Saturday, August 31, 2019

Faceless Crimes

Part I. Computer crimes or cybercrimes have been on the rise since the introduction of the Internet. More so with the onset of mobility and the launch of wireless networking, the increase in mischievous computer activities was exponentially high. Since cybercrimes are considered â€Å"faceless crimes† where a criminal hacker can do their misdeeds miles or continents away, or set-up a logic bomb a few hours later, it has been more difficult to trace these malicious acts. In determining specific categories or types of IT-related attacks, it is noteworthy to examine the lists prepared by Mandia et al. (2001) in the book â€Å"Incident Response: investigating Computer Crime: 1.Denial-of-service attacks are some of the easiest incidents to respond to, because they do not involve actual intrusions. 2.Unauthorized uses of resources are typically insiders using their computers in an inappropriate manner. These investigations are often more oriented around personnel rather than technical issues. 3.Theft of information attacks involves unauthorized read-only access to information. While these are typically solved easily through configuration, it is very difficult to tell through an initial investigation if the attacker's access is read-only or actually involved a full-blown computer intrusion. 4.Vandalism is really a subset of computer intrusion, because it is not possible without access to the victim system. 5.Computer intrusions are the â€Å"mother of all incidents,† in that they require the most involved response. The best way to determine unauthorized computer access, downloading, copying and transferring of classified or confidential materials is by examining and evaluating the log files and access control lists. Unless the intruder or attacker is a sophisticated or high-caliber criminal hacker, this is the quickest and simplest method available, otherwise hiring trained professionals who will do computer forensics investigation is necessary to establish criminal liability and culpability. Part II. Depending upon the forensics investigator, there are various techniques or methodologies in investigating cybercrimes. But in general, there are four major steps namely; â€Å"evidence identification, evidence preservation, evidence analysis and evidence presentation (Solomon et al., 2005). There are two major tools required in forensics investigation, the first are the disk imaging and validating tools and the second are the forensics tools. Disk imaging and validating tools basically check the integrity of the hard disks and creates a mirror copy of the hard disk involved in the investigation. Forensics tools are the hardcore equipment that does data analysis, recovery and rebuilding, for deleted files and data. Numerous tools are available commercially on the market. One important note for an aspiring computer forensics investigator is that all tools to be utilized in the course of their trade should be properly licensed and the used is authorized by the vendor otherwise the case might be thrown out of court for using pirated or illegally purchased software. Some of the common disk imaging and validation tools as listed by Solomon et al. (2005) are: ByteBack by Tesch Assist, inc. and used for data recovery; EnCase from Guidance Software is one of the best drive duplicators; and Norton Ghost by Symantec provides the ability to create disk copies that are almost exact copies of the original. Solomon et al. (2005) also listed SMART by ASR Data Acquisition as a suite of forensics examination tool and WinHex ftom X-Ways is a universal hexadecimal editor and disk management utility.

Friday, August 30, 2019

Ethical Issues With Globalization

Describe at least three ethical issues resulting from globalization. Well I hope that this is somewhat of what you’re looking for because I really didn’t understand the assignment. The first issue I notice would be the Western culture and corporations putting jobs and communities at a high risk while they exploit cheap labor in the poor countries. By doing this it increase the threat to the environment. The next one would be how America is always trading, buying or helping China. For example China has cars that run off of eclectic and want to know how to make our cars. America will bargain with China and all they want is to still any secrets from use that will help them in the long run. And the last one would be how America is always running to other people help trying to figure out ways to help them and we need help as well. I know they are making some types of deals with the other states or countries if we run to their rescue.Explain the ethical risks and consequences associated with global business. One of the ethical risks would be kidnapping and bodily threats made by the other countries the United States does business with. The way that the United States are set up to do their trading and buying their employing more people in other countries than they are here in the US. At one point and time I couldn’t see how that was possible but the US is not going to trust the other country with their goods so employees are needed.

Language analysis Essay

Feature article ‘Application failed: Tortured by hi-tech’ written by Sally Morrell in the Wednesday, June 13 issue of the Herald Sun contends that instead of machines making our lives easier, they have now become the control center of our daily activities. This feature article written in a reasonable and colloquial tone shows her views towards the topic of hi-tech as well as the visual showing a woman using a computer as a drug to help encourage readers to support her views. The title of the article makes her opinions on ‘hi-tech’ clear and the piece is filled with many reasons on why technology has overdone its natural purpose. Referring to life experiences in her opening sentence indicates that Morrell has an understanding of the topic and is able to relate to what she’s writing about. Her writing attempts to show readers that their lives have been over controlled by technology and machines. The juxtaposition of the title and visual shows an ironic analogy which helps strengthen matter at hand. ‘Application failed’ is entitled to compel reader’s think of a software program making it relate to the topic of technology. By using the image of a crazed woman ‘connected’ to her computer, strikes the reader’s attention enabling them to see how in order to function in our everyday lives, we need to have that addiction of being dependent on our technology resources. The technology around us is like a drug and Morrell forces readers to see that having machines is a pleasure but it can also be an over dominate resource thus agreeing with her in saying that it has ruled our lives. Colloquial language such as ‘twig’ and ‘conned’ throughout the text is used to personalize Morrell’s article. Relating to experiences and referring to them throughout the text, presents her as a person who has knowledge and understanding of matter. This helps supports her opinions and allows her to disagree on the statement ‘all these gadgets would make us all independent’. Her experiences show that even she has become a person who has relied on her device especially for communication with others. The way she personalizes her text makes what she is stating more believable and true. This obliges readers to see that instead of become more independent individuals; we have become more dependent on our gadgets enabling them to be the focal point of our lives. Readers do not have the time to enjoy time in the bathroom, at a cinema or at the dinner table because we are addicted to our gadgets and devices. ‘No wonder the World Wide Web is so named – webs are meant to trap people aren’t they?’ and ‘doesn’t it sounds like a lame excuse to say your computer was stuffed?’ are rhetorical questions Morrell uses to build up the arguments she wants to discuss. Her opinions and experience draws the reader to think about how idiotic it sounds that not rippling to an email within hours is late but when you don’t receive a letter for a week or two it’s okay. Having technology is meant to be ‘freedom’ but what’s freeing about having people contact you day and night about a crisis at work when you’re trying to relax and be free from the stress of work. Not only does Morrell state about freedom she also writes about how life 100 years ago wasn’t based on the devices and that now in our lives we are hostage to what is around us. Readers will see that we have become so reliant on their devices that they are basically our control center. Having experience on the topic, Morrell articles leaves readers to think about the affect technology has on their lives and how controlling the have become. Having caught the readers attentions through the life examples are her personal views throughout the article allows readers to be at one with her opinions and agree on the fact that technology and the World Wide Web have now become the control center of our daily activities.

Thursday, August 29, 2019

Beling reflective about 1 article Example | Topics and Well Written Essays - 500 words

Beling reflective about 1 - Article Example In this program, she initiated that traditional assessment measures are accompanied with additional measures, classrooms are to be differentiated, and development is enhanced through preparatory services, early intervention and parent outreach. One of Robinson's critiques is Margie K. Kitano. Kitano debunked the premises in Robinson's action plan through her paper "Gifted potential and poverty: A call for extraordinary action." Instead of saying that income level produces social inequality, she pointed at the complexity of the situation, particularly in migration, that indeed, it is almost difficult to separate the two from each other. She therefore said that undermining the importance of the racial factor would indeed "not solve society's unsolved problems." Instead also of claiming that the source of the reduction in the proportion of identified gifted but economically disadvantaged children is the negatives effects of poverty, she cited the work of Brooks-Gunn and Duncan (1997) that environmental conditions outside the family have a major impact on the quality of life of these children, and therefore this problem is rooted not on the family conditions per se, but the assessment procedures in which these children are bei ng selected.

Wednesday, August 28, 2019

Stereotypes, Cyborg & Moral Panics Essay Example | Topics and Well Written Essays - 2000 words

Stereotypes, Cyborg & Moral Panics - Essay Example Categorically, it is a first-person shooter video game released in different formats such as XBox, Wii and PC. Its theme is quite similar to another war simulation game known as Medal of Honor. However, Medal of Honor ( MOH) is played only from the perspective of an American soldier. The first Call of Duty gives the player two other perspectives: Soviet and British since the computer provides allies from these countries. In short, the game simulates the real allied forces during World War 2. According to Metacritic ( 2003), Call of Duty had a rating of 91 which is quite a feat since the 44 critic reviews were ravishing. Metacritic is website that publishes game reviews so that the gaming public would not waste their money and time on badly scripted games. Critic reviewers of video games are often harsh since the industry is filled with frustrating games. Luckily, aside from getting superb reviews from game sites, Call of Duty garnered awards such as â€Å"Game of the Year Award 2004 ( from the Academy of Interactive Sciences) as well as Computer Game of the Year . Because of its popularity, various spin-off of the game such as Call of Duty 2, Call of Duty 3 and the recent Call of Duty 4 : Modern Warfare has evolved. The most modern version, Call of Duty 4 : World at War 2 was released for different consoles such as Xbox360, PlayStation 3 and Wii; moreover, it also had a PC version for Windows and Mac OS X. However the most controversial version was that of Call of Duty : Modern Warfare ( CODMW) which was released last April 2007. According to gamepro.com, COD MW sold 7 million copies, however , that was as far as January 2008. News report of USA Today ( 2009 ) claims that the game has sold 11 million copies. Aside from gaining sales and top video ratings, the game also earned a lot of controversy. For one, the game gives the player an option to play good guy by defending the capital. Conversely, the player can

Tuesday, August 27, 2019

D7 Assignment Example | Topics and Well Written Essays - 500 words

D7 - Assignment Example Likewise, the war that ensued in 1941 caused â€Å"white men went off to fight in a segregated military, and women and people of color filled the jobs in the defense industry previously reserved for white males† (American Experience: People & Events par. 3). Concurrently, a group of Mexican Americans who became enthusiastic in jazz began to don zoot suits, originally defined as â€Å"an African American youth fashion, closely connected to jazz culture, the zoot suit was co-opted by a generation of Mexican American kids, who made it their own† (American Experience: Zoot Suit Culture par. 1). When military servicemen drove by the thousands in Los Angeles, seen as a leisure spot as a playground for drinking, womanizing and engaging in fight, civilians detested the behavior and stirred tensions between servicemen and Mexican Americans. The constant tension between these groups over Mexican American girls provided the impetus for the Zoot Suit Riots that took place for more than one week in June of 1943 (American Experience: People & Events par. 8; Star xxiv; American Express:The Press and the Riot). The United Farmworkers Union (UFW) was primarily envisioned as an organization to reclaim â€Å"dignity for people who were marginalized by society† (Tejada-Flores, CEZAR CHAVEZ). Eventually, the UFW was reported to have evolved as a political force spurred from growing awareness of the need for Mexican Americans to participate in deciding on economic issues, electoral activity and cultural enhancement. This organization was presided by Cesar Chavez who was also instrumental in winning the battle for the farmers’ rights. However, setbacks from these victories cased the UFW to strike, to wit: â€Å"the UFW responded with strikes that led to the jailing of thousands. Many strikers were injured by violent attacks on the picket lines, and two were killed in dreveby shootings and attacks.. But the â€Å"inter-union† battle had left the public confused and made

Monday, August 26, 2019

Situation analysis focusing on the key internal factors Essay

Situation analysis focusing on the key internal factors - Essay Example This will make apple have an increase in the number of transaction made, which is in line with its strategy. A company’s resource strengths and competitive capabilities allows a company to own power in the market place (Oster, 1999). Competitive power of a resource strength or competitive capability is measured by how many of the following four tests it can pass. This is determined by how much the company helps to improve its customer value preposition, how effectively it competes with rivals, and its role in the company’s preposition. MasterCard has matched its closest rival in terms of competition since most financial institution offer both options to customers a structure known as ‘duality.’ In terms of market, MasterCard is a global brand. Due to these strengths it can be deduced that the company has a competitive value. The main rivals of MasterCard are Visa and American express, these two companies have the same resources and capability as MasterCard. Due to this fact, MasterCard does not have a competitive power in the market place, and it doesn’t qualify to be a source of competitive advantage. This test is a fail on MasterCard as it doesn’t own a weapon that its competitors doesn’t have. The more difficult and more expensive it is for rivals to imitate a valuable resource or competitive capability, the greater its potential for enabling a company to outcompete rivals and win a competitive advantage. On this note it can be said that MasterCard has a resource that it is hard to copy, which is the company’s brand name as well as the complexity in its electro system. These resources have enabled the company to have a strong market strength as well as acquiring a sustainable profit. MasterCard does not score in this test since the resources that it perceives to be hard to copy can be easily be substituted by its rivals

Sunday, August 25, 2019

Compare Chinese monster and American monster Essay

Compare Chinese monster and American monster - Essay Example Chinese holds the Spring Festival to commemorate Nian Monster. Besides, they consider the Spring Festival as the grandest, most magnificent festival in the history of the country’s culture. On the other hand, Momo the Missouri Monster is a hairy, foul-smelling monster. According to Taylor (130), Momo, in simple term refers to Bigfoot. It was first reported in 1971 and identified to live in Missouri. Since that time, the monster has been spotted up and down the Mississippi river. In the first scenario, two picnickers asserted that they saw the monster come out the woods nearby. The foul-smelling creature allegedly ate their food while they locked themselves inside the car. In the second scenario, local children (Doris, Wally and Terry) reportedly saw Momo walk regally past them hauling a dead dog. The fundamental differences between the two legends, Nian and Momo, highlight the deep-seated cultural variation and beliefs between Chinese and Americans. In this regard, this paper tries to compare the existence of Nian vs. Momo the Missouri Monster and their importance to Chinese and American cultures respectively. Nian was a furious monster that allegedly descended from the mountains or under the sea to hunt people every 1st and 15th of the lunar month. Thus, people locked their doors very early before nightfall on the days the creature was likely come (Wong 27). Although the monster attacked anyone regardless of gender, it mainly preferred children. Parents were terrified of a possible fatal attack on their children who often played outside their homes. The old man in the village thought the panic in people perhaps made the monster furious and so bold. He asked the people to come together and find a way of conquering the monster. According to the old man, burning of bamboo, beating gongs and drums, lighting off fireworks would be an effective approach to conquering Nian (Wong 27). He believed that large noises would threaten and scare away the horrible monster.

Saturday, August 24, 2019

Wk1 INTL304 Forum Coursework Example | Topics and Well Written Essays - 250 words

Wk1 INTL304 Forum - Coursework Example Air force pilots, navy captains, and army commanders often use tactical military requirements for intelligence analysis. Strategically, agencies using information from the DOD (Department Of Defense) serve as armed forces elements that dedicate their resources to training experts to build tactical intelligence skills2. The outcome of this strategy is less gritty in contrast to outcomes generated by different sources of tactical military requirements. The strategic analysis of gathered intelligence is less time sensitive than tactical military requirements, which makes their effectiveness witnessed more by DOD agencies than the armed forces. For instance, strategic analysis compelled United States army to â€Å"take its time† while invading Iraq and Afghanistan3. Another example is Syrian president Bassad’s order of chemical assaults was pivotal for the United States in terms of collection planning of tactical military activities in Syria and neighboring countries with American military bases. Although the DOD chiefly uses strategic analysis and tactical military requirements, analysts do not have to be versant with both skills. This is because DOD supports Congressional policymakers like the Joint Chief of Staffs and the Secretary of

Friday, August 23, 2019

The Knowledge of Reading Essay Example | Topics and Well Written Essays - 1000 words

The Knowledge of Reading - Essay Example According to the study reading helps people find things that they may need. People read directions, warnings, and advertisings. Without reading, no one would know what is right and what is wrong. Reading warnings and special signs prevent people from getting into dangerous situations. For example, there are signs that read â€Å"caution, end zone† to tell people to avoid a certain area. If a person does not know how to read that, her or she may get into trouble. The roads give directions so that people can find their way to any destination. In order to get to certain places, people must know how to read directions and signals. It is always important to know how to read because it prevents people from being lost or confused. Secondly, reading helps when communicating with our family and friends. Today, everyone communicates by email, Facebook or texting, etc. What if nobody knew how to read? How would relatives that live far away with each other? This is why reading is truly im portant. From this paper it is clear that people know what happens around the world by reading newspapers and articles. They are aware of the actions that happen among them. Reading also challenges the mind. In the article, â€Å"Response to Alberto Manguel’s ‘Reading Ourselves and the World around Us,† the author says that words and letters are only symbols that allow us to give meaning to literature. He also says, â€Å"If people do not take the time to read and give meaning to everyday occurrences, they will not fully understand the reason behind a lot of things and will not be able to function properly in their lives†. This is important because people need to know the surroundings and the knowledge inside themselves which will help them to reach their goals and put their lives on track, because the more knowledge the individual have, the more chance to success. Most importantly, however, reading gives people the ability to access ideas of other people, from other perspectives. Each person has only one life, only one lived experience, through which to filter what happens in the world. This can be a very disastrous thing. For instance, if someone grows up very rich and in a lot of luxury, they may not be able to understand that some people are very poor and have nothing to eat. Or if they grow up in a very repressive society where they are not allowed to say what they think or challenge existing ideas, they may not know that there are other ways of doing things, other societies that act differently. Reading allows people to break out of this cycle, to understand the world from many different perspectives. This happens because every time one reads, one is exposed to a different way of thinking, a different way of seeing the world through a different set of filters. This is true in non-fiction, obviously, because it allows a person to explain how they think through and work through things. But this is also true

Thursday, August 22, 2019

Economy and Environment (part of petroleum engineering group project) Essay

Economy and Environment (part of petroleum engineering group project) - Essay Example In this operation, there was both the capital expenditure (CAPEX) as well as the operating expenditure (OPEX) that will be involved in the initial years of the project, hence hindering any revenue generation in the initial years of operation. It therefore means that, the cash flow during the initial years will only consist of the CAPEX and the OPEX data before revenue generation begins. The project needed a capital injection for the first three years of operation before, hence no revenue for this period. On the fourth year, however, the project begins generating revenue. This is explained that, the project will begin producing oil on the fourth year with no or zero water at the beginning. The production will then continue after which, from the sixth year on to the ninth year, more water will be produced; hence the revenue is expected to reduce as less oil will be produced to increase the revenue. After year nine, the oil production is again expected to increase with a decrease in the production of water, hence there will be a rise in the NPV once again as oil production is expected to follow such a trend of increasing initially up to year seven where it will again be expected to decrease and again rise after year nine. This trend is demonstrated in the table below. Net Present Value is the difference between the present value of the cash inflows and the present value of the cash out flows. To calculate the Net Present Values, the project cash flows are discounted using an appropriate rate which is usually the minimum rate of the return required by the investors. The appropriate cash flows in this case are the after tax cash flows and the net cash flow is therefore estimated on an after tax basis. For this project, the appropriate discounting rate used was 7%. The various applicable rates for each year were calculated in the discounting

Manufacturing Industry Protection and Liberalisation Essay Example for Free

Manufacturing Industry Protection and Liberalisation Essay For a long period in history, the Australian manufacturing sector has enjoyed protection with the government aiming at establishing a stable manufacturing sector to ensure self-sufficiency as well as provide job variety to its citizens. Successive governments over the past decades have introduced several structural changes. Australia now has a regime which is said to have the lowest protection for manufacturing industries. The argument is that protection is only given for a limited amount of time to allow the industry to establish itself. It is not only the manufacturing industry that has undergone reforms but the whole economy as a whole. Liberalisation of trade is becoming a norm in Australia with the government withdrawing from participating in trade matters and issuing fewer restrictions to businesses. The idea is to give them the freedom to make decisions without the government influence and this according to economic analysts is bound to improve the economy as competition increases (Productivity Commission, 2009). Conservatives and the labor party are against deregulation citing that sooner or later it could have serious negative impacts on the citizens through commodity price increases and rise in unemployment levels. This paper seeks to analyze the reasons for the reduction in the Australian manufacturing sector protection as well as the consequences this reduction is likely to have on the economy. Further, a discussion on liberalisation of the economy is introduced showing the reasons as to why liberalisation is a good idea for Australia. Decline in protection in the Australian Manufacturing Sector There has been a significant decline in the trade protection for the Australian manufacturing sector over the years. The tariff provisions reduced from 25 percent in 1983 to 6 percent in 1997 (Chemlink, 2001). Import duties on foreign manufactured goods have also fallen significantly from as high as 60 percent to 5% in 1997 (Chemlink, 2001)). The government following the advice of the productivity commission now plans to abolish tariffs on all manufacturers. The arguments behind the reduction in protection include the ability of the Australian industries to compete in the world market (Wilson, 1998). When the foreign produced goods are allowed into the Australian market, the competition caused should be a wake up call for local industries to be innovative in order to counter this competition. According to Anderman (2001); Productivity Commission (2009), tariffs offer little incentives for competition are likely to cause industries to be less innovative due to reliance on the government for protection. Protection is being reduced because it has led in the decrease of innovation which is a direct result of lack of competition. Protection creates monopolies within the country hence the high costs of goods. This is one of the arguments of protectionism and it maintains that due to protection from competition, industries tend to take advantage of this to charge high prices on the goods (Anderman, 2001). By allowing foreign goods into the market, monopolies are abolished by the competitive mood that results. The consumers can therefore get the same goods at a more favourable price (Landek, 2003). The Australian government through the AusAID wanted to help Least Developed Countries (LDC) to develop their export industry. The strategy used by AusAID was to remove tariffs on goods from LDCs. While benefiting these countries, Australia can easily import goods from these countries and have little effect on the productivity of Australian manufacturing industry and employment (Leigh, 2002). Effects on the Australian Economy As a result of the reduction in protection of the manufacturing sector, the domestic industry is highly likely to go into a slump and consequently slow down economic development in Australia. According to Anderman (2001), state protection ensures that domestic industries are saved from competition brought by foreign manufactured goods so that they can effectively establish and develop themselves. Reduction in protection just goes on to encourage the entry of foreign goods into the country. Since most of these goods are likely to have lower prices than Australian goods they will capture the market originally being served by Australian manufacturing sector pushing Australian industries out of business (Wilson, 1998). A situation where foreign goods are sold at a lower price than the price in the importing country is known as dumping which is quite harmful to the local goods market (Anderman, 2001). As the level of competition from foreign goods increases, high levels of unemployment are likely to be witnessed. This results from the fact that foreign goods flood the market and if they are cheaper than local goods they are likely to attract more customers (Anderman, 2001). The consequence of this will be that the Australian goods will have little of no market such that the industry owners will have no option but to close down. In return, workers will lose their jobs leading to economic suffering and high income inequality (Wilson, 1998). Current statistics as at the end of 2008 indicate that unemployment is at 5. 2 percent. According to Sterle (2009), the manufacturing sector provided more than one million jobs in 1996 but this had so far reduced by 300,000 at the end of 2008. Kelmax for example has already closed its Adelaide operations leading to a loss of 80 jobs. Other examples of companies which have laid down workers include Westpac, Manildra Group and Silcraft. Innovation in the country will be discouraged as cheaper goods enter the Australian market. Innovation is encouraged by the presence of a prospective market (Landek, 2003). However, if the market is not assured then investors may not be willing to take the risk. Stiff competition from foreign goods also reduces industry productivity such that profits are reduced. Since innovation requires large amounts of finances, the local industries cannot afford to innovate. The government will lose out on income with reduced protectionism. This stems from the keep money at home argument which maintains that when countries import, they get the benefits of the goods while the foreign country goes with the money (Anderman, 2001). This means that the importing country is benefiting the other by increasing its earnings on foreign exchange. By protecting its domestic industries, a country would have both the goods as well as the money. Likelihood of trade imbalance is increased when protection of domestic industries is abolished. An unfavourable balance of trade is dangerous to a country and it occurs when a country starts importing more than it is exporting (Anderman, 2001). Reduction in exports would come as a result of lack of incentive to innovate and closure of domestic firms. Liberalisation  One of the latest Australian government reforms is the liberalization of the Australian economy. Government reforms to liberalisation have been a topic of controversy as economists insist that free trade is in essence the key to economic welfare for Australia. Conservatives and the labor party are not for liberalisation. Labor party maintains that it will lead to harmful negative results in future (Sterle, 2009). According to them, liberalisation will give firms too much freedom which they may use to exploit customers, engage in unethical business practices and cause the decline in employment levels. I personally do not agree with these views and in this regard I totally support the government in the liberalisation reforms because I believe that it is going to work in favour of the Australian economy. Deregulation ensures steadfast commitment to competition which is a fuelling factor for development (Coonan, 2007). Competition is useful in two major ways: promotion of innovation and reduction in prices of goods. Trade liberalisation fosters competition leading to better quality goods and more affordable prices (Leigh, 2002). Competition promotes innovation so that as firms try to outdo each other they come up with better products to win customers. The direct results of innovation are better quality goods, development in technology and more competition so that development is a continuous process (Leigh, 2002). Free trade enhances competition among firms producing similar products and as we know it, competition has a significant influence on the reduction in prices as companies try to secure more customers and a gain large market share (Leign, 2002). We can therefore collectively say that competition leads to better quality goods for customers and variety at affordable prices. Free trade or liberalisation will create jobs for Australian citizens (Coonan, 2007). Arguments have been put forward by the conservatives that liberalisation it is likely to lead to a rise in unemployment levels. However, the gains obtained in free trade override the losses (Smith, 2007; Productivity Commission, 2009). There could be some sense in that firms in their efforts to increase their profits may lay down some workers (Smith, 2007). The number of new firms and expansion of existing firms however is likely to take on board more workers than those who have been left jobless (Landek, 2003). Increase in innovation and profits will definitely lead to the expansion of the existing industries which are going to need workers. This way, employment is enhanced as opposed to where government regulations limit the business operations. As an illustration of the advantages that liberalisation can bring, I take a case of the telecommunications industry in Australia. The liberalisation in the telecommunications industry has earned Australia an extra $15. 2 billion since 1997 following a decision by the Howard government to liberalise the sector (Coonan, 2007). In a report issued by the Communications, Information Technology and the Arts minister Hon Helen Coonan in November 2006, more than 17,550 jobs were created in the year 2005. Apart from these, use in Information Technology has risen with an average of 5. 9 million having subscribed for internet services and 80 percent of Australians have mobile phones. This should indeed serve as an illustration to the conservatives that liberalisation has positive economic effects and this is the way to go for Australia. Conclusion Tariffs and trade restrictions protect domestic industries from competition caused by free import of foreign goods. This ensures that new industries can establish themselves without having to bear competition pressures. With globalisation however, countries use of tariffs are going down and the reasons for this is to encourage competition so that the local industries can become more innovative and consumers can obtain quality goods at reasonable prices. This together with trade liberalisation have embraced the spirit of free trade that ensures minimal government intervention in trade activities. Just like in reduction in protectionism, deregulation or liberalisation ensures that consumers can get better goods due to increased innovation and quality goods as a result of increased competition among firms. In conclusion, trade liberalisation is an effective instrument in increasing the productivity of a countrys economy.

Wednesday, August 21, 2019

Distributed Information System Medical Lab Service Information Technology Essay

Distributed Information System Medical Lab Service Information Technology Essay Online booking system has become a common trend now days in business organisations. With the coming of the internet everything is just a click away. As the Private medical care service provider began its quest for the development of a laboratory test, diagnoses and treatment services that would be used to serve over 100 outlets across the UK, it becomes every web developer responsibility to deal with the challenges and this challenge still goes on. As developer took on the task, it created a platform for other and its from those existing system that new development are based. The distributed health care system should be designed in a way that guarantees the security of the users data and it should be designed in the most user friendly way possible, putting in consideration all the accessibility requirements. 1. Introduction Information Technology has created a new domain for business to excel. It has opened many horizons for companies which are looking for better ways to impress their customers. Not only that it has given many options to the firms and helps them in their daily routine tasks. No wonder it is playing a vital role in development of the firm. Research and Development for any firm is very important for future. Let it be long term planning or short term I.T has helped in many ways for example minimising risks, calculating costs, estimating future trends and so on. 1.2-Tier Architecture Technology is dynamic as it changes day by day making business world easier to survive with excellent management. 3-Tier Architecture is one of the modern technology three way interactions in client /server environment. This architecture was generated to overcome the problems of 2-tier architecture. This consists of three essential components as shown in the figure. Fig: 3-tier Architecture (Source: www.cardisoft.eu//3_tier_architecture.jpg, Accessed on 04/06/2011) Client Tier: This is the layer where the users interact with the system. So this is the user interface which is stored in client server. This layer sends the data to application server and gets the result back from there. An Application Tier This server consist of two layers i.e. Business layer and data access layer. This is the main layer which process the data received from client server and also interacts with database server. Data Tier All the data are stored in database server which can be retrieve at any time. This layer takes the command from application server and gives the required data back. 2. Overview The vast development and empowering of todays knowledge in all sectors of our modern life is improving satisfaction, comfort and reliability. There are remarkable effects entering in our medical service sector that make the patients and doctors relationship more satisfactory and exciting. However, patients and Medical care Service often struggle with disagreeing views about the Laboratory testing system and adoption of proper communication and appointment procedures. Patients look for technological advances to improve the quality and outcomes of medical care system. In new developed system, with the help of emerging web techniques and technologies the Medical Care Service turn into a great improvement by reducing early days delay and difficulty. In the online system, Administrative staff can track patients, staff and can book appointment for patient. Doctors will be able to access patient information, their medical history and would be able to arrange for lab testing laboratory staff member will be able to track only sample which is belonged with a patient. 2.1 Scope of project. The main aim of the project is to create a patients test booking system and manage doctors and staff member detail that is more efficient and easy to use for all. The project also aims at ensuring reliability in the medical booking systems so that in the near future the members of the public as well as the health workers find communication between the two parties easy and secure and time saving. By secure we mean a reasonable level of data protection. 2.2 Aims and objective. In order to hit the set target for this project aims and objectives were set and this included: Develop a login facility to access details and information easily. Create an online interactive system between patients and Health Care Provider for quicker response (such as fixing online appointment). To design UML Deployment diagram of the system architecture To design Use Case Diagram of the system To design ERD of the backend database To design Class Diagram of the system To implement the 3-tier Architecture and design the prototypes 2.3 Purpose of the Project After this project, Medical Care Service will have a efficient appointment system for their patients. Following are the advantages in implementing 3-tier Architecture. Development Issues: Complex application rules are easy to implement in application server. Business logic off-loaded from database server and client, which makes performance excellent. Changes to business logic automatically requested by server changes require only new application server software to be installed. Application server logic is suitable to other database server platforms by virtue of the application software. Performance: 3-Tier Architecture gives superior performance for medium to high volume environments 2. Business Key Requirement Analysis The main requirement for Medical care Service provider is to overcome with the problem of Traditional database system. So the aim of the project is to develop Web Base applications and implement 3-tier architecture system. There are three separate interfaces with different functions for different users. Administrator Administrator can: Login to the system using login form. Track Patients Enter Staff Information Book Appointment for Patients Doctors Doctors can: Login the system. Access Patients Information Access Patients Medical history Arrange for Lab testing Laboratory Staff Login the system Track Sample (Associated with Patients) 3. Model Used for System Development There are different types of methodology for the development of system such as Waterfall Model, Spiral Model, Prototyping Model, and Rapid Application Development. Among them Prototyping Model was selected for the purposed system. 3.1 Prototyping Model In this model, the problems of the existing system are defined. The requirements are break down into different parts. For each requirement different prototypes are designed and tested separately. If the systems do not give the expected output, then again different actions are taken to construct the system. 4. Feasibility Study The study involves a complete research for the project; it looks at some of the features that could be translated into reality. This stage helps project developers to know accurately they can deal with the process. It is therefore a critical phase which requires a detailed study be carried out. Feasibility study is the initial study undertaken before the actual project begins to highlight the possibility of the project success. It is an analysis of possible options and solutions to problems and provides suggestions on the best alternative. 4.1 Technical Feasibility The project Medical Care Service runs on any windows system as well as in World Wide Web. Many organizations use the web server because it is a common and very user-friendly interface to develop ASP.net enabled programs in the Internet. The necessary technologies needed to run this project are available without any new software to be installed. The software ASP.net and Microsoft Access which is commonly available and widely popular software existing in the market. It comes with features to access the Internet in an efficient approach. Thus, by using this all the modules are able to perform the tasks required. The task is to produce a product that reflects the user mind. 4.2 Operational Feasibility Operational feasibility is the measure of how well the explanation of problems will work in the organisation and also determine how people feel about the system project. In this area particularly, problems within the login areas and security validations that were sighted, A project is therefore said to be operationally feasible if it achieves the needs and expectations of end users. User acceptance is a key determinant of operational feasibility. This project does not require any special memory or enhanced features in the system in order to run. Instead it will consume less memory and will operate efficiently even under normal speed. 4.3 Economic Feasibility Economic feasibility is the measure of the cost-effectiveness of an information system solution. Regarding economic feasibility, the project is a less expensive one. As a whole, the project does not demand any special feature. It makes use of the available resources and provides a better performance in convinced areas. 5. Languages Used for System Development In this phase, the required hardware, software and people required for the project are selected. The following software is used for designing. 5.1 Microsoft Visual Studio 2008 (ASP.net) Microsoft visual studio is an integrated development environment (IDE) from Microsoft which can be used to develop console and graphical user interface applications along with Windows Forms applications, web sites, web applications, and web services. Visual Studio 2008 was upgraded to support all the new features introduced in .NET Framework 2.0, including generics and ASP.NET 2.0. The IntelliSense feature in Visual Studio was upgraded for generics and new project types were added to support ASP.NET web services. Visual Studio 2005 also includes a local web server, separate from IIS that can be used to host ASP.NET applications during development and testing. It also supports all SQL Server 2005 databases. Other new features of Visual Studio 2005 include the Deployment Designer which allows application designs to be validated before deployments, an improved environment for web publishing when combined with ASP.NET 2.0 and load testing to see application performance under various sorts of user loads. This is used in this project for the presentation tier to design the interfaces for window applications. 5.2 VB.NET Visual Basic .NET (VB.NET) is an object-oriented computer programming language that can be viewed as an evolution of Microsofts Visual Basic (VB) which is generally implemented on the Microsoft .NET Framework. Microsoft currently supplies Visual Basic Express Edition free of charge. This language is used for coding of the main functions and process in this project. This is used for the presentation tier. 5.3 UML Diagrams UML stands for Unified Modelling Language which is used in the business logic layer in middle tier of 3-tier Architecture. This is specially designed for developers to see the system in different perspective view. There are different types of UML Diagrams such as use case diagram, class diagram, sequence diagram, deployment diagram. Among them following UML Diagrams are used for this project. Use Case diagram to show how the users interact with system Class Diagram forms class structure and contents using design elements such as classes, packages and objects. It also displays relationships such as containment, inheritance, associations, generalization, etc. Deployment Diagram to show the interaction between the components that is relation between hardware and software. This diagram shows the physical architecture of the system. 5.4 MS Access 2007 MS Access is the database application for Windows, included in Microsoft Office suite which is used to store the data in tables form. MS Access offers many templates which makes easy to use. Many big and small organizations use this software for database server in order to store the data in standard tabulation form and retrieve as required. In this project, this program is used to store the data in the database server. 6. Designing the System The purpose of design phase is to transform the business requirements statement from the requirements analysis phase into design specifications for construction. For this purpose, design phase encompasses following tasks: Design the Application Architecture Design the System Database Design System Interface 6.1 Design the Application Architecture For the design of system architecture the UML diagrams such as Use Case Diagram, UML Deployment Diagram and Class Diagrams are used. 6.2 System Architecture Design Clients IIS 5 . 0 Server Business Logic Components VB .net Library Data Access via ADO . NET Middle Tier CLR MCS Database Ms Access 2007 Server ASP . NET 7. Use Case Diagram for Medical Lab Service 8. Design the System Database To design the database of the system, the E-R diagram is prepared at first. Then, the database structure is prepared in the MS Access. 8.1 Entity Relationship Diagram ERD stands for Entity Relationship Diagram.  Ã‚  It is one of the most important analysis diagrams for designing a database which summarise the whole structure of database.  Ã‚   In relational databases, the data is split up into tables instead of writing it all out in a single line or record.  Ã‚  This removes some of the problems often encountered in building a database.  Ã‚  The tables are linked together by  the primary key of one table being present as what is called a foreign key in another table. For National Car Parts Retail, the database system main content following AdminLogin Branch DoctorsDetails PatientDetails PatientVisitDetail ReportStatus StaffDetails ERD Diagram StaffDesignation StaffGender Login userName Id Password Type createDate Patients PatientName PatientId MaritalStatus PatientDOB PatientHistory PatientAddress PatientPhone TestType PatientGender PatientBookingDate StaffDOB BranchFax BranchPhonedress BranchName Has BranchId Branch Has VisitDetail PatientvisitID DoctorsId TestDate PatientId Arrange Test DoctorDetails DoctorsName DoctorsId DoctorsGender DoctorsAddress DoctorsSpecial DoctorsPhone Booking Has StaffPhone Id StaffAddress StaffId StaffName Staff Details Postcode BranchAddress The above diagram is entity relationship diagram for Medical Lab Service explaining the relationship between the entities and their attributes. The attributes shown in the diagram are their primary keys. 9. Database Structure The database was designed using MS Access with the name Medical.mdb List of the various tables and their descriptions are as follows: S. No. Table Name Description 1 AdminLogin Store Login information 2 Branch Store Medical Lab Branches details 3 DoctorsDetails Store Doctors information 4 PatientDetails Store Patients booking details 5 PatientVisitDetail Store Patients Visit Detail For Medical Test 6 ReportStatus Store Patients Report Status 7 StaffDetails Store Lab Staff details Below is the more detail of database structure. Branch Table Name Data Type Size Nulls? Default Value Extra BranchId Number Long Int No BranchName Text 30 No BranchAddress Text 50 No PostCode Text 20 No BranchPhone Text 20 No BranchFax Text 20 For more detail refer to appendix Medical 9.1 Design the System Interface This is the Index page of the Web Based system for Medical Lab Service where the user logins and does other processing. This is the Medical Lab Service index page from where user can process further. For more prototypes refer to appendix prototypes 10. Coding Coding should be done according to design specifications in order to meet business requirements. VB.NET was used as the server-side script. Including entire code of the system would make the system unnecessarily lengthy. Hence I have included code of some important functionality and presented a brief explanation. 11. Implementation and Testing of System As I mentioned before this is the web based application so the other Medical Lab Branch can be accessed this System through internet. When the system gave expected result then it was implemented to the entire branch and old traditional system was completely removed. The list below is the test plan for the system. Login Add/Update/Delete Branch Detail (Admin) Add/Update Delete Patients Booking (Admin) Add/Update Delete Doctors Details (Admin) Add/Update Delete Staff Details (Admin) Add/Update Delete Test Arrangement (Doctors) Add/Update Delete Report Details (Lab Staff) Searching from Admin(Branch, Doctors, Patients, Lab Staff) Searching from Doctor (Patients History, Test Details) Searching from Lab Staff (Search Report Status) 12. User Documentation After the completion of the whole project the final user document was prepared which content all the information of the system. The user guide was prepared and different training was given to employees of the Medical Lab Service so that they can be familiar with the new system. 13. Conclusion This report is prepared as the System documentation for Web Based Application Designing for a Medical Lab Service. This project provided me with good professional practice in applying our knowledge of Information Systems to address business problems. During this endeavour, I learned to write a suite of programs that encompass the main facets of business computing. I was able to obtain an in-depth knowledge of a formal coding language. I have been able to produce relevant documentation in support of the developed system. With the preparation of the projects, I have learned the efforts time required to prepare a professional system. I gained knowledge about different phases methodology of a project, which supports both the system development operation and support stages of the system life cycle. Hence with the development of this system, I understood the real need and value of having 3-tier Architecture System. I learnt that coding is only small part of system development and that greater effort should be placed in understanding the business requirements. Understanding business need is a challenge and getting application built to suit it is a whole lot another field by it self 14. References Reference Books Jeffrey L. Whitten, Lonnie D. Bentley, Kevin C. Dittman, Systems Analysis and Design Methods, Fifth Edition Roger S. Pressman, Ph.D., Software Engineering A Practitioners Approach, Fifth Edition Visual Studio 2008 Professional (ASP.Net)

Tuesday, August 20, 2019

Battle Of Leyte Gulf History Essay

Battle Of Leyte Gulf History Essay The Battle of Leyte Gulf (Oct. 23-26, 1944) was a naval engagement between the forces of the Imperial Navy of Japan and the United States Navy. The United States planned to retake the Philippine Islands from the Japanese Empire as they saw the islands as a vital naval base of operations to start its island hopping campaign. By taking the islands, the American forces can launch a direct naval assault on the islands near the Japanese homeland. Expecting an invasion, Japanese forces launched its forces towards Leyte Gulf where Americans are bound to land its troops to start the liberation. However, the navy suffered heavy losses during previous naval engagements leaving them with a numerical disadvantage. In the ensuing battle, American fighters successfully inflicted heavy damages to the Japanese fleet forcing them to retreat. With the threat of a Japanese intrusion on the American transports gone, troops were able to land on Leyte paving a way to the eventual liberation of the rest of the Philippine Islands. The Japanese suffered heavy losses on its part allowing the United States to start invading the Philippines and elimina te any naval threats in the Pacific from the Japanese Navy. Battle of Midway Island The Battle of Midway Island (June 3, 1942) marked the first major naval victory against the Imperial Navy of Japan turning the tide of the war on the side of the Americans. The Japanese planned to invade Midway Island as the islands were strategically placed in the middle of the Pacific Ocean thus, expanding Japans defensive perimeters by adding a naval base in its arsenal more closer to the US. They also hoped that the aircraft carriers of the United States that missed the attack on Pearl Harbor would be lured in to engage the Japanese fleet in a counter attack. The Japaneses main goal was to finally wipe out the entire Pacific fleet of the United States rendering the country useless as Japan expand its Greater East Asia Co-prosperity Sphere; the Japanese plan to bring Northeast and Southeast Asia under its rule. Unknown to the Japanese fleet, United States intelligence successfully decrypted the Japanese plan to invade Midway. They sent three aircraft carriers, Hornet, Yorktown, and Enterprise to ambush the Japanese fleet. The resulting naval engagement proved to be disastrous to the Japanese forces as they were caught off guard when US fighters attac ked the vulnerable fleet. Four of its aircraft carriers were destroyed and dozens of veteran aircraft pilots killed. Japanese Admiral Yamamoto was forced to abandon the invasion of Midway. The battle marked the first major naval victory of the Americans. It was a great loss to the Japanese Empire losing four of its greatest aircraft carriers crippling the navys capability to battle on par with the United States. Battle of the Philippine Sea June 19, 1944 The Battle of the Philippine Sea was a naval battle between the opposing forces of the United States and Japan. Marianas Turkey Shoot. It was considered to be the greatest carrier battle in history. The battle started when the Americans led its naval fleet towards the Marianas Islands to retake it from the Japanese. Because losing the Marianas meant that the defenses of the Philippines and Japan itself will lessen, the Imperial Navy decided to challenge the American fleet. It resulted in a decisive American victory and a great defeat to the navy of Japan. One contributing factor that led to Japans defeat was its inexperienced fighters and aging fighter planes. Battle of Iwo Jima February 19-March 26, 1945 One of the last battles on the Pacific Theatre between the forces of United States and Japan. As the United States acquired more and more islands Japan previously controlled, it became obvious that the tide of the war is turning on the side of the Americans. However, in order for Japan to surrender the United States needed to invade the Japanese home islands. Americans moved their sights on the island of Iwo Jima. The island was strategically important because of its potential refueling base and emergency landing field for its fleet of bombers. On February 19, 1945 after shelling the island for 74 days, US marines landed on the island to wrestle its control from Japanese forces. The American forces after suffering heavy casualties finally succeeded in taking over the island on March 26, 1945 after 36 days of fighting. The Battle of Iwo Jima was a turning point in the Pacific War as it resulted in the deteriorating of Japanese supremacy in the Pacific. Iwo Jima subsequently became the stepping point for the last and largest engagement between the Japanese and United States. Ba ttle of Okinawa. Battle of Okinawa April 1-June 22, 1945 The last and largest engagement between the forces of the United States and Japanese imperial forces. Okinawa Island was the largest in the Ryukyu Islands being of great importance as it was located just south of the Japanese main islands. The United States sought to take it from Japanese forces to launch raids on the archipelago, Japans home islands. American forces were numerically superior to that of the Japanese-287,000 against 130,000 troops. The battle resulted in massive casualties in both sides. The Japanese defenders fought bravely against its invaders and even using fanatical tactics to try do defeat American forces. Such tactics included Kamikazes, intentional ramming of Japanese fighter planes on American ships. In a desperate bid to defend the island, Japan launched Operation Ten Go. Japan sent the battleship Yamato, the largest and most armed battleship in history as a suicide attempt to destroy as many American ships as possible. Unfortunately, American submarines quic kly spotted the ship and destroyed it before reaching the island. The battle continued on for many weeks and only ending after the Japanese garrison had been exhausted. The whole troops of Japan were wiped out including some 150,000 civilians. In the American side 13,000 were dead and 37,000 wounded. The unwillingness to give up showed by the Japanese forced the then-president Truman to allow the use of the atomic bomb to finally end the war. Battle of Wake Island Japanese fleet launched an invasion on a small atoll called Wake Island. Though they were unsuccessful in their first attacks, the eventual assaults this time by a larger Japanese fleet forced the defenders to surrender. Battle of Java Sea The battle was a decisive Japanese victory against the forces of the Allies which included the US, Britain and the Netherlands. The Japanese fleet was better organized and deployed constant air attacks demoralizing the Allies. In the end, Japan was able to invade the island of Java extending its empires reach in Southeast Asia once more. Doolittle Raids The Doolittle Raids were the first air raid conducted by the United States on the Japanese Home Islands. On April 18, 1942 sixteen bombers launched from aircraft carrier USS Hornet flew to Japan in a mission to destroy strategic locations and boost American morale after the Attack on Pearl Harbor. Though, no sufficient damage was made it forced Japanese military to strengthen the defenses around the home islands, bringing back its powerful aircraft fleet to defend the islands. It also justified the Japanese invasion on Midway island .They believed that the bombers came from that island and if left untouched, it would pose a threat to Japan. The raids damaged the governments prestige and in the ensuing battle in Midway hurt Japans overall prestige. Bataan Death March After the invasion of the Philippines by the Empire of Japan, some 75,000 American and Filipino forces surrendered after the loss in the Battle of Bataan. On April 9, 1942 Japanese forces forced march these prisoner of war (POW) to a prison camp about 63 miles away from Bataan. They were robbed of their belongings and were mistreated severely during the march. Prisoners were beaten harshly and most of the time for no apparent reason. Those who tried to get a drink of water were quickly executed. Eventually, the sides of the roads became littered with dead bodies. En route to the camp, about 7,000-10,000 died while others escaped to the jungle. Only 54,000 reached the camp. Battle of Coral Sea May 7-8, 1942 Japan planned an invasion on Port Moresby to try to keep the United States from helping Australia. Allied intelligence knew of the attack so they sent a task force to try to repulse the invasion. The Battle of Coral Sea marked the first time the Japanese failed to complete its mission in the war. The result of the Coral Sea engagement was that neither side won the battle completely. Japan won a tactical victory as it was able to sink more ships than the Americans. The United States won a strategic victory as Japan failed to complete its invasion. Atomic Bombing of Hiroshima and Nagasaki After the bloody engagement in the island of Okinawa, President Truman was forced to make a choice in the future of the war in the Pacific. With Germany defeated in Europe, all that stands in ending World War II is Japan. Truman knew after the Battle of Okinawa that Japan will fight to the end if ever American forces begin to invade the Japanese home islands. The casualties of such attack would be considerably high and it would only prolong the war. Refusing to throw away the lives of American soldiers, Truman agreed over moral reservations that using the Atomic bomb would quickly put an end to the war without any major American casualty. With Japans refusal to accept the Potsdam Declaration which stated that Japan will end in prompt and utter destruction if they do not surrender, the plan went into effect. On August 6, Enola Gay the bomber dropped the atomic bomb (Little Boy) on the city of Hiroshima. The bomb exploded 2,000 feet above Hiroshima destroying large parts of the city. W ithin minutes, the radiation effects caused by the bomb had killed 70,000-80,000 people. Another bomb was dropped (Fat Man) when the Japanese government still refused to surrender this time on the city of Nagasaki. 60,000-80,000 people were killed. Guadalcanal Campaign August 7, 1942-February 9, 1943 The Guadalcanal Island is a part of the Solomon Islands, a series of small islands 500 miles northeast of Australia. At the start of the war, Japan controlled much of the Solomon including Guadalcanal. The airbase in Guadalcanal was important to strengthen the sea lines of communication between Australia and United States. On August 7, the Allied troops landed on the shores of the islands and quickly captured an unfinished Japanese airstrip renaming it Henderson Field. Japanese reinforcements arrived and both sides battled viciously for the control of the island. Battles were done on air, land and sea for many months with heavy casualties on either side. As Allied forces grew increasingly in numbers, Japan launched a counteroffensive to retakes the islands from Allied forces. By November 15, the Allied forces decisively defeated Japanese but not without suffering major casualties. By mid-February Japan was forced to evacuate the island allowing the Allied forces to control the island . The battle was important to the war because it was the first major land defeat of the Japanese forces and ended any further expansion attempts. It was considered to be the first in a long series of battles that ultimately brought the United States on the Japanese home islands. Attack on Pearl Harbor December 7, 1941 The United States had emplaced economic sanctions and embargo on Japan ever since it started its expansion towards China. Without essential supplies America believed it would stop its territorial acquisitions in Asia. Japan however did not agree on negotiations with the United States. Because oil reserves are running out, Japan needed to acquire lands rich with natural resources in the Pacific to support its extending empire in Asia. With this in mind, Japan would directly attack the military of the United States situated in Pearl Harbor to eliminate a possible counter offensive when it starts to acquire other territories especially the Philippine islands. Japan hoped that by destroying the Pacific Fleet of the United States, it would leave them unopposed in expanding its empire. On December 7, 1941 launched 6 of its aircraft carriers with hundreds of aircraft to Pearl Harbor for a surprise attack. Caught unaware, the ships moored in the bay were destroyed one by one as Japanese figh ter planes and bombers dropped a barrage of bombs and bullets. Overall damages to the fleet were high; most of the battleships destroyed along with hundreds of aircraft. The following day, the United States declared war on Japan. After three days, Germany and Italy, Japans allies declared war on the United States. Though it had destroyed the majority of the battleships of the Pacific Fleet, Japan failed to destroy the United States aircraft carriers at that time located on the main land. The battleships had become obsolete at the start of World War II which Japan still see as more important than aircraft power. The United States was forced to use its fleet of aircraft carriers to wage war on the Pacific, a major oversight of Japan which ultimately led to victories on the Pacific.

Monday, August 19, 2019

Creative Story: Death Cload :: essays research papers

Creative Story: Death Cload 2100 hours, Captain James S. Steward of the United States Air Force straps on his G-suit and goes over his mission briefings one last time. He walks out into the hanger and awaits his chariot. The SR-71 Blackbird, the fastest plane in the world with it's twin turbine engines and slick black radar absorbent skin make him a flying shadow in the air. His mission, to fly a covert reconnaissance mission over Moscow, the heart of the USSR Intelligence believe that the Russians have a build up of nuclear missile silos around the capitol. With the Cuban missile crisis at hand, the United States cannot let their guard down on a sneak attack from the Communists. "Another suicide-run," says Captain Steward to his flight maintainer. "Yes, sir," replies the private. Captain Steward squeezes into his cockpit seat like a sardine in a can. Little switches, gauges, and buttons embellish the cockpit, each with a crucial part in flying the aircraft. "Ready to rock n' roll." Steward pulls the Blackbird out of the hanger like a cumbersome Oldsmobile, but only this special Oldsmobile can travel over twice the speed of sound undetected by enemy radar. With a push of the throttle the twin-turbine engines roar with authority. The bird takes flight disappearing into the night skies evanescently. The only sign that it exists is the trademark sonic boom as it passes the sound barrier. After approximately seven hours flight time and two in-flight re-fuelings, the Blackbird reaches its destination, Moscow, Russia. The thermal imaging camera, located in the bird's hull, depicts the radioactivity from nuclear silos as bright yellow and orange blobs on the terrain. The images show seas of yellow throughout Moscow. The city resembles a giant missile base up and operational. Captain Steward pulls a 180 and heads for home with sick eerie feeling in his stomach. After a long comprehensive study of the recon images, the United States order an increase in their production of their nuclear missiles to counter- attack any offensive the Russians have planned. Silos sprout like weeds throughout the United States and the President gave the order for Defcon 2. The country falls in a state of panic, as they slip one step closer to a nuclear holocaust. On the other side of the Atlantic, the USSR notices the nuclear build up in the United States. In fear of an preemptive strike, the Communist fuel and prepare their birds just in case. This pre-war act resembles a chess game; one side makes and move and the other counters it until both sides end up killing

Sunday, August 18, 2019

Our Kinds of People :: essays research papers fc

Cultural capital is specialized knowledge. They are symbols that you are given access to because of your upper class status. The children’s club Jack and Jill is full of these symbols. It is believed that the original Jack and Jill nursery rhyme was French and written about the beheadings of King Louis XVI and his bride Queen Marie Antoinette. The lyrics were changed to make the song more appealing to children. It later became a tale of sacrifice. In Our Kinds of People the children had to make sacrifices when in the club, and because of their association other children teased them (Graham, 1999, p.35) On all the Jack and Jill chapter websites that we came across the first thing it states underneath the chapter name is, â€Å"Providing nurturing and guidance for our future leaders† (www.jjfarwest.org/phoenix/). The phoenix chapter goes on to list their mission statement as follows; â€Å"Our mission is to provide an avenue for our children to develop bonds that will f oster spirituality, strong leadership skills, achievement and lifelong friendships. These bonds will lead to strong, positive images, promote sharing and caring, and support our children as they participate in age appropriate community and educational activities† (www.jjfarwest.org/phoenix/). Each year, the organization publishes an annual yearbook called Up the Hill, which features photos and reports from local chapters as they detail service, cultural, and social activities of the prior year. (Graham, 1999, p. 34)   Ã‚  Ã‚  Ã‚  Ã‚  The many different chapters, as well as the prestigious clubs for the men and women, portray cultural capital. They all must hold keys to get accepted into the groups. In Preparing for Power they needed to hold certain keys to be able to further their lives in the elite group. We think that the processes were very similar in both books. In Preparing for Power as well as the movie, Born Rich, it talked about living up to your family name and following in your parent’s footsteps. In Our Kinds of People it is just as important, although the context differs slightly, in that with the blacks it was not only a class issue but a color issue as well. In the book Lawrence Otis Graham even mentions that he had his nose altered and was instructed from his grandmother at a young age to stay out of the sun so his black skin didn’t get any darker.   Ã‚  Ã‚  Ã‚  Ã‚  We think that Graham’s concerns about there being black elite are justified.

Saturday, August 17, 2019

What Is Social Anxiety Disorder?

i. Introduction Social Anxiety is a worldwide disorder that can affect anyone, no matter what ethnicity or gender they are. Social anxiety is an intense fear of social situations, especially when you are being judged or watched by others. Such as presentations, being the center of attention, public speaking, making phone calls or eating and drinking in front of others. I chose to study this topic because I find it interesting how certain social situations can cause fear in people.Also, I show some symptoms of having social anxiety and I wish to learn more about this topic. Social anxiety disorder is also known as social phobia. It is defined as the fear of social situations that involve interaction with other people. It is the fear and anxiety of being judged and evaluated negatively by other people or behaving in a way that might cause embarrassment or ridicule. This leads to feelings of inadequacy, self-consciousness, and depression. The person with social anxiety disorder may beli eve that all eyes are on him/her at all times.Social situations that provoke social anxiety are eating or drinking in front of others, being the center of attention, public speaking, presentations, talking on the telephone and asking questions. People with this disorder will do whatever it takes to avoid social situations. The symptoms of Social Anxiety Disorder are extreme self-consciousness, immense fear of being judged or watched, nausea, rapid heartbeat, sweating and trembling. ii. Overview There are many different perceptions about people with social anxiety. Statistics show that this disorder is the third largest mental disability in the world and can affect 19. million Americans at any time. Even though it can occur at any time in people’s lives, it happens most often in childhood, adolescence and adulthood. Statistics also show that women are more likely to get diagnosed with Social Anxiety, than men. People who do have it are often seen by others as just being shy, u neasy or quiet. The people who are diagnosed with social anxiety may be conflicted by these perceptions, so they may fail to seek treatment. The problem is generally unheard and they may think that they are the only ones who suffer from it.People who do seek treatment are often misdiagnosed and labeled as â€Å"personality disorder† or â€Å"manic depressive. † This is because social anxiety is not well understood by the general public, or medical or health care professionals. Those with the disorder usually know that their anxiety, thoughts, and fears are irrational. They realize that it is angst and terror that they are experiencing. They know that people around them are not really judging them or evaluating them. They understand that everyone is not out to degrade or embarrass them.But despite this logical knowledge and sense, they still continue to feel and believe differently, which causes thoughts and symptoms of anxiety usually persist with no indication of goin g away. People with social anxiety may usually experience extreme distress in some of these situations: when they are being introduced to other people, being teased or criticized, being the center of attention or meeting important people or authoritative people. Or by being watched while doing something, announcing something in a public situation and getting embarrassed easily.Social anxiety may be selective. A person may have an extreme fear of one occasion, such as public speaking, but be perfectly comfortable in any other situation. People with a social phobia are nervous, anxious, and afraid about many social situations. Simply attending a business meeting or going to a party can be highly nerve wracking and intimidating. Although people with social anxiety want to be social with everyone else, their anxiety about not doing well in public is strong and hinders their efforts. They freeze up when they meet new people. ii. What Causes Social Anxiety Disorder? What Are The Symptoms? Knowing the exact causes of social anxiety is still an ongoing research and there is no single known cause. However, there are environmental and psychological factors that will play a role in its development. This development of this disorder can be from a humiliating experience the patient has experienced in the past. People diagnosed with social anxiety may have developed this disorder by seeing what has happened to someone else when that person has been embarrassed.As mentioned before, there are also emotional, physical and behavioral symptoms of social anxiety. Emotional symptoms can range from fearing that other people will notice that you’re nervous, to worrying for days or weeks prior to a social situation. Physical symptoms are nausea, sweating, rapid heartbeat, feeling faint, trembling and shaking. The behavioral symptoms are avoiding any type of social situation to an extent where it disrupts your life and hiding â€Å"behind the scenes† to escape from being noticed. iv. Treatment for Social Anxiety DisorderTwo types of treatment may be used to help patients suffering from social anxiety. A certain type of therapy can be used, cognitive-behavioral therapy, and it has proved to be effective in most cases. Medication is also useful in treatment. Antidepressant, such as MAOI’s, in contrast with CBT, is the most beneficial. Benzodiazepines like Xanax, Valium and Ativan are prescribed to people who have social anxiety to treat it. But research has shown that if the two treatments are not used together, success is only temporary.Also, treatment must include a therapist and an active behavioral therapy group. Group therapy for social anxiety use CBT techniques includes role-playing and training of social skills. This group therapy uses acting or mock interviews to work on the social situations that will make you anxious. The most important steps in defeating social anxiety disorder is understanding, becoming aware of the problem, and c ommitting to go through all treatments, including therapy. v. Conclusion I learned that Social Anxiety Disorder can affect millions of people at any given time.I think I show signs of Social Anxiety Disorder because during social situations, such as presenting, I show the symptoms. I get anxious, shaky, nervous and rapid heartbeats. In my opinion, this is probably one of the worst mental disorders that someone can have, because it is so misunderstood and misdiagnosed. What makes the situation even more difficult is the fact that the disorder does not just come and go like other disorders. A person is faced with it every day of their life, every time they have to go out anywhere or are put in a situation where others are involved.They have to deal with this all the time, until they are treated. Unfortunately, most people do not know that they have it. Without some kind of formal education, knowledge, or treatment, social anxiety continues to ruin their lives. And if they finally do t ry to seek help, chances are that they will not find. This is the reality for 19. 2 million Americans, but yet there is very little being done in the way of trying to help them realize that they are not just shy or introverted, they really have a problem. REFERENCES Websites: Stein MB, Stein DJ. Social anxiety disorder.Lancet. 2008;371:1115-1125 – (http://www. ncbi. nlm. nih. gov/pubmedhealth/PMH0001953/) Jaffe-Gil, Ellen, M. A. ; Smith, Melinda, M. A. -www. helpguide. org ;(http://www. helpguide. org/mental/social_anxiety_support_symptom_causes_treatment. htm) www. nimnh. nih. gove/index. shtml (http://www. nimh. nih. gov/health/publications/social-phobia-social-anxiety-disorder-always-embarrassed/what-is-social-phobia. shtml) www. wikipedia. org (http://en. wikipedia. org/wiki/Social_anxiety  ) www. webmd. com (http://www. webmd. com/anxiety-panic/guide/mental-health-social-anxiety-disorder)

Descriptive general marketing plan outline for eegee company

I.  Ã‚   Executive Summary – This marketing plan is designed and conceptualized to respond to a particular challenge that the Eegee Company is looking to take head-on: make solid, calculated steps upward the market and consumer share ladder and eventually lead the industry based on commanding hold of the target market and market share. This marketing plan provides an insight on the key pillars of a workable, achievable and realistic marketing strategy through the careful analysis and consideration of the company structure, capability and current market position as well as the position of the competitors and the direction where most of the target customers are looking. This marketing plan is designed to design a strategy so to ensure that the target customers of Eegee Company is looking Eegee’s way, and no other way, through effective marketing with the use of traditional and below the line (BLT) advertising vis-à  -vis enhanced and improved product designed to suit the taste of its target market. In order to measure the success level of the marketing plan, several long term and short term objectives are identified in this marketing plan to enable the company to see whether they are consistent with the course of action and course plotted by the marketing plan, and if the marketing plan is effective after all. II. The Egee Company Marketing Challenge – The Eegee Company has been operating since 1971, and for nearly four decades, many internal and external aspects have changed. Internally, there have been several changes in operational direction that included shift in logistics, use of technology and expansion while externally, competitors of the Eegee Company products themselves collectively experienced changes; some became stronger brands, some disappeared and in their place some new names surfaced to challenge the market and threaten the market share enjoyed by Eegee Company. The main marketing plan of the this marketing plan is to put Eegee Company in a position of stable and consistent growth, and over a period of calculated time, hit the top spot in market share in the frozen fruit juice, baked goods and sandwich industry, and provide long term and short term strategies on how to maintain pole position at least before a new and more suitable and up-to-date marketing plan has been created and enforced. This market plan will take into consideration the analysis of the current business situation Eegee is in, as well as the analysis of the company, the target market and customers and the competition to be able to ascertain the real grounds Eegee is standing on at the moment and from that point define the path it should take to get to where it wants to go. Analysis of the Situation – Eegee Company has successfully managed to branch out, but the branching out of the company is not yielding the desired stranglehold effect of the target market. Simply put, Egee is everywhere, but a lot of its target consumers are still going somewhere else. The question is, ‘why is that’? Product-wise, Eegee Company’s line of food product provides both character to the company and diversity that consumers require for a food chain to constantly invite patrons and attract new customers. In the absence of any official action against Eegee Company by anyone of its former and current customers with regards to the products having undesirable qualities, it is by default that this marketing plan would consider that most customers would agree that generally, Eegee Company’s food is fresh, delicious, satisfying and reasonably priced. Eegee Company, throughout its 36 years of existence and operation, was able to follow trends in local and trans-state food and beverage distribution and manufacturing, such trends not jeopardizing the quality of Eegee Company food. III. Alternative and Selected Marketing Strategies – This marketing plan will identify some alternative marketing strategy and select particular marketing strategies that the company is capable of launching and supporting inside a particular time frame. Selective and Sensitive Media Advertising – Traditional marketing wisdom still points to the use of advertising in mass media as an effective marketing strategy. But as was pointed out earlier in the marketing plan, current social changes affect the manner by which modern advertising and marketing strategy is being conducted, and Eegee should be aware of that and incorporate these changes in the strategy to come across as an issue-sensitive company whose main concern as a corporate entity is customer welfare. Eegee can shift its marketing and advertising styles with more health-conscious tones and responsibilities, meaning Eegee will focus on its healthy food line and stress on the characteristic of Eegee as a partner in maintaining healthy eating habits and at the same time re-align product advertising with regards to the audience that it actually hits, similar to the Kellogg case and the role of their advertisement of food that pressure groups deem as unhealthy for kids and contributing to the obesity of the children in America (Associated Press, 2007). Product and company assessment through public and target market survey – bringing the food closer to the target customers requires the company to know what type of food these people want on their hands and on their plates. This assessment is critical since this will provide the company a glimpse of where current Eegee products stand in the preference of the target market. Results of this study is integral in the marketing plan since this will help in the undertaking of alternative recommended strategies like the discontinuing of a product as well as product re-branding and change in company profile. The marketing team can begin with conducting the study on the impact of the company’s current identifiable logos and characters and whether or not it alienates a particular section of the target market owing to its leaning towards more youthful and child-like personality. Promotion through close contact with customers – Promotional activities like community-based events support and sponsorship is highly encouraged to be able to put Eegee closer to its target market. Other minor promotional gimmicks like holiday discounts and give-away items should also be analyzed carefully, particularly with the items to give out with focus on strengthening brand and product recall through non-food items. IV. Short Term and Long Term Projections – Long term and short term projections include immediate marketing strategy impact as well as the expected fall out of the marketing plan which will be reflected in a post mortem for the marketing plan which will be identified in the marketing strategy calendar. The long term and short term projections should also consider the impact of the marketing plan in other business areas like the forecast of revenues, expenses and break even analysis. The selected marketing strategies also promise several long term and short term impact on the company sales and product performance. The ‘Selective and Sensitive Media Advertising’ marketing strategy’s short term results may include favorable public perception on the company and the product that may show direct positive impact in immediate improvement of sales. Another expected short term result is the gaining of newfound interest among new target market who will be hit by the particular new wave of Eegee’s media advertising. Long term results generated from this particular strategy include long term maintenance of favorable and positive company and product profile (which can only be maintained if the company can provide products that customers generally like and enjoy) as well as the establishment of the very critical brand recall that can help in minimizing advertising efforts for at least the next one or two years. The ‘Product and company assessment through public and target market survey’ strategy’s long term and short term effect is primarily the ability of the company to use the opinion of its target consumers to its advantage. Its short term effect includes being able to re-design and repackage the products, the company and the marketing style that fits the consumer taste. Its long term effect is primarily the providing of usable data which the company can use in the future during its redesigning of future marketing plans and strategies. The ‘Promotion through close contact with customers’ strategy provides a short term effect that translates to direct communication with target consumers on a more localize and direct level while its long term effect is expected in the increase and maintenance of brand recall and product identification. In order to achieve them, departments and individuals who are directly involved in the implementation of the marketing plan should perform expected tasks and maintain deliverables as per marketing plan schedule. Special action towards the marketing plan that affects the marketing strategies directly may come in the form of remedial actions should unexpected problems arise during the duration of the marketing plan and strategy implementation, as well as crisis management task undertaking in the event of crisis-level concerns occurring during the duration of the marketing plan/strategy implementation. Forecast of Revenue – members of the marketing team should be designate the starting point of marketing campaign pursuant to the marketing plan put into action. A comprehensive administration of the marketing plan (advertisement, promotion, product change, corporate re-design etc) would be sufficient enough to allow management to evaluate sales performance from the start of the marketing campaign up to the end of the first three or five months and break down these months into weeks and days to see if there are noticeable trends that can suggest improving revenue based on the imposed marketing strategy. Expenses – List of expected expenses should make room for auxiliary expenses for unexpected marketing costs and should be detailed in the marketing plan. The expenses incurred in the undertaking of a creating and using of a new marketing plan and marketing strategy is considered as internal investment of the company. The marketing team should work hand in hand with the accounting and the legal department to see how some of the expenses can be translated for tax refunds and tax exempts and other ways and means that can soften the impact of the expenses on overall operation and financial status of the company. Marketing, after all, ‘costs money’ (Gendusa, 2006). Break Even Analysis – The marketing plan, the forecast of revenue and the list of expenses should design a strategy allowing for break even income – costs as the worst case scenario in the event that the marketing plan did not yield expected results. Necessary plans should also be made to compensate for any negative result of the break even analysis. References: Associated Press. (June 14, 2007). Kellogg to change recipes, marketing. The Boston Globe. Retrieved December 25, 2007, from http://www.boston.com/business/globe/articles/2007/06/14/kellogg_to_change_recipes_marketing/ Eegee's website. Retrieved December 25, 2007, from http://www.eegees.com/index.htm Gendusa, Joy. (May 22, 2006). The Importance of a Marketing Plan. Articlesbase. Retrieved December 25, 2007, from http://www.articlesbase.com/marketing-articles/the importance-of-a-marketing-plan-30026.html ;

Friday, August 16, 2019

Marketing Strategy in ecommerce industry

IntroductionTechnological development has led to formulation of quite a number of strategies aimed at elevating marketing in line with the current electronic age. Amazon and eBay provide us with a perfect example to the extent to which e-commerce can help in the continued growth of business. In the traditional marketing strategy, the model used is the Four P’s model. That is, there has to be product, place, price and promotion. The commodity offered on the market to attract attention or intended to be offered for acquisition is the product. When you have your product you must also have the platform which will act as the venue of meeting between the targeted client and the product in question.The value attached to the product and which is the target channel to the generation of revenue is the price. The price attached or tagged on the product need not necessarily be the price at which it is sold. This is because the process of selling is subject to many constraints, bargaining being one of them. Customers or targeted customers need information about the product, its characteristics and distinguishing features in order to make their purchases. Promoting the product therefore helps in ensuring that this role is played. It ensures awareness of the product by the potential customers. It is done in several ways. Advertising is one of the ways through which this promotional activity is carried out.The model applied in e-commerce strategy is more complex than what we have discussed above. However,   Ã‚  it is good to also note that it is very essential; that both traditional model and this advanced model be fused together in order to create a smooth transition without leaving a hanging gap. According to Allen and Fjermestad, integrating the new strategic frameworks with the traditional marketing model a more thorough framework can be developed.Due to great expansion that has been seen in the area of internet use, which means that the number of internet users h as immensely increased, there is need to come up with a model that can serve the needs of all these customers so that businesses do not lose the goodwill of the very customers whose satisfaction the existence of the business depends on. If the satisfaction of the customers is not assured then the business can be sure to lose their confidence yet it is fundamental that the business reassures every customer of satisfaction. In fact, information apart from providing awareness, it is a product on its own.   It is therefore important to examine the problems that the e-commerce faces by critically looking at the marketing mix. In addition the four P’s do not lose meaning but rather the gain meaning.Data requiredAs we have indicated above, data is a product on itself in addition to being a means of creating awareness to the benefit of a given product offered by a company. The product can either be a service or a good. Companies in need of obtaining data through quick online connec tion need to license eBay Market Data. After licensing eBay Market Data, they can access AERS (Advanced Economic Research Systems) data services online. Companies can get online quickly with time tested search technologies that produce correct analysis using the most efficient techniques possible. Before we look into the kind of data a company would need it is good to understand the setting in which the data will be situated.Allen and Fjerstand go ahead to state that the development in technology has allowed the information about the product or service to be separated from the product or service itself (Allen and Fjerstand). This, they say, has three elements: content, context and infrastructure. Content is what is being sold and could be information, service or a physical product.Context is how the product is presented for exchange. This method of presentation is vital to winning the consumer loyalty. Once the consumer loyalty is won, there is assurance of large and similar transac tions taking place. Infrastructure on the other hand is the way in which the buyer and the seller are brought together in order for the transaction to be executed.There is need to understand that mentioning marketing we must have two kinds of information. We must have consumer information and product information. Therefore the data required falls under the two categories of information. The consumer has to be equipped with the full information about the product before making good the urge to purchase. In addition, the fact that the whole process internet selling is quite intangible increases the risk involved. The seller also needs to have information about the buyers. It is important that the seller understands the location of the customer, preferences and tastes. The customer will also need to know about shipping, physical features of the product on offer.Location of the dataAdvanced Economic Research Systems provide a wide range of data systems which in turn provide location for access of data. The following are some of the data systems that can act as location for data.eBay Category Structure Lookups eBay Smart Search Technology eBay Demographics Data Systems eBay Market Research (Customized Reporting) eBay Shipping Data Systems The method used to inquire about the information is just a click on the mouse and the navigator takes you to the required center.Analysis of the dataIt is vital that correct information is gathered concerning the customer or the product. If this is not done, there is possibility of collecting the wrong information thereby either buying the wrong product or providing buyers with the wrong product. Coming up with a comprehensive marketing is a challenge which has several advantages that give a strong of go on.It allows reduced warehousing by the companies thereby reducing storage costs and holding costs and reduced inventory costs due to automation. Internet selling is just to all companies big and small since any company is able to operate internet. There is possibility for companies to reach customers who are far away and who the company would otherwise not have the ability to sell to in their localities. Internet has enabled a one to one marketing in addition to creating room for 24-hour operation. Lastly, it provides a unique form of market research for information about the market.The internet has also its own demerits. The rapid growth in internet use has made it difficult for the companies to cope with high demand and manage distribution. Secondly, it is possible for transactions to take to long before being executed. This is because it is easier for buyers to forget after making an order due to dalliance. Lastly, apart from the fact that it could hard to find some sites, there is a barrier created between the buyer and the company since the products can’t be seen in person.Achievement of any framework developed should be measured in terms of customer satisfaction such that its failure would be se en through its failure to satisfy the targeted customers.  In conclusion, we ca say that there has been an enormous increase in the demand for information which can be justified by the increase in internet connectivity. This means that there is need to be developed a strategy that will ensure effective management and sustained distribution to customers.Reference:Checking out. (2000, March- April). Harvard Business Review, p. 22Mardesian, J. (1999, November 8). ‘The Web is no Shopper’s Paradise’. Fortune. Pp 189, 190