Thursday, August 27, 2020

The Cost Of Living Essays - Arundhati Roy, Bengali People

The Cost Of Living Essays - Arundhati Roy, Bengali People The Cost Of Living Question #1 With the 3600(A. Roy 16) hydroelectric dams either going up or effectively inherent India, there will without a doubt be more than 33,000,000 individuals dislodged by the huge dams stores (16), a large portion of which are Adivasi or Dalits (18), locals of India. Without a legitimate resettlement program set up, many are left with no spot to go. A great part of the land that is required for the repositories was reallocated, misled away, or tormented into being sold by the administration. What's more, what land the legislature bought, not every person got the cash they should. The resettlement programs that are set up, are best depicted by Roy I can warrant that the nature of their convenience is more terrible than in any convergence of the Third Reich(20). From what I accumulate from Roy, these resettlement destinations sound entirely unfeeling and Im truly astounded activities like that of the Indian government arent enduring an onslaught of the U.N. Allowed this doesnt appear to be the most plugged nor all around reported progressing occurrence. Concerning the Nuclear weapon issue that faces India, Roy didnt appear to address it in incredible detail. What's more, in the event that she did, I read directly through it. With absence of legitimate storerooms and the danger of sullying Indias uncommonly costly drinking water. It may be astute choice for the Indian government to either stop their atomic weapons program or appropriately address these issues. Question #2 I surmise I truly have no other decision yet to concur with Roys conclusions. Perhaps in the event that we were given some kind of composed reaction from the Indian government or anything from an alternate perspective. Anybody that has perused this book, with no outside data, would must have something against the Adivasi or seen something in the book that most likely 99% percent of the individuals that have perused it missed to differ with Roy on the issues in India. The main individuals benefitting from the dams are in the administration, some portion of World Bank, Jai Prakash Associates, and anybody with enough cash that needs the water. Besides, it doesnt give the idea that any of the rustic residents of India will be partaking in any of the benefits or even get water for a long while. Question #3 The careful condition Roy ascertains on pg. 17 that gauges 33,000,000 individuals have been uprooted by huge dams is a gigantic solid point in Roys contention. To make an already difficult situation even worse, the individuals that are even fortunate enough to get resettled, are placed in tin shacks on ungracious land, a long ways from what there used to. Prior to the dams, the uprooted were independent and doing OK for the way of life they drove. The entirety of the proof Roy offers about the Indian government focuses to a complete dismissal for human life or an incredible level of inadequacy. In any case, something extraordinary must occur before anything is truly going to change. To be completely forthright, I neglected to perceive any shortcomings in Roys contentions. Im doing whatever it takes not to state there arent any, yet I didnt discover any. Question #4 I decided to mark as coming Roy from a social clash point of view. I essentially did this through the procedure of end. She is certainly not a basic functionalist. She was unquestionably doing whatever it takes not to be objective, in the loosest feeling of the word, while composing this book. This is one more of the states tried methodologies. It slaughters you with advisory groups., she sounds truly associated with that sentence while portraying one of the councils assume to direct a free audit. Her conditions, money related reports, and rates give her a little representative connection flavor, yet she unquestionably is more into the manner in which her kin are being dealt with List of sources The typical cost for basic items by andretti roy

Saturday, August 22, 2020

Reengineering and Code Migration Strategies

Reengineering and Code Migration Strategies GENERAL The most significant nature of programming reengineering is to improve or change of a current programming framework with the goal that it very well may be comprehended, controlled and easy to understand. Programming is utilized to supplant high programming upkeep cost of the inheritance frameworks. So programming reengineering is progressively useful for recouping and reusing existing programming resources, putting high programming support costs leveled out. It likewise builds up a base for future programming advancement. There are a few programming reengineering procedure, for example, figuring out, re-documentation, rebuilding, source code interpretation and forward reengineering. So we utilized programming reengineering through source code interpretation process. For doing programming reengineering through source code transformation there are a few change instruments, these devices used to interpret a code written in one language to another dialect. We chose to change over programming formed in C++ language into java language since java progressively reasonable for web, increasingly dependable, stage autonomous etc.There are different source code interpretation instruments, for example, Tangible programming arrangement In, Ephedra; novo soft’s C2J++, C2J, etc. We utilized substantial programming arrangement Inc instrument to change over a source code written in C++ language into java programming language. It has been discovered that java based source code is obviously superior to C++. There are a few purpose behind that, for example, less execution time too less multifaceted nature. The substance of programming reengineering is to reuse the current code of inheritance framework on the grounds that the first cost of building up the rationale and the part of the product ought not be squandered. In this Dissertation programming reengineering through source code interpretation is utilized. The test results are better. As clarification in java language detail, java is identified with C and C++ yet there are some significant and observable contrasts that represent a few issues in a movement from C++ to Java. The greatest contrast is that C++ is definitely not a total article arranged language as that of java. Java is the stage free programming language implies it needn't bother with explicit stage for run.So it is difficult issue to make an interpretation of a C++ code into a java code in light of the fact that there is no a particular instrument that can change over a given C++ code into java code with no manual work on the grounds that both the linguistic structure and semantics is required to change over. We additionally used to change the worldview which is important to move from C++ to java. KEY POINTS OF REENGINEERING During our thesis work we have closed the accompanying key purposes of programming reengineering: The goal of reengineering is to improve the structure of the framework to make it more clear and to keep up. Source code interpretation is the mechanized transformation of the program written in one language to another dialect. Figuring out is the procedure of concentrate the framework plan and recognizable proof from its source code. Program modularization incorporate recovery to gather associated things. Information reengineering might be fundamental due to the conflicting information the executives. CODE MIGRATION STRATEGIES: C++ TO JAVA In this section we will examine about different endeavors which are utilized by us during investigation of C++ to java change utilizing Tangible Software Solution Inc converter. To approve Tangible Software Solution Inc approach, we close a few contextual investigations by choosing run of the mill C++ source code for movement in java language. We additionally broke down that comprehensibility of java language grew physically is extremely simple than unique C++ code yet clarity of java changed over code by this apparatus isn't flawless in light of the fact that its Line of Code (LOC) is excessively enormous in contrast with unique C++ source code just as physically java changed over code. During the transformation from C++ source code into java code, we composed a great deal of C++ programs in last part. We composed different sorts of C++ programs as a relapse test suite to test parts of transliteration. To approve the rightness of genuine program, we picked an independent restraining infrastructure Air-ticket programming bundle. We pick C++ to Java relocation since we realize that java language become an acknowledged standard for wide scope of advancement needs now-a-days. Programming just as web engineer thought that it was important to change over the applications they have written in more seasoned programming language, for example, C++ to Java. There are different language transformation devices like Tangible Software Solution Inc, C2J++, Ephedra and so on. Novosoft’s C2J++ changes over a given C++ code to its proportional java classes while other given apparatus changes over any given C++ source code into java code. With the assistance of these apparatuses it is conceivable to change over any C ++ code into java code and this transformation with the assistance of these devices isn't troublesome. In the event that any product engineer utilizes these devices, at that point he/she can spare both time just as assets. He/she can complete a task fast and without holding somebody to revise an application , which is the last choice, if the reengineering cost is excessively huge. We can likewise decide to modify or to redevelop if the quantity of the broken segments (objects) is over half. An unmistakable programming arrangement Inc converter makes an interpretation of a C++ code to a java code or java classes. The measure of time it takes to interpret the given C++ source code into java code relies upon quantities of components including your equipment just as size of the first C++ source code. Expected transformation isn't straightforwardly corresponding to Line of Code (LOC) used to create C++ code yet it relies upon the idea of C++ program. For the huge applications we expect that the change time of Tangible programming arrangement Inc apparatus is around two minutes. Presently we will talk about the change of different kind of C++ program into java and what sort of challenges have came during transformation with the assistance of Tangible programming arrangement Inc change instrument. We will likewise talk about these standards with the assistance of some contextual investigations base on C++ to java change as follows: PROGRAM STRUCTURE IMPROVEMENT At whatever point we chose to reengineer given programming rather than support, we have the accompanying improvement in the structure of this product: Upkeep moves to degenerate the structure of a program. It gets troublesome and hard to comprehend. Program might be aphoristically rebuilt to dispense with unrestricted branches. The conditions might be cleared to make them increasingly conceivable. The conditions might be improved as follows: Complex condition given by following articulation: If not ( A>B and (CF))) Also, the disentangled condition might be communicated as: In the event that ( A = D or E > F) †¦Ã¢â‚¬ ¦ Contrast BETWEEN C++ JAVA The significant contrast among C++ and Java is the equipment stage for which these programming dialects are accumulated. C++ programs are typically accumulated to the local machine language of a PC, while Java programs are ordered by the Java Virtual Machine (JVM), a virtual equipment stage running on a solid equipment stage. The JVM checks all sort changes and capacity gets to for their wellbeing and security and forces traditionalist limitations on these activities. All C and C++ compilers actualize a phase of arrangement known as the preprocessor. The preprocessor fundamentally plays out an intelligentsearch and supplant on identifiers that have been announced utilizing the #define or#typedef orders. Java doesn't have a preprocessor. Steady information individuals are utilized instead of the #define mandate and class definitions are utilized in lieu of the #typedef order, anyway there is not a viable alternative for macros, which canbe helpful. The Java way to deal with characterizing constants and namingtypes of information structures is likely thoughtfully easier for the programmer.Java will limits check exhibits toprevent this from occurring, obviously with alittle extra runtime cost. Nature OF GENERATED CODE At whatever point we convert a C++ source code to a java code with the assistance of Tangible programming arrangement Inc converter or physically then we see that the nature of created code improved unquestionably. We additionally investigated the changed over code as for its intelligibility and execution of recently changed over code. Anyway Tangible programming arrangement Inc apparatus can't change over the entire given programming created in the C++ language into java code at once however it is reasonable to change over a given C++ code to comparable java classes and in the wake of accomplishing some manual work on these changed over java classes with the assistance of Tangible programming arrangement Inc transformation device, we can found the resultant java code. We additionally broke down that this code is progressively viable in contrast with given unique C++ source code. The most significant component of java language is that it is absolutely stage autonomous language while C++ language doesn't have this element. On the off chance that any product/program code is stage free it implies it can run on any framework having distinctive working framework that is on the off chance that any java code is created utilizing window working framework, at that point it can likewise run on various frameworks having diverse working frameworks such like Linux just as UNIX working framework without any problem. There are following primary elements which are improved after change: Intelligibility Conformance and reconciliation Execution Intelligibility On the off chance that we take out an emotional perspective, at that point code produced by Ephedra change device having less manual work in contrast with its rival for enormous scope computerized interpretation of source code by Tangible programming arrangement Inc, yet primary issue identified with Ephedra is its accessibility. Ephedra isn't open source code so for the most part isn't utilized for scholastics. Before utilizing this instrument we need to require its permit so we chose to accomplish our work with Tangible programming arrangement Inc change device which is open source programming. Anyway we changed over our undertaking formed in C++ language into java language with the assistance of thi

Friday, August 21, 2020

Theres antimony, arsenic, aluminum, selenium

There’s antimony, arsenic, aluminum, selenium… Whew! I ran back from my field hockey game today (we won, 3-1! ya!) just in time to help the 213 suite put together a study break. Every Thursday, some group of people on the floor puts together a late night snack for everyone to enjoy while, as the name implies, breaking from their studies. Since we hadnt actually planned anything, we just ran to LaVerdes (the convenience store in the student center) and bought brownie mix and ice cream. It was all quite delicious, even if a certain member of the 224 suite complained that we stole one of their ideas. =P Ive been hanging out in the floor lounge since then, trying to do some programming for 6.081. But Im tired and confused (why is d+=1 legal normally but not when it comes right after the else command?) so Im not really making progress. Instead, Im having more fun observing the other activity going on in the floor lounge One of the requirements of 3.091 (one of the freshmen chemistry options) is that the students memorize the contents of the periodic table for a quiz. This basically means that everyone crams the information into their brains just before the quiz and then promptly forgets it all. A couple of freshmen were in the process of said cramming when Diana 08 and Adelaide 09 decided to try to fill out the entire table from memoryyou know, for fun. So between my halfhearted attempts at trying to figure out my syntax errors, Ive been shouting out radium is more reactive than that! or Hey you forgot manganese! Its honestly a rather pleasant way to spend an evening. Said the MIT student. Seriously, this is what we do for kicks. If you think thats lame, MIT is not for you. =P Now that Ive actually been to classes, I can share them with you! Yay! 2.001: Things are static. ? £Fx=0. ? £Fy=0. ? £M=0. The end. 2.003: Things move. The end. 6.081: Things do what you tell them to if you can figure out how to do it without making them mad. Usually. 21M.600: Things (i.e. students) act like trees that die in the winter and are born again in the spring. its weird. So that was whimsical and vague. Im tired, leave me alone. Ill write more insightful descriptions later. Ask me questions. Your previous questions will be answered in my next entry, when I dont feel like Im about to fall asleep any second. Good night!

Monday, May 25, 2020

Personal Reading Inventory Worksheet The Great Gatsby Essay

Personal Reading Inventory Worksheet Title of Work: The Great Gatsby Author’s Name: F. Scott Fitzgerald Date of publication: April 10, 1925 Genre: Romance and Adventure Characteristics of the genre the work does/doesn’t meet: The work does meet the characteristic of having an obstacle that prevents love between two people. It also meets the characteristic of strong emotions, love at first sight, and having two protagonists. Setting: Time + Place + Atmosphere (mood or tone): It was the summer of 1922. The story took place in Long Island, New York, in West Egg Village. Major characters (physical and personality): †¢ Jay Gatsby – Gatsby is wealthy but lonely. He loves Daisy Buchanan. His neighbor is Nick Carraway who throws a lot of crazy parties hoping Daisy will show up one day. He is respectful and well-kept. †¢ Nick Carraway – A 29 year-old man who just moved to West Egg to work as a bonds salesman. He is the cousin of Daisy Buchanan and is the narrator of the story. He claims to be an honest person, but he is also quite judgmental. †¢ Daisy Buchanan – Tom Buchanan’s wife and Gatsby’s lover. She is in an unhappy marriage with Tom. She has an attractive but self-absorbed personality. She is very indecisive and has a â€Å"thrilling voice.† Summary of the plot: Nick Carraway, the cousin of Daisy Buchanan moves to a wealthy neighborhood in New York and gets invited to a party next door by a mysterious man named Gatsby. He later finds out that Gatsby and Daisy used to be lovers.

Thursday, May 14, 2020

Cultural Differences in Joint Ventures Essays - 3358 Words

ESSAY TOPIC (1) :A joint venture is affected by the cultural distance between two partners. In what ways are joint ventures and types of international collaboration affected by cultural differences? INDEX INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 What is culture?†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2-3 The Cultural Orientation Model†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.4 The cultural Gap†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5-6 Understanding Cultural Differences†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.6 The Challenge of Cultural Success†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..7 Cross-cultural training as a solution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 The effectiveness of the cross cultural training programs†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8-9 Future Directions for Cross-Cultural Training and International Business Assignments†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..10.†¦show more content†¦He states that it can be discussed quot;in terms of typical ways in which people in a society, group or organization behave, communicate, think or perceive reality.quot;3 Each culture has differing value and belief systems, which effect how people perceive reality and their following reactions to it. A useful analogy to describe how culture impacts on the interpersonal level is that of computer software. Geert Hofstede has defined culture as the quot;software of the mind.quot;4 Hofstede compares culture to a computer program, in that individuals learn and acquire patterns of thinking, feeling and acting over time that influence their actions and perceptions. He believes that culture is quot;mental software,quot;5 in that it predisposes individuals for certain inputs which are processed in a familiar way for a certain set of outputs, or actions. Hofstede states, however, that quot;a persons behavior is only partially predetermined by his or her mental programs: (s)he has a basic ability to deviate from them, and to react in ways which are new, creative, destructive, or unexpected.quot;6 The mental program is not absolute. It can change over time to react to new inputs and stimulus. If this were not the case, mutual understanding in intercultural communication would not be possible 7 . Not only does intercultural training enable communication in the procedural sense, it also quot;givesShow MoreRelatedCultural Differences in Joint Ventures3468 Words   |  14 PagesESSAY TOPIC (1) :A joint venture is affected by the cultural distance between two partners. In what ways are joint ventures and types of international collaboration affected by cultural differences? INDEX INTRODUCTIONÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…2 What is culture?Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…2-3 The Cultural Orientation ModelÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â….4 The cultural GapÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…5-6 Understanding Cultural DifferencesÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â….6 The Challenge of Cultural SuccessÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Read MoreChangan-Ford Joint Venture606 Words   |  3 PagesChina and Ford Motor Co. of USa in forming the Changan ford joint venture. 2) Using section 10.4 describe the type of strategic alliance, the motives for alliance, and highlight the issues with their probable causes. 3) Make recommendations to the CEO and senior managers of Changan-Ford on how they can address the cross-cultural issues identified. The Changan Ford Joint Venture: Same Bed but still different dreams? 1. This joint venture has provided both companies many advantages. From an economicRead MoreVitro Corning1728 Words   |  7 Pagestoward a joint venture with Vitro. Because of long histories of successful joint ventures and had been an innovative leader in foreign alliances for over 73 years, Corning s strategy of establishing the joint venture relationship with Vitro seems to be a ideal combination and will lead to success. However, the joint venture became subject to a series of cultural and other conflicts that began to undermine this vision. According to company officials and external analysts, cultural differences wereRead MoreA Rare Success in China - the Celanese Joint Venture1573 Words   |  7 Pagesreproduced for the purposes of study only, and is in no way a condonement of the damage the tobacco is causing. Overview One of the most closely studied Chinese joint ventures is that involving Celanese Corporation of the United States, a producer of value-added industrial chemicals, and China National Tobacco Corporation (CNTC). The venture produces tow, the fluffy synthetic fiber in cigarette filters. In 1982, when CNTC decided to increase its production of filter cigarettes, it was on the lookoutRead MoreDisney Market Entry Strategy1610 Words   |  7 Pagesperformance is exceeding expectations (Sampson, 2017). However, it took the need to overcome cultural and managerial obstacles to make the Shanghai expansion possible. This report will analyze the cultural factors and managerial challenges facing the Walt Disney Company when expanding into Shanghai, China. First, the impact of different cultural factors will be assessed with emphasis on Hofstede’s six cultural dimensions. Second, the report will undertake an analysis of the recommendations on a marketRead MoreCase Study: Guanxi in Jeopardy1598 Words   |  6 PagesIntroduction This case study Guanxi in Jeopardy is a story of two companies Electrowide and Motosuzhou who planned to do a joint venture. Electrowide is a USA based company which produces new and latest technology equipments for the automobiles while Motosuzhou is a large organization of China working under the instructions of Chinese government like many other Chinese firms. Electrowide planned to improve their business by using the lean production and latest technology methods. AlongRead MoreHarley Davidson Essay658 Words   |  3 Pages Name: William Pate Case Study Title: Case Study #5 Harley-Davidson Question #1 If you were CEO of Harley-Davidson, how would you compare the advantages and disadvantages of using exports, joint ventures, and foreign subsidiaries as ways of expanding international sales? As CEO of Harley-Davidson the way that I would compare the advantages and disadvantages of exporting would be; Exporting Gives us instant market access into a new market making us able to maximize revenue in a short amountRead MoreShui Fabrics Question - Ans959 Words   |  4 Pagesand the inflation rate. These factors have major impacts on how  businesses operate and make decisions.. There are economic differences that influence the relationship between the partners at Shui Fabrics. Chiu Wai operated Shanghai Fabrics LTC located in  China, before it  became a joint venture  with Rocky River Industries in the United States. When the companies became a  venture, Chiu Wai became the Deputy General Manager for Shui Fabrics in China and venturing company Rocky River Industries locatedRead MoreNegotiation Report Med Lee1070 Words   |  5 PagesNegotiations and Bargaining 1. What, in general, did you learn about negotiation from the exercise? What surprised you? What would you do differently if you had a chance to do the exercise again? The MedLee: In Pursuit of a joint venture negotiation exercise refers to a joint venture between a US Company and a Family Thai Business Company. I had the role of Pat Armstrong (Med Device Representative: Director of International Strategic Market Research) the issues I had to negotiate were: decision making/controlRead MoreNora Sakari Case Analysis Essay1029 Words   |  5 Pageswas looking to open research centers in leading markets, including Southeast Asia. The drawbacks are that Nora needs large investment in the building for the joint venture as well as that other companies have more established brands than Sakari. In the meantime, there are also benefits and disadvantages for Sakari in the joint venture. However, Sakari seems to have more leveraging in this negotiation in terms of the equity ownership. An appropriate leverage equation might be an equity split

Wednesday, May 6, 2020

Virginia Woolf s The Feminist Movement - 1237 Words

Virginia Woolf is considered a foremother of the feminist movement for many reasons. She was a big advocate on women being able to receive the same education as men, to be able to make their own wages, as well as have their own property, and the ability to freely travel on their own. Growing up in a family where the boys were able to go away to an academy to be educated while her and her sister had to stay at home and learn from the literature in her father’s library, she’s been able to see the inequalities between genders. Virginia wrote about the â€Å"evocations of states of mind—or of mind and body, since she refused to separate the two.† (The Norton Anthology: Western Literature pg. 1957) She also liked using how women played a role in society, or even sometimes their lack of a role in society because women were supposed to be dainty beings without any intellectual sense. With this being said, women writers were a rare thing to come by. If they wrote, it was supposed to be about silly little things that didn’t really matter to society but Virginia strayed away from that by infusing controversial topics in her novels and short stories that made her readers think. Virginia wanted her writing to be used to inspire other women to be creative and pursue intellectual freedom. She didn’t think that it was fair that women were not able to receive the same education as men. Virginia resented the unequal treatment and how it women were discouraged to want an education.Show MoreRelatedVirginia Woolf Essay1274 Words   |  6 PagesVirginia Woolf Virginia Woolf spends much of her time straddling the issues in ?A Room of One?s Own.? She carefully manipulates the reader by burying her points in flowery language and assumes the identity of another person so she does not have to take responsibility for what she says. She is very careful not to come off as too forceful or angry because she knows that her ideas will be disregarded if she does. Woolf is terrified of having her words labeled as ?feminist? and of attractingRead MoreA Room Of One s Own By Alice Walker906 Words   |  4 Pagesthe twentieth centuary, two feminist authors, tried to comment on society. In the essay â€Å"In Search of a Room of One’s Own,† written by Virginia Woolf in 1929, she talks about the experiences of women s lives in her two lectures to women at Cambridge University. This was a time just after women in England had gotten the right to vote, but they were still a facing the gender bias. In the essay â€Å"In Search of Our Mothersâ€⠄¢ Gardens† written by Alice Walker in the late 1960’s, she describes how women haveRead MoreThroughout The History Of The Women’S Rights Initiative,989 Words   |  4 Pagesenthusiastic, they were received as radical. Too meak, and none would listen. Finding a balance was imperative to the success of their message. This equilibrium is excellently exemplified in Virginia Woolf’s speech, â€Å"Professions for Women,† which was delivered to the Women’s Service League in 1931. In her oration, Woolf describes her inner struggles with the patriarchy in the context of her writing career. She tries to encourage other women to similarly expand their mindset and reject the ingrained misogynisticRead MoreGender Identity Has Changed Its Definition Over Time1578 Words   |  7 Pagesmale or female. Seems simple but we now know in todays world the definition has broadened. Gender identity is now defined as one s personal experience of one s own gender . Gender identity can correlate with assigned sex at birth, or can differ from it completely. All societies have a set of gender categories that can serve as the basis of the formation of a person s social identity in relation to other members of society. From the past when we had many strong women’s rights activist who foughtRead MoreThe Patriarchal Church1271 Words   |  6 PagesAlthough Jeanette’s mother agrees with the dominance of the patriarchal church, she dominates the home front, which Woolf cites as the â€Å"domestic arts† (134). Once Jeanette was revealed to be a lesbian, Jeanette’s mother blamed Jeanette’s preaching and activism in the church as the cause since it was thought that preaching was a masculine job. In Oranges, Jeanette states: The real problem, it seemed, was going against the teachings of St Paul, and allowing women power in the church. Our branch ofRead MoreThe Woman Author: A Comparative Analysis2449 Words   |  10 Pagessparsely included in ‘reputable’ works of literature, let alone incorporated into any canon at all. Virginia Woolf, in her essay titled â€Å"In a Room of One’s Own† (1925), details the apparent trials and tribulations that female writers in the Victorian era experience when attempting to become recognized within a literary community. The female author is revisited during the second-wave feminist movement by Sandra Gilbert and Susan Gubar in their psychoanalytic text, â€Å"Infection in the Sentence† (1979)Read More Feminism: A Fight for Human Rights Essay2674 Words   |  11 Pagesstruggling to be considered human. The essay explores writings on women?s issues from sources including the Bible, Virginia Woolf, and Bell Hooks enabling observations f rom diverse times and cultures to be explored. Often our society is oblivious to what is happening in other countries or even other neighborhoods, this essay is a reminder. Feminism: A Human Right Feminism, as thought by many Americans, is not just a movement to create high-level jobs in the corporate world and equal salariesRead MoreThe Movement Of Virginia Woolf s Kew Gardens1722 Words   |  7 PagesThe movement of Virginia Woolf s Kew Gardens is quite the mutineer towards the traditional writing format of a beginning, middle and ending. Although, the story does eventually end, Woolf creates a space in time within this story s reality where there really is no beginning, nor a way to end it. We just become in the moment, infinitely moving through space and time, observing all tiny details around us. To analyze this story, we have to think of it as an abstract painting, and assume there willRead MoreEssay about Woolfs Vision in A Room of Ones Own2764 Words   |  12 PagesA Room of Ones Own      Ã‚  Ã‚  Ã‚  Many years have lapsed sinee Virginia Woolf spoke at Newnham and Girton colleges on the subject of women and fiction.   Her remarkable words are preserved for future generations of women in A Room of Ones Own.   This essay is the first manifesto of the modern feminist movement (Samuelson), and has been called a notable preamble to a kind of feminine Declaration of Independence (Muller 34).   Woolf writes that her modest goal for this ground-breaking essay is toRead MoreTo The Lighthouse, by Virginia Woolf Essay1237 Words   |  5 Pagesthroughout this passage highlighting Woolf’s own perspective on society and sexuality between genders. Woolf supports the belief in a complete change to society resulting in a non – hierarchical society. Woolf felt for this to happen aside from the practical changes, that a radical redefinition of sexuality was also needed. The novel focuses on sexual issues of the twentieth century central to feminist campaigns, s uch as marriage being a form of institutionalized slavery . She brings to attention one

Tuesday, May 5, 2020

Firm growth and barriers to growth firms - Myassignmenthelp.Com

Question: Discuss about the Firm growth and barriers to growth firms. Answer: The business environment is not stagnant. It is very dynamic and multi-faceted. Various factors present in the external environment have an effect on the operations of the business. Since a business is believed to have forever entity, it is assumed that a business will not remain the same. If many opportunities are available for the business then it plans to expand its operations (Flamholtz Randle, 2007). In the given report, I will be discussing the concept of growth strategies and throw light on the challenges faced in growing a business. The solutions to overcome these challenges have also been provided, along with the role of organization systems and strictures in it. The benefits and disadvantage of the different types of exit-strategies will be discussed. In the following section I will be discussing the importance of growth in a business. According to me, it is extremely important for a business to grow in terms of revenue and business because growth plays a crucial factor in deciding the future of the organization. If an organization is not growing, it means that it is dying. Growth helps the company to earn greater profits and attain to the needs of the larger population. Without adequate growth strategies, the firm will not last long in the competitive business environment (Hofer Charan, 1984). However, there are certain challenges faced by the various companies to expand and grow their business. The challenges faced by the companies are given in the next section. I believe the primary challenge faced by all businesses these days are competition from online e-commerce websites. The e-commerce platform has been doing exceptionally better in the last few years. Local businesses have been facing a lot of competition and therefore, it is difficult to expand the business as the mass market has already been captured by the online retail stores (Roberts, 1999). The offerings given by the online stores range from plumbing, doctoral, books, groceries, car parts to clothing and accessories. The convenience that the online websites offer tends to influence the customers and attracts them. Many retailers closed in 2017 in the United States because of various online websites. The online shopping is very impulsive and this tends to increase the sales of the given website. Due to this, the businesses are not being able to expand their operations. According to me, the next problem arises when the business is unable to connect with the customers outside the area of operation. Businesses are unable to connect with the businesses, which lie outside the domain of the organization. Most of the local business houses are able to connect with the business that lies in the same city of operations; however, they are unable to connect with the businesses, which lie outside the geographical location. This may be due to lack of knowledge about customer demand or lack of human resource. It may also be due to lack of expertise. The next problem is lack of proper human resource. Very often, the organizations fail to analyze which employees it should hire and which ones it should not (Sahlman Stevenson, 2007). Attracting and retaining the right talent at both middle and higher levels is an extremely difficult task, which a majority of companies fails to do. Many companies have a habit of appointing a full time Chief Financial Officer for their company in the early years. This is not correct as a better approach would be to hire a part time CFO who would set the company`s direction correctly. This shall help in saving extra costs and minimizing expenses. Lastly, I believe that cash flow management also plays a big role in the growth of a company. Many companies appear to be financially healthy from the outside perspective. However, this is not the case. Many businesses have a very poor cash flow system as compared to their competitors (DeTienne, McKelvie Chandler, 2015). Accounts receivable and other relevant components of accounts are extremely difficult to maintain and often form a hindrance in front of the company, which resist their strategies to grow. In the given section, I have tried to elaborate upon the role of organizational system and structure in overcoming the various growth challenges. An organization`s system and structure has a key role to play in its growth strategies. The organization`s strategy is a key plan b the directors and managers for the whole business. The organizational structure is a way in which the various pieces of an organization can fir in together. The strategy and the structure of an organization need to be combined effectively so that it is able to overcome the various obstacles that come in the way of achieving growth in an organization. As mentioned earlier, it is extremely important for an organization to grow in order to keep up with the various requirements in a business (Collewaert, 2012). It is for this reason that the organization needs to have a proper structure and a well-managed system so that the various strategies in an organization can be fulfilled. According to me, a good organizational structure helps to give out tasks to the various members of a firm. The goal of a good structure is to ensure that the workforce has collaborated properly and that all the employees work together towards the goal. When the roles and responsibilities of all the team members are divided properly then one can ensure that the various growth challenges are easily overcome (Nordqvist et al., 2013). A good organizational structure helps to overcome the challenges which range from online competitors where the firm is unable to cope up with the online merchants to unable to meet the demand of the consumers where the company is unable to expand due to lack of proper resources mainly the staff. When there are good employees present in an organization due to the presence of a good structure then the company can expand and prosper efficiently. It often happens that structure is not given much importance and it is viewed separately from the success and strategy of an organization but it is not so. Structure tends to help the firm in managing their cash flows by allowing sufficient transparency. It also helps to form a clear method of hiring and recruitment which tends to form another barrier in growth It is often believed by experts that good governance has an important role to play in a business. Governance can be referred to as the practices and culture that is followed in an organization. Governance plays an important role in forming the strategy of the organization as it helps to grow the organization and take it to new heights (Balassa, 2014). Good governance is important because it promotes community confidence, leads to better decisions and supports ethical decision-making. However, very often a situation arises where the business needs to exit from the market. In this section, we have discussed the various exit strategies, which can be adopted by a firm. Business needs to be based on logical thinking. A company must be smart enough to realize when it should make the move and exit a market (Coad Tamvada, 2012). A company can exit the market because of many reasons like high loss rates, unhealthy competition, reduced demand, internal problems and others. The following section will discuss the various exit strategies and high light their advantages and disadvantages. The first method is Liquidation. In a liquidation strategy, the owner of the business simply sells all the assets in a business thereby ending his business. The advantages of this method are that the outstanding debts are written off, legal action is halted, leases can be cancelled and relatively low costs involved. The disadvantages of this method are that it becomes a personal liability for company debts and liability for overdrawn director`s current accounts. The second method is taking the company public. In this method, an Initial Public offer is made and thus the owners of the business transfer their issues into the public markets (Eggert et al, 2014). The advantages of the method are that the stock becomes the worth of millions of dollars and the company is listed and the owners become extremely popular. The disadvantages of the method are that it is a difficult method as there are various rules to abide by and the cost of an IPO can run into millions. The next method is Acquisition. A business buying the other business is referred to as an acquisition. British American Tobacco and Reynolds American is one of the biggest acquisitions in the globe. AT T and Time Warner is also a good example. The advantages of the method are that if the business has a strategic value then it may pay far more than what the business is worth of and the prices can be raised as much as possible based if the worth of business. The disadvantages are that they are a difficult process, the legal proceedings are not easy and the business me be acquired in a very low cost. Therefore, from the given discussion, it can be clearly stated that the external environment of the business today is extremely dynamic and multi-faceted. Several companies are trying to grow and this leads to extensive competition. There are various barriers faced by each company in order to make their business grow. Hence, it is advisable that the company has a strategic vision, foresees all future threats, and excels in its operations. References Balassa, B. (2014). Development Strategies'.International Economics and Development: Essays in Honor of Ral Prebisch, 159. Coad, A., Tamvada, J. P. (2012). Firm growth and barriers to growth among small firms in India.Small Business Economics,39(2), 383-400. Collewaert, V. (2012). Angel Investors' and Entrepreneurs' Intentions to Exit Their Ventures: A Conflict Perspective. Entrepreneurship Theory and Practice, 36(4), 753-779. DeTienne, D. R., McKelvie, A., Chandler, G. N. (2015). Making sense of entrepreneurial exit strategies: A typology and test. Journal of Business Venturing, 30(2), 255-272. Eggert, A., Hogreve, J., Ulaga, W., Muenkhoff, E. (2014). Revenue and profit implications of industrial service strategies.Journal of Service Research,17(1), 23-39. Flamholtz, E.G. Randle, Y. (2007). Growing pains: transitioning from an entrepreneurship to a professionally managed firm, 4th Edition, pp. 48-70. San Francisco: JosseyBass. Hofer, C. W., Charan, R. (1984). The Transition to Professional Management: Mission Impossible? American Journal of Small Business, 9(1): 1-11.Roberts, M.J. (1999). Managing transitions in the growing enterprise. In W.A. Nordqvist, M., Wennberg, K., Bau, M., Hellerstedt, K.. (2013). An entrepreneurial process perspective on succession in family firms. Small Business Economics, 40(4),1087-1122. Sahlman Stevenson, H.H. (eds.), (2007). The entrepreneurial venture, pp. 377-391. Boston, MA:Harvard Business School

Monday, April 6, 2020

RR 1 Essays - Fictional Characters, Fictional Detectives, Fiction

Reading Reaction Reading Reaction on "The Adventure of the Speckled Band" The short story by Sir Arthur Conan Doyle, "The Adventure of the Speckled Band," was interesting and reminded me of the books that I enjoyed reading as a young child. One of my favorite books that I can recall was a collaboration between Nancy Drew and the Hardy Boys as detectives working together. This short story brought me back to those days, nonetheless. I liked "The Adventure of the Speckled Band" because of the plot and it's corny, yet dark, humor. However, I also did not like the story because of its dated language and its drawn-out length. The story, I found had some underlying crude humor which I always find enjoyable when being forced to read something. Dr. Watson is a character who exhibits these notes of humor, which has led me to favor his character. When they are indulging themselves in the case, Holmes apologizes to Watson for bringing him along because they will be in a rather dangerous position. However, Watson merely laughs it off by saying that he has no idea what is going on. Holmes humbly says that they've seen the same things, just thought about them differently and Watson does not seem to lose his trust in Holmes regardless of possible danger. This just makes me laugh because no matter the situation, it appears that their relationship as partners is much wittier and stronger than some risky business would lead on. A partial quote that really stuck out to me was, " the very horror of my situation lies in the fact that my fears are so vague, and my suspicions depend so entirely upon small points, which might seem trivial to another" (Doyle, 1892, p. 2). This quote is relatable to anyone who is trying to figure any given situation out. I, myself, feel as though I am delusional with all the little things, I attempt to tie together in order to place the correct blame. I could argue that this is the basis for the short story entirely. If Helen just assumed the death of her sister was merely an accident, then she wouldn't feel as though her life was also in danger; thus, she wouldn't have reached out for the help of Sherlock Holmes. Reflecting back to my thesis, I spoke of disliking the proper and dated language. With that, I will clarify that I do appreciate the origin of this short story and its importance to the history of early literature, however in today's language we do not use certain phrases that commonly appear in the story. It was hard to read smoothly when I had to question multiple times what a word meant. I assume, though, that save means but and that pray means please because of the sentence structure in which they are formulated. In addition to the language, the length had me bored and hurt my eyes after a while. A personal preference of mine is reading books with uncommon fonts or bigger spacing, otherwise I easily lose track of where I am at and end up rereading the same paragraph three times. Overall my reaction to the short story was that I enjoyed it once I got it read. I did not have many complaints and the ones I did have were not super huge either. I would consider reading more of these stories for enjoyment (and I do not read for pleasure, so that is saying a lot).

Monday, March 9, 2020

Narrative Essays Examples

Narrative Essays Examples When you are assigned to write a narrative essay, you can be puzzled if you have never written such a kind of assignment before. Indeed, story writing is not a very popular practice in schools and in colleges. However, it can be a very interesting experience for you. As for your teachers can assess your knowledge of grammar and punctuation and enjoy reading an interesting story (if you manage to produce something interesting!). Well, what to start with? To have a better idea of what you need to do, read some narrative essays examples that you can find online. These texts will vary greatly in style and themes; however, you might find something useful for yourself. If you are not fond of writing, you believe that you are not creative enough to produce original stories, or you are loaded with work and have other assignments to do, contract our company. We have been writing original papers for students for several years already. Many of students became our habitual clients, which is the best recommendation an academic writing company can ever have. Where to look for narrative essays examples and how to use them? There are a lot of student-written samples online. You can read them to learn how other students cope with this task, and you can come across an idea for you own story. However, if you want to buy a ready-made story for little money, this is not a very good idea. Many of the online-sources of free, so there is no need to pay for the paper that has been sold to other students many times. How to invent a topic? This is perhaps the most difficult task. One recommendation that can be useful is to write about something, which you know very well. You might think that there is nothing especially interesting in your life, but you should remember that your life experience is unique. There is of course something special about your life that can be interesting to read. For instance, you can recollect an anecdote from your childhood, or write about your dog. It can be a funny story from school pr from your vacation. Just give yourself enough time to think, and you will surely find a good topic. Which tone to use? Your assignment belongs to creative writing. So, there are no strict rules concerning style or tone. You can use humor to add zest to your narration. However, as you might have learnt from online narrative essays examples, your work is still an academic paper. That means, avoid colloquial language, slang, short word forms etc.

Friday, February 21, 2020

MGM465-0801A-05 Business Strategy - Phase 1 Individual Project Essay

MGM465-0801A-05 Business Strategy - Phase 1 Individual Project - Essay Example Warden International, Incorporated is a conglomerate international firm is in the process a merger & acquisition deal to purchase Able Corporation. The target investment, Able Corporation, is a company dedicated to manufacturing portable and electric power tools. This report provides a qualitative analysis of different aspects that the newly formed management team of Walton & Able must consider in the planning process to develop a strategic plan for Able Corporation by the stipulated deadline of June 11, 2008. Able Corporation has been in business for a while and has lots of experience in their industry. The human capital that has been developed in-house in this firm are hold valuable information which can not be reproduced by any other means other than directly retrieve the information directly from the source. The employees of the company at all levels are the first place to look in order to build a new mission statement for the newly acquired subsidiary of Walton International. The employees should also be part of the strategic planning process since the data needed to create alternative solutions concerning important business functions such as risk management and corporate social responsibility strategies within their minds. The identity of the company was defined through years of harmony and synergies that was lived by the employees of the company who determine the corporate culture of the company. A corporate culture is a system of shared actions, values, and beliefs that develops within an organization and guides the behavior of its members (Schermerhorn & Hunt & Osborn, 2003). During the initial phases of the negotiation process between the board of directors of Able and the executive management team the topic of organization cultural integration had to be discussed. As the merger moves forward the company needs to determine the best exploit the competitive advantages that can be achieved with the union of two workforces. A way to initially

Wednesday, February 5, 2020

Comparing Piaget and Vygotski Essay Example | Topics and Well Written Essays - 1250 words

Comparing Piaget and Vygotski - Essay Example The child learns from adults who behave according to the cultural norms in which the child is reared. The child uses certain adaptive tools for acquiring information from his or her surrounding, language is one such tool (Funderstanding, 2008). Following are some Key Terms of this theory: In Piaget’s approach towards learning, the purpose of education in class room is to provide pupils with opportunities to learn through interaction with the environment. According to Piaget all cognitive learning of a child occurs in stages. This learning is developed by forming of mental concepts. For this it is necessary for the child to have a supportive and rich environment that allows experiential learning. According to Vygotsky, the child’s primary source of education is the teacher’s personality rather than the school environment. The teacher is the child’s MKO i.e. more knowledgeable other and the child internalizes the teachers values and adopts the teachers traits automatically. So the value of education according to Vygotsky is to present the child with an MKO who will be the child’s role model and will transmit knowledge by demonstrating it in front of the child through his or her behavior and actions (Learning Theories, 2010). In Piaget’s approach, the teacher is just a supervisor. He or she just provides the child with an enriched environment, facilitates learning process monitors the child’s work and provides the child with countless opportunities to understand the world and develop his or her own cognitions about the world as the child experiences it. The teacher’s role in this theory is highly objective and impersonal. According to Vygotsky, the teacher is the role model for the child. Whatever the child learns is what he adopts from his teacher. Social cognition is developed in the child by blindly assimilating the teacher’s traits. Intellectual development comes after it. Therefore the role of

Tuesday, January 28, 2020

The personality disorders | Analysis

The personality disorders | Analysis Personality or personality traits are the basis of what makes a person who they are. When expressed in a healthy way that is beneficial to a person, they are described as an enduring pattern of our thoughts, feelings, and behaviors. They are how we think, feel, make decisions, and take actions (Barker, 1995). They are determined both by a persons genetic makeup and environmental factors and are a determining factor as to how a person lives their life. When a personality trait becomes rigid and dysfunctional, where it significantly hinders healthy thoughts and activities and harms the person who has them, this may be the basis for a personality disorder. According to the DSM-IV a personality disorder must show a lasting pattern of behavior and inner experience that markedly deviates from norms of the persons culture (James Morrison, 2006). This could include personality patterns that are normal in some people, but are exaggerated or accentuated in those with a personality disorder. In order for a person to be diagnosed with a personality disorder, the symptoms must show a lifelong pattern of manifestation. This means that the disorder is typically identified in late adolescence or early adulthood and persists throughout a lifespan. Another requirement for the diagnosis of personality disorders is that the negative behavior patterns must have a pervasive effect on all areas of a persons life; this includes employment, intimate relationships, social functioning, and family. The behavior must routinely causes problems or dysfunction, and cannot be attributed to any other sort of mental or physical illness (James Morrison, 2006). An indi vidual with a personality disorder will show maladjustment in all aspects of their life and the disorder will be reflected in the ingrained, rigid, and dysfunctional patterns that they present throughout their lifetime. According to Frances, personality disorders usually produce ego-syntonic behavior, or consistent with the ego integrity of the individual, and, therefore, are usually considered appropriate by the individual. This may cause the negative behavioral patterns to be inflexible and tough to change. (Frances, 1999) The treatment of personality disorders is usually difficult and often has limited results. In the DSM-IV there are three groups or clusters that each of the 10 personality disorders fall into. People with cluster A disorders are characterized by odd or eccentric behavior, abnormal cognitions or ideas, strange speech or actions, and difficulty relating to others (Frances, 1999). People diagnosed with personality disorders are more frequently diagnosed with an Axis I disorders as well (James Morrison, 2006). Frequent co-morbid diagnosis for cluster A personality disorders are: agoraphobia, major depression, obsessive-compulsive disorder, and substance abuse (Frances, 1999). Type A disorders include paranoid, schizoid, and schizotypal personality disorders. Paranoid personality disorder, the first of the cluster A disorders, is characterized by extreme or unnecessary paranoia, suspiciousness, and a general mistrust of organizations, groups, and others, is found in 0.5%-2.5% of the population, as a whole and occurs more commonly in males (Frances, 1999). A person with paranoid personality disorder often thinks, without reason or cause, that others are exploiting, harming, or deceiving them, which inhibits them from developing close relationships. According to Dobbert, The delusional belief that others are disloyal and untrustworthy precludes their ability to confide in others. The afflicted person believes that the information that they provide in confidence will be later utilized to bring them harm (Dobbert, 2007). People with paranoid personality disorder also tend to hold grudges and become angry for seemingly benign perceptions of insults or injuries. These grudges can be long lasting and based out of perceived threats or insults. Even if the intention to harm or defame the person is not present, due to the constant expectation that others are trying to hurt them, an individual with a paranoid personality disorder creates a threat and will then hold malice toward another person for an exaggerated amount of time. This malice will evoke anger and hostility that will eventually lead to the alienation and isolation (Dobbert, 2007). The second of the cluster A disorders is the schizoid personality disorder, it is characterized by a general detachment from social settings, a restricted or muted range of emotions, and need for solidarity. It is found in 3% of the general population and affects women more commonly then men (Frances, 1999). A person with schizoid personality disorder neither desires nor enjoys close or intimate relationships. According to Dobbert, Persons afflicted with schizoid personality disorder find no interest in initiating, developing, and maintaining close relationships. It is not uncommon for these persons to lack the interest or desire to be considered a part of their biological family (Dobbert, 2007). These people do not find inclusion in groups or social settings particularly interesting or desirable and work to avoid such settings. A person with schizoid personality disorder is described as appearing introverted, but not shy, and seems to prefer their own company instead of seeking relationships with others. This often leads the person showing little if any interest in sexual or intimate experiences, preferring acts of self-gratification and sexual fantasy over personal contact. (Dobbert, 2007) Due to the indifference of intimate relationships, the person with schizoid personality disorder develops limited interest in activities they enjoy and does not seek to share these activities with others. They would prefer to focus their attention on a few activities and interests of a solitary nature and to obsess about those interests with little regard to the perceptions of others. They also seem to be unaffected by the acceptance, praise, or criticism of others involving their actions and isolation. It becomes obvious to those around them that a person with schizoid personality disorder does not care what others perceptions are and they often seem cold, detached, and unemotional, presenting a bland or blank expression to the world (Dobbert, 2007). The final disorder in cluster A is the schizotypal personality disorder which is a condition characterized by distorted thoughts, behaviors, and functioning. Magical thinking, relationship difficulties, severe anxiety, and poor social skills are also common. (James Morrison, 2006) This disorder affects 3% of the general population and is diagnosed slightly more in females then males. (Frances, 1999) People with schizotypal personality disorder perceive things in an odd or unusual way. Their interpretation often differs from that of others and is specific to themselves (meaning nobody else shares similar perceptions and thoughts), but is not based out of delusional thought or differing cultural norms. Many of these people believe that that they have extrasensory or magical powers and attribute their odd perceptions to this ability (Dobbert, 2007). The belief in clairvoyance, mind control, the sixth sense and other forms of magical thinking often lead others to view these people as odd which strains social and work relationships. To compound this, many people with schizotypal personality disorder have a reduced ability to understand other peoples actions and respond to them inappropriate and in a socially unacceptable manner. Having few successful experiences with others often leads to social anxiety, suspiciousness, and paranoid ideation. Dobbert states rather than examining ones self to determine the source of others avoidance, people with schizotypal personality disorder believe that the others are conspiring against them. Due to the inability of self-introspections, the afflicted person withdraws deeper and further isolates themselves, leading the person to further fall into their delusional thinking (Dobbert, 2007). People with cluster B disorders are characterized by dramatic, unpredictable, and destructive behaviors as well as difficulty with impulsiveness, the violation of social norms, and being self-abusive and hostile to others. It is common for these disorders to share co-morbidity with eating disorders, social phobias, somatization disorder, pathological gambling, substance abuse, and post traumatic stress disorder (Frances, 1999). Included in cluster B are antisocial, borderline, histrionic, and narcissistic personality disorders. According to the DSM-V, the first of the cluster B disorders is the antisocial personality disorder, which is a pervasive pattern of disregard for, and violations of, the rights of others (James Morrison, 2006). It is characterized by failure to conform to social norms, deceitfulness, impulsivity, aggression, irresponsibility, and lack of remorse. It affects 3% of men and 1% of women, and is distributed evenly throughout all races (Frances, 1999). People with antisocial personality disorder act against social norms and show little respect for lawful behaviors. They are often arrested or commit acts that could lead to confrontations with law enforcement. According to Dobbert, people with this disorder dont just violate social normsbut, perform behaviors that are significant violations of the criminal code (Dobbert, 2007). This indicates that people with antisocial personality disorder are capable of committing the most heinous of crimes including rape, armed robbery, and murder. This diagnosis had been applied to many of the documented serial killers such as Ted Bundy, Jeffery Dahmer, and John Wayne Gacy. (Dobbert, 2007) The level of deceptiveness that is involved in antisocial personality disorder has been directly linked to the intelligence of the individual. While all people diagnosed with this disorder pathologically lie, as intelligence increases the use of aliases and conning operations also shows an increase. Deception contributes to the notable involvement with law enforcement and is often utilized in criminal acts (Dobbert, 2007). As displayed by criminal and deceptive acts, a lack of impulse control is noted for those diagnosed with antisocial personality disorder. This impulsivity often leads to the disregard for personal safety and the safety of others. In the ever increasing need for heightened stimulation, those with antisocial personality disorder do whatever gives them the feeling of power over others (Dobbert, 2007), this may include hurtful, violent, and aggressive acts done with little regard for other peoples feelings or of the consequences of their actions. The second disorder in cluster B, borderline personality disorder, is stated by the American Psychiatric Association as pervasive pattern of instability of interpersonal relationships, self-image, and affects and marked impulsivity (James Morrison, 2006). It is characterized by identity disturbances, self-damaging behavior, feelings of emptiness, anger regulation problems, and stress related paranoid ideation or dissociative symptoms. Affecting more females than males at a rate of 3-1, it is found in 2% of the general population (Frances, 1999). Dysfunctional relationships are the key area that defines borderline personality disorder. Dobbert states that persons afflicted with borderline personality disorder are obsessed with the potential for rejection and abandonment. Their perception of the environment and persons response to them influences their feeling of self-worth and image (Dobbert, 2007). They often misconceive common circumstances and situations as rejection. This then manifests itself in anger, resentment, and feelings of abandonment. In order to tailor themselves to a relationship, the person with borderline personality disorder will illustrate a sudden change in self expression and perception. These changes may include sudden changes in the style of clothing, attitude, and social preferences of the individual and may also encompass hobbies, interests, and activities. If an individual is rejected by the object of that relationship, they will change themselves again to distance themselves from their past relationship and attract a new one (Dobbert, 2007). In order to manipulate others and stage off real or perceived abandonment, a person with borderline personality disorder will threaten or attempt suicidal behavior, and self-mutilation. Threatening self-injury or suicide allows the individual to control the other person in the relationship and allows them to postpone the abandonment that they so fear. While attempts are made on the part of a person with this disorder, many of them are half-hearted and not meant to be successful; they are simply utilized as a device evoke a desired reaction from another person. Histrionic personality disorder is the third of the cluster B disorders, and is described as pervasive and excessive emotionality and attention-seeking behavior (James Morrison, 2006). It is characterized by sexual promiscuity, rapidly shifting and shallow expression of emotion, self-dramatization, and suggestibility. It is found in 2-3% of the population and is diagnosed more often in women (Frances, 1999). Typically, people with histrionic personality disorder exhibit a compulsatory need to be the center of attention. When they find themselves being ignored or not admired they feel anxiety and identify confusion. These people are very socially motivated and expect to be noticed and envied by others. In order to gain attention many people with histrionic personality disorder focus intensely on appearance or act overdramatically in hopes of creating a scene to gain attention. Seductiveness and overtly sexual and provocative behavior is another way for people with histrionic personality disorder to gain attention. Flirtatious and intimate behavior is often used, even in inappropriate settings such as work, to gain attention. A conflict surrounding this inappropriate behavior, instead of inhibiting the behavior, only works to reinforce it as the center of attention again shifts to the disordered person. Narcissistic personality disorder, the final disorder of the cluster B sub-type is characterized by exaggeration of achievements, preoccupation with success and power, excessive need for admiration, a sense of entitlement, exploitation, envy, and arrogance (Frances, 1999). The DSM-V states that narcissistic personality disorder is a pervasive pattern of grandiosity, with a need for admiration, and a marked lack of empathy (James Morrison, 2006). Of the general population less than 1% of the population suffers from narcissistic personality disorder and it is diagnosed 3-1 in males over females and is commonly classed the male ego disorder (Frances, 1999). Those who suffer from this disorder are prone to overinflating or creating achievements in order to brag about or prove their superiority to others. They often daydream about unlimited success and about the admiration that it will bring from others. They may also suffer from delusions that allow them to believe that they are entitled to act in any way they want, despite the effect it has on others. Because they view themselves as superior, the narcissist does not feel that they should be concerned themselves with the feelings of others. They will often defame and exploit others for their own self promotion. This marked lack of empathy is a dominate feature of narcissistic personality disorder and is brought about as a defense mechanism to protect their grandiose ideals about themselves. Cluster C disorders, including avoidant, dependant, and obsessive-compulsive personality disorders are characterized by fearful and anxious behaviors, as well as avoidance of social situations and feelings of loss of control (Frances, 1999). Typical Axis I co-morbid diagnosis are: social phobias, anxiety disorder, adjustment disorder, myocardial infraction, and obsessive compulsive disorder. Treatment- (Dingfelder, 2004) Individuals at this end of the continuum commit rape, murder, and genocide. Will a person afflicted with antisocial personality disorder start at the lease serious end of the continuum and move to the far extreme? Recovery Conclusion Works Cited Barker, R. L. (1995). The Social Work Dictionary. In R. L. Barker, The Social Work Dictionary (p. 104). New York, New York: NASW Press. This source is reviewed and published by the NASW press, a division of the National Association of Social Workers, which is a leading scholarly press in social science research field. The information used gives a broad and comprehensive definition of the role that a personality plays in the life of an individual. This definition of personality and personality traits was chosen because due to its association with social work and because of its encompassing definition. This definition is used as a contrast point for the explanation of personality disorders. Dingfelder, S. (2004). Treatment for the Untreatable. Monitor on Psychology , Vol 35, No. 3, p. 46-48. This article, found in a peer reviewed scholarly journal, discusses the effectiveness of treatment for personality disorders. It states that many practitioners have had difficulty in treating personality disorders, which continue to present a pervasive and persistent pattern of dysfunction despite many treatment methods. It also discusses some effective treatment options and the hope for recovery from personality disorders. Frances, A. M. (1999). Your Mental Health: A Laymans Guide to the Psychiatrists Bible . In A. M. Frances, Your Mental Health: A Laymans Guide to the Psychiatrists Bible . New York: Scribner. Written by one of the authors of the American Psychiatric Associations Diagnostic and Statistical Manual, this book provides general information about diagnosis of personality disorders and other mental health problems. It gives more detailed information on the cluster groupings (A, B, and C) for personality disorders than the DSM-IV Made Easy, as sited below. It also gives descriptive character traits that are associated with each of the personality disorders and discusses Axis I co-morbid diagnosis that are often found with personality disorders. James Morrison, M. (2006). The DSM-IV Made Easy. In M. James Morriosn, The DSM-IV Made Easy (pp. 461-495). New York: Guildford Publications, Inc. This book, containing information released in the DSM-IV, released by the American Psychological Association, is a stripped down, simplified version of the original DSM_IV. It provided detailed information on each personality disorder as well as diagnostic criteria for personality disorders. It also provides classification information and Axis diagnosis. The information in the source is considered to be extremely accurate and is therefore used to give a thorough and comprehensive information in relation to each personality disorder. Mayo Clinic. (2010, April 6). Personality Disorders. Retrieved April 6, 2010, from MayoClinic.com: http://www.mayoclinic.com/health/personality-disorders/DS00562 This source, written by the psychological staff at the Mayo Clinic, is retrievable online. The Mayo Clinic, an internationally renowned medical practice and research group, has given a general overview of personality disorders and discussed some treatment options that are available for the disorders. The information for treatment is not found in the above references, and the idea of using psychotherapy and medication to treat personality disorders is discussed. Women Discrimination In Business: Walmarts Case Women Discrimination In Business: Walmarts Case Ethics has consistently been a part of our society. It has continuously played a crucial role whether in the professional world or in our normal daily lives. According to the well known sociologist Raymond Baumhart, ethics consists of the guidelines based on the basis of what is right and wrong and people are expected to follow the right path. A few examples such as honesty, trust and equality fall under ethical behavior and it is required in order for all of us to have a peaceful environment. (Baumhart, 1987) Importance of ethics in the business world Ethics is equally essential in the business world because it highlights the responsibilities, the principles and the standards that business people along with its organization should follow permanently. Any business organization that lacks or ignores the ethical principles is expected to fail and may harm the companys image in several ways. For example unethical behavior such as employees coming to work late frequently will reduce the productivity level for the company and this may also intervene with their profit which for many firms is the sole purpose. It is the top management levels duty to ensure that all the current working employees in their company are aware of the ethical guidelines regarding acceptable behavior in order to prevent acts such cheating at work, socializing at some networking site rather than giving priority to your work, discriminating against an employee etc. Ethics is also considered one of the corporate social responsibilities along with economic, legal and philanthropic and they should be considered majorly important. It should be dealt with seriousness because it covers human resource issues which refer to discrimination at workplace and it is extremely vital for the managers at top level to not differentiate between their employees based on how they appear or any other reason for that matter. Fairness is another part where the managers have to make sure that they are treating their employees with equality without any biased decisions taking place. Besides these reasons there are many more which just proves the point that ethics is really important for management to succeed in achieving their goals. Women Discrimination Gender Discrimination Discrimination in todays world can be defined as the à ¢Ã¢â€š ¬Ã‚ ¦treatment or consideration of, or making a distinction in favour of or against, a person or a thing based on the group, class, or category to which that person or thing belongs rather than on individual merit. (Dictionary.com, 2010). Discriminatory behaviours are of many different kinds but they mainly entail some form of exclusion or rejection. One form of discrimination that has been seen from generations till today is gender discrimination where either of the sex is considered weaker than the other. Women Discrimination in society In most societies and developed countries like the U.S. girls are usually given the freedom and encouraged to create their own lifestyle, since childhood. They are made to believe in themselves and that they can be as successful as boys in every work of life. However, the case is not the same for girls from other societies which are mostly from developing countries. They are brought up to believe the opposite where they are constantly reminded of the things they are not allowed to do. In most of the developing countries sons are regarded as insurance and hence their birth is celebrated with great joy. Whereas, when a girl is born she is considered as another expense and liability for the family. Since childhood, they are trained to do household activities and stay indoors, isolating them from the rest of the world. In some parts of India, a tradition prevails to greet the family of newborn girl by saying The servant of your household has been born. Women from such societies face issu es like emotional and physical abuse, inferiority, having their families and society limit their opportunities and restricting them from living life up to their full potential. Discrimination against women is a very demoralizing reality that still exists resulting in millions of individual tragedies. Studies show that a countrys attitude towards women is directly proportional to its social and economic progress i.e. if one part of the country gets affected then the result of the affect is suffered by the whole country as well. Sadly, women fall weak and are not able to defend themselves in situations where they are being discriminated. For example many women have to face problems like dowry, negligence, infanticide and sex-selective abortion, physical abuse and labour and sex trafficking (Mullins, 2010). Gender lines are drawn early in womens life and they face exclusions from childhood and continue facing it through out their adulthood as well. This perspective of women and false belief that women do not belong in the high corporate world has risen as a result of women discrimination. There has, over time been a stereotype thinking that women are only suitable for restricted professions like teaching or best suited to be housewives. Studies show that during elementary school teachers give more attention and importance to boys in Maths and Science while girls are paid attention by teachers in subjects like Language and Art. This is because Maths and Science subjects are more academically challenging and to be taken in the field of medicine, engineering and architecture which are considered to be male professions. Studies also show that girls in middle and high school are discouraged to participate in extracurricular activities like sports or join debate clubs. Instead, they are encou raged to participate in after school volunteer work, social programs and more inert activities. Also, when making career choices, girls are pestered by parents into pursuing clichà ©d female-oriented professions like teaching, nursing, care giving, retail and office administration. Studies carried by the Department of Labour 2007 statistics show that more women are starting businesses than men, more women are in the employees than men, and the majority of degree-holders are now women and yet they are only still dominating fields and industries that are considered suitable for female (Wolfe, 2009) Women discrimination is not always seen in developing countries alone but can also be noticed in developed countries. For example, one of the largest sex discrimination case seen in the history on the U.S. is the law suit filed against Wal-Mart. This suit was filed in the year 2001 by six female employees and by April 2010 it was reported to include more than a million females costing the retailer billions in damages. The women who filed the case claimed that they faced systematic discrimination at work. The Wal-Mart industry It is an American retailing industry founded by Sam Walton in1962 when he launched its first branch in Arkansas. His main strategy which found him early success in his life was to keep prices relatively low which lead him to earn a ranking as the richest man during the 1980s. According to the Forbes magazine, it became the worlds largest corporation by revenue. Walmarts women discrimination case Wal-Mart is being criticized for paying its female employees less than its male employees and also provide smaller salary raises to women and fewer promotions. It was reported that women at Wal-Mart were being steered away from management positions into lower-level jobs without much possible chances of progress like cashier jobs. Moreover, a woman who came looking for a job opportunity as a manager was reported to be told that she was not qualified for the management position as she was not able to stack 50 pound bags of dog food. It was also reported by The New York Times that around 33% of the women at Wal-Mart are companys managers whereas the rest 65% consist of women working as hourly employees. Wal-Mart was account to be biased towards males (Goudreau, 2010). Wal-Mart has around 700,000 working women that form its back bone and make it one of the largest private sector employers of women in the U.S. However, these employees face discrimination at work on advancement opportunities, job assignments and receive unequal pay. This discrimination towards women has been seen in all levels of the company i.e. from hourly working employees to senior management. Women earn 40cents less than what they should be earning equal to the other hourly male employees even though they have longer seniority and higher merit ratings than their male co-workers. A woman manager earns around $5,000 per year less compared to a male manager who earns $23,175 per year. Women executives also do not find themselves safe from discrimination at Wal-Mart. Women face systematic denial of advancement as men dominate the management ranks. They are stuck in the low paying jobs consisting of 92% cashiers and 76% sales associate. Wal-Marts competitors in the past have had more women managers than men compared to Wal-Mart. (UFCW, 2010). Walmarts case from Kants perspective Wal-Marts case casts light upon the ethical considerations of women discrimination in the work environment. Whether it is illegal is still under trial, however, it is clearly an ethical issue. Businesses often face such ethical issues which occur due to many reasons even if they are unintentional. The market fluctuations, competition and profit-making orientation lead business owners and managers into behaving unethically without conspicuous intentions. The issue of women discrimination can be analysed and evaluated using ethical theory. Ethical theory is generally based upon moral philosophy and may be classified on many different dimensions, however, there are several basic types of moral philosophy which are used in business ethics, such as egoism, utilitarianism, deontology, rights and relativism (Bartlett, 2003: 224). Egoism and Utilitarianism are examples of consequentialist philosophies whereas, deontological approaches such as that of Immanuel Kant are an example of non-consequentialist philosophies. Kants theories are often associated with the duties, moral rights and respect of an individual. His theories say that each person has both the right to expect to be treated according to universal moral laws and the corresponding duty to behave according to that law (Bartlett, 2003: 224). Kants theory proposes a categorical imperative which is the particular moral law according to which people should act. It states that one should act as if the maxim of thy action were to become by thy will a universal law of nature (Kant, cited in Bartlett, 2003: 224). This means that an action can be set as a categorical imperative making it a universal law and applying it to the maximum population to see what the result of that action would be if it became common behavior of the world. The morality of an action can be judged by applying the deontological approach which considers the rights, duties, truth and respect of an individual according to universal moral principles. It focuses on doing the right thing. Sex discrimination or discrimination of women in particular can be evaluated using Kants theory. Applying the theory, the categorical imperative or the universal rule can be set as It is okay to discriminate women in business practices. If this rule is applied universally, the effect of this action on the society or the whole world would be highly negative. Firstly, men would continue to view women as the weaker sex due to which they will not give them opportunities to work at all. If women dont work they will have low motivation and high emotional stress which can affect their family lives. If all families became unhappy and stressed the whole society will be affected and may not prosper. Secondly, the household incomes would decrease drastically as women will not be able to support their husbands. Furthermore, if women will have no career opportunities, they will stop their education and the literacy rate would go down. Labour supply in the market would decrease which would lead to a surplus in labour demand thus, creating a need for high wages and salaries which can become a major issue with employers. The overall employment rate would also decrease; affecting the world economy. The result of discriminating women and discouraging their participation in work practices universally can cause serious harm to the society and the whole world overall. It questions womens rights and respect along with mans duty towards equality and fairness in the world. Thus, the universal rule will be contradicted and negated leading to the conclusion that, as analyzed through this theory and the deontological approach, sex discrimination is unethical. Walmarts perspective On the contrary, when considering the case from Walmarts perspective, it is important to understand that it is the senior managements duty and responsibility to take every measure to ensure they assign jobs to employees who are most suited to do them and hold the capabilities required to accomplish the job. For example, Walmart has been criticised for refusing one woman a management position because she was unable to stack 50-pound bags of dog food hence, unqualified for the job. While many have protested against this act, it must be highlighted that there has been always a stereotype image of women as being the weaker sex and this incident helps illustrate that. Walmart managers understand that the business involves tasks that cannot be easily accomplished by women as compared to men. Also, giving women tedious jobs might be considered unethical by some customers and this could affect Walmarts reputation as being harsh towards women and making them do jobs they are not fit for. More over, Walmart may have been scandalised by its competitors who are looking for ways to show the company in a negative light as it is successful and poses serious threat to smaller businesses who are unable to compete on the basis of price due to the exceptional low prices Walmart provides hence, looking for other methods of causing damage to their competitor. Target Corporation and its ethical practices One of the greatest competitions faced by Walmart is from Target Corporation; after Walmart, Target is the second largest discount retailer in the United States. Walmart and Target do business in quiet similar manner and have both very wide-ranging ethical and environmental policies in place. However in terms of practices, Walmart has solicited much more criticism than Target for breaching its ethical policies, the company has poor employment benefits, exerts pressure on suppliers, eliminates waste into the environment and as discussed earlier, practices gender discrimination to great extent. However, Target refuses to tolerate workplace discrimination and tries to create an environment in which everyone recognizes the value of diversity. According to national statistics the average company across the United States employs a staff that consists of forty-eight percent women; fifty-nine percent of Targets workforce is women. In part with this statistic and the treatment of their female employees, Target has been honored as an organization with multiple national awards recognizing their commitment to gender diversity. In 2005, Target was named one of the Top 30 Companies for Executive Women, by the National Association for Female Executives. As well as in 2004, they were named one of the 100 Best Companies for Working Mothers, by the magazine, Working Mother. Therefore similar to Target, Walmart should also adopt policies against gender discrimination to avoid lawsuits which spoils the image of the company.

Monday, January 20, 2020

The High School Gymnasium :: Observation Essays, Descriptive Essays

My alarm clock blares into my silent room. It’s time to spend the early hours of my Saturday morning at the same place I spent the late hours of my Friday night. Groggily I get dressed and leave without breakfast. When I arrive, it is dark, empty and cold. The lonely feeling replaces what was bright, full and warm just hours ago. This place is the gymnasium at my high school. For four years, I have exerted sweat, tears, and even blood in this place. On this stage, four years of my growing up and maturing were played out for anyone willing to pay two dollars. I have been everywhere in this gym, from standing high on the bleachers with a bird’s eye view, to lying on the ground debating whether to rise only to get knocked down again. Those who have left a part of themselves in this place can breathe deeply and inhale experiences. Experiences of glorious victories and experiences of embarrassing defeats; both experiences I have left in that gym. Friendships were made and lost on that court, and other ones strengthened when my friends from outside came with their support and encouragement. It is here I learned perseverance, hard work, determination and loyalty. It is not here that I found who I was, but more who I was not. It is here I had to not settle for mediocrity, but strive for excellence. When I think back to the long hours I spent in this gymnasium, the most prominent memory will be my final game there. It was a night of emotions. I was surrounded by encouraging teammates, supportive family and friends, and finally I received my reward for the energy I had spent there for four years: I made the game winning shot. While my name will soon be taken down from the wall, and another person will wear number thirty-three in that gym, I have left a piece of me there, which is the beauty of the place.

Saturday, January 11, 2020

Inter-vendor Storage Management Application Tools Essay

Inter-vendor storage application management tools are huge enterprise software applications that are used for robust, reliable, available and effective data management. The applications are both hardware and software dependent. The choice of their implementation depends on the organizational needs and objectives. Various vendors develop and support these tools both for support of business and mission critical applications. Some of the leading Inter-vendor applications tools that have dominated the industry as well as organizational automations in the last two years include VERITAS, Oracle and NetApp (ESM, 2009). VERITAS Its application tools provides for automated storage management software for enterprise business applications which have increased dependence on data from corporate storage infrastructure. VERITAS application tools are vital for boosting administrator productivity and reduce errors in automated storage administration. Among the tools it provides is the Storage Resource Management (SRM) software tools that help to automate the erroneous, tedious and routine tasks in storage administration. The tools are able to predict when the problem is likely to happen and as a result the IT managers are able to head off these problems. The automated storage provisions help the administrators have a continuous, uninterrupted access to the enterprise storage resources. The storage administration by the automated SRM software can accomplish several tasks in use, management and applications of the storage allocations. The automation tools are able to gather data around the storage infrastructure and also give feedback on the successful storage policies and also provide input and reports on the storage environment. The accurate and timely data help managers make informed and intelligent decisions on the future use of the storage. Further administrators are able to report and monitor on resource utilization and performance. When applications crash, the pagers beep and systems panic, it is the administrator that is on the receiving end of a pager to get the problem notification. Such situations prove to be very critical especially for business users due to degraded performance, equipment failure, resource shortages, and corruption of data or storage problem risks. This interruption of application access may in turn lead to incalculable financial losses to the business or organization. Therefore the automated software provisioning has a framework that manages the growing inventory in the components of enterprise storage. When the SRM software tools are deployed into the automated storage provisioning framework, the administrator has an easier access to the event based interventions and rule based policies which adequately resolve and intercept potential problems before they reach their critical levels (Hussain, 2008). The storage management application tool for a web based directory assistance runs on a web server as a data entry component with a more sophisticated management application that runs on a separate application server. When data is entered for the directory assistance, it is updated on the web server and staged on the repository application server and it is then automatically transferred to a relational database in another server by the directory management application. For fault tolerance as provided by the database server, database tables are duplicated using the snapshots from the primary database. The services however are vulnerable to storage failures especially when space allocation to the web server, database and repository is threatened to be exhausted and as a result bring down the system. Organizations of all sizes and in all industries are dependent on enterprise technological infrastructure which means that there is immense need for automated storage management process to avert any failures in the enterprise storage infrastructure. Therefore the SRM software tools and the automated storage provisioning should be implemented to solve the storage management problems. The rule based storage automations streamlines the administrator’s routine which improves productivity, reduces potential errors and system’s availability which impacts business activities and application availability. Oracle and NetApp The Automatic Storage Management (ASM) application tool provides a way to manage storage with an underlying database on a volume manager for the files on the database and an integrated file system. Its gives an alternative to the volume management solutions and file systems for the storage management tasks in the database (Manning & Bridge, 2009). On the other hand NetApp filers simplify management and deployment of the enterprise data. The ASM and NetApp storage lower ownership costs and save on costs through the configuration of combined technology. There are combined benefits for using the NetApp for database layered applications and Oracle database which includes practices for deployment of ASM with the storage solutions networked by NetApp. Oracle ASM on NetApp iSAN and SAN storage like Oracle on NAS storage by NetApp has alternative capability for volume management for customers on an Oracle server that can alter, drop and create SQL statements which simplifies the storage provisioning on the database. The NetApp and ASM storage application tools has features that complement one another in performance to avoid errors by balancing of workload and help utilize the disk drive resources available. They also provide for support of online removal and addition of storage capacity that help maximize data availability and at the same time making configuration changes in the storage. The applications tools provide data security and availability since enterprises require high levels of data availability and protection whether there are component failures or faults storage subsystems. These tools include NetApp mirroring solutions that offer protection for disaster recovery requirements and business continuance while ASM provides protection against storage failures. In shared storage, Oracle’s Real Application Clusters (RAC) provides scalability and availability for the Oracle database which requires all servers to have direct read and full access to the database files. The ASM implementation provides a simplified cluster file system with optimized functionality of the volume manager in the shared storage. The NetApp networked storage gives shared access as required by RAC while in SAN environments, ASM provides volume management by Oracle RAC and a capable clustered file system. Both application tools have a rich assortment of storage data management that can be used separately or when combined depending on the customer enterprise requirements or the data infrastructure (Animi et al, 2009). The Automatic Storage Management application tool simplifies the management and configuration of storage management for the Oracle data files in its database. It also complements iSCSI SAN products for storage and NetApp Fibre Channel and while combined, they give full value to both technologies. With several combinations for data storage management and protection exists in the market, the Oracle and NetApp partnership offer powerful combinations that offer best practices to meet business performance and high availability requirements. Storage Management Networking Industry Association (SNIA) SNIA has created Storage Management Initiative Specification (SMI-S) application tool in order to standardize and develop storage management technologies for networking and storage. The SMI-S is for a standardized interface like SAN based storage management which are a challenge for interrogators and end-users to manage especially for multivendor SANs. The applications developed in most cases are unable to work together or are uncoordinated to perform tasks and deliver functionality, security and reliability for increased business efficiency. SMI-S therefore specifies protocols to manage communications with incorporated mechanisms for standard based management. It unifies the storage networks and also the management tools. The set of interfaces will allow the control of heterogeneous storage by storage management software packages. This way storage administrator will create and delete volumes and zones and also monitor array controllers, switches and host bus adapters. The enterprises too can manage with a single management framework their storage capacity independent of manufacturers. The application features have a common and extensive management transport, which has unified and complete which provides control of Zones and LUNs in a SAN context. It also has an automated discovery system with a newer approach in application of the CIM/WBEM technology. This specification helps to secure a reliable interface that can allow for the storage management interface classify, identify, control and monitor logical and physical resources in a SAN. The Technical Specification defines the management of a heterogeneous SAN and describes information from a SMI-S compliant CIM server available to a WBEM client. This information is object oriented, message based, XML based interface that is designed to support requirements of the managing devices through and in SANs. Using the CIM-XML on HTTP standard which is an independent management protocol, vendors increase the functions and features of their products without having to redesign the management storage therefore reducing cost and extending functionality. The SMI-S functional capabilities include the version requirements as provided and stated in the interface. Among them is that it will be able to receive the asynchronous notifications incase the SAN configuration changes. It will also be able to identify the health of vital resources in a SAN and also receive the asynchronous notification incase the SAN resource’s health has changed. It will also identify interconnects available performance in a SAN and receive the asynchronous notification incase a SAN’s interconnect performance changes. It will also identify zones that SAN enforces and help enable or disable, delete or create zones in a SAN. It will also identify the access rights and connectivity to SAN Storage Volumes and also enable or disable, delete or create access rights and connectivity to SAN Storage Volumes. These standards and specifications can only be used by a WBEM compliant and authenticated client. The language chosen for managing information and other related operations is the XML language which will help traverse the organizational firewalls and installed at low costs (Cover, 2010). In midrange computing environments and enterprise class, the SANs are highly emerging due to various functions and applications such as sharing of huge storage resources between multiple systems and having a LAN free backup. Other applications include disaster tolerant and remote online mirroring of critical data and clustering fault tolerant applications and systems with one data copy. While emergence of SANs accelerate, the informational industry requires a management interface for different classes of software and hardware products for multiple vendors to allow interoperation and reliability in order to monitor and control resources. For this reason SMI-S was created to define this interface and provide a standard for heterogeneous, functionally secure and reliable control and monitoring of resources in the complex distributed Inter-vendor SAN topologies. The SMI-S standard can simplify the huge storage management and reduced costs in storage administration but has not solved all storage problems. Since storage is an integral part in IT infrastructure to be managed with a combination of servers, applications and networks, management solutions offered by SMI-S work for servers, storages and networks. In the storage infrastructure, it provides the end-users with a consistency for device discovery, configuration and status information. SMI-S defines the behavior and structure of devices and their management and configuration in the storage infrastructure and provides management of multiple storage devices from multivendor. However, it does not solve the problem of incompatibility of hardware devices from the different vendors while its domain in storage management does not cover remote replication and backup. Conclusion There is countless demand by customers for open software from the computer industry vendors which is the reason multiple vendors such as Oracle and NetApp have had to work more closely to develop common standards, protocols and languages for storage and network management. The multipurpose standards could help storage administrators take control of the distributed applications with a resulting inter-vendor, manageable and open information systems. Using standard based storage management application tools can help increase value of IT investments. Before the multivendor standards were developed by SNIA, the individual users would need to manage the storage devices with vendor specific tools while disparate information was integrated manually. Today’s management standards and specifications are increasingly interoperable while still maintaining competitive advantage among vendors through differentiation.