Wednesday, July 31, 2019
Digital Fortress Chapter 13
Tokugen Numataka stood in his plush, penthouse office and gazed out at the Tokyo skyline. His employees and competitors knew him a sakuta same-the deadly shark. For three decade she'd outguessed, outbid, and out advertised all the Japanese competition; now he was on the brink of becoming a giant in the world market as well. He was about to close the biggest deal of his life-a deal that would make his Numatech Corp. the Microsoft of the future. His blood was alive with the cool rush of adrenaline. Business was war-and war was exciting. Although Tokugen Numataka had been suspicious when the call had come three days ago, he now knew the truth. He was blessed with myouri-good fortune. The gods had chosen him. ââ¬Å"I have a copy of the Digital Fortress pass-key,â⬠the American accent had said. ââ¬Å"Would you like to buy it?â⬠Numataka had almost laughed aloud. He knew it was a ploy. Numatech Corp. had bid generously for Ensei Tankado's new algorithm, and now one of Numatech's competitors was playing games, trying to find out the amount of the bid. ââ¬Å"You have the pass-key?â⬠Numataka feigned interest. ââ¬Å"I do. My name is North Dakota.â⬠Numataka stifled a laugh. Everyone knew about North Dakota. Tankado had told the press about his secret partner. It had been a wise move on Tankado's part to have a partner; even in Japan, business practices had become dishonorable. Ensei Tankado was not safe. But one false move by an overeager firm, and the pass-key would be published; every software firm on the market would suffer. Numataka took a long pull on his Umami cigar and played along with the caller's pathetic charade. ââ¬Å"So you're selling your pass-key? Interesting. How does Ensei Tankado feel about this?â⬠ââ¬Å"I have no allegiance to Mr. Tankado. Mr. Tankado was foolish to trust me. The pass-key is worth hundreds of times what he is paying me to handle it for him.â⬠ââ¬Å"I'm sorry,â⬠Numataka said. ââ¬Å"Your pass-key alone is worth nothing to me. When Tankado finds out what you've done, he will simply publish his copy, and the market will be flooded.â⬠ââ¬Å"You will receive both pass-keys,â⬠the voice said. ââ¬Å"Mr. Tankado's and mine.â⬠Numataka covered the receiver and laughed aloud. He couldn't help asking. ââ¬Å"How much are you asking for both keys?â⬠ââ¬Å"Twenty million U.S. dollars.â⬠Twenty million was almost exactly what Numataka had bid. ââ¬Å"Twenty million?â⬠He gasped in mock horror. ââ¬Å"That's outrageous!â⬠ââ¬Å"I've seen the algorithm. I assure you it's well worth it.â⬠No shit, thought Numataka. It's worth ten times that. ââ¬Å"Unfortunately,â⬠he said, tiring of the game, ââ¬Å"we both know Mr. Tankado would never stand for this. Think of the legal repercussions.â⬠The caller paused ominously. ââ¬Å"What if Mr. Tankado were no longer a factor?â⬠Numataka wanted to laugh, but he noted an odd determination in the voice. ââ¬Å"If Tankado were no longer a factor?â⬠Numataka considered it. ââ¬Å"Then you and I would have a deal.â⬠ââ¬Å"I'll be in touch,â⬠the voice said. The line went dead.
Over-crowded Classes
The background to the studyThere was a shocking difficult of overcrowded classes in public primary schools of Mangaung, due to an high residents as it is in central part of the province Free State. One class can be having over forty learners, and this makes the learning process to be ineffective and difficult. This difficult causes a major poor performance in the school academics as to one in such a huge number. In such large classes, the teacher cannot concentrate on all learners in class for attention The statement of the Research problem There was a shocking problem of over-crowded classes in public primary schools of Mangaung, due to an elevated population as it is in central part of the province Free State. One class can be having over forty learners, and this makes the learning process to be ineffective and difficult. A class can have about fifty learners and effective learning become hard. This devastating problem make the performance of learners to drop, the teacher cannot concentrate on all learners in class for attention. Research questions 1. Does overpopulation in school affect learner's academic performance? 2. What are the problems both teachers and learners face in overcrowded classroom in teaching and learning process in primary schools of Mangaung district? 3. Does overpopulation affect the efficiency of teachers in the process of teaching? 4. Howdoes the size of class influence in learners behavior? 5. What are the solutions to the problems both teachers and learners face in over-crowded classrooms in a primary? 6. Is classroom management possible in overcrowded classrooms?The purpose of the studyThe general purpose of this study is to inspect the effect of overcrowded classrooms on the academic performance of learners in public primary schools. The purpose of the study is also to disclose the impact of classroom overpopulation on performance of learner's academically To inspect factors affecting teachers to fail classroom managementThe significance of the studyThis study is very important to supply the school management with information to recognize the challenges faced by teachers and learners in overpopulated classes. This study will make known the extent to which overpopulated has affected learners academic performance. It also tells the other issues affecting learner's performance. In addition, this study will help the school leaders and teachers to propose procedures to reduce the effect of overcrowding in public primary schools. The result of the study will help teachers of primary schools to understand the product of over-crowding in classes, and to find out ways of how to teach the class of more number than the required. The study will provide support for additional research in education and it will be in the best sign of the learners, teachers, and government.Definition of key termsAcademicWord used to describe things that related to the work done in schools, colleges and universities.Over-crowdedFull accommodation or a space beyond what is usual or comfortableClassroomA building constructed for organizing students for learningClassroom managementThe essential part of the teaching and learning process, the methods, strategies and skills teachers use to maintain classroom environment.Delimitation of the studyThis study is performing in Mangaung district at Botshabelo where two primary schools will select a case study. The primary schools participating areNthabiseng Primary School and Pelong primary school who have more over-crowded classrooms.REVIEW OF RELATED LITERATUREIntroduction Most of South African school's leading difficult is overcrowded classrooms. This affects the learner's performance and teachers' motivation as well. There is a need to look onto how hard it is for both learners and teachers to cooperate and make it through in this tough situation.it is impossible to learn and teach when there are many learners and one teacher in class. The teachers experience every day (Davis, 2013).Teaching challenges in overcrowded classroomsOverpopulation in classrooms affect learners as much as it affects teachers, in long run this will affect the department of education as majority of learners' academic achievements will drop. Teaching in overcrowded classrooms face big challenges of having to create a productive learning environment for learners. De Corby, 2005 states that physical teaching teachers are challenged in engaging in important physical activities and because of overcrowded classrooms this is difficult for them. Most of the subject such as life orientation and sciences in terms of practical suffer a lot due to the class size, even the laboratory is not available. This is mostly experienced in South African schools. For example, the study of Guardian Africa Network found that some schools in the Eastern Cape have more than 120 packed in one classroom into one classroom and teachers are obliged to present lessons with their backs pressed up against the blackboard (Guardian Africa Network, 2013). During the practical experience I acquired from the Central University of Technology, I noticed that in Free State this problem is huge. Having to teach more than 50 learners for 30 minutes per period is not enough. Some of the problems are small space and no resources and equipment needed in some subjects. Teachers cannot practice a variety of methods, such as higher-order questioning methods and active learning methods due to lack of space. The science teachers cannot perform the practical, learners do not concentrate, and discipline is not there due to the number. In fact, teachers are effectively limited to the ââ¬Ëchalk and talk' instructional method (Opoku-Asare et al., 2014:128). This also give teachers challenge in terms of how to finish the curriculum, resulting in teachers being guided by the books and work schedule or weekly plan but not teaching for the learners to understand. The teachers give over less time to instruction and give learners lot of notes on the board resulting in learners not even writing those notes because of their number the teacher cannot even tell who participate and who does not. Tasks such as checking presence of learners, and managing their performance take lot of time of content and lessons. Time teachers give to individual students is affected by class size as well as the social self-motivation among students. The teachers are challenged a lot because as much as they want to help all learners, it is impossible and very sad. Class sizes are a problem in the Free State and even present problems to student teachers in conducting learners centered lesson methods. Large class size gives practicing teachers only one option of teaching style that is convenient that requires learners to be passive recipients of knowledge during lessons. This does not allow for learner teachers to interaction (Mtika, 2010). The quality of learning and teaching for them is lost and this can emotionally drain them, leaving them with doubts of continuing the teaching career. There is a lot of noise in large classes this being an outcome of an increasing number of learners in the classroom. Noisy classrooms translate to the distraction, making it more difficult for learners to learn and for teachers to teach. No concentration in class and more time wasted trying to make learners keep quit instead of teaching. There is creation of stress for teachers making it difficult for them to handle the learning needs of learners (Oliver, 2006). This creates a hurt on the bond between the teacher and the learner. Most of the time spent is at school than at home, teachers supposed to know the learners and their ability more than their biological parents do and the lack of bond leads to problems and disruptions in the classroom. This can create a negative learning environment for the teacher and learner. Behavioral problems, absenteeism and high failure rates are experiences in overcrowded classrooms (Gibbs ; Jenkins, 1992). Gibbs and Jenkins (1992) indicate that dealing with overcrowded classrooms leads to high teacher absenteeism, teacher laziness and teacher stress. The research that is presenting an international perspective has shown that teachers internationally are finding difficulty in managing overcrowded classrooms.Disciplinary problems in large classesOvercrowding increases classroom issues of discipline. More learners provide more opportunities provided for personal conflicts, tension and general disruptive behavior. Even the best teacher or the principal cannot control the overcrowded classroom effectively , teachers find themselves spending more time to manage the class that they spend the time to teach. It is easy for learners to misbehave in large classes because teachers cannot keep their ey es on one person the whole time. Most of troublesome learners comes from overcrowded classerooms, troubles such as bullying, disrespecting and violence. Teachers are involved in failure to maintain classroom management by coming to class with no lesson plan. This learners most of them have problems from outside classroom that make them to misbehave. According to Mustafa (2014) more number of learners in classroom the more misbehavior increase and classroom management become difficult. Corporal punishment is not legal in South Africa. It is not easy for teachers and principals to discipline the learners and give the penalties. Every doing is according to the laws no matter how long it will take. The permissions available to the disciplining learners are very few. Beyond talking to learners as their teacher, and short of transferring or expelling them, disciplinarians hold students out of class, contact their parents, or enforce one to five day suspensions. Official responses to misbehavior are, thus, limited in training to either a simple reproof, holding the learner in the office until the next class period, or a suspension, this is still not enough for every minute a learner spend outside is loss of education. The most easily front runners' problems for suspension are class troubles, failure to attend classes, disrespect, leaving the school during school time. The other common types of disciplinary problems found mostly in schools as mentioned by Donnelly (2000) are fights, and disbelief of the organization. McManus (1995) lists several types of misbehaviorsthat make the work of educators difficult. These include; Repeatedly asking to go to the toilet; Missing lessons, absconding; Smoking in the toilets; Pushing past the educator; learners playing with matches in class and making rude remarks to the teacher when the teacher stops them. The noisewhen the learner is supposed to be writing; this happen a lot when learners are writing formal tasks and it distract other learners who are concentrating. Other misbehavior includes : talking while the teacher is talking, failing to raise hand before talking, Being abusive to the educator; fighting in class; Chasing one another around the classroom; Packing up early, as if to leave while the teacher is busy with the lesson. This thing of taking the educator's property without the permission is bad because it is associated with stealing. The mentality of wearing private clothes and not the school uniform especially during winter seasons is one of the misbehavior that teachers and principal deal with all the time. Leaving class early; and Commenting of wanting to go home while the teacher is busy is what most of the learners always do and it really irritate the teacher and make other learners to lose focus. The absence of parents on their children's school life play a huge part in the discipline of learners, this starts as early as in primary school level. Learners are coming to school with bad attitudes towards life and school. Lot parents are not involved in the education of their children, they do not even check the books, they do not attend parents' meetings, and these cause poor results, and learners dodging school. Louw and Barnes (2003) clarify that there is no problem child, there are only problem parents, those learners who behave badly at school are not taught respect at home. Rossouw (2003) regards the failure in discipline in most schools as originating from the communities rather than from schools. What causes the parents of learners to be absent in their school life is that, they are single parents at home and having lack of parental dominance over the house. Children who are walking and playing in croups influence each other in the discipline and misbehavior. These learners increase the problems of discipline negatively These groups effects on what are the child principles, what he or she knows, and learns. The amount of this influence depends on other situations such as, age and personality of children in the group and the nature of the group its self (Harris, 1998; Hartup, 1983). There are no doubts that the peer pressure and groups affect the aupport the growth problem of youth behavior. According to Seita, Mitchell and Tobin (1996) ââ¬Å"When the family and loved ones of the children are absent in their lives, someone will play their part for them and advice the childâ⬠.MethodologyResearch methodology The study is descriptive in nature. It is an attempt to investigate the problems faced by the teachers in overcrowded classes and suggested some measures to settle these problems.Research designThe research captures the structure of case study. Case study is helping in making the results more vigorous, worth natural setting and context. Teachers are able to elaborate further in where the ââ¬Ëhow' and ââ¬Ëwhy' questions are discovering. For this study, the case study is to search a specific group of teachers, in two public overcrowded schools in order to explore their experience in overcrowded classrooms.The research instrumentsThe study is developing appropriate tools for the collection and analysis of necessary data. Close ended questionnaires that are unstructured for teachers.The population and samplingPopulationThe population of the study included two government schools. Ten teachers of different gender and age are part of the research.The sampleThere are ten participants i n the study and two classrooms are going to be part of observation. Five teachers are from Nthabiseng Primary school and five teachers are from Pelong primary school. One classroom each school for observations. Both schools are public schools in Mangaung disctrict, Botshabelo, Free State province Sampling technique / procedurePurposive samplingOnly the teachers of two overcrowded schools are participating. Between those two schools, only teachers who have overcrowded classrooms participate so that the research can gain accurateinformation for the experiences in the overcrowded classrooms. Convenience sampling is used, the teachers who are readily available to contact will participate. The technique participants from Nthabiseng Primary are easily accessible to generate data from the schoolData collection proceduresThe research is using the unstructured questionnaire and observation as the methods of data procedure and data generation.Unstructured QuestionnaireIn this study, a questionnaire is a primary data tool for collecting data from the teachers. Open-ended questions for respondents because they impose no restriction and they allow foe any response to questions provided to the respondent. This type of questioner is preferred because the respondent will express themselves freely with no restrictions. The questioner generates personal opinions, beliefs, emotions and experiencesObservationsThe observation method helps in taking the live data from the natural occurring social location. The teachers' observation will take place while they teach one classroom it is impor tant to observe these classrooms so that they could be included in in sample so that the researcher could also have first-hand experience into what happens in overcrowded classrooms of different schools, observing learner-teacher interaction and the attitudes of both learners and teachers. This is a preferred method as it allows the researcher to gain insight information into teachers' experiences with overcrowded classrooms. The secondary data collections are from review of literature, a study of documents and books.Data Analysis TechniquesFor the purpose of this research, there is carefully and thoroughly reading, transcribing, and analysing of data. Thematic analysis will ensure the rich description of the data set.Ethical ConsiderationThe principal will receive the written letter asking the permission to use their school for the research. Explaining the purpose of the study and asking the permission to make class observations while teachers work Approval from the Department of B asic Education informing them of the plans to use Nthabiseng primary school and Pelong primary school in this research All the participants as well as the school involved in the study privacy and secrecy will be with respect.Limitations of the StudyMost of the sources are old therefore; the present study literature is limited. The sample size that is the number of teachers is also limited, reason being they must be in classes teaching not answering questioners. During data collections under observation method, the teachers do things different from when the researchers are not there.
Tuesday, July 30, 2019
Ego, Id, and Superego Essay
ââ¬Å"The poor ego has a still harder time of it; it has to serve three harsh masters, and it has to do its best to reconcile the claims and demands of all threeâ⬠¦ The three tyrants are the external world, the superego, and the id.â⬠That quote was said by the physiologist Sigmund Freud. Freud developed a system of classifying individualââ¬â¢s mental life. The system is id, ego, and superego. In the novel Lord of the Flies by William Golding, id, ego, and superego are used to deepen the audienceââ¬â¢s outlook on the main characters. Ralph represented ego, which could be compared to being human. Jack represented id, which symbolized evil. Finally, Simon represented superego, which can be compared to an angel. Ralph represented ego, which was a self serving person who had flaws. Ralph was self centered because all he cared about was being rescued, ââ¬Å"we want to be rescued; and of course we shall be rescued.â⬠(37). That quote demonstrated Ralphââ¬â¢s focus on being rescued. Ralph tried to obtain order by having the conch, and being a leader to the other boys. Ralphââ¬â¢s human flaws surfaced when he made fun of Piggy, and when he joined Jack in acting out the killing of the pig, eventually killing Simon. ââ¬Å"ââ¬ËThat was Simon.ââ¬â¢ ââ¬ËYou said that before.ââ¬â¢ ââ¬ËPiggy.ââ¬â¢ ââ¬ËUh?ââ¬â¢ ââ¬ËThat was murder.ââ¬â¢Ã¢â¬ (156). That quote showed that Ralph knew what he did was very wrong, and he felt guilty. Ralphââ¬â¢s human qualities became very translucent. Id is best matched up to Jack Merridew because he would seek adventure, and look for personal pleasure. Jack represented evil from the beginning because of the way he took Piggyââ¬â¢s glasses and his cruelty to the little kids by yelling at them. ââ¬Å"He tried to convey the compulsion to track down and kill that was swallowing him up.â⬠(51). That quote demonstrated how Jack had transformed into a savage killer who didnââ¬â¢t care about being rescued. ââ¬Å"The forest near them burst into uproar. Demoniac figures with faces of white and red and green rushed out howling, so that the littluns fled screaming.â⬠(140). That quote showed Jack and his hunters attacking Piggy and Ralph. Jack scared off the ââ¬Ëlittleunsââ¬â¢ which showed he didnââ¬â¢t care about anyone. Jack becomes so savage that he killed Simon in an attempt to act out killing the beast. It was clear Jack that a representation of evil. Simon was a prime example of superego. All Simon did was good, the novel never showed Simon as evil. ââ¬Å"Simon found for them the fruit they could not reach, pulled off the choicest from up in the foliage, passed them back down to the endless outstretched hands.â⬠(56). That quote proved Simon was compassionate to all the kids, even the ââ¬Ëlittleunsââ¬â¢. ââ¬Å"Simon, sitting between the twins and Piggy, wiped his mouth and shoved his piece of meat over the rocks to Piggy.â⬠(74). That quote was another example of kindness shown by Simon. Simon gave his meat to Piggy when the other boys refused to give him any. When Simon was killed by all the other boys, for no reason, he was going to find them to tell them that the beast was not real. That displayed Simon only wanted to do good, he was truly an angelic figure. Sigmund Freudââ¬â¢s system of classifying individualââ¬â¢s metal life was very applicable to the novel Lord of the Flies. Ralph represented human nature in ego because he was focused on his own desire to be rescued. Jack showed he represented evil by showing his meanness and savageness, which all fell into the category of id. Simon strived for good, which made him superego, and he would be represented by an angel. In conclusion, Freudââ¬â¢s system of mental classification is always conflicting, much like Ralph, Jack, and Piggyââ¬â¢s personalities.
Monday, July 29, 2019
Critical Review Paper Expansion Term Example | Topics and Well Written Essays - 2500 words
Critical Review Expansion - Term Paper Example Their views are important for international political thought, because they influenced present international political economy theories and helped paved the debate on political ideology, particularly shaping the discourse on the concept of ââ¬Å"civil societyâ⬠and the rise of nation-states vis-a-vis ââ¬Å"civil society.â⬠Kant, Rousseau, Locke and Hobbes have diverging views on the relationship between the government and civil society, as well as the notions of slavery, sovereignty, direction of international politics, and peace, but they share somewhat similar beliefs in the role of education and the state of nature of humanity. Locke and Hobbes have diverging views on the relationship between the government and civil society. Hobbes believes that Europe has changed as a civil society through the evolution of the social contract. The Commonwealth only exists because of the Covenant between the people and the government or the state. Hobbes says in the Leviathan: ââ¬Å" Essence of the Common-wealth; which (to define it) is ââ¬ËOne Person, of whose Acts a great Multitude, by mutual Covenants one with another, have made themselves every one the Author, to the end he may use the strength and means of them all, as he shall think expedient, for their Peace and Common Defense.ââ¬â¢Ã¢â¬ This statement shows that the main goal of the government is to ensure peace and national defense. The covenant or social contract, however, for Hobbes is absolute, where the state incorporates the wills of the individuals; the state is the body and individuals are just parts of it: ââ¬Å"The only way to erect such a Common Powerâ⬠is ââ¬Å"to confer all their power and strength upon one Man, or upon one Assembly of men, that may reduce all their Wills, by plurality of voices, unto one Willâ⬠(Hobbes). This statement underscores that the social contract binds all individuals. On the one hand, it enforces plurality of wills. On the other hand, it means the precedence of the state over civil society. Locke confirms the same views as Hobbes and argues that Europe also changed because of the need for the social contract. Unlike Hobbes, Locke believes that people take part of social contracts merely to help adjudicate disputes between individuals or groups. He says: ââ¬Å"And this is done, where-ever any number of men, in the state of nature, enter into society to make one people, one body politic, under one supreme governmentâ⬠¦to make laws for him, as the public good of the society shall requireâ⬠¦Ã¢â¬ (Locke, Two Treatises on Government). From here, it is clear that Locke believes that it is the people or civil society that legitimizes the state; while for Hobbes, it is the government that legitimizes the existence of a peaceful civil society. My criticism of Hobbes is that he overlooks that the people make the government. The social contract binds the people, but the people can unbind some laws too in order to make the contract fit their changing needs and issues. I agree more with Locke, who reminds governments of their servitude to the civil society. It does not mean, however, that the civil society will also abuse its rights and fully void the social contract without due justifications. Moreover, Locke and Hobbes diverge on the notion of sovereignty. Locke argues that civil
Sunday, July 28, 2019
Management Solutions in Practice Research Paper
Management Solutions in Practice - Research Paper Example A person can access the applications as long as he/she has an access to the internet. ââ¬Å"As long as a computer has Internet access it will be able to use the applicationâ⬠(Cheow 2010). Cloud computing is usually partitioned into three main categories, which include utility computing, web services, and Software-as-a-Service (SaaS). SaaS is considered the simplest way of computing because it is a single application. ââ¬Å"Because there is only one application it is very easy for the company to maintainâ⬠(Cheow 2010). SaaS model of cloud computing helps companies save their expenses on buying hardware and software. This model also removes the maintenance costs of the computer systems and applications. ââ¬Å"Some common examples of these types of programs are any online e-mail service or instant messagingâ⬠(Brodsky n.d.). If we talk about utility computing, we can say that it is, at present, supplemental kind of computing because it is used for the fulfillment of such needs that are not very critical by nature. However, companies like Amazon and IBM are using this technology to run different processes of their businesses. We can say that with the rise in the popularity level of this form of computing, it may soon become the most useful form of computing for the companies. The third type of cloud computing, .i.e. web services, is used by the companies for a variety of purposes, such as, making online presence of the company, dealing with online customers, and performing web based business activities. ââ¬Å"Providers can offer things such as discrete business services, and other kinds of APIs that are offered by such systems such as Google Mapsâ⬠(Cheow 2010). In cloud computing, people make use of web services which help them perform their business activities online instead of using traditional methods. Stevens and Pettey (2008)
Saturday, July 27, 2019
A Corporate Entrepreneurship Analysis of Sony Essay
A Corporate Entrepreneurship Analysis of Sony - Essay Example The term can be defined alternatively as the development of internal markets and relatively small and independent units designed to create internal ventures and expand innovative staff services, technologies and methods within an organization (Pinchot, 1985). It has been established that successful companies have one thing in common and that is an entrepreneurial style of management (Katz & Shepherd, 2004). Stevenson and Gumbert (1985) attribute the sustenance of a high level of performance by big companies such as Sony and Hewlett Packard to their entrepreneurial behaviour. Company overview Sony corporation is a Japanese multinational conglomerate that originated in the wake of World War II. The company made history after it built Japanââ¬â¢s first tape recorder and named it the Type-G. In 1958, the company changed its name from Tokyo Telecommunications Engineering Company to the present day Sony. The Sony Corporation has diversified its operating scope to cover almost all the ar eas of the entertainment and the telecommunications sectors. Sony Corporation is the parent company of the Sony Group. As the parent company of the group, its main task is to make strategic business plans for the group through research and development, designing, and marketing of products. As pointed out earlier, Sony Corporation has diversified its scope in to most entertainment and telecommunication sectors. The company has done this through its subsidiaries. One such example of the subsidiaries is the Sony Chemical and Information device Corporation which is responsible for manufacturing as well as the engineering and research and development for the mass production of products (Sony Corporation, 2012). According to the fortune 500 2012 list of companies, Sony Corporation is ranked 87th (CNN, 2012). The Sony group not only focuses on electronics, gaming, and entertainment, it also offers financial services. The subsidiary company that is responsible for the financial services bus iness of the Sony group is the Sony Financial Holdings. With its headquarters in Tokyo, Japan, the company controls the operations of Sony Life, Sony Assurance, Sony bank, and Sony Bank holdings. This subsidiary is the most profitable of all of Sonyââ¬â¢s subsidiaries accounting for about 50% of Sonyââ¬â¢s global earnings (Sony Corporation, 2012). The company was enjoying high profit returns up until early 2000ââ¬â¢s when it started experiencing financial difficulties. These financial difficulties were due to several reasons. The first reason was the global financial crisis. The crisis made it difficult for the company to procure materials for manufacturing, cope with debt and maintain its work force. Secondly, the companyââ¬â¢s milk cow, the play station, started to face steep competition from rivals Microsoft with their X-box gaming model. With the sales of the play station reducing, the companyââ¬â¢s profits suffered similarly. The last main cause of the companyâ⠬â¢s decline in profits was due to natural disasters. Japan has been victim to natural disasters, mainly earthquakes. The companyââ¬â¢s headquarters in Tokyo, Japan, was hit by the devastating earthquake and therefore it became financially challenging for the company to make a comeback. The company however made a comeback in December 2011. Though the market capitalization of the company had dropped by over 50%, its net worth had increased from $17.6 billion in March 2002, to $35.6 billion in December 2011. This comeback can be attributed to the entrepreneurial behaviour of the company in promoting innovation and creativity that has enabled the company to realize and
Friday, July 26, 2019
Health of Ageing (SLP) Essay Example | Topics and Well Written Essays - 250 words
Health of Ageing (SLP) - Essay Example Another similar goal of the project is to make sure that high-risk benefactors do not go to a health facility once more. Likewise, the program makes its goal to file and document savings that are measurable for the benefit of the Medicare program (Kim, 2008). The participating organizationsââ¬â¢ effectiveness will be measured according to the obligation of each of the organizations. There are the organizations responsible for providing intervention and prior services to prevent readmission hospitals. Other participants manage the communications between hospitals and the stakeholders. However, participants invite all health centers that experience high admission rates, to apply for the program (Lau, 2007). The program will excel in its objective due to the strategy its applying to fulfill them. The program tends to involve the people whom itââ¬â¢s targeting. The change that the program sets to achieve is also crucial and significant thus becomes part of the target population. The program also applies Information Technology as a support in the daily
Essay on Business Opportunities Example | Topics and Well Written Essays - 2000 words
On Business Opportunities - Essay Example Now the AT & T Inc has retained around 45% of the sub companies that had occurred due to the lawsuit. The company is an international level telecommunication company that is head quartered in the United States of America. It is a multinational company that is currently operating in around 200 countries all over the world. It has itââ¬â¢s headquarter in Dallas, Texas. It is the second largest company that is providing both fixed and mobile telephony to the people of the United States of America. Itââ¬â¢s ranking within United states of America is 7th according to the total revenue that it has and if the non oil companies are considered then it is the third largest company. They are a very well established company and have been titled by Forbes as the fourteenth largest company in the world due to the market value that it has. It has been listed as the ninth largest non oil company in the world according to the Forbes list. It is the twentieth largest company in the world of tele com companies and has in total around 100.7 million customers all over the world. It even gives broad band telecommunication television subscription service too. Its major market is in the North of America. The current Chairman of the AT & T is Randall Stephenson. Their revenue has been on an increasing trend and is currently around US$ 126.723 billion. There are around 256420 employees who are currently working for AT & T. AT&T Inc. is itself the chief trading company the shares are traded in the name of the At &T Inc. and the rest of the structure is as follows: Southwestern Bellà Telephone Company d/b/a AT&T Arkansas, AT&T Kansas, AT&T Missouri, AT&T Oklahoma, AT&T Southwest, AT&T Texas AT&T Tele holdings Illinois Bellà Telephone Company Indiana Bellà Telephone Company Michigan Bellà Telephone Company Theà Ohio Bellà Telephone Company Pacific Bellà Telephone Company Nevada Bellà Telephone Company Theà Southern New England Telephoneà Company Wisconsin Bell, Inc . AT&T Corp. was acquired in 2005 with the name and the products. AT&T Alas com BellSouthà Corporation d/b/a AT&T South was acquired by the firm in 2006 BellSouth Telecommunications, AT&T Mobility Technological Opportunities Currently there has been a serious increase in the data traffic of the network. There has been an increase in the users as well. The company is doing quite well. As they are famous for investing a lot in the Research and development side of the business they have had constant innovation at their workplace and this has helped increase a lot of traffic for them. They were one of the first companies who actually switched from telephones to the wireless service and then ever since they have been working to enhance their services and get hold of better facilities and technologies that will actually help them compete in a better way in the fast paced world of today. The main issue that people have had is in relation with the quality of the calls and the frequency of the dropped calls. There are also rumors that Apple is actually looking for other networks as the AT & T have felt that they didnââ¬â¢t need the LTE development. The major problems started when the Apple company came up with their I phone 4s, and the AT & T were unable to fulfill their demands. It was then that the Apple Company started looking at other options like Verizon. The telephone companies today are actually looking
Thursday, July 25, 2019
Management Assignment Example | Topics and Well Written Essays - 2000 words
Management - Assignment Example Managing performance is an ongoing activity that involves identification of performance measures, implementation of the performance management system, evaluation of performance outcomes and provision of feedback for improvement purposes (Kammerer, 2009). Importance of measures of organizational and managerial performance of Mid Staffordshire Hospital Trust Organisational performance measures assess how well the organisation contributes to the attainment of its vision, mission and strategic goals. Managerial performance measures focus on how well the management plans, organises and allocates limited resources in an efficient and effective manner towards the attainment of organisational goals (Kammerer, 2009). Measures of organisational and managerial performance are importance since they enable the organization to meet the demands of external accountability and foster strong sense of internal accountability. Measures of performance provide the basis of implementing organisational stra tegies through identifying the expected performance goals. The measures allow for collaboration through integrating the objectives of the organisation with the key performance indicators (Kammerer, 2009). ... The measures will enable Mid Staffordshire NHS hospital to improve communication with external stakeholders such as suppliers of medical equipment and government regulatory agencies. The measures of performance justify expenditure and costs in the organisation through ensuring cost-effectiveness and identifying the value for money committed towards improvement of organisational processes (Niven, 2005). Advantages and disadvantages of using balanced scorecard approach to organizational and managerial performance Balanced scorecard was developed by Robert Kaplan in early 1990s, but has certain advantages and disadvantages as a measure of both organizational and managerial performance. Balanced scorecard translates the mission and business strategy in to a comprehensive set of performance measures that cater for the overall organization. In addition, the performance measurement tool acts as a communication tool since it outlines the employee expectations and aims at ensuring periodic ev aluation of the performance standards (Christensen, 2008). According to Daft (2010), the tool integrates both short-term and long-term measures of performance and forms the basis of employee compensation. Ideally, balanced scorecard offers an advantage as performance management system since it breaks down strategic measures to the bottom level units such as department, clinical units, and individual staff within the organization. Balanced scorecard enhances creativity and innovation in the organisation through continuous learning and growth opportunities for the staff and improvement of the processes (Ginter, Duncan & Swayne, 2013). Lastly, the performance management tool leads to unique competitive advantage through improved decision-making and improved processes in the entire
Wednesday, July 24, 2019
The role of CSR in an organization's performance Dissertation
The role of CSR in an organization's performance - Dissertation Example 303). It therefore follows that corporate social responsibility has a significant role to play in the organizationââ¬â¢s performance. This study conducts a review of the literature relative to stakeholder theory and its emergence as a core driver of corporate social responsibility and thus creates tension between stakeholder and shareholder theories of corporate governance. In doing so, the research analyses the literature relative to the conceptualization of the role of corporate social responsibility in organization performance and the manner in which organizations structure corporate governance to resolve the tensions between stakeholder and shareholder models. In order to test this conceptualization or hypothesis that corporate social responsibility has a significant role to play in organization performance and creates tension between shareholder and stakeholder theory, an empirical research study is conducted. The empirical research study involves a survey of ten for profit o rganizations. The survey is a questionnaire which is designed to determine views on corporate social responsibility, shareholder primacy and how these organizations prioritize their performance. Conclusion: This research study concludes that corporate social responsibility is important to organizations, yet organizations tend to focus more sharply on maximization of profits for the benefit of shareholders. Contents Abstract 2 Contents 3 Chapter One 5 Introduction 5 Background 6 Key Definitions 7 Corporate Social Responsibility 7 Shareholder primacy 8 Stakeholder Theory 8 Aims and Objectives 9 Significance of the Study 9 Research Questions 10 Research Methodology and Design 10 Research Methods 11 Qualitative Analysis 11 Quantitative Analysis 12 Organization of the Study 13 Chapter Two 15 A Review of the Literature 15 Introduction 15 I.Corporate Social Responsibility 15 A.Organizations 15 B. Corporate Social Responsibility Theories 19 i.Neoliberalism 19 ii.Neo-Keynesianism Theories of Corporate Social Responsibility 21 C.History of Corporate Social Responsibility 24 II.Shareholder Primacy Theory 31 III.Stakeholder Theory 39 Conclusion 44 Chapter Three 45 Methodology 45 Introduction 45 Research Methodology 46 Qualitative Analysis 48 Quantitative Analysis 48 Ethical Issues 51 Strengths of the Research 51 Limitations of the Research 52 Chapter Four 53 Analysis and Results 53 Chapter Five 60 Conclusion 60 Size of Organization: (a) Large (b) Medium (c) Small 63 References 69 Chapter One Introduction The concept of corporate social responsibility (CSR) can be traced back to the 1950s with definitions of the term expanding over the course of the 1930s (Okoye 2009, p. 613). By the 1990s, CSR has come to be synonymous with corporate social performance, stakeholder and business ethics theories (Carroll 1999, p. 268). Cumulatively, the development of CSR has come to mean that organizations have an implicit duty to advance social interests and not merely the organizationâ⠬â¢s interest and that which is legally required (McWilliams and Siegel 2001, p. 117). Regardless, CSR not only conflicts with organizational interests, but also presents a number of conflicting interests among the wider group of stakeholders. For instance, CSR requires that organizations take account of the interests of a variety of groups such as consumers, government, employees, community organizations and other stockholders (McWilliams and S
Tuesday, July 23, 2019
Child perpetrator of violence Case Study Example | Topics and Well Written Essays - 2500 words
Child perpetrator of violence - Case Study Example This is a case that happened to twenty six year old Corey Deen Saunders who experienced chaotic childhood and currently serves a life sentence in prison for perpetuation sexual abuse to a six year old boy. Corey Deen Saunders and family history Corey Deen Saunders is a 26 year old man serving a life sentence in prison after abusing a six year old boy in a library. He is mildly retarded and suffers from attention deficit disorder. He had serious psychological problems and turned from a victim to a predator that sexually preyed on young boys. Saunders really liked younger boys, especially those between six and twelve years and always gave excuses to be around and hang out with them. As he grew up, his behavior became conspicuously sexual and all his remarks on boys were sexual in nature. Saunders also sexually fantasized a lot about younger boys living in his neighborhood. He admitted to having more than four hundred sexual fantasies that involved younger children in school. At one poi nt, he contemplated raping and murdering a specific ten year old boy in school. In April 1999, Saunders tried to aggressively win over a twelve year old boy to have sex with him. As Corey Deen Saunders grew, he became sexually compulsive towards younger boys. Saundersââ¬â¢ compulsive sexual behavior eventually landed him in prison following unsuccessful rehabilitation. His real problems began when he sexually abused two children below his age. This is because he had serious psychological problems. Saunders overtly sexual behavior was not corrected at Stetson school and he continued making sexual advances to younger boys. He stole boys under wears and hoarded them. In September 1999, Stetson school found it extremely difficult to contain Saunders and it was decided that Saunders was becoming hazardous to younger children and was transferred to North Carolinaââ¬â¢s treatment facility. However, Saunders was transferred to Top East Emergency Shelter in Taunton instead. Saunders es caped from the facility on December 30, 1999 and was found by police some hours later walking barefoot in the streets of Taunton. After escaping from Top East Emergency Shelter he was never readmitted and the Department of Social Services instructed the police to take Saunders to a foster home in Attleboro. Neither police nor the Department of Social Services informed the woman at foster home that he young man had serious psychological problems. As a result, the woman manager did not take extra measures to protect other children from his sexually compulsive behavior. Consequently, Saunders sexually assaulted a seven year old son of the foster woman a few feet away from his mother in the fosterââ¬â¢s home living room. As a result, Saunders was charged of battery and indecent assault of a child below fourteen years, abuse and attempted rape of a child less than sixteen years. Following the above incident in 2001, Saunders pleaded guilty and was sentenced to four years and one day i n prison, with additional twelve years probation. After serving his term in prison, Saunders was eventually released. However, Saunders sexually assaulted a six year old boy in New Bedford Public Library, and he was charged again with battery and indecent assault on a child below fourteen years, enticing and raping a child below sixteen years. Following his second abuse, he was sentenced for life to keep him away from harming children.
Monday, July 22, 2019
Lavinia froze silently in awe Essay Example for Free
Lavinia froze silently in awe Essay She put her hand out to the light switch and stopped. What? she asked. What? What? Behind her, in the black living room, someone cleared his throat. Hello? she asked anxiously. Still, no answer. She stared apprehensively around the pitch dark room, curiously, as to what the source of this mysterious sound was. It suddenly became all too familiar with her. Oh my God, she thought, the Lonely One? As she examined the kitchen with her eyes, wide as the ravine which lay outside her house, she began to think irrational thoughts. Thoughts which could only lead her to worse ones. She stood still as her eyes continued to scan the room, not moving a single inch from where she was. There was a piercing silence which filled the air. You could hear a pin drop. Officer Kennedy? she tried to reassure herself that someone she could trust was in her house. She began to tremble as she reluctantly took her first few steps towards the centre darkness of the kitchen, like a baby learning how to walk. She could smell the soup shed made earlier on that day. How she longed to go back just a few hours. She continuously looked around hoping she would find nothing. Just as her uneasiness began to settle, a distant figure appeared through the dark, walking eagerly, but gradually towards Lavinia. Lavinia froze silently in awe. As this body continued moving closer, it became obvious that they were limping on one foot, as to say they had caught on something. Lavinia could smell the putrid waft of the ravine almost suffocating her. Still she stood still, with her hairs on the back of her neck standing up as if wanting to escape from her body. Goose pimples began to appear all over her temporarily immobile body. She opened her mouth as to speak, frightened at the same time. What, what, who are you? she babbled, her words only just managing to escape from her cold-blue lips. The person stopped and looked up, to what seemed the darkest room in the world. Why dont you turn the light on Lavinia he said, with a raspy voice. Lavinia couldnt believe her eyes. You! she shouted furious as a bull seeing red. Yes Lavinia, me, he said slowly uttering the words. What are you doing here?! How did you get in?! Lavinia shouted, stunned. I followed you he said staring Lavinia up and down with his eyes red as flames. I watched you walk through the ravine. Why?! I dont understand. Just leave. Get out! Lavinia shouted, as her annoyance and shock replaced her fear. No Lavinia. I came here to see you. Im not leaving. He stepped closer with a mild grin, looking at Lavinia deeply into her eyes. His hand crept up slowly, approaching Lavinias hip. He places his hand there, clutching it. Im not leaving. Lavinia jumped, and pushed his rough hands of her hips, disgusted and extremely annoyed. I said get out! Dont you dare touch me! I mean it! Get out otherwise Ill scream Lavinia said furious. No I told you already beautiful! Im not going anywhere. Im staying here with you. You can scream all you want, he said calmly and slowly, still carrying the same smile. This time, he lifted his hand and latched onto Lavinias hair, and began stroking it, twirling the ends with his rough as sand paper hands. Lavinia became full with fury and pushed his hand away, gathering all of the saliva she could in her mouth in an instant of a second and spat in his face. His concentrated smile turned into a furious face. He pulled his right hand towards him as he wiped his face with the end of his left black and grey stripy gauze shirt sleeve. He looked up at Lavinia who looked scared as hell, looking like she wanted to run away. He gathered all of the strength a man could and released the most powerful blow to her pretty face with the back of his rusted hand. Lavinia immediately fell to the ground slamming her side on the kitchen floor tiles. She began to bleed from her ear, as her silky black hair became covered in it, drowning in the wine-coloured substance. Her eyes were half open, half closed and she began mumbling words like a drunk man talking. who, w huh where? I where? He stood in front of her looking at her bleeding to death, grinning uncontrollably. Lavinia? Can you hear me my darling? Silence. Oh well. You shouldnt have done that should you? Lavinia lay on the cold floor as she looked at him, continuing to bleed. She could just about manage to put up an angry face as she screwed her eyebrows inwards. The whole floor by now was covered in her blood. Her eyes however continued to flicker life. She carried on mumbling her words. You y, I, I cant. Why. He kneeled down on the floor as he bent over to kiss her bloody cheek. Lavinia couldnt react as she lay frozen on the floor. He got up and walked towards the main door leading out to the ravine. Lavinia.
Sunday, July 21, 2019
Basic resource for any organisation
Basic resource for any organisation Introduction: Information is basic resource for any organisation to its management. If the information is available on time its really effective for the management in its operations. The term information system usually refers to a system based on computer which is designed to support the operation, management and decision function. Management information system collects, transmit, process, store information and the system convert this data for management to make decisions and the strategy in the organisation. Reason for information system strategy First let me clear the misunderstanding for those who dont understand that whatever we do we have a strategy.im sure everything we do we have an objective to achieve that plan we make a plan that plan is strategy. Problem is strategy can be good or it can be bad or we may not have spotted that we can do much better if take the opportunity and environment into account. But there can be certain things give us a push to adopt a strategy and to achieve the better results for our business. There are two distinct phases, the first one is quantitative and the second one is qualitative. The first part we talk about the research of different organisations. In each organisation we will talk about different key stake holders in formulation of strategy process. This phase of the research will be started when different stakeholders will be interviewed over 100 interviews have been conducted so far. For the second phase the potential sample size will be every HEI in the UK. The first method tool which is being used to get samples in the first part is based on interviews and observation from which case studies are being created. The case studies created in part one will then be used to enlarge and increase upon present theory to grow a survey. This will be directed, using the results already recognized in qualitative research and different other organisations. This will bring the experimental sample to lots of other organisation which is adequate to learn any main defects in the survey. The second data-gathering tool will be a organized survey. The small size of the real people means that the survey can be given in all the organisations to at smallest three key stake holders or alliance frontrunners. Earl suggests a multiple methodology to formulate an information systems strategy. Earls multiple methodologies Earls multiple methodology provides a means of: Clarification of the business needs and strategy in information systems terms. Evaluation of current information systems provision and use. Innovation of new strategic opportunities. 1. Top down clarification Earls definition of a suitable method to clarify business needs in IS terms: ââ¬ËA methodology that is easily understood and used by line and general managers, it can cope with varying robustness of business strategy, it does not consume too much time or resource, it can be repeated as circumstances inevitably change and, as a result of these needs and because it could not achieve anything else, it points to directional IS needs and not detailed specifications. The ââ¬ËCritical Success factors approach meets many of the requirements of the definition. There are otherssee ââ¬ËStrategic Management and Information Systems Wendy Robson See ââ¬ËIT Strategy for Business Joe Peppard 2. Bottom Up evaluation Most organisations only have a vague understanding of the potential and capacity of their present IT systems. The technical perspective and backroom perception of IT may create a barrier. To understand the present systems a bottom up analysis is carried out. This involves an audit or survey. As well as the technical detail the user/specialist interface is examined. The value of the system to the organisation must also be ascertained. In this evaluation the following questions must be asked: How reliable is the system? How easy is it to maintain? How cost effective is it? What is the impact on the business? How easy is it to use? How often is it used? What is the state of our specialist user relationship? Other considerations might be the interactivity of the systems. These interactions and the evaluation can be shown graphically using systems maps or other means. The present systems can then be examined for strengths and weaknesses. The top-down business approach and the bottom-up systems approach do not provide an opportunity to exploit radical new ideas for exploiting the competitive advantage of IT. The business approach examines the ââ¬Ëwhat and does not examine the ââ¬Ëhows. The bottom-up approach is constrains radical thinking by the presence of the evaluation process and the strengths and weaknesses of the existing systems. A more detached approach is needed. 3. inside out thinking lateral thinking It is often inspiration and creativity that produces the bright spark ideas that can produce the beginnings of an IS strategy for competitive advantage. Ideas brought from unrelated sectors can often be successfully applied. The right atmosphere must be nurtured to produce this creativity. Runge suggests the following six characteristics associated with IT innovation|: The idea often emanates from a commercial manager. The idea was backed by a senior manager who became the project champion. The competitive advantage was added to an existing system; evolutionary process. The idea was developed outside of the IT control constraints. Customers were involved in the development. The application was given a high profile and was marketed. External Analysis The three legs of Earls multiple methodologies have considered IS strategy from an internal perspective. It is important to also view this strategy from an external point of view i.e. competitors, customers, consumers etc. There are techniques that can help clarify this approach. The SWOTmethod is a suitable candidate that explores both internal and external perspectives. A technique such as SWOT is useful when considering an external view of the three legs of the multiple strategies. Porters five forces model is a useful model for considering the external perspective on IS strategy. Boddy et al suggest that Porters model can be used to construct an IS strategy. Considerations when using the multiple methodologies. The use of methodologies does not mean a ââ¬Ëcookbook attitude should be taken the implementation of strategies. Methodologies are useful overall frameworks but the context in which they are used needs consideration as well as experience. Experience suggests that: Significant differences existed in different firms; IS strategy formulation inherently seemed a more complex matter in some firms than others; and approaches in practice did not always match either the popular prescriptions or the accounts in case documented articles. Infrastructure-led may emphasise leg 2 bottom-up approach. Business-led may emphasise leg 1 top-down approach. Opportunity-led may emphasise leg 3 inside-out. Alternative approaches There are many other approaches in structuring IS strategy. One such approach is Porters five forces model. This is also useful in conjunction with Earls methodology. The following is reproduced from Body et al. IS changes the basis of competition: opportunities and threats Computer-based information systems are changing competitive conditions in many Indus-tries. There are many tools and techniques which can be used to analyse the relationship between strategy and information systems, depending on their purpose. In this book we can only illustrate one of these approaches, and the Five Forces model originally developed by Michael Porter seems the most appropriate to introduce. It can be used at the level of the individual firm to assess the possible impact of information systems on the competitive position of the firm. A comprehensive account of the many other perspectives on the topic will be found in Robson (1997). Figure 4.5 is based on Porters framework, and a show that IS represents an opportunity to secure a strategic advantage by using it to strengthen one or more of these forces. Similarly, it represents a competitive threat, if other organisations are able to use IS more effectively in these ways. Information systems and the threat of new entrants Managers can use IS on this force by using it to reduce the threat from new entrants by raising barriers, or by using it themselves to enter new markets. Using information systems to raise entry barriers The Caterpillar case illustrates that the manufacturer of the machine links the customer electronically with the service organisation. Because of that electronic link, it is not easy for a customer to go to another service organisation for repair and maintenance. This strengthens Caterpillars position as a manufacturer and as a service provider. The system is so complicated, advanced and expensive that it is hard for existing competitors to imitate. It is even more difficult for new entrants in this market to develop a similar system. The box gives two other examples. In the IS industry itself ââ¬Ësetting the standard is very important to gaining a strong position. Most customers want to use equipment that has become established as the industry standard. Examples are Microsoft word-processing software, Intel computer chips and Netscape Internet browsers. It is very hard for new entrants to overcome these entry barriers, leading to a winner takes all situation in many sectors of the market. Using IS to enter markets more easily The Caterpillar case illustrates how the company uses its information system to attain a stronger position in the maintenance market. The system can strengthen the relationship with buyers of Caterpillar equipment and provide them with a broad after-sales service. Caterpillar becomes a stronger competitor of independent maintenance companies in new markets. Information systems and the threat of substitutes Companies can use information systems to alter this force by differentiating their products, or by creating new ones which they can use to threaten competitors. Using information systems to differentiate products and services The Caterpillar case shows the company using the information system mainly to improve the speed and quality of customer service. When the system notes deterioration the service starts immediately and the very capital-intensive machine will be repaired soon. This saves the customer a great deal of money. Other companies use the Internet to create and orchestrate active customer communities. Examples include Kraft (www.kraftfoods.com), Intel (www.intel.com), Apple (www.apple.com) and Harley Davidson (www.harley-davidson.com). Through these communities the companies become close to their customers. They can learn and innovate with product or service improvements that would otherwise be impossible. The research summary box below explains why it is essential for information service providers to differentiate their products. Using information systems to create new products and services Telephone and Internet banking are relatively new phenomena which have only become possible with new systems. The same is true of companies that use the power of database technology to offer new services in customer relationship management and direct market-in. Wide Internet access has generated a huge increase in businesses offering new services. These include electronic auctions, search engines, electronic retailers, electronic hubs (Data and Segev, 1999; Timmers, 2000; Kaplan, 2000), and Internet providers. Caterpillar created new maintenance services, and the next box gives another example. Information systems and the bargaining power of suppliers Increasing power of suppliers can increase their power by using information systems to track much more closely the costs of providing services to customers. They can set prices accordingly, or decide that they do not want a particular piece of business. For example, airlines use yield management systems to track actual reservations against traffic forecasts for any flight, and then adjust prices for the remaining seats to maximise revenue. Stepanekz (1999) reports how Weyerhaeuser Doors uses an Internet-based system to, amongst other things; manage orders from its distributors. This allows the company to manage its internal processes more efficiently, but also to assess much more accurately the value of each order, and the overall performance of its distributors. This enables it to refuse unprofitable orders, and to be more selective about the distributors which it supplies. Customer relationship management systems are a currently popular example of suppliers ability to track customers requirements more accuratel y, thus increasing the suppliers power over the customer. Decreasing power of suppliers Information systems can also be used the other way around. Customers can use information systems to strengthen their position in the marketplace at the expense of suppliers power. Ford and General Motors have set up electronic marketplaces and urge their suppliers to use that system to match their supply with the demand of Ford and GM. The Economist (6 November 1999) commented: Ford and GMs e-business revolution will not be confined to them alone. Their decision to go online will ripple through the 50,000 or so firms they trade with. The car makers are careful to say that none of their suppliers will be compelled to use their new portals, preferring simply to express that the benefits-cost savings, the access to new customers, the faster time to market, the sheer value of the information will make it an obvious choice. But the reality is different. Ford and GM are investing a lot in their e-business infrastructure and great hopes are riding on it. Suppliers that want to continue to do business the old way will rapidly become ex-suppliers and before long ex-companies. The next section about the use of information systems to change the power of buyers explores this theme further. This illustrates that information systems are increasingly inter-organisational phenomena, rather than hidden back-office systems. Inter-organisational systems can be used to co-operate as well as to compete with business partners, whether suppliers or customers. Powerful parties tend to urge less powerful ones to adopt their systems. Information systems and the bargaining power of buyers a good example of the balance of power being altered is when retail chains use modern communication technologies to make electronic links with their suppliers. Such systems reduce inventory costs and warehouse expenses and improve fulfilment time and information flows. For instance, they encouraged the further concentration of retailing firms which then had much more power over their suppliers. The retailers computer continually monitors its suppliers finished goods inventories, factory scheduling, and commitments against its schedule. The purpose is to ensure the stores always have adequate stocks. A supplier that is unwilling to join the system is likely to lose business. The box illustrates how Wal-Mart used this idea. More generally, buyers can use the web to access more suppliers, and to compare prices for standard commodities much more widely than was practical with earlier technologies. Information systems and the intensity of rivalry two ways of using information systems in the process of competitive rivalry are by reducing costs and through more effective management. Using IS to reduce costs On-line inventory systems make it possible to make radical changes in manufacturing supply systems. This greatly reduces inventory levels, and the costs associated with them. Car manufacturers are only invoiced for components when the completed assembly leaves the factory. When the system knows that X headlamps have been used, it passes the information to the component supplier. They send an (electronic) invoice for the components used, and supply replacements. There are similar systems in retailing, where suppliers like Unilever and Procter Gamble manage the inventory of their biggest customers. These inter-organisational systems reduce inventory costs but not only through lower inventory levels. They also reduce the need for working capital and allow a (smaller) purchasing department to focus on non-routine orders and strategic supply matters. The Internet enables large companies to transfer their purchasing operations to the web. Secure web sites connect suppliers, business partners and customers all over the world. This makes it easier for new suppliers to bid for a share of the available business, makes costs more transparent, and improves the administrative efficiency of the supply process. Using IS to enable more effective management A travel agents branch accounting system can now provide detailed patterns of business to managers, enabling them to monitor trends more closely, and to take better-informed pricing and promotional decisions. Another example is Ahold, a Dutch retailer, which achieved much greater performance in the supply chain by using its data-mining capability and knowledge extraction in its customer database. Management information systems can expand the span of control of individual managers, which can support the flattening of organisations. These examples show that information systems may become opportunities for creating, supporting or changing generic strategies. On the other hand competitors have similar opportunities there are also costs and risks associated with using information systems in this way. IS can also be a threat New entrants in the financial services sector have been able to introduce telephone bank-in through call centres very quickly. They were able to take advantage of the fact that they did not have an established branch network, and so could use the new technology very quickly. The technology worked to the disadvantage of established banks with many local offices. They found it costly to close branches. The technology was an advantage to the new, a disadvantage to the old. This illustrates a more general point that, for all the potential opportunities, IS can also be a threat. Information systems enable new competition Computer-based information systems represent opportunities for one business and threats to another company. In retailing, large chains have benefited at the expense of smaller shops, large suppliers have benefited at the expense of smaller ones, and large retailers have more power over suppliers. Any use of IS by one company to enter a new market, reduce costs and so on, is a potential threat to a competitor. They lose out if they have not seen the possibility, or have managed implementation less effectively. The London Stock Exchange is threatened by the fact that modern technology allows major institutions to trade shares directly, rather than use the market institution. The problem is increased by the fact that competing exchanges have implemented new information systems more effectively. They are likely to gain a larger share of a smaller market. Information systems place new demands on management time Implementing a major system takes a great deal of management time a cost that managers rarely include when evaluating investments. They require managers to look inward at (important) operational problems of staff, system design, and security. The danger is that they do not look at (even more important) issues of how to use the systems for strategic advantage. In other words: managers are often balancing between a ââ¬Ëproblem orientation and an ââ¬Ëopportunity orientation. Senior management frequently underestimates the resources required to implement new information systems, especially of managing the many organisational implications. Implementing an information system successfully is difficult many research reports comment on the difficulties of implementing information systems. This is especially true of systems which involve many stakeholders with different interests or those which are innovative in other respects. They often take place in an uncertain environment, from a competitive as well as from a technological point of view. These uncertainties make it difficult to plan a change over a longer time. At the same time, the stakes are getting higher in terms of costs, people and other resources. Even when applications work, there may be downsides Managers often buy in expertise for development, operations and consultancy. These suppliers become the main experts of a companys IS resource. This dependency can be misused. Their lack of knowledge and insight in the organisation causes major problems. They have difficulty in negotiating successfully with the external providers and crucial company knowledge becomes the asset of other companies. References Achterberg, J.S., Gerrit, A. and Heng, M.S.H. (1991) Information systems research in the post-modern period. In Nissen, H.E., Klein, H.K. and Hirschheim, R. (eds.) Information Systems Research: Contemporary Approaches and Emergent Traditions. Elsevier Science Publishers BV, North Holland. Anderson, M. (1992) Implementing an information infrastructure strategy: the University of Edinburgh experience. University Computing Antill, L. (1991) Selection of a research method. In Nissen, H.E., Klein, H.K. and Hirschheim, R. (eds) Information Systems Research: Contemporary Approaches and Emergent Traditions. Elsevier Science Publishers BV, North Holland. Baroundi, J.J. and Orlikowski, W.J. (1988) A short form measure of user information satisfaction: pychometric evaluation and notes on use. Journal of Management Information Systems Boaden, R. and Lockett, G. (1991) Information technology, information systems and information management: definition and development. European Journal of Information Systems Breaks, M. (1991) Information systems strategies. British Journal of Academic Librarianship Burrell, G. and Morgan, G. (1979) Sociological Paradigms and Organisational Analysis: Elements of the Sociology of Corporate Life. Ashgate Publishers. Campbell, W.G. and Fiske, D. (1959) Convergent and discriminant validation by the multitrait- multimethod matrix. Psychological Bulletin Creswell, J.W. (1994) Research Design: Qualitative and Quantitative Approaches. Sage Publications.Return to text Fitzgerald, E.P (1993) Success measures for information systems strategic planning. Journal of Strategic Information Systems Galliers, R.D. (1991) Strategic information systems planning: myths reality and guidelines for successful implementation. European Journal of Information Systems
Driverless Metro Train With Obstacle Detector Engineering Essay
Driverless Metro Train With Obstacle Detector Engineering Essay INTRODUCTION This project is designed to understand the technology used in driver less metro train. This technology is the future of the metro train. This train will be equipped with the microcontroller as the CPU, Sensors, Displays, and Motors. These trains will be designed for following the specific path. This microcontroller will be programmed such that door opens and close automatically when the train reaches its station. This microcontroller will be programmed for a specific path so that it knows the distance between two stations. It also opens the door when train reaches the station for a certain time and then closes. Also if the train is following its path and in front of train an obstacle is detected the sensor will sense the obstacle from a safer distance so that the train can be stopped before accident. In this project we are using the same pattern described above. Here we are using AT89S52 microcontroller as a CPU. One stepper motor is used for the train so that it can travel between the stations. Second, motor is used for the door open and close. For displaying the number of station and emergency message we are using 2 line LCD displays. Here the train is designed for ten stations numbered 1 to 10. LCD is used to display the message as station number reached. Also buzzer is used as a sound indicator of emergency alarm and door open. Sensor is used to detect the obstacle in front of the train. When the obstacle is detected the buzzer will sound , all the motors stop, and message will be displayed on the LCD. When the obstacle is removed the train will again start moving on its path. The train equipped with microcontroller controls LCD L293D motor driving IC PIR sensor Buzzer Led LIST OF COMPONENTS 1 IC 8051 MC (AT89S52) 1 2 IC L293D 1 3 Transformer (120 V to 12V) 1 4 Voltage Regulator 7806 1 5 Voltage Regulator 7812 1 6 2 X16 LCD display 1 7 Stepper Motor 2 8 Crystal Oscillator (11.0592 MHz) 2 9 Switch 1 10 LED 1 11 Resistors (1k,10k,8.2k,18 SIP10kÃŽà ©)- pack of each 12 Capacitors(22pf,10uf,1mf,10nf) pack of each 13 Diode IN4007 4 14 Buzzer 1 15 Transistor (5474A) 1 16 PIR 1 WORKING OF PROJECT: Driver less metro train project is typically based on microcontroller. Where microcontroller used as a CPU is controlling the entire circuit. The micro IC is programmed to follow the sequence of instruction or interrupts generated during the whole operation. The whole project circuit is divided into different parts so that it is easy to understand and debug. The main parts are Main microcontroller circuit L293D motor driving circuit Power supply circuit LCD circuit PIR sensor circuit These four parts are connected together to make the whole project functional. BLOCK DIAGRAM led POWER SUPPLY MICRO 8051 L293D IC MOTOR SENSOR PIR LCD 2X16 BUZZER CIRCUIT DESIGN (MULTISIM DESIGN, ULTIBOARD DESIGN) POWER SUPPLY For explaining the working of the project firstly we explain the architecture of the power supply. For this project we need the power supply that can convert 120V to 12V and 6 V. the main components used in the power supply are: DC POWER SUPPLLY Transformer (120V to 12V Step down, 0.5Amp) IN4007 diodes connected I bridge shape Voltage regulator 7806 and 7812 Capacitor (1uf,10 nf) Resistor (10 kohm) The 120 volts is step down by 12 volts by transformer. Then this 12V is rectified by the bridge rectifier made up of diodes. This bridge rectifier is used to provide DC voltage. Then the 12V is regulated by 7806 to 6V and 7812 to 12V. 1 micro farad capacitor is used to filter the pulsating DC voltage in order to get the pure DC. Here 6V is given to the microcontroller circuit. Other, 12V is given to the motor driving circuit. Here Voltage regulator is used so that no fluctuation occurs in order to get constant voltage. The LED attaches to check the correctness of power supply. PIR SENSOR PIR stands for Passive infrared sensor which detects the motion of the obstacle in front of the train. Its pin 1 is connected to the VCC, pin 3 connected to the ground and pin 2 is connected to the base 0 of the transistor. The output of the sensor is active high which is given to the base of the transistor. This transistor act like a not gate and convert active high input to active low output of the transistor output. The collector of the transistor is connected to the microcontroller port 3.0. Resistance is connected to the base of the transistor to prevent overflow of the current. The output of the PIR sensor is digital. When PIR sensor senses the obstacle in front of the it sends active low input through transistor to the microcontroller as a interrupt. When microcontroller gets this interrupt the programming in the microcontroller stops all the motor bringing the train to stop. Also the led will glow and buzzer will sound showing the presence of obstacle. LCD MODULE In our project we are using 2 line and 16 digit LCD display. This lcd has 16 pins. It is connected as a parallel port to the microcontroller. Here we are using 14 pins two pins are not being used. Out of these 14 pins, 8 pins are used for data lines to communicate with the microcontroller. These 8 pins are connected to the port 2.0 to port 2.7 of the microcontroller. When the message is to be displayed by the microcontroller it is transferred through these data pins. Here data bit D7 is used for showing the busy message. When D7=1 the LCD is busy and when it is D7=0 than it is not. RW, EN, and RD are connected to the port 3 pins P3.5 to P3.7. EN pin is used to detect the high to low pulse. RS=1 is used for register select that is data register to display data coming from microcontroller and RS=0 command register to get command from microcontroller like clrscr. For data register RS =1 and for command register RS=0. For RW we have R=1 and W=0. VCC pin is connected to 5V power supply, G ND pin is connected to ground. CV pin is connected to potentiometer which is used to adjust the contrast of the LCD. MOTOR DRIVING CIRCUIT The motor driving circuit depends upon the output of the microcontroller. 2 motors are connected to L293D IC. This IC is used separately to drive motor because the microcontroller voltage is low to drive the motors. L293D act as a amplifier for driving the motor. Here the output of the IC is same as the input the difference is just that the input voltage is amplified. Two motors are connected to the output of the IC. This L293D IC can rotate motor in either direction. L293D is connected to the port0 of the microcontroller through pull up resistor. In the staring both the motor are in off state. Each motor has two pins that are connected to the IC. Here instead of using both motor we are using CD tray motor that will act like a gate which will open when it get open command from microcontroller and close with the close command. we are using stepper motor that is a electro-mechanical rotary actuator that converts electrical pulses into unique shaft rotations. This rotation is directly r elated to the number of pulses. This motor can be operated in forward/reverse with controllable speed from a microcontroller through a transistor driver circuit. This stepper motor is a (4 phase) 12 VDC, 150 mA motor that takes 3.6 degrees per step. Phase resistance (Ohms): 75 à · Current (mA): 150 à · Phase Inductance (mH): 39 à · Detent torque (g-cm): 80 à · Holding Torque (g-cm): 600 à · Mounting hole space diagonal (in.): 1.73 à · Mounting hole (in.) 0.11 à · Shaft diameter (in.): 0.197 à · Shaft length (in.): 0.43 à · Motor Diameter (in.): 1.66 à ·Motor height (in.): 1.35 à · Weight: 0.55 lbs. BUZZER C:UsersAdminDesktopimages (1).jpg In this project buzzer is used as a alarm indicator. Buzzer has 2 pins its positive is connected to the supply voltage and negative pin is connected to microcontroller at port 1 pin p1.0. Buzzer will sound when it receive 0 from the microcontroller and stop when it receive 1 from P1.0. This buzzer will sound when the train reaches the station and also in case of emergency when obstacle is detected. AT89S52 C:UsersAdminDesktopAT89S52-MICROCONTROLLER-configuration.jpg The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmels high-density nonvolatile memory technology and is compatible with the industry-standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications. The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. In this microcontroller 11.0592 crystal oscillator is used to produce clock pulses for the microcontroller functioning. These clock pulses are used for R/W cycle. 2 ceramic capacitor of 22pf are used to provide pure pulse to the microcontroller. A combination of resistance 10 kilo ohm and capacitor of 10uf are used to provide reset circuitry. When we provide power to microcontroller it should be reset for some time. The reset time is given by t= 1.1*R*C. This reset circuitry is connected to port 1 reset pin; this circuit can be manually reset using switch which is also connected to the reset pin. Interrupt pin INTO is connected to the output of the transistor which gives active low input as a interrupt. Port 0 is connected to 18 (10 kohm) SIP resistors to provide the external pull up. Port is used for the output to the motor driver circuit. Port 2 is connected to the LCD module. TROUBLESHOOT 1-Care should be taken while choosing the components with proper rating. 2- Power supply should maintain preventing short circuit. 3- Project should be handled with care since IC is delicate. 4- Project circuit should be simple so that it is to debug. 5-Etching and drilling holes should be done carefully. 6-Soldering should be done with proper precaution Advantages 1-Lower expenditure for staff .However, service and security personnel is common in automated systems. 2-Trains can be shorter and instead run more frequently without increasing expenditure for staff. 3-Service frequency can easily be adjusted to meet sudden unexpected demands.. 4-Intruder detection systems can be more effective than humans in stopping trains if someone is on the tracks. 5-Financial savings in both energy and wear-and-tear costs because trains are driven to an optimum specification. FUTURE SCOPE This project will be useful for the metro trains. This is very low cost project that can be help full in operating the train without driver. One can operate the train from remote distance. It will also be beneficial for the developing countries decreasing the cost of labors. Also the station information and emergency will also be displayed to the passengers. It will going to increase the technology trends. This is just a scratch to start this project there is a lot of improvement can be done in this project APPENDIX CODING FOR PROJECT #include void delay(unsigned int); void lcdcmd(unsigned char); void lcddata(unsigned char); void lcdready(); void welcome(); void obstacle(); void station(); void gate(); sfr ldata = 0xA0; sbit rs = P3^7; sbit rw = P3^6; sbit en = P3^5; sbit busy = P2^7; sbit m11 = P0^0; sbit m12 = P0^1; sbit m21 = P0^2; sbit m22 = P0^3; sbit alarm = P1^0; sbit led = P1^1; void ad(void) interrupt 0 { P0 = 0x00; alarm = 0; obstacle(); } void main(void) { IT0 = 0; // Configure interrupt 0 for falling edge on /INT0 (P3.2) EX0 = 1; // Enable EX0 Interrupt EA = 1; // Enable Global Interrupt Flag P0 = 0x00; alarm = 1; led = 1; m11 = m12 = m21 = m22 = 0; lcdcmd(0x38); lcdcmd(0x0E); lcdcmd(0x01); lcdcmd(0x06); lcdcmd(0x81); while(1) { welcome(); station(); lcddata(1); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(2); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(3); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(4); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(5); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(6); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(7); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(8); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(9); led = 0; gate(); led = 1; m11 = 1; delay(1000); m11 = 0; station(); lcddata(1); lcddata(0); led = 0 ; gate(); led = 1; } } void gate() { m21 = 1; m22 = 0; delay(200); m21 = m22 = 0; delay(300); m21 = 0; m22 = 1; delay(200); m21 = m22 = 0; } void welcome() { unsigned char proj1[] = Metro Rail; unsigned char z; lcdcmd(0x01); lcdcmd(0x83); for(z = 0; z { lcddata(proj1[z]); } delay(200); } void obstacle() { unsigned char obs1[] = Obstacle; unsigned char obs2[] = Detected; unsigned char z; lcdcmd(0x01); lcdcmd(0x84); for(z = 0; z { lcddata(obs1[z]); } delay(100); lcdcmd(0xC4); for(z = 0; z { lcddata(obs2[z]); } } void station() { unsigned char st[] = Station ; unsigned char z; lcdcmd(0x01); lcdcmd(0x83); for(z = 0; z { lcddata(st[z]); } } void delay(unsigned int itime) { unsigned int i,j; for(i=0;i for(j=0;j } void lcdcmd(unsigned char value) { lcdready(); ldata = value; rs = 0; rw = 0; en = 1; delay(1); en = 0; return; } void lcddata(unsigned char value) { lcdready(); ldata = value; rs = 1; rw = 0; en = 1; delay(1); en = 0; return; } void lcdready() { busy = 1; rs = 0; rw = 1; while(busy == 1) { en = 0; delay(1); en = 1; } return; }
Saturday, July 20, 2019
Should the Internet be censored? Essay -- essays research papers
Should the Internet be censored? From colonial times to the present, the media in America has been subject to censorship challenges and regulations. The Internet has become a vast sea of opportunity. Everyone is seizing the moment. The good and the bad of society have reduced the meaning of the Internet. Menace threatens each onlooker, as people browse the many pages of Cyberspace. As the new technological advances help to shape our society, one cannot help but think of the dangers waiting to prey on anyone. The Internet should be censored, because there needs to be some protection against the criminal minds that dwell in society. If the problems concerning the Internet are not irradiated in its early stage now, it could fester into something cancerous. This cancer could easily turn something that should be in the best interest of society, into societyââ¬â¢s worst nightmare. The part of society that is most opposed to censoring the Internet argue that placing restrictions on Internet usage is in direct violation of the First Amendment Rights of the Constitution. This right was established long before the Internet was even inkling in someoneââ¬â¢s imagination. By restricting web site content, society freedom of opinion and expression are oppressed (EFF, www.eff.org/freespeech.html July 1990). The Internet allows everyone in a group to have the same opportunities for engaging in and partaking of debates. Even people with disabilities, who are very often excluded from other media outle...
Friday, July 19, 2019
Individual Freedom in Melvilles Bartleby, the Scrivener Essay
Individual Freedom in Melville's Bartleby, the Scrivener What motivates you to go to work everyday? What motivates you to dress the way you do? What motivates you to be reasonable when it comes to normal requests? Ah, the ultimate question in need of an answer: Who determines what is reasonable and normal, and should we not determine these matters for ourselves? Chaos would result, you say, if every individual were granted that freedom. Yet, we all do have that freedom, and Herman Melville (1819-1891) through the interpretation of a man who prefers to follow his own path in "Bartleby, the Scrivener", subjectively conveys the mental anguish he experienced as a writer and man when the literary world attempted to steal that freedom. Dear Bartleby was a harmless man with a demeanor that was capable of disarming many. From the onset of Melville's story, it becomes quite apparent that Bartleby is a man who prefers not to do what society wishes of him. He prefers not to honor any request from his employer that would make him deviate from what he prefers to be doing. Bartleby's employer quickly realized that, "there was something about Bartleby that not only strangely disarmed me, but in a wonderful manner touched and disconcerted me" (2236). Bartleby gave no argument nor tried to justify denying his employers request. He would simply state, I would prefer not to. His only motive was to do as he preferred. Bartleby's employer found this expression of freedom very strange. Where did this man come from who has the audacity to break the pattern of normalcy that we all follow? He who will not "comply with my request-a request made according to common usage and common sense...(2337). However, what was "common" for others was not comm... ...rican equals" (2292). Melville was not alive to witness this revival. Due to his resolve to retain his literary freedom, he was able to attain everlasting literary success that resounds from his own realm of reasonable and normal. As for myself, I would prefer not to disclose any motivational reasoning for my own preferences; less I confuse even further those who still cannot understand my denying "normal and reasonable" request. "If I were to regulate the writings of my mind- I would never write". Works Cited * Melville, Herman. "Bartleby, the Scrivener." The Norton Anthology of American Literature. Ed. Nina Baym. 6th ed. Vol.B. New York: W.W. Norton & Company, 2003. 2290-2337 * Edwards, Jonathan. "Sinners in the Hands of an Angry God." The Norton Anthology of American Literature. Ed. Nina Baym. 6th ed. Vol.A. New York: W.W. Norton & Company, 2003. 503
stock :: essays research papers
Khaled Bitar What were the causes of the 1929 stock market crash and the 1987 stock market crash? What are the differences between the causes? à à à à à In the 1920s stock was first issued by companies. Companies issued stock after they went public in order to make money. When traders buy stock, they were buying from the company and a stake in the company. On October 24, 1929, (a.k.a. Black Thursday) the stock market fell 9% and five days later the market fell an unprecedented 17.3%. About 29 million shares of stock changed owners causing, at the time, the biggest stock market crash in the history of the United States. à à à à à In the decade before the crash, America was thriving and production was soaring. The GNP increased by 40% and average income grew 30% throughout the decade. There was an abnormally high level of investment and traders were overwhelmed with confidence. à à à à à When the stock market crashed on Black Thursday, traders were still confident because of President Hooverââ¬â¢s declaration that a recovery was imminent. à à à à à Despite the general optimism, the market crashed again causing the great depression. The effects were devastating. Over the next three years, the unemployment rate rose to 13.6 million people and GNP decreased 45 million dollars. à à à à à There are many causes to the 1929 stock market crash including speculation, WWI, Foreign investment, and a scandal that could have played a minor role. à à à à à The 1929 stock market was a bull market fueled by speculation. Speculation inflated stock prices beyond what they were worth because of the large amount of traders. Speculation is when traders think that a stock has much more value and potential then it really does. Traders would buy a stock that they think is thriving and when they realize that the company is losing money, they sell causing the market to decrease. (i.e. people investing in ebay and then selling after seeing ebayââ¬â¢s earnings.) à à à à à Many investors were not very experienced and they believed that whenever their stock went down, they felt selling was the best option which fueled the crash even further. à à à à à Because of the thriving market, many loaned money from banks and invested in the stock market. When it crashed, they could not pay back the loans and the banks lost money. The market misled the banks as they thought loaning traders money would be very lucrative. The Federal Reserve was a cause of the 1929 stock market crash because it essentially owned the government and fueled the speculation.
Thursday, July 18, 2019
European Handball
European Handball ââ¬â goal shooting European handball is a unique, high intensity sport which is best described as a combination of netball, soccer and basketball. Two teams with seven players per side verse each other. In order to earn points, the handball must be thrown into the goals; this demonstrates the skill of goal shooting which will be the main focus of this report. Characteristics of basketball are seen in the rule that the player must bounce the ball while running.Defending is a common action in any sport and is seen in European Handball; the team without possession of the ball may attempt to stop the other team from scoring by blocking the path of the player with possession. During the game, the ball is passed around in the style of netball. The sport involves a combination of multiple sports such as soccer (goals), netball (passing) and basketball (court size, bouncing, dribbling) which makes it different to any other sport thus people are intrigued to play and tho roughly enjoy it. Explanation of the skillGoal shooting is just like a pass but with more power. The ball must be thrown into the goals. A common technique performed when shooting a goal is the jump shot. The jump shot is where the player is in the air when the shot is made; by doing this the shot is more powerful and more effective. Explanation of the drills 1) The first drill that we will be teaching students in our training session aims to practice the jump shot as it is the most effective way of shooting a goal. For the most effective goal shot, right handed players should push off from and land on their left foot and vice versa.When they are suspended in the air, their body should be stretched with their throwing shoulder back and then the ball should be thrown from the highest point of the jump for maximum effectiveness of the shot at goals. 2) The second drill we will be teaching in our training session aims to practice passing and shooting under pressure through the use of a goalie. Students will get in groups of three and two of them will pass the ball between each other and take shots at goal with a goalie trying to stop them from scoring. To pass the ball students are to use their preferred arm, xtend it behind their head and with force throw overarm to the other player. The goal keeperââ¬â¢s aim is to defend the goals and position them self correctly so any incoming shots can be stopped. They will all stand equal distance apart in a triangular formation. Each student will rotate position until everyone has had a turn at passing and being goalie. This will improve everyoneââ¬â¢s passing and defending skills. Actions and strategies that contribute to enjoyable participation There are many strategies that can be used and actions that can be taken to make participation more enjoyable.Offering rewards have proven to be an effective strategy used in many sports all around the world. Rewards come in many shapes and forms to appeal to a wide range of participants such as money, various prizes and awards including certificates, medals and trophies. As well as physical rewards to acknowledge achievement, there are many actions that can be performed to encourage enjoyable participation. Praising good behaviour and recognising an athleteââ¬â¢s achievements is incredibly effective in increasing the enjoyment during participation in a sport.Offering your congratulations by shaking their hand, giving them a pat on the back or simply telling them theyââ¬â¢ve done a good job can motivate the player and help them to enjoy the sport more. These actions and strategies not only make players enjoy participating but also show aspects of a good coach. Organisations of activities The training session will be made up of various activities and demonstrations and will go for approximately 10 minutes. Warm Up ââ¬â We will begin with a warm up which will consist of a short run and stretches.We will demonstrate appropriate stretches which t he students will then complete. First stretching the calf and leg muscles with lunges and swinging legs; then stretching the arm muscles with a shoulder shrug, arm across body, swinging arms, and breathing exercises. This will help get their body and mind ready for the activities. The warm up should run for approximately two minutes. Demonstration and Explanation ââ¬â We will then give a thorough explanation of the skill, explaining how the skill is preformed and techniques students should use to increase their chances of success.A demonstration of the skill and both drills will then be performed so that students can visibly see what it should look like and get an understanding of how to do it. This explanation and demonstration should go for approximately two to three minutes. Drill One ââ¬â The students will then perform the drills. Students will form a line and one by one attempt the jump goal shot. We will check that theyââ¬â¢re doing it correctly and offer advice to players on how they can improve. This drill requires the goals, cones, ball and the rope and should run for approximately two to three minutes Drill Two ââ¬âWe will then start the second drill. Students are to form groups of threes and go to their own set of goals. The group will have to decide on a defender and two shooters. Students will perform the drill once and we will check that all students are doing it correctly. The players will then rotate positions until everyone has had a go. We will continue giving advice and helping students who are struggling or confused, and will motivate and praise all students. This drill requires goals, cones and balls and should go for two to three minutes Warm Down/ Cool down ââ¬âThe warm down will consist of a slow stretches and various breathing exercises to relax the body and muscles. This will reduce the risk of injuries and sore muscles. Safety measures The safety of all students is the most important. All students are required to f ollow certain rules and instructions so that their safety is not a risk. Warms Ups and Warms Downs ââ¬â At the beginning and end of our training session we will get all students to complete a range of stretches. Warm ups are essential as they help assist your circulatory system in pumping blood to your working muscles.The purpose is to steadily increase circulation throughout the body. A correct warm up safely prepares the body for movement and exercise. Cold muscles which have not been properly warmed up are more susceptible to injury. Warm downs relax your muscles and allow your heart rate to slowly return back to normal. Pay attention to demonstrations/ listen to instructions ââ¬â All students need to pay close attention to the demonstrations and listen when weââ¬â¢re explaining the skills so that they know exactly what to do.If students are not paying attention and then try to perform the skill they could ruin equipment, hurt them self and hurt other students around t hem. Correct/Appropriate Equipment ââ¬â European handball requires a specific ball. The ball is not allowed to have a shiny or slippery surface as the player needs to be able to grip the ball to throw a powerful pass. If an incorrect ball is used the players will find it hard to grip onto the ball and throw a powerful pass, and the ball would also be dropped a lot which could result in another player tripping over it and injuring themself.No contacting or unnecessary rough play ââ¬â European handball is a fast paced sport but it is contact free. Players are not allowed to contact one another deliberately. Any student who is acting in an unnecessary behaviour will put themselves and peers at risk of being hurt. Appropriate use of equipment ââ¬â All students are to act sensible with the equipment that they use whilst participating in the drills. The equipment can cause injury if used incorrectly, and students who do not use it appropriately could also risk damaging it. Sup ervision of instructors/ teacher ââ¬âTeachers and instructors (people running the activity) are responsible for the safety of all students participating in the activities. They are expected to supervise all performances so that any errors can be corrects and mistakes can be pointed out. It is a coachââ¬â¢s responsibility to teach their students the correct way to perform a skill in order to remain safe. The safety of the athlete is always the main priority. All of the above points should be followed throughout the whole presentation so that all students are safe and the chance of injury is decreased.
Subscribe to:
Comments (Atom)