in their daily operational activities. Thus, web meeting can be not only be helpful but also can make a vital difference to our lives. There are a few drawbacks to web-based conferencing. If users in your Internet meeting don’t have sufficient bandwidth, the conference can become laggy for all participants. Fortunately, broadband penetration is growing by leaps and bounds throughout each country yearly. Over the coming years, this issue will slowly disappear, as less and less dial-up accounts are used, especially in business settings. There has been an enormous growth of companies that specialize in this type of communication service. Some of those companies are Webex, ooVoo, GoToMeeting, ComBOTS and Skype. Many offer their service for free. According to a recent publication, video telepresence is one of eight emerging technologies that will have a transformational business impact and should be strongly considered for adoption by technology planners in the next 10 years. Further growth of managed IT services has been predicted by a number of analyst houses, despite the slowdown in the global economy. On the personal-user side there are companies cropping up that offer a walk-in storefront where you can use their equipment to vieoconference others from around the globe. One such company is called Order Express. They’re main business was check cashing and money transfers (wires) until the owner of one franchise got an idea while dusting some videoconferencing equipment in an office. This was particularly appealing to illegal immigrants that missed their families back home. Since 9/11 there is stricter border control, which makes it nearly impossible for them to get back into the country. For about $40 they can talk and see their families for about 30 minutes. Many of these businesses are so busy you have to make reservations weeks and even months in advance. Businesses across the world are feeling pressure to maintain or increase revenue, while keeping a close eye on costs. Web-based conferencing is a huge improvement over chat rooms, due to audio, video, and slide sharing. Globalisation has meant that there is more need than ever for people to collaborate. With face-to-face meetings proving both expensive and impractical, businesses are looking to videoconferencing to keep their business running in a cost effective manner. Many companies are stating they are making up their initial investment for equipment within four to five months by cutting down on travel. Thay also state that within a few minutes they forget it’s a web conference and feel like they are there. In the old way of doing business, it would take them weeks to make a decision. Now everyone can collaborate immediately because everyone sees the same things at the same time, and they can make decisions a lot quicker. Remember how the CEOs at the big three automakers flew to Washington in private jets to ask for a bailout? Well, after being brought back to Earth by a barrage of deserved what-were-they-thinking? outrage, the big boys decided to give up their private jets. And PR reps at the big three subsequently announced that whenever possible, employees at those companies would videoconference instead of travel. Now they get it. In todays world, many people have real concerns about the safety and security of global travel. Having the ability to accomplish objectives and to maintain strong lines of communication without the need to cross borders provides many business people (and their families) with peace of mind and an increased sense of security. What is the future of videoconferencing? The possibilities seem endless. Like how about no more blind dates? Or no more snow days? What about Hologram Technology? The first time I saw that used in real life was during this last election on CNN. It’s not just for the movies anymore. In general, video conferencing is here to stay. It saves a lot of time, money and energy and increases productivity while reducing our carbon footprint. Web meetings as such will not remain the same way. Changes are a part of life and we have got to adjust with it and accept it as part of daily lives. This way, we can always remain a step ahead of the rest. Let’s hope this will we change the way we communicate and for good. Research Papers on Videoconferencing Saves Money and TimeThe Project Managment Office SystemBionic Assembly System: A New Concept of SelfOpen Architechture a white paperIncorporating Risk and Uncertainty Factor in CapitalThe Effects of Illegal ImmigrationMarketing of Lifeboy Soap A Unilever ProductDefinition of Export QuotasRelationship between Media Coverage and Social andGenetic EngineeringTwilight of the UAW

Monday, October 21, 2019

How a Magnetic Train Works

How a Magnetic Train Works Masayuki Shibata is a highly trained and capable professional in the field of engineering. He holds a doctorate degree in science from Tsukuba University. Immediately after obtaining his Doctor of Science degree, he joined Hitachi Ltd in 1988. Currently, he works at the Hitachi laboratory.Advertising We will write a custom essay sample on How a Magnetic Train Works specifically for you for only $16.05 $11/page Learn More For a long time, he has developed deep interest and practice in railway systems that are magnetically levitated. In other words, he has adequate professional knowledge and background on how magnetic trains work. Due to his reputation, he is a member of both the Japan Physics Society and the Cryogenic Engineering Association. Maki furthered his studies from a bachelor’s level and now holds a Ph.D. degree in science. He once worked as a director of the Superconducting Research Centre. This is part and parcel of the Hitachi Research labo ratory. He has vast knowledge in the development of superconducting generators as well as engineering background on the working principle of trains that are magnetically powered. He is an active member of IEEE, Japan Radiation Institute, and the Cryogenic Engineering Association. Toshio Saito graduated in March 1977 from Hokkaido University with a Master’s degree. He immediately joined Hitachi Ltd. He is also keen participant in the development of railway systems that are magnetically levitated. Takashi Kobayashi holds a Master’s degree in electrical engineering. Apart from a solid academic background, he has acquired vast knowledge in various working stations such as Hitachi Ltd. He is a reputable scientist in magnetic flux studies. For instance, one of his work stations was the Superconducting Research Centre. He has written a lot of study materials on magnetic flux and levitation. Shunsuke Fujiwara has a Ph.D. degree in Engineering. He has gained a long term experie nce when working with Maglev Technology Laboratory. He has lifetime membership to IEEJ. Tsuyoshi is also a member of IEEJ and has worked with Railway Technical Research Institute, Maglev System Division and the Guide way Engineering Department. The peer reviewed journal article by Fujiwara and Fujimoto has been divided into summary, introduction, working principle of magnetic trains, analysis of characteristics, and numerous examples of how magnetic trains work. The article has a list of references from reputable sources. Although I will go over several sections of this article, my main area of focus will be the working principle of magnetic trains. The intended target audiences are the professionals in electrical engineering or students pursuing studies in electrical engineering.Advertising Looking for essay on engineering? Let's see if we can help you! Get your first paper with 15% OFF Learn More In the second journal article by Shibata et al, the material has been divided into 1) Summary 2) introduction 3) working principle of a levitation coil 4) optimization of a levitation coil and 5) worked out examples and discussions. Although there is no list of references at the end of the article, each of the contributors of the journal is an authority in electrical engineering. Professionals or students of electrical engineering are the key target audience. According to Shibata, Maki, Saito and Kobayashi (1993, p.112), superconducting magnets have become crucial when constructing magnetically levitated trains. Usually, the side walls are used to mount the levitation coils within the maglev rail system that can be used with a magnetic train. The authors are quite categorical that a magnetic flux is generated by the induced current along the levitation coils. Hence, there must be higher order harmonics for adequate magnetic force to be generated. Usually, the eddy currents are generated by harmonics near the surface where the superconducting magnets are positioned (Shibata et al 1993, p. 113). Due to the presence of the static magnetic field and the eddy currents, a powerful force is produced. As a result, the available helium liquid evaporates. The authors observe that the interaction of these forces lead to the generation of amplitude and continuous magnetic flux that eventually lead to movement of a train. In order to create a better understanding of the working principle of a magnetic train, the authors have used several illustrations in form of diagrams and worked out examples. The figure below shows a magnetically levitated train. Source: (Shibata et al 1993, p. 112)Advertising We will write a custom essay sample on How a Magnetic Train Works specifically for you for only $16.05 $11/page Learn More From the above diagram, it can be seen that the guide way is electronically manned by the thrust coil, levitation coil, superconductor coil and the coil vessel. Guidance and levitation of the magnetic train is made possible by the fundamental flux which is produced by the harmonic flux and ground coils (Shibata et al 1993, p. 115). On the same note, Fujiwara and Fujimoto present a working principle of a magnetic train that makes use of both the guiding scheme and levitation (Fujiwara Fujimoto 1993, p.124). The figure below shows how the ground coils are connected parallel to each other. Source: Fujiwara Fujimoto (1993, p.124) The working principle is the same although there are slight modifications. For example, the EDS maglev vehicle is adjusted in such a way that the magnetic drag force is significantly reduced. There are two rectangular unit coils that make up the levitation coil. These rectangular coils prevent any induction of electric current around the levitation coil. Hence, the guidance and levitation functions are performed by both the left and right coils (Fujiwara Fujimoto 1993, p.128). References Fujiwara, S. Fujimoto, T 1993, â€Å"Characteristics of Combined Levitation and Guidance EDS Maglev System.† Electrical Engineering in Japan, vol. 113 no. 3, pp, 123-134. Shibata, M., Maki, N., Saito, T. Kobayashi, T 1993, â€Å"Levitation Coil length Optimization of a magnetically Levitation Train.† Electrical Engineering in Japan, vol. 113 no. 2, pp. 112-121.Advertising Looking for essay on engineering? Let's see if we can help you! Get your first paper with 15% OFF Learn More

Sunday, October 20, 2019

North American Birch Tree Identification

North American Birch Tree Identification Most everyone has some recognition of the birch tree, a tree with light-colored white, yellow, or grayish bark that often separates into thin papery plates and is characteristically marked with long horizontal  dark raised lines (also known as lenticils). But how can you identify birch trees and their leaves in order to tell different types apart? Characteristics of North American Birch Trees Birch species are generally small- or medium-sized trees or large shrubs, mostly found in northern temperate climates in Asia,  Europe, and North America.  The simple leaves may be toothed or pointed with serrated edges, and the fruit is a small samara- a small seed with papery wings. Many types of birch grow in clumps of two to four closely spaced separate trunks.   All North American birches have double-toothed leaves and are yellow and showy in the fall. Male catkins appear in late summer near the tips of small twigs or long shoots. The female cone-like catkins follow in the spring and bare small winged samaras drop from that mature structure. Birch trees are sometimes confused with beech and alder trees. Alders, from the family  Alnus, are very similar to the birch; the principal distinguishing feature is that alders have catkins that are woody and do not disintegrate in the way that birch catkins do. Birches also have bark that more readily layers into segments; alder bark is fairly smooth and uniform. The confusion with beech trees stems from the fact the beech also has light-colored bark and serrated leaves. But unlike the birch, beeches have smooth bark that often has a skin-like appearance and they tend to grow considerably taller than birches, with thicker trunks and branches.   In the native environment, birches are considered pioneer species, which means that they tend to colonize in open,  grassy areas, such as spaces cleared by forest fire or abandoned farms.  You will often find them in meadowy areas, including meadows where cleared farmland is in the process of reverting to woodlands.   Interestingly, the sweet sap of the birch can be reduced into syrup and was once used as birch beer. The tree is valuable to wildlife species that depend on the catkins and seeds for food, and the trees are an important timber for woodworking and cabinetry. Taxonomy All birches fall into the general plant family of  Betulaceae, which are closely related to the  Fagaceae  family, including beeches and oaks. The various birch species fall into the  Betula  genus, and there are several that are common North American trees in natural environments or used for landscape design purposes. Because in all beech species the leaves and catkins are similar and they all have very much the same foliage color, the main way to distinguish the species is by close examination of the bark.   4  Common Birch Species The four most common birch species in North America are described below.   Paper birch (Betula  papyrifera): Also known as canoe birch, silver birch, or white birch, this is the species more widely recognized as the iconic birch. In its native environment, it can be found in forest borders across the northern and central U.S. Its bark is dark when the tree is young, but quickly develops the characteristic bright white bark that peels so readily in thick layers that it was once used to make bark canoes. The species grows to about 60 feet tall but is relatively short-lived. It is susceptible to borer insects and is no longer used widely in landscape design due to its susceptibility to damage.  River birch (Betula nigra): Sometimes called black birch, this species has a much darker trunk than the paper birch, but still has the characteristic flaky surface. In its native environment, it is common to the eastern third of the U.S. Its trunk has a much rougher, coarser appearance than most of the other birches, and it is bigger than the paper birch, sometimes growing to 80 feet or more. It prefers moist soil, and although short-lived, it is relatively immune to most diseases. It is a common  choice in residential landscape design.   Yellow birch (Betula alleghaniensis): This tree is native to forests of the northeast U.S. and is also known as the swamp birch due to the fact that it is often found in marshy areas. It is the largest of the birches, easily growing to 100 feet in height.  It has silvery-yellow bark that peels in very thin layers. Its bark does not have the thick layers seen in paper birches nor the very rough texture seen in river birches.  Sweet birch (Betula lenta): This species, also known in some areas as the cherry birch, is native to the eastern U.S., especially the Appalachian region. Growing to 80 feet, its bark is dark in color, but unlike the dark river birch, the skin is relatively tight and smooth, with deep vertical scores. From a distance, the impression is of a smooth, silver bark marked by irregular vertical black lines.

Saturday, October 19, 2019

SLP 1 - Strategic Review Simulation Essay Example | Topics and Well Written Essays - 1000 words

SLP 1 - Strategic Review Simulation - Essay Example In order to understand the outcome of the strategies adopted by Schmoe during his tenure it is important to gain insight into how strategies can help companies flourish and how each element of strategy making can affect the possible outcomes of the business (Henry, 2008). Clipboard Tablet Co is observed to be the presently manufacturing computer tablets manufacturing and advertising different tablet models namely X5, X6 and X7 as their recent brands in the market. It has been observed that tablet X5 is proponed by the customer’s who are price conscious. The second model X6 is proponed by the customers who are quality conscious. However the third model X7 is proponed by those customers who give accent to price as well as quality of the product for purchasing. The availability of the three different models by the company is as follows: X5 for seven years ending 2015, X6 for last six years, and X7 for five years till the completion of 2015. Beforehand the company decided the fina ncial value of these brands as: X5 for $265, X6 for $420 and X7 for $195 respectively. However, it was observed that the brands X5 and X6 were profitable in the duration between 2010 and 2015 with an increase in the market value. On the other side the brand X7 was unprofitable and attain loss till 2013 afore achieving the profit in 2014 and 2015. Financial review The marketing of X5 in was equivalent to 968,979 in 2011 and 1,647,592 in 2012 that had an increment up to 70%. The interest that was accomplished from the marketing also had an increment from 276,159,075 in 2011 to 469,563,809 in 2012 which up to 70%. It clearly indicates the good performance of brand with an elevation in the financial value as well as in the interest. An increase in the profit of this brand is observed again up to 30% during 2013 on account of the first time customers who availed 86% of total sale volume. Though after 2013 the marketing of X5 started to abate with an abated interest while in 2014 a revers e growth is observed up to 14% and up to 48% in 2015. The marketing value from the first time customers when compared between 2015 and 2012 reveals that it had increased up to 66% in 2012 while abated up to 72% in 2015. However the repeat purchase elevates only up to 26% in 2015 in comparison with a high increase of 96% in 2012. Financially, the prices for manufacturing of X5 elevated by 42% and 23% in 2012 and 2013 respectively but it had abated by 19% and 37% in 2014 and 2015 respectively. The price of research and development had an incision of 33% in 2012 and remains constant for many years due to which the first time customers lost their interest. In 2011, the worth of X5 was found to be 16% which increased up to 30% in 2012 and 34% in 2013 which reveals the good performance of the company with high marketing. Conclusively, the overall the interest is found to descend in 2014 with 32% while in 2015 it remains only 17%. The brand of X6 began laboriously in 2011 with an acquisiti on of increment in marketing up to 129% in 2012 comparatively in 2011. The growth in first time custom

Friday, October 18, 2019

To what extent can the marketing mix be quintessentially standardised Essay

To what extent can the marketing mix be quintessentially standardised within the international marketplace - Essay Example strategies which are incorporated into the new competition that is a part of the market as well as the changes which have occurred within the internal and external environment are also altering the strategies which can be used. Defining the marketing strategies in the marketplace as well as the standardization which can be used can also offer new implementation of marketing in a different manner at a global level. The foundational concepts that are associated with marketing and the international marketplace are relevant because of different activities, organizational structures and practices which are required by organizations. The marketing strategies which are used are now an integral part of building an international marketing scenario, specifically with corporations that are beginning to expand globally and which are interested in creating multinational corporations. The strategies which are incorporated into the marketplace are essential because they create a relationship within the internal organization as well as through the customers that are interested in a business at an international level. The activities which take place, structure of the company and the ability to communicate effectively with those that are looking into different corporations then become an integral part of the marketing initiatives. Ensuring that the communication from marketing as well as the responses that are incorporated into the different organizations is effective makes a difference in the capabilities of an organization to work toward an international reputation (Czinkota, Ronkainen, 17, 2007). The concept of marketing is not only important because of the need to create new strategies to meet the international expectations within the market. There are also alterations that are related to the process which has to be incorporated as well as the ability to move through the benefits and challenges which are associated with international marketing. Surviving through

Critical Thinking Questions Assignment Example | Topics and Well Written Essays - 250 words

Critical Thinking Questions - Assignment Example Other times, the listener is preoccupied with other things apart from what the listener is talking about at that moment. In other times, the listener is ego-occupied, or very busy with personal needs to concentrate on what is being conveyed. Lack of interest or curiosity in the message being delivered or lack of energy to listen is another hindrance to listening well. Listeners literally choose not to have an attachment with what the listener is saying and end up not getting anything. Many listeners simply do not have adequate listening skills while others have no discipline in controlling themselves. Others lack the motivation to take up responsibility for good listening habits. There are various ways to improve your listening ability. One you have to be alert and force yourself to pay attention. To achieve this, you have to be disciplined and responsible you have to make right decisions and know that listening is beneficial to you. This means that you will have to force your mind to concentrate on the speaker. Second, you need to concentrate on improving your interpreting. You can achieve this through be attentive and following the speaker from beginning to the end. You have to understand the exact context to which the speaker is in i.e. knowing the meaning of the message being delivered. Third, you need to think from the speakers viewpoint. This means connecting with the speaker and developing a mind picture of what the speaker is conveying this will help you not to be lost in the course of conversation. Finally yet importantly, you will need to consciously try to remember. You will never be in a position to process information if memory is left out. With out remembering, you will not be able to connect words to bring out a meaning of what is being said. Without memory, you will not understand the full meaning of any message.

Travel in South Africa Essay Example | Topics and Well Written Essays - 1000 words

Travel in South Africa - Essay Example The country is characterized by world class infrastructure, friendly citizens as well as spectacular scenery. This sector received a major boost during the 2010 world cup when it received the highest number of visitors in history. There are various benefits associated with the industry in South Africa. Tourism and travel provides foreign exchange for the country. This gives the governments enough money to offset the foreign debts, allows the South African Rand to remain at par with the US dollar. It also allows the government to pay its employees (Walker and Keith 15). This means that governments have money that is dedicated towards constructive projects such as education, infrastructure as well as health care. The South African citizens that go for shopping sprees abroad have the money to buy goods and services as long as the foreign currencies are readily available in the economy (Walker and Keith 22). Finally, tourism and travel facilitates exportation of goods into the country. Tourism and travel leads to the direct and indirect creation of jobs. When tourists visit the country, it leads to job creation for jewelry trades, drivers and vendors that are directly involved in the sector (Walker and Keith 33). Tourism and travel also has an indirect impacts on landlords and other traders. The sector plays a key role in ensuring job creation in the hotel and entertainment industries. As earlier stated the tourism and travel sector employs one out of every twelve individuals in the economy. The tourism sector contributes towards infrastructure development as the government works towards developing roads, electricity and communication networks in the country to attract tourists. This results into an infrastructure improvement in the country (Walker and Keith 67). The tourist and travel sector results into cultural preservation through economic and cultural incentives. Finally, it results

Thursday, October 17, 2019

Ontario and Forest Sustainability Essay Example | Topics and Well Written Essays - 2750 words

Ontario and Forest Sustainability - Essay Example Although Canada is often deemed, from a romantic point of view, as a source of endless beauty and natural resources, this is simply not the case. There are limits. The Ontario forests are owned primarily by the province of Ontario, under the auspices of the "Crown Forest", and represent more than ninety percent of all forested land in the province; of these forested lands, slightly more than thirty percent have been allocated for productive uses. These productive uses include the cutting down of timber, tourism, and a variety of other uses. Because these forested lands provide different benefits to different groups, both aesthetic and economic, philosophical conflicts are inevitable. The provincial Ministry of Natural Resources of Ontario asserts that it is doing everything possible to sustain the forested lands; and, yet, there are those that counter that more needs to be done given certain data suggesting that sustainability problems have occurred and continue to emerge. The questi on presented, in short, is whether Ontario is doing enough, both in terms of policy formulation and implementation, in order to truly ensure sustainability. I am of the view that, while Ontario's actions seem superficially comprehensive and cohesive, the fact is that there remain very real problems regarding the forests and related industry. How might Ontario better approach this issue of sustainability I will attempt to provide some answers by discussing the goals and types of sustainability, some of the policies and programs adopted in Ontario, and the ultimate reality on the ground. Sustainable Development Defined As a preliminary matter, it is important to define what is meant by the term, sustainable development. The most widely accepted definition has been attributed to the Bruntland Commission which stated that sustainable development is that type of development that "meets the needs of the present without compromising the ability of future generations to meet their own needs."1 This implies a policy model that emphasizes regeneration; more specifically, sustainable development demands that our actions today do not disadvantage people in the future. The difficulty is that sustainability must account for several sub-types of sustainability; these sub-types include environmental sustainability, political sustainability, social sustainability, and economic sustainability. One can easily imagine the conflicts which arise when one group tends to emphasize environmental sustainability, for instance, and another group chooses instead to emphasize political sustainability given certain economic p ressures and rewards. These competing points of view have been stated as philosophies or ideologies governing how policy should be inspired and designed. The ecocentric school of thought treats everything as an interrelated living whole and posits that all policy decisions must account for all types of sustainability2; the anthropocentric approach, on the other hand, holds that the well-being of human beings must transcend all other concerns.3 Many critics have argued that the anthropocentric approach has resulted in legislation and policies which have exacerbated rather than minimized certain sustainability concerns. An

Wednesday, October 16, 2019

How children learn the sounds of their language Coursework - 1

How children learn the sounds of their language - Coursework Example From the outset children learn to speak as the result of being part of a social and cultural fabric. Halliday (1980) proposes that we ‘learn language, learn through language and learn about language simultaneously as we use language’. Language cannot be learned in isolation from others. As soon as children are born they enter the world they find themselves to be part of adult conversations. For the most part ‘motherese’ (see vialle, Lysaght & Verenkina 2000, p.74), is an extremely small part of the language children hear. The overwhelming majority of the language forms in the children’s immediate culture and environment is framed in adult conventions without any attempt to simplify. As parents and others care for the daily needs of children they chatter to the child, asking questions (‘who’s a pretty baby? Did you have a big sleep?’), they share family stories (‘Grandma’s coming today and we are going shopping’) and they use language that they neither expect the child to understand or respond to at this stage. Families include children in their language acts as they gather around their new offspring. And all this time there is myriad background talk emanating from radios, televisions, computers and often other siblings. While this language may often seem to be a jumble of noise and sounds, there is always one constant in play: meaning is being developed through social interaction. This is the driving force that will operate throughout the initial years in each child’s language development and beyond (vialle, Lysaght & Verenikina 2000, p.66). Language learning is a mutual process -- Children are not passive passengers in the language that surrounds them. Young children can understand a great deal a long time before they can actually vocalize any recognizable words. As active participants in the everyday interactions of life, gradually children realize that

Ontario and Forest Sustainability Essay Example | Topics and Well Written Essays - 2750 words

Ontario and Forest Sustainability - Essay Example Although Canada is often deemed, from a romantic point of view, as a source of endless beauty and natural resources, this is simply not the case. There are limits. The Ontario forests are owned primarily by the province of Ontario, under the auspices of the "Crown Forest", and represent more than ninety percent of all forested land in the province; of these forested lands, slightly more than thirty percent have been allocated for productive uses. These productive uses include the cutting down of timber, tourism, and a variety of other uses. Because these forested lands provide different benefits to different groups, both aesthetic and economic, philosophical conflicts are inevitable. The provincial Ministry of Natural Resources of Ontario asserts that it is doing everything possible to sustain the forested lands; and, yet, there are those that counter that more needs to be done given certain data suggesting that sustainability problems have occurred and continue to emerge. The questi on presented, in short, is whether Ontario is doing enough, both in terms of policy formulation and implementation, in order to truly ensure sustainability. I am of the view that, while Ontario's actions seem superficially comprehensive and cohesive, the fact is that there remain very real problems regarding the forests and related industry. How might Ontario better approach this issue of sustainability I will attempt to provide some answers by discussing the goals and types of sustainability, some of the policies and programs adopted in Ontario, and the ultimate reality on the ground. Sustainable Development Defined As a preliminary matter, it is important to define what is meant by the term, sustainable development. The most widely accepted definition has been attributed to the Bruntland Commission which stated that sustainable development is that type of development that "meets the needs of the present without compromising the ability of future generations to meet their own needs."1 This implies a policy model that emphasizes regeneration; more specifically, sustainable development demands that our actions today do not disadvantage people in the future. The difficulty is that sustainability must account for several sub-types of sustainability; these sub-types include environmental sustainability, political sustainability, social sustainability, and economic sustainability. One can easily imagine the conflicts which arise when one group tends to emphasize environmental sustainability, for instance, and another group chooses instead to emphasize political sustainability given certain economic p ressures and rewards. These competing points of view have been stated as philosophies or ideologies governing how policy should be inspired and designed. The ecocentric school of thought treats everything as an interrelated living whole and posits that all policy decisions must account for all types of sustainability2; the anthropocentric approach, on the other hand, holds that the well-being of human beings must transcend all other concerns.3 Many critics have argued that the anthropocentric approach has resulted in legislation and policies which have exacerbated rather than minimized certain sustainability concerns. An

Tuesday, October 15, 2019

Phantom Time Theory Essay Example for Free

Phantom Time Theory Essay There are a few German scholars who believe that a 300 year time period was just written in the history books, without actually existing. The gap in history has been coined the Phantom Time Theory or Phantom Time Hypothesis. Although it is not a very widely accepted theory, there is a fair amount of evidence to back it up. Time itself has very many definitions, the historical records of the time don’t coincide, and astronomy and dendrochronology can’t definitively prove the theory wrong. What exactly is time? One of time’s many definitions is â€Å"the system of those sequential relations that any event has to any other, as past, present, or future; indefinite and continuous duration regarded as that in which events succeed one another,† (Time 784) Basically, this means the order of events occurred in relation to each other. Since there are numerous other definitions time is very subjective and who is to say that time even really exists. Different countries have different calendars and started counting years at other various times. For example, the Islam calendar started in the year we know as 622 AD. Niemitz asks â€Å"How was it possible to insert this phantom time into history? †(8), which has no easy answers. One might respond in a way as to say that we made a mistake when changing from the Julian calendar to the Gregorian calendar. If that were to be the case, then how would it have been a 300 year oversight? Maybe, the switch in calendars may just be a small part of the problem; could it have been the start of the falsified history? If so, then where else could the gap have come from? Most of the historical documents of the time seem to have either been falsified or just don’t exist. For example, Heribert Illig believes â€Å"†¦Charlemagne was a fictional character,† (Bellows 1). If Charlemagne was a made-up figure in history, than what else has been made up about that era? Maybe all of it has been fictionalized by some mass conspirators, or maybe certain documents of the time have just been translated incorrectly and certain historical feats did not actually happen. Also, there are large gaps in historical documents like â€Å"†¦the doctrine of faith, especially the gap in the evolution of theory and meaning of purgatory†¦,† (Bellows 3). With gaps in historical documents like this, it leaves a doubt in the mind of anybody that ponders the existence of this time period. If there are gaps in historical documents like this, then maybe there are gaps in the history itself, as well. John states in his narrative that â€Å"Often, historiography just consisted of archiving anything at all†¦Ã¢â‚¬  (John 5). So, maybe most of the history as we think we know is nothing but false assumptions. But, this whole theory is built on the word maybe. Other scholars might give Illig more respect for his findings if he could come up with more specific answers that tell both sides of the story. Astronomy is neutral, for the most part, when it comes to the Phantom Time Theory. For example, Beaufort writes â€Å"Ultimate evidence against Illigs hypothesis, based solely on historical solar eclipses can possibly not be found,† (Beaufort 25). So, if solar eclipses can’t prove the theory wrong, then what can? Methods like Dendrochronology, carbon dating, might hold the answer. Unfortunately, â€Å"Despite of calibration a high degree†¦antique period typically up to +/-150 years,† (Beaufort 26). This leaves us once again with no definitive answer on the validity of the hypothesis. At the moment, there is no scientific way to prove the theory valid or invalid, but maybe, some day in the near or possibly distant future, there will be a way to accurately pinpoint the dates when certain historical events happened to put this talk of the theory being a â€Å"conspiracy† to bed. 300 years of our history may just have been thought up in someone’s head and written in the history books, or maybe it is true. There are a few things for certain though: time is very subjective and we could be living in any time period imaginable, depending on when you start counting years. Some historical documentation of the era has been proven to be forged, so we can never distinguish what has actually happened in history and what some writer of a history book just made it up. Lastly, astronomy and dendrochronology don’t give a definitive answer to the questions of when exactly these historical events happened. So, maybe this theory is just some wild thought a few German scholars had, but maybe, in the coming years more and more evidence to prove the theory valid may come out and these crazy scholars would look like geniuses.

Monday, October 14, 2019

Security Threats in Businesses

Security Threats in Businesses Musa Hajara Muhammad Introduction The business environment is becoming a fast paced globalized economy that depends on information and data carried via open channels. As a business organization, it is critical to maintain and protect both physical and virtual property that is being owned against intruders, potential theft and other acts that could cause loss of any form. Dominos, for example, one of the biggest pizza delivery company faced a massive data breach where customer information was made public, hence resulting in loss of sales and customers. In today’s global, digital world, data rules. Safeguarding intellectual property, financial information, and a company’s reputation is a crucial part of business strategy. With the number of threats and the sophistication of attacks increasing, safeguarding becomes a formidable task.Businesses, both small and big are under massive attacks by external agents in order to get credit card information and other confidential data which can be have a negative imp act on the growth of the business. However, this security threats are not limited to attacks from the outside, but also from within the firm (BusinessSecurity, 2013). A recent survey shows that 80% of security breaches are caused by insiders- most often employees, more than 20% of attacks on the corporate WEB sites come from the inside, almost 30% of companies, experience more than 5 attacks from the inside every year. However, it has also been argued that having too much security may affect business processes. According to Cowan (2012), while there are various security solutions to help protect businesses from potential reputational or financial damage, a heavy investment in business security solutions may have a counter-productive impact on the business. It can affect the corporate culture, flow of information and operational processes, leading to inefficiencies and productivity loss (Cowan, 2012). On the other hand, being too permissive can have the same result, with employees able to access, share, lose or damage sensitive data too easily (Cowan, 2012). According to Cowan, business security needs to be tailored to each business depending on their respective risks and business objectives, that is, Security measures must neither be so restrictive that they affect business processes, nor too relaxed and thereby causing harm (Cowan, 2012). The key is to weigh up all the risks and vulnerabilities, potential consequences and controls, and then decide which information assets to protect and which can be accessed and shared openly without major consequences. Following a risk-based approach will lead to business growth and spending the right amount of time and money on the right level of protection in the right areas (Cowan, 2012). As a result of the negative issues of security threats to businesses, many companies today are adopting a corporate security strategy. Corporate securityidentifies and effectively mitigates or manages, at an early stage, any developments that may threaten the resilience and continued survival of a corporation. It is a corporate function that oversees and manages the close coordination of all functions within the company that are concerned with security, continuity and safety (Wikipedia, 2010). Core components of corporate security includes personal security, physical security, information security, corporate governance, compliance and ethics program, crime prevention and detection, fraud deterrence, investigations, risk management, business continuity, and crisis management (Wikipedia, 2010). While it takes effecting time planning to implement, Bordoloi (2012) argues that developing an effective governance approach to corporate security results in five basic outcomes: Reduced risks and potential business impacts to an acceptable level; Strategic alignment of security with the enterprise strategy and the organizational objectives; Business value generated through the optimization of security investments with organizational objectives; Preserved and increased market share due to the reputation for safeguarding information; Efficient utilization of security investments that support organization’s objectives. Also Adhering to a good corporate security policy can assist senior management to help them make decisions and then pass the essential actions to those in management positions. Al-Awadi Renaud (2008) argue that implementing an effective security solution can be complex and time consuming, stating that while it can slow a firm growth due to the resources involved, it is the key strategy for the sustainability of a firm in the 21st century. Al-Awadi Renaud (2008) identified five key factors for the successful implementation of a business security strategy. They include awareness and training, budget, management support, Information Security Policy Enforcement and Adaptation and organization mission. Critical success factors for security policy implementation Dhillon (1999) argues that, organizations must have ongoing education and training programs to achieve the required outcome from the implementation of an information security policy. The 2002 security awareness index report cited by McKay (2003) concluded that organizations around the world are failing to make their employees aware of the security issues and the consequences. Hone Eloff (2002) explain that the behaviour and attitudes of employees towards information security will be more in line with secure behaviour if top management demonstrates concern, therefore it is suggested that the tone of security is set by the attitudes of those at the top of the organization (Hinde, 1998). Management wont act to support the information security unless they can see that it supports the organizations core business function (Blake, 2000). Hence they must be convinced of the importance of information security before they will to provide sufficient budget, and act to enforce the information security policy (Von Solms, 1999). Also, Bjorck (2002) describes budget as the financial facility which firstly rationally estimates the costs and secondly assesses the access required to the resources to achieve successful implementation of information security. Organizations require adequate funding (Doherty Fulford, 2005) to achieve effective information security. â€Å"Budgets generally depend on the manner in which individuals’ investments translate to outcomes, but the impact of security investment often depends not only on the investor’s own decisions but also on the decisions of others† (Anderson Moore, 2006, p.612 ). Lack of information security budgeting in organizations leads to under- investment in appropriate controls (Dinnie, 1999). Moreover, Fung et al. (2003) explains that a good security policy is the keystone to a sustainable business growth. There is no doubt that the adoption of a security policy is the initial measure that must be in place to minimize the threat of unacceptable use of any of the organization’s information resources. And lastly, Siponen (2001) explains that in terms of security, organizations usually do nothing as long as nothing goes wrong, but when things do go wrong, they suddenly pay attention and a lot of effort is required to recover from the situation, even though sometimes full recovery is impossible. Some of the experts said that the organizations clear goals and objectives are essential in implementing security policies and that having a culture of secure information in the organization will affect its success. Conclusion Information is knowledge, and knowledge is power. Businesses are beginning to understand the need to demonstrate to customers that their information is being handled securely, especially in the light of numerous data breaches such as the NSA scandal. When customers are aware that the information a firm possesses about them is highly secured, they tend to build confidence in such a firm, and invest even more. What has been discovered from the analysis above is that firms that are concerned about security are more likely to survive both internal and external threats posed to them. However, due to the complexity of implementing these security initiatives, certain schools of thought are of the opinion that it may take firms concerned with security time to grow. These thoughts have led to the emergence of security analysts, data managers, network and security engineers, and other security personnel who specialize in safe guarding company data and information from various mishaps. In recent years the amount of money pumped into security firms around the world simply goes a long way to reiterate the fact that firms are getting keener about security investment. $15 million pumped into Cylance, $23 million into EndGame, and a whopping $50 million into FireEye are a few from the several investment deals reached with tech security companies. (Bryon Acohido, 2013). Investing in security can cost a company a large amount of its resources, but not adequately investing in securing its most valuable asset, which is information can cause a company to totally shut down in the case of any data exposure or loss. Alpex Consulting Africa Managing Director, Joseph Kibe, in Kenya said, â€Å"Organizations have lost a lot of data and there must be a lot of losses incurred because of customers’ data being thrown away when information leaks to the wrong hands. The economy has to wake up and secure this information†¦if you walk into an insurance firm, a bank, or a hospital, is your information secure? That is what will determine who makes it †¦Ã¢â‚¬  For a successful security policy, organizations must institute security policies to prevent unauthorized access to their resources. Steps must be taken to ensure that employees get the required awareness and security training to make them aware of the security issues and the consequences of insecure behavior. Moreover, the results suggest the ethos of security must come from the top of the organization to encourage a serious attitude from employees and an expectation that they will comply with the organizations security policy rules and regulations. A point worthy of note is that, for a firm to think about security in the first instance, it must already have a decent amount of presence over the internet. This alone, can make a company gain more profit and recognition due to its global presence. Most security breaches occur in the most developed of countries, and this is because of the level of advancement in technology, and also sophistication in cybercrime. A country who is just at the developing stage seldom experiences high level of security mishap. This goes a long way to say that the level of development in a country can be directly proportional the amount of cybercrime that occurs in that country. Implementation of security won’t be possible if a sufficient budget is not allocated. Clear organizational mission statements and goals result in positive employee behavior and positive attitudes towards securing the organization’s information assets. Just like a car, building, or machine, information is an asset, and the most valuable in this era of information technology. Safeguarding such a valuable asset will in no way slow down the growth of a firm, but set it apart from its adversaries. References Bordoloi, C. (2012) 5 Benefits of Proper IT Security Governance URL: http://www.enterprisecioforum.com/en/blogs/cj-bordoloi/5-benefits-proper-it-security-governance Accessed (23/06/2013) Bjorck, F., 2002. Implementing Information Security Management Systems – An Empirical Study of Critical Success Factors. Wikipedia (2010) Corporate Security URL:http://en.wikipedia.org/wiki/Corporate_security Accessed (23/06/2013) Dhillon, G., 1999. Managing and Controlling Computer Misuse. Information Management Computer Security, Vol. 7, No. 4, pp. 171-175. Doherty, N. F. and Fulford, H., 2005. Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis. Information Resources Management Journal, Vol. 18, No. 2, pp. 21-39. DeviceLock (2012),Corporate security: risks of the insiders attack URL: http://www.devicelock.com/articles/detail.html?CODE=corporate_security Accessed (23/06/2013) Business Security (2013) Understanding Business Security URL:http://www.businesssecurity.net/ Accessed (23/06/2013) Cole, E (2010) Importance of cyber security to protect your business URL: http://www.securityhaven.com/specialist/cyber-security-for-business.html Accessed (23/06/2013) Hone, K. Eloff, J.H.P. 2002. What makes an Effective Information Security Policy. Network Security, Vol. 20, No. 6,pp. 14-16. Fung, P., Kwok, L. Longley, D. 2003. Electronic Information Security Documentation. Australian Computer society, Vol. 21. Dinnie, G., 1999. The Second Annual Global Information Security Survey. Information Management computer security, Vol. 7, No. 3, pp. 112-120. Hind, S. 2002. Security Surveys Spring Crop. Computers and Security, Vol. 21, No. 4, pp. 310-321. McKay, J. 2003. Pitching the Policy: implementing IT Security Policy through Awareness. SANS Institute. Von Solms, R. 1999. Information Security Management: Why Standards are Important. Information Management Computer Security, Vol. 7, No. 1, pp. 50-57.