Thursday, October 31, 2019

Early Islam Research Paper Example | Topics and Well Written Essays - 750 words

Early Islam - Research Paper Example Thus, contrary to what some outsiders may think, Islam did not appear as a separate or new religion. Rather, it confirmed the earlier messages of God to mankind (HQ, 6:92) and took the form of a completion of his messages. Islam therefore has a very close relationship with other religions. Indeed all prophets are seen as brothers, as demonstrated when the Holy Prophet led them all in prayer on the night of the ascension in Jerusalem. Prophet Muhammad is thus widely seen as the ‘Seal of the Prophets’. In particular, Islam gives high regard to the ‘People of the Book’, which refers to Jews and Christians. Allah advises Muslims not to dispute with them (except with better means or in the case of a wrong being inflicted) (HQ, 29:45-49). The beginning of Islam thus stretches back to the beginning of creation itself. The same one God, who sent earlier prophets to guide mankind, also sent the final prophet Muhammad (SAWS). The Quran also describes at length, the li ves of the prophets that were sent earlier, including Prophet Isa (Jesus) and Musa (Musa), peace be upon them all, among others. Racially, the Arabs share a common ancestry with the Jews. Both are viewed in Islam as the ‘Children of Ibrahim (Abraham)’. The linkage of these two races has also been proven genetically. The genetic signature of Prophet Harun (Aaron) has been shown to be CMH as the primary Y-marker, which is found among Jews and in high numbers among Arabs (Kleiman, 161-162). The two races were divided by Ibrahim’s (AS) sons. Whereas the Jews descend from the Prophet Ishaq (Isaac), the Arabs are descended from his brother Ismail (Ishmael), peace be upon them both. This also explains some of the tenets of Islam. For example, the hajj (pilgrimage to Makkah) has its origins in the story of Prophet Ibrahim (AS), his wife Hajar and son Ismail (AS). The three were responsible for building the Ka’ba and finding the well of Zam-Zam (Ibrahim, 219). This holy family is thus respected not only by Jews but also by Muslims. In fact, Muslims regard Prophet Ibrahim (AS) not as a Jew as such, but a ‘Hanif’ referring to his abhorrence for idolatry (Peters, 121). Similarly, prophet Musa (AS) played a significant role in the assigning of the five daily prayers obligatory on Muslims. The relationship between Prophet Isa (Jesus) and Prophet Muhammad is also very close but the Trinitarian Christians have elevated Jesus’ status to such an extent, by ascribing to him Godly qualities, that it becomes difficult to make them appreciate their connection. Suffice it to say, Prophet Isa’s (AS) life is covered in detail in the Holy Quran, including his life as a child that is not mentioned in the Holy Bible. Also, in Islam, Prophet Muhammad (SAWS) is seen as the paraclete spoken of by Jesus Christ. Like Christians, Muslims also await the return of Jesus Christ in the end times. Some Christians even view Islam as an offshoot o f Christianity, as do for example, Ohlig & Puin in tracing its origins of its tenets to pre-Nicean, Syrian Christianity. However, this approach makes the mistake of attributing similarities to one (in this case Christianity) being the origin of the other (i.e. Islam), whereas similarities in beliefs and tenets actually show that both have a common origin. Hence, there are bound to be similarities because God had been sending his messages and prophets

Tuesday, October 29, 2019

Pestel Analysis, Political and Legal Factors Research Paper

Pestel Analysis, Political and Legal Factors - Research Paper Example This essay will therefore present a pestle analysis for college Hunks Hauling Junk Company. Political and Legal Factors The government has interests on how businesses are run. This interest is experienced through direct and indirect control of business by the government. Political and legal processes in a country are the main channels through which the government influences an industry. The government has interest in the running of business due to its social responsibilities. In particular, the federal government, local author and state governments have an interest in the junk industry due to their assumed responsibilities. The risks associated with the junk business are the main cause of government’s interest in the industry. Such risks are concerned with the safety of the employees as well as the environment. In response to the need of protecting the environment and people, the government has established the relevant legislations and policies. These laws and policies form th e legal factors that affect the industry. The Environment Protection Act was specifically established to protect the environment from harmful effects resulting from uncontrolled business practices. This Act has provisions that regulate waste management, recycling, and disposal. Such policies will have an effect to the company that will be felt through regulations on its business. Protection of employees from exploitation by employers is the responsibility of the government. The junk industry is labor intensive and therefore employees form a major part of junk companies. Employment laws of the United States are applied by the government to regulate employment with emphasis in protection of employees from exploitation. The company is therefore expected to be conversant with these laws and their implication in the business. The junk industry has disposal of wastes as a major part of their day-to-day operations. Companies in the junk industry are also involved with recycling as part of their strategic management. Recycling and disposal of waste are processes of interest to the authorities especially the local government. In response to the two activities, the government has established environment protection measures through relevant laws and policies. The legislations and policies are mainly concerned with the disposal and recycling of hazardous wastes. Due to its operation scale, College Hunks Hauling Company needs to consider these legislations and policies. Economic Factors Economic factors in an industry are factors that determine a business’s rate of success in the industry. These factors affect availability of capital, operation cost and the demand of a company’s products (Grant 95). Consumption is an important process in sustenance of business and therefore factors that affects people’s consumption affects business operations. The disposable income of a country gives a measure on how much the consumers are able and ready to spend at a particular time. The company will therefore be affected by the variations in the consumer’s consumption power resulting from the level of disposable income of a country. Currently, the United States’ level of disposable income per household is slightly above 10%. This is a significant figure compared to the current taxation rates and the spending rates experienced in previous years. The junk industry depends on the rate at which people replace their old and worn out

Sunday, October 27, 2019

Investigating The Importance Of WAN Technologies Information Technology Essay

Investigating The Importance Of WAN Technologies Information Technology Essay Wide area network is very important to the global to do their work easily now days every companies trying to develop their business all over the world wide area network helps them to connect their network together .the companies need to design the network according to their needs and purpose because different type of networks are available for different purpose. According to this project the company network placed in different countries each network hold different application Different type of architecture models is available to design network one is peer to peer model and another one is client/server model most of the network designed by using client/server model. peer to peer model is connect two or more computers connected through network this model is unsafe because it is difficult to implement security policies .different network topologies are available to design network so we have to consider these topologies when design a network. Normally every companies using star topology to design their network because this topology have more advantage when compare with other topologies various hardware components need to design a network such as switches, routers, firewalls, server, linkect By using Ethernet technologies and other network technologies several LAN (local area network) is created in different countries then each subnet LAN was connected together via ATM cloud to make WAN (wide area network) In this project company network model was designed in opnet modeller to investigate the performance of a network looking at WAN technologies with varying traffic loads there are different type of link used to implement the traffic load the network was designed up to getting the final result LITERATURE REVIEW Computer network Computer network is more than one computers or group of computers and network devices are connected together for the purpose sharing information, file and data between each computer. Different type of devices need to design a computer network such as switches, hubs, routers, different link, firewall, server and work station Protocols are use to do sharing information, files, datas over the network there are two transmission technology available in computer network one is broadcast and another is point to point connection. Computer network classified according to network architecture (peer to peer model, client/server mode), network topology (star topology, ring topology, bus topology and mesh network topology).computer network it is classified as personal area network (PAN), local area network (LAN),metropolitan area network(MAN),wide area network(WAN),global area network(GAN) Computer network is very useful to the public because it has many applications such as access to remote information by using this application any one can do their work from anywhere in the world( ticket reservation ,shopping), communication between one to another through email, videoconferencing. Business application Different type of computer network Local area network (LAN) Local area network (LAN) is less number or group of computers and related devices such as printer, scanner etc that share a common communication line.lan is considered within a small geographical area such as a home, office building here LAN is designed by using Ethernet technology such as Ethernet cables, Ethernet switches and adapters. Local area network (LAN) performance features are depending on size of the network, network topologies and transmission technology. Advantage of LAN is cover small geographical area so transmission time is limited. Different type of topologies is support to create broadcast LAN network such as bus and ring based topologies. FIDD is used in the LAN for connect token ring. IEEE 802.11standad indicates the local area network technologies. [Andrew s] Metropolitan area network (MAN) Metropolitan area network (MAN) is developed version of LAN and this network also using same technologies as LAN, compare with LAN it cover large area (company offices and city).this network carrying voice signal and dates. MAN network contain few cables it dont have any switching elements, by using network technologies such as backbone technology, routers and switches it connect several LAN networks. DQDB (distributed queue dual bus) is MAN network standard by using this standard we can expand the network up to 30km and speeds of 34 to 155 Mbit/s Wide area network (WAN) Wide area network (WAN) comparatively covers wide geographical (country or continent) area and connecting number of local area network, local area network connected to a WAN through the public net work such as internet.WAN network can use is satellite system, WAN routers contain antenna by using antenna it can make data transmission. Switching device and transmission link are two separate mechanism of subnet in the WAN network. Different type of transmission link are available to carry the signals and data transmission from one system to another system over the WAN network such as twisted pair cable, coaxial cable and fiber optic cable. WAN is a collection of LAN, these LANs are connected via switching device router so each LAN must contain at least one router to interconnect. WAN network use backbone technology. Global area network (GAN) Global area network (GAN) is collection of different network such as WAN or MAN it covers the very large geographical area (unlimited area). Worldwide individual business companies use GAN network for their process. Network architecture model Client-server network model Client- server model is very useful and popular network model in the network architecture client and server devices are designed for the particular function in the computer network client server model mainly used in internet as well as local area network. Personal computers are client device in the network it is installed with required network software; database and files are stored in the server devices, server devices contain more memory, bigger disk drive than client devices The client server model client makes a request to server and server receives client request and response to their client request. Advantage of client-server model is centralised network model it means all users in the network are connected to a central server. Central server contains all user information and communication information. Configuration of data backup, security policies are easy in this model Peer to peer network model Peer to peer network is suitable for a small network in this model more than one computer or group of computers are connected through the network .peer nodes sharing their documents, audio, video file and datas in digital format a and also they sharing their resource without a dedicated server all connected peers act as either client or server. One system acts as server for one transaction while simultaneously act as client for another transaction in this model every client act as server and server act as client. It is complicated to apply security policies and access policies to the network because peer to peer network is a small contain few computers. Access permission and rights of users set individuality in peer to peer network. This model do not utilize centralized network model so it dont have any user information or communication information NETWORK TOPOLOGIES Different network topologies are available in computer networking they are star topology, bus topology, ring topology, tree topology and mesh topology these topologies help to design an excellent network. when design a network designer should have to choose which topology is suitable for the particular network Ring topology Ring topology is used to connect network devices in ring shape when these devices in ring shape each device has two neighbour devices for their message transaction this message transaction between neighbour only one direction. Ring topology use token passing system to their message transmission and access control. Main drawback of this method is any device fails in network ring that cause entire network transmission become failure this kind of network can manage and implement easily and it normally uses in office, school network different technologies are available to implement ring topology such as token ring and FDDI Star topology Most of the network use star topology because implementation and maintains of this network is easily this kind of networks use point to point connection between devices and central hub main advantage of star topology is any connection fail between device and hub that affect only particular device. This network devices use twisted pair Ethernet cable to connect with central device hub Bus topology Bus topology mainly used in LAN networks because these kinds of topology suitable for limited number of device bus topology use backbone to connect all devices together backbone function as connect different part of network and offering path to message transmission between network. Implementation of this topology is easy and inexpensive. It is possible to message transmission in both directions, to avoid message bouncing use termination at both end of the bus cable there is no need more cabling to connect devices. Main disadvantage of this topology is if backbone cable fails that affect whole network Tree topology Tree topology combines multiple several star topologies together into a bus by using point to point connection hub devices linked to the tree bus to develop network scalability bus/star topology in a hybrid approach. Implementation of this topology is very difficult, if backbone cable file whole network become failure advantage of this topology is each parts connected by point to point link and it supported by a number of hardware and software vendor. Network components Hardware and software components need to create a network there are different type of hardware components available in the network each of them configured for different function. Usually a network contains many components such as switch, router, server, firewall, hub, work stationest. Router Router is one of the important devices in the network it is used to connect more than one network together such as two WANs or two LANs and it allow data transmission between the networks. Routers having routing tables it contain information about network devices that uses to find the destination place of the network. Routers work at transport and network layer of the OSI reference model. Routers maintain traffic control in the network. Switch Switch is one of the hardware devices in the network it is used to connect network device such as server, workstation and printers together with in a local area network .switches work at the data link layer of the OSI reference model. Switches have a facility to check whether that the data received or not, delivering the messages to correct destination and also identifying that the particular data was transferred from which device (source) to other device (destination).`different type of Ethernet switches are available but in this network i have used Ethernet 16 port switches to connect network devices. Server In the client/server networking model a server receive requests from client in the same network or other network and response client request. There are different types of server with their related configuration. In this network i have used many servers such as database server, Email server, VoIP server, HTTP server, FTP server, file server, printer server and backup server. Firewall Main task of the firewall is preventing unprivileged user from accessing the network. There is different type of firewalls such as packet filter firewall, application gateway and proxy server each of them doing different job in the network .firewall implemented in some hardware devices. In this project i have used firewall router in a simulation. Open system interconnection (OSI) model OSI reference model is clearly defined how messages transmitted from source to destination in the networking. OSI reference model contain seven layers such as application layer, presentation layer, session layer, Trans port layer, network layer, data link layer and presentation layer. This model describes structure of a network for applying protocol on seven layers. Every layers doing different function. This model spited into tow part such as upper layers and lower layers. Upper layers associated with software and lower layers associated with hardware. Application layer Application layer is highest layer of OSI reference model. Main function of this layer is interface for users to relate with application and identifying end user, verify resource availability. By using application users can access information at application layer. Application layer providing some services such as file transfer, electronic mail and software services. Many Protocols are implemented in this layer such as file transfer protocol (FTP), hyper text transfer protocol (HTTP), simple mail transfer protocol (SMTP) and telnet. Presentation layer Presentation layer is sixth layer of the OSI reference model this layer receives all messages from application and sends those messages to session layer. Main function of this layer is converting the format of receiving and sending data format and also many functions are undertaking by this layer such as data compression, encryption, decryption, protocol conversation and encodes message for email transaction. Presentation layer providing some services such as simple mail transfer protocol (SMTP), telnet and file transfer protocol (FTP). At this layer data transmission starts with syntax and semantics format. Session layer Fifth layer of the OSI reference model is session layer it provides function to communicate between two nodes in the network this layer create, maintain and stop connection between the node and few protocols are implemented they are data link protocol (DLP), apple talk session protocol (ASP) and printer access control protocol (PAP) these protocols are mainly uses to multimedia messages. Transport layer Data link layer Data link layer is second layer of the OSI reference model the use of this layer is control and arranges all sending messages from software to network link. This layer makes some network setting such as data format setting, time setting and wire setting. it gives many services such as keep all messages are correct format when they transmit, maintain flow control when messages transmit over the link ,detecting error in physical layer and encoding messages for secure transaction. Physical layer Physical layer is lowest layer of the OSI reference model. This layer receives all messages from data link layer in the format of bits and converts into signal (electrical or electromagnetic signal).messages are sending to physical media via switches and wires TCP/IP model TCP/IP model contain four network layers such as application layer, transport layer, internet layer and network inter face layer. TCP/IP model and OSI reference models are providing similar services.TCP/IP model contain network communication protocol used to for different type data transmission between different networks. Simple mail transfer protocol (SMTP), used to Email transaction, file transfer protocol (FTP) used to file transaction etc. This model defines how particular protocols are implemented in a computer for data transmission over the network. End to end connectivity of the TCP/IP model define how datas received, routed and formatted at end nodes. TCP/IP application layer Application layer is higher level protocol of TCP/IP model this layer match to OSI reference model of session layer, application layer and presentation layer. This layer gives different services to user such as file transfer, email ect. Application layer contain many protocol such as simple mail transfer protocol (SMTP), file transfer protocol (FTP) and telnet. All datas are coded in this layer then these datas encapsulated into transport layer. Lower level layers of TCP/IP model treat by application layer. Transport layer Transport layer is third layer of TCP/IP model. This layer providing services these services are managed by the user datagram protocol (UDP) and transmission control protocol (TCP). TCP is connection oriented and reliable transmission protocol. Connection oriented it means source (sender) set up connection with destination (receiver) node before the sending data. Error detection, error correction retransmission of datas is possible in TCP. UDP is connection less and unreliable transmission. Error detection, error correction retransmission of datas is impossible in UDP it is suitable for audio and video transmission. Internet layer Internet layer is second layer of TCP/IP model this model used to transfer the message from source computer to destination computer. Internet protocol (IP) is main protocol of this layer. This protocol providing many services such as routing packets between source and destination. Internet protocols receive messages from network interface layer in the format of bit then make it into packets. Network interface layer is lowest layer of the TCP/IP model main function of this layer is by using protocol it create a connection to physical medium, error detection and packet framing are possible in this layer. This layer contain local area network (LAN) and wide area network (WAN) technologies such as token ring,X.25,ehhernet and frame relay. This layer responsible for physical devices such as wire, cables, network interface card and satellite links. Asynchronous transfer mode (ATM) Asynchronous transfer mode (ATM) contains three layers such as ATM adaption layer, ATM layer and physical layer. This model providing different type of function it used to transfer all type datas such as audio, video and text messages. Same time we can use ATM technology in different network (LAN. MAN and WAN). ATM model contain management, hyphenated and handshaking protocol, quality of services and flow control facilities. Hyphenated protocol is connection oriented; cell switched and point to point.ATM use different type of technologies to data transmission. Fixed -length cells model used to transfer variable frames this model use 48 bytes for data, 5bytes for overhead. ATM adaption layer ATM adaption layer is third layer of this model this model composed application layer, transport layer and session layer of OSI reference mode. There are two different types of layers in ATM adaption layer such as convergence sub layer and segmentation and reassembly sub layer. It is classified into five types of class for providing different type of services. According to this class of services Convergence sub layer receive messages from high level layer, identify the received message format, type finally arrange all messages for sending out. ATM layer ATM layer is second layer of this model this layer providing link between ATM adaption layer and physical layer to transmit cells between those two layers and also create virtual link, doing multiplex and de-multiplex of cells, creating cell header. ATM physical layer ATM physical layer is first layer of this model the main function of this layer is encapsulate all incoming cells in a proper format before transmit bit to the physical medium. Physical layer divided into two sub layers such as transmission convergence sub layer and physical medium dependent sub layer these sub layers are doing different function such as transmission convergence sub layer doing error correction, framing and de-framing of cells and physical medium dependent sub layer assign bit time and coding for the physical medium. Protocols Protocol is a set of rules it is used to transfer the message between one ends to another end. OSI reference model is clearly defined how messages transmitted from source to destination in the networking. This reference model contain seven layers each layers must contain one or more protocol for their message transmission. Internet protocol (IP) Main function of internet protocol (IP) is transmits message between one end to another end. When sends the messages via this protocol message divided into many parts each part contain IP address if end system and this small segment send different ways receiver receive this segment in different order. This protocol implemented in network layer of OSI reference model and internet layer of TCP/IP model so internet protocol (IP) support data transmission to upper level layers in OSI and TCP/IP reference model. This protocol is connection less protocol and we cant make sure about delivery of message. Now days two different version of internet protocols (IP) are available in the networking such as internet protocol version4 (IPV4) and internet protocol version6 (IPV6). Transmission control protocol (TCP) Transmission control protocol (TCP) applied in transport layer of OSI reference model and host to host transport layer of TCP/IP model for message transmission. This protocol is a connection oriented and reliable transmission protocol. Connection oriented it means source (sender) set up connection with destination (receiver) node before the sending data. Error detection, error correction retransmission of datas is possible in TCP. Message transmission via this protocol is very slow because of overhead (20bytes) for error correction/detection and acknowledgement. There are two types of buffers such as sending and receiving buffers these buffers are used to storage, flow control, error detection and correction. Same time messages can be transfer both direction in TCP it provides full duplex transaction and also multiplexing and de-multiplexing are possible in TCP. [Behrouz A.] User datagram protocol (UDP) User datagram protocol (UDP) installed in transport layer of OSI reference model and host to host transport layer of TCP/IP model for message transmission between the layers. This protocol is a connection less and unreliable transmission protocol. Message transmission via UDP is very fast because there is small header (8bytes).this protocol containing many drawbacks such as no error control and no flow control. Receiver cant identify whether this message is original or duplicate when message transfer via UDP. Encapulation and decapitation of messages are possible in UDP when messages transfer from source to destination. [Behrouz A.] Hyper text transfer protocol (HTTP) Main function of hyper text transfer protocol (HTTP) is access data from internet (www).this protocol is applied in application layer of OSI and TCP/IP reference model. It is describe the message transmission over the network from client to server and data format. This protocol use TCP for data transmission between client and server in this model the client first send request to server then server send response message to client. There is no secure message transmission because HTTP does not provide security HTTP provide security when it run over the secure socket layer This protocol messages can only understand by HTTP client and server. [Behrouz A.] File transfer protocol (FTP) File transfer protocol (FTP) is applied in application layer in TCP/IP model. Main function of this protocol is transferring datas from source to destination (client to server or server to client) in easy way.FTP protocol create two link between source and destination one is for message transmission other link for replay.FTP use three commands such as RETR command function of this command is copying files, STOR command function of this command is store the files and LIST command this is for list the files.FTP use different transmission mode to transfer the files such as compressed mode, stream mode and block mode .through the FTP protocol we can send text files, images and ASCII files.FTP use two different TCP port, port 20 is used transfer datas or files between client and server and port 21 is used to control transmission between them. [Behrouz A.] Simple mail transfer protocol (SMTP) Simple mail transfer protocol (SMTP) is installed in application layer in TCP/IP reference model. Function of this protocol is transferring the email messages between client and server and also it contains some commands these commands are used to transfer the datas between client and server. Some other protocols are support to email transmission with SMTP such as post office protocol (POP3) and internet mail access protocol (IMAP4) [Behrouz A.] Simple network management protocol (SNMP) Simple network management protocol (SNMP) is applied in application layer of TCP/IP reference model this type of protocol is used to manage the network for providing better network performance by regular testing system, protect the network from unwanted user by monitoring system. SNMP protocol defines the transaction between the manager and agent. SNMP manager verify the agent details by sending requesting message to agent. SNMP identify the packets exchange between manager and agent [Behrouz A.] Network transmission media A transmission media is necessary to transfer a signal form source to destination in the networking system. Signals are transfer via Guided and unguided transmission media now a days different type of guided transmission media support to carry the signal such as twisted pair cable, coaxial cable and fiber optic cable. Unguided transmission media it is radio wave, micro wave and infrared Twisted pair cable Twisted pair cable is one of the guided transmission media to carry the signal over the network. Analogy and digital signal can be carried by this cable. This cable contains two shield copper wire then these wires are sick together. This type of cables used in telecommunication system. Twisted pair cable not suitable for long expanse, repeaters is needed to use long distance, for small area it will work without amplification. Compare to other cables this type of cable is inexpensive. Two types of twisted pair cables are available one is unshielded twisted pair cable (UTP) another one is shield twisted pair cable (STP). [Andrew s] Coaxial cable Compare to twisted pair cable it is better shield cable it is suitable for carry the signal to long distance. This kind of cables used to carry the high frequency signals and broad band signals as well as this cable carries analogy and digital signal but using different cable. Coaxial cables providing functions in several ways one is baseband it use total bandwidth to carry the signals, another one is broad band it divide the bandwidth with signals. Centre core it is made by hard copper wire, this core is bounded by inner dielectric insulator, copper screen and plastic sheath. [Andrew s], [Michael] Fiber optics cable Fiber optic cables transfer the signal in the form of light beam. This type of cable is used to connect different cities and countries such as telephone connection because these cables are suitable for long distance. Two different types of fibre optic cables are available such as single mode fibber optic cable and multimode fiber optic cable and this cables contain two part such as inner class cylindrical core and outer class cladding Compare with other cables it has many advantage such as it can be used to long distance, signal transmission is very fast and loss of signal is very low. Disadvantage of this cable it is very expensive. [Michael] Quality of services Quality of services (QOS) contains many network technologies to develop a network. Quality of services gives expected result to the network and quality of services develop and determine data transfer, delay, and error rate and loss of cell in the network. It is very use full apply the quality of services to VOIP and video but implementation of quality if services to network is very difficult. Quality of service measure Type of Delay Different type of delay are occur in the network during the data transmission from one system to another system they are processing delay, queuing delay, transmission delay and propagation delay. Processing delay A data(1 bit) transmission time between the end systems (source to destination) it is called processing delay this delay may occur for the following reaction such as error datas transmitting from one system to router, network architecture, switching mode and also it include in configuration of network devices Propagation delay A data (1 bit) of transmission between the source and destination it is called propagation delay. This delay depends on distance between routers and propagation speed; it depends on the transmission media propagation delay calculated by dividing the distance by propagation speed Propagation delay= [Behrouz A] Queuing delay Datas or packets waiting in queue at intermediate device (router) for their transaction, when the network is busy router cant rout all the packet at same time it process these packet one by one so packets need to wait this waiting time is called queuing delay. Transmission delay Transmission delay is amount of time is needed to transfer one bit of data via transmission media. Transmission delay depends on bandwidth and size of the data. Transmission time= [Behrouz A] Jitter Voice over internet protocol (VOIP) Voice over internet protocol (VoIP) is used to communication purpose it means one person can transfer his information to another person through telephone call, voice and fax over the IP based network. To reduce the bandwidth waste VOIP use packet- switching method to telephone calls. Normally more bandwidth is needed to voice transmission but voice data is compressed to small for the transaction so it require small bandwidth. Main advantage of VOIP is reducing the cost of long distance calls, when compare with ordinary phone call for this reason every organization applying VOIP in their networks. IP telephone is used in the VOIP network because IP telephone designed with coder/decoder for convert the voice signal from analogy to digital signal and digital to analogy signal. Softwares and hardware components are helps to connect the phone with network. Different protocols are implemented in the VOIP network for support voice transaction such as RTP(real time transport protocol) it support the delay of audio, H.323 protocol used to multimedia transmission, H.235 protocol used to data encryption. ) [Michael] List of books 1) [Michael] MICHAEL A, WILLIAM M Networking explained, second edition ISBN 1-55558-252-4 2) [Behrouz A.] Behrouz A. Frozen, TCP/IP protocol Suite Fourth Edition ISBN 978-0-07-016678-3 3) [Andrew s] Andrew S.Tanenbaum, computer networks fourth edition ISBN 0-13-038488-7 4) [James F] James F.Kurose, Keith W.ROSE Computer networking, fourth edition, a top down approach ISBN -13:978-0-321-51325-0 ISBN -10:0-321-51325-8 5) [Behrouz A] Behrouz A.Forouzan, data communication and networking, fourth edition ISBN 007-125442-0 List of Internet and

Friday, October 25, 2019

Three Lonely Outcasts :: Free Essay Writer

Three Lonely Outcasts In Of Mice and Men by John Steinbeck almost all of the characters are ranch hands and they are solitary wanderers. They live very lonely, solitary lives, drifting from one ranch to another. They don?t make many friends and they don?t make much money. There are three characters on the ranch who are the lonliest of the lonely because they are also outcasts or misfits who don?t fit in with what is considered ?normal? by the other ranch hands. Lennie is an outcast because he is retarded, Crooks is an outcast because he is black, and Curley?s wife is an outcast because she is a woman. These three outcasts look for companionship throughout the novel. First, Lennie is a lonely outcast because he is retarded. One of the reasons he doesn?t fit in with the other ranch hands is because he doesn?t always understand what people are talking about. He doesn?t even always understand George. Lennie admits this when Crooks says to him, ?Sometimes he talks and and you don?t know what the hell he?s talkin? about.? (Steinbeck,77). But Lennie always needs companionship. He is never alone, even if he has a dead mouse or a puppy with him. George would sometimes punish Lenny by not letting him tend to the rabbits on the ranch. And Lennie?s biggest fear is of being abandoned by George: He won?t do it,? Lennie cried. ?George wouldn?t do nothing like that. I been with George a long time. He?ll come back tonight But the doubt was too much for him.? (Steinbeck,78). The second lonely outcast is Curley?s wife. The other ranch hands stay away from her because she is a woman and because she is the wife of the boss? son. Also, even though her husband is very jealous, she is so lonely that she tries to get attention from the ranch hands, which makes Curley even angrier and more jealous. She is like the outcast of the outcasts. One night, when everyone else is away from the ranch, Lennie and Candy are in Crooks? room. Even though it is just the three ?. . . weak ones here? (Steinbeck,84), when Curley?s wife is lonely and wants to join them, they won?t let her: ?Maybe you better go along to your own house now.

Thursday, October 24, 2019

My Most Memorable Person

My mother Is without a doubt the most memorable person in my whole life. Her name is Cathedral Lahore. When I describe my mother, there Is nothing critical about it; It Is all admiration. She works as a Government employee In our town for almost 20 years. She always deals people every day with different personalities. Seeing her at work Is very awe-inspiring, especially her ability to connect and communicate with other people.I adore her very much. She made many sacrifices to raise me. She dedicated all her time and effort to bring me up. She always lends her shoulder for me to cry on during my bad times. She was a person that brightens up a room with her smile and helps everyone who Is In need. When she smiles, It Is as If she Is using all her might Just to see If It could get bigger. Her eyes are as black as the starry night full of sparkling stars. Her skin, the color white, flawlessly smooth before the rippling winds.She is a wonderful person whom I admire and love unconditionall y forever. Her words of advices, her tender loving care, her unfading support, her encouraging thoughts everyday makes her my most memorable. I remember one thing she told me last Christmas, â€Å"nag, study wisely, don't hesitate to tell me everything you need, I will always be here guiding you with your Daddy, supporting you and will always love you all the way, I love you†. That's the most heart melting feeling ever that I have experienced.Having a mother like her is the most precious thing that was given to me by our Almighty Father, she's everything to me. For me, having her in my life makes me so special than others. I am so special that she's always by my side, always supporting me, guiding me and most of all loving me unconditionally no matter who am I or even how worst my attitude is. She's always there to accept me. That makes her a gem, rare and hard to find. I love her so much that's all what matters.

Wednesday, October 23, 2019

Overcomming Cultural Challanges Tyco Case Study

CHANGE AND TRANSFORMATION Student : Odirile MachaDate : 15 October 2012 | 1. Tyco Employees’ Frustration turnaround3 2. Tyco’s Strategy to Overcome Cultural Change barriers5 3. Tyco’s CEO: Rebuild corporate reputation: Message package to Employees8 4. Issues emerging in communicating change externally: Tyco Case10 5. Bibliography12 * Tyco Employees’ Frustration turnaround (Gerard & Teurfs 1995; Palmer et al. 009) urges that practice dialogue is commonly used combat issue of culture in an organization or community, the practice consist of four components defined: a) First rule, the participants must suspend the attachment to their own position and judgements regarding each other. This allows participants to be more accepting to others perspective. b) Second rule, participant must identify their underlying assumptions on the matter at hand. ) Third rule, participant must listen actively to each other; remain actively present during the sessions. d) Final rul e, participants must reflect in order to uncover deeper issues and create a profound level of understanding. Transformation of culture can be measured or realised, as urged by Gerard & Teurfs (1995), byatransformed participant behavior, by the morale or feeling with the organization and by the attitude of collaborations instead of individualism.The purpose of response to question seeks to establish: the similarities in between the approach taken by the Turnaround team and the practice of dialogue; and also evaluate the outcome inline with the perceived results of a transformed culture. These similaries between the Turnaround team’s approach and practice dialogue, categorized into three stages of using dialogue in problem solving , a view supported by Gerard & Teurfs (1995). Stage 1. Problem Identification (Gerard & Teurfs 1995; Palmer et al. 009) urges that the first stage seeks to identify problems early and assist the team in setting their priorities. a) The general assumpt ion made is that Breen was part of the Turnaround team, and the fact that he never commented about Kozlowski’s past behaviour, is in line with the first step of practice in dialogue, where the participant suspend the attachment to their own position and judgements regarding each other. b) The turnaround team (Breen), communicated in a letter to the employees and shareholders, Tyco’s commitment to reinvent its credibility and integrity.This message was all inclusive not directed to any particular individuals, and that qualifies to the second rule about assumptions about each other’s commitment. The problem was identified to be lack of credibility and integrity leading to frustration of employees at Tyco, which were centred on the ethical behaviour that existed during the last CEO’s tenure, which brought uncertainty to the future of the company. Stage 2. Problem Solving (Gerard & Teurfs, 1995; Palmer et al. 2009) urges that the second stage seeks to underst and the problem, generate solutions, and make decisions. a) The approach to communication, by the turnaround team, in defining Guide to ethical conduct of employees. Instead of defining just Code of ethics rules. The team built guides with illustrative which were meant to make the code easier to read and understand, this is in line with the third rule in dialogue, where the participant should remain active during the sessions, and absorb the messages consistently. ) The message was package in local languages across different cultures and delivered through meeting (â€Å"if you want to change the hearts people about their ethical behaviour, you must bring live to this document†), instead of sending the documents to all operations around the globe, the Turnaround team choose to deliver the message in meeting (face to face), to gain active participation and also get feedback on the assumptions the team made in line with the first and second rule. The turnaround team did make dec ision to changing the executive team and infrastructure related changes.The team also made a decision on the implementation approach. Stage 3. Implementation (Gerard & Teurfs, 1995; Palmer et al. , 2009) urges that the final stage seeks confirm that the group behind the change will support the final decision and be committed to it. a) The implementation was done in meetings, with the message packed in videos and corporate management making visits to Tyco sites, which is in line with the third rule for developing a profound understanding is achieved. b) Management site visits also build a profound understanding of issues in line with rule three.The fact that corporate manager visit site and dialogue issues with management brings a degree of trust, releasing a lot of frustration that the employees had. c) The implementation involved further training of 20,000 personnel, localising trainers who went further provide input further refinement of the massage blue print for targeted destina tion, these refinement were published, this is in line with rule two and three, on understanding problem and getting commitment. d) The organisation gained an improved Governance metrics of international rating from 1. in 2002 to 9. 0 in 2005, and was consider being the most dramatically improved. This improvement is in line with the third rulewhere the result demonstrates the team fully understood the problem and prescribed a fit solution. The Turnaround team were fully committed to the change and the results were observed to have a positive impact on the organisation as a whole. The outcome can be measured though positive energy on the employee as the managed to produce positive result in profits and improved ratings. Tyco’s Strategy to Overcome Cultural Change barriersGhemawat (2001) urges that distance from an area of comfort of doing business (base country) always has in impact on the overall strategy, and that the impact of distance on industry and product is based on t he country specific characteristic defined: a) Culture (C) covers different ethnicities, lack of connective ethnic or social networks; different religions and different social norms. b) Administrative (A) covers aabsence of colonial ties; absence of shared monetary or political association; Political hostility; government policies; institutional weakness. ) Geography (G) covers physical remoteness; lack of a common border; lack of sea or river access; size of country; weak transportation or communication links, differences in climates d) Economic (E) covers differences in consumer incomes differences in costs and quality of: natural resources, financial resources, human resources, infrastructure, intermediate inputs, and information or knowledge. Tyco’s global strategy will have to address these international issues, if they are compete internationally because challenges differ from one country to the next, a view shared by (Grant, 2010).The other part to this question, is to develop a strategy that will assist in overcoming cultural barrier that faced Tyco, Hill & Hernadez-Requejo (2011) urge the best way for a Tyco to deal with cultural bariers is to develop a Cross culture litetracy, use country specific input and use local content. Cross Culture literacy Hill & Hernadez-Requejo (2011) urges that for international company to succeed in doing what they do, they must adapt to conform with the value system and norm of that culture.The adaptation must cover the following: ways of dealing with negotiation, incentive pay system, organisation structure, products naming, labor and management relations and product promotion concepts to avoid cultural conflicts associated with cultural differences (Hill & Hernadez-Requejo 2011). International companies in other countries, must learn more about the countries and cultural values (Hofstede, 1980; House et al. , 2004), and how these will affect their business.Tyco’s strategy to overcome culture barriers hin ges on understanding the cultural values and differences that exist in each country, and (discovered that these values are deeply embedded in people who work in these organisation. (Hofstede, 1980) confirms that values are held the moral behaviour of people and how they ultimately perform in their organisations. The strategy seeks understand the values identified by (Hofstede, 1980): Power Distance, Uncertainty Avoidance; Masculinity vs. Femininity; Individualism vs. Collectivism; Long vs.Short Term Orientation; and then identify the mis-alignments and adapt to the new cultural values without compromising the organization value system, a view by Hill & Hernadez-Requejo (2011). a) Power Distance Local Manager should be equipped to with the relevant skills to handle prevent, guard against and deal with issues influence by socioecomic status and power that may exist in the community within which Tyco operates, a view supported by Hill & Hernadez-Requejo (2011), to ensure that organisat ion key objectives are met. b) Masculinity vs. FemininityLocal manager should be empowered to align that the organization observes community or individual values governing the gender based differentiation in masculine based country and the contrary, a view confirmed by Hill & Hernadez-Requejo (2011), to ensure that organisation key objectives are not compromised. c) Individualism vs. Collectivism Local Manager should be empower to align that the organization observes community or individual values governing collectiveness society where family ties are strong to an extent where employee cannot be separated with their families and conform where possible and the contrary should be observed. ) Uncertainty Avoidance Local Manager should be empower to align that the organization observes community or individual values associated how they view uncertainty and ensure proactive communication to avoid instance of uncertainty that may affect corporate objectives. e) Long vs. Short Term Orienta tion Local Manager should be empower to align that the organization observes community or individual values to stay in the same job for short or long term, and make sure the build contingencies that are cost efficient for the organization.The strategies must be broken down into initiatives that can be easily followed and delivered, with proper measures and timeline, a view by Palmer et al. (2009). Tyco’s CEO: Rebuild corporate reputation: Message package to Employees Corporate reputation defines, how the organisations perceived by all its internal and external stakeholders and it is always linked with trust and credibility, a view shared by Grates (2005), who further confirms that a loss in the company (Tyco) trust and credibility destroys its reputation and is difficult to restore.The current situation at Tyco, with the former CEO on trial, has lowered the reputation of company. According to (Collin 2001; Hughes et al 2012), it take a long time for a company to build its rep utation, through delivery of sustainable proof before the stake holders can endorse it as a positive reputation. The crisis situation that Tyco is in, have been identified and there reputational issues that needs to be managed to avoid further damage.There is an immediate need to communicate with, internal and external stakeholder, and the message content should contain the following as guided by [Reputation-Risk of risks: Economist Intelligent Unit]: * Concerns – As the CEO,I have to communicate and acknowledge the challenges that Tyco is faced with; own up to what has gone wrong; and express regret and concern, a view supported by Palmer et al (2009). * Commitment – As the CEO, I have to communicate a plan to fix this problem and share in detail an action plan with clear timelines, a view supported by Palmer et al (2009). Control – As the CEO, I must demonstrate that we are in control of the situation and that we are liaising with the relevant authorities invo lved to bring the situation under control a view supported by Palmer et al (2009). It is imperative, as the CEO, to break news earlier to employees and keys stakeholder [Reputation-Risk of risks: Economist Intelligent Unit], before the other sources share information that is ambiguous and could shake up the stakeholder and affect the companies operation.It is however important to also acknowledge indeed some business operation and resource will be affected and also provide a medium that could be used by also sources to provide feedback. Any questions that are asked must be responded to consistently with the message shared by the CEO. As the CEO, it is important to step back and reflect on my personal reputation and professional conduct, are tightly tied to the reputation of the company. The decision made should be consistent, as confirmed by [Reputation-Risk of risks: Economist Intelligent Unit], with the messages that are being put across as the turnaround strategy.There should be transparency on actions taken, as confirmed by [Reputation-Risk of risks: Economist Intelligent Unit] that affect people, and information about plans should be share promptly. Palmer et al (2009) urge that it is within and through communication that changes occurs and as the CEO, it is ideal to explore the change methodologies that are effective for internal communication with staff. There are four types of change approaches, which can be used draw up the speech acts as defined by Palmer et al. (2009): Initiative conversation – this focuses on the need for change depending on the situation, in the event that something has happened already or before it occurs. In the case of Tyco, the initiative would be based on what the organisation seeks to undertake to address the problems that have been identified. The message will contain assertions (what need to be in aligned with governance issues), request (to establish reforms to achieve objective) and declaration message (about new targets) going forward: * Conversation for understanding – meant to provide employees with greater appreciation of change issues and problem areas.The conversation would seek to establish on clarity solution proposed to target the challenges and beyond. * Conversation for performance – focuses on producing the actual change required, at Tyco, this would be the time to implement all the promises Tyco committed to deliver on aligned to the plan shared with stake holders. * Conversation for closure- is an indication of the completion of the actual change, this is where acknowledgements are made to deserving participants, and rewards are disclosed ad celebration ensued.The CEO cannot carry out all these activities on his own but requires to have people with the right skills in the right jobs, people with the attitude to lead the change and these people have to be carefully selected a view by (Collin 2001; Hughes et al 2012). The CEO still remain accountable but provide gui dance in direction to ensure that what is delivered is consistent with the commitments made. Issues emerging in communicating change externally: Tyco Case Palmer et al. 2009) urges that external oriented communication can be categorised into two parts: communication with external stakeholder that relates to internal organisation changes; and where there is need to handle a crisis situation. In Tyco case is more associated with the crisis situation and the communication was done with a letter to internal and external stakeholders, and the message promoted credibility; integrity; and promoted a culture of accountability, the question seek to find out how effective communication was to external stakeholders.Palmer et al. (2009) urge external communication is different from internal communication is a number of respects, it address issues relating to: justification decision made; assurance over an allegation made; downplaying statements made (concealment) ,or reassurance that matter are under control. Issue emerging from the case: a) Hiring a new CEO, is a also consider a major event in rebuilding the reputation of Tyco, that required external communication. [The road to reputation recovery: Burson-Marsteller] ) The Tyco letter Breen spoke to reassurance and commitment to change. The message was carefully crafted because at the time there was not much to give out, as the trial was still on-going. The message seek to reassure the employees and shareholders that; Breen and his team were committed to addressing issues relating to credibility of the corporation internal and external stakeholder but is does not layout the intervention and the time it will take to restore the integrity.There was no apology from the CEO about recent bad publicity; it is as if nothing major has happened at least resentment would have been enough. [The road to reputation recovery: Burson-Marsteller] c) The changes done at board and executive level were fitting of external communication esp ecially the appointments new executive members and board, because reputation issues affecting Tyco, were more to deal with the CEO’s leadership and board and between the two they are both responsible for the wellbeing of the organisations reputation. The road to reputation recovery: Burson-Marsteller] d) Guideline developed for internal employees relating to interaction with suppliers and partners would have been something that worth external communication, this was a good initiative as it commits Tyco to a good corporate principle. [The road to reputation recovery: Burson-Marsteller] e) The fact that Tyco, consider best practice models Sigma, was the right move as it demonstrated Tyco’s desire to improve the corporate performance, this move was worth sharing externally if it does not compromise their competitiveness. ) The fact that Tyco, consider engage in an audit and the performance rating was improved dramatically, it was worth going public on the results, this su rely is some reputation builder according to [The road to reputation recovery: Burson-Marsteller], and this was worth acknowledging and celebrating. g) The fact that the turnaround of Tyco, was well completed within five years and that the corporation managed to payout dividends worth 2. 09 billion, was not communicated externally well enough, but it some positive development for the shareholder.The corporate media for public communication and information sharing were not well explored [The road to reputation recovery: Burson-Marsteller] Bibliography Busson-Marsteller (2009). The road to reputation recovery. [Online] Available from :< http://www. CEOgo. com/documents/RR_01_10_05. pdf >[Accessed 13 October 2012]. Economist Intelligent Unit, the (2005). Reputation: Risk of risks [Online] Available from :< http://www. eiu. com/report_dl. asp? mode=fi&fi=1552294140. PDF&rf=0>[Accessed 13 October 2012]. Gerard G. & Teurfs L. (1995). Dialogue and Organizational transformations†, in community spirit: Renewing Spirit and Learning in Business, Kazimerz Gozdz. San Francisco: New Leader Press. pp. 143-53. Ghemawat, P. (2001) Distance Still Matters: The Hard reality of Global Expansions. Harvard Business Review, 79 (8), pp. 137 -147. Grant R. M. (2010). Contemporary Strategy Analysis. 7 ed. United Kingdom. Wiley and Sons. Grates F. G. (2005). Hold on tight:  The Reputational Pull of the Automotive Industry. [Online]. Available from: < www. instituteforpr. org/downloads/330> [Accessed 13 October 2012].Hill, C. W. L & Hernadez-Requejo, W. (2011). Global Business Today. New York, McGraw Hill/Irwin. Hofstede, G. (1980), Culture’s Consequences: International Differences in Work-related Values, Sage Publications, Newbury Park, CA. Hughes , L. R. , Ginnett, C. R. , Curphy, J. G. (2012). Leadership: Enhancing the lessons of Experience. 7th Ed. Singapore, McGraw-Hill companies. Palmer I, Dunford R & Akin G. (2009) Managing Organization Change: A multiple perspective approach. 2nd ED Boston, McGraw Hill International. Elsevier LTD.

Tuesday, October 22, 2019

Implementation of Business Ethics in the Company essayEssay Writing Service

Implementation of Business Ethics in the Company essayEssay Writing Service Implementation of Business Ethics in the Company essay Implementation of Business Ethics in the Company essayBesides the code of ethics and ethical training, an organization should also implement ethical infrastructure aimed at resolving ethical issues, establishing ethical standards, formulating and sharing corporate values. An important part of this infrastructure is constituted by ethics committees the function of which is supervision of ethical conduct.It is essential to distinguish between company ethics departments and ethics committees (Parraga, 2013): ethics committee is aimed to respond to emerging ethical issues in the company and should be to a reasonable extent independent from major corporate structures. The purpose of this paper is to choose an organization, to investigate whether it uses ethical committees, to examine the format used for committees if there are any and to draft a plan for establishing ethical committees if there are none.The considered company is Walmart Stores Inc. This is a multinational retailer which o perates globally and is the largest worlds employer (Walmart, 2014). Walmart created a Global Ethics Office which is responsible for ethics reporting, ethical education and guiding employees in ethical decision-making. Part of the structure of Walmart ethics office are Compliance and Ethics Committees created for each of international retail markets (Walmart, 2014). The structure of these committees is similar to the structure of Global Compliance and Ethics Committee: both types of committees consist of senior executives and are chaired by the companys compliance and ethics executives (Walmart, 2014). Committee members discuss ethical issues, review progress, plan improvements, assign responsibility and establish accountability (Walmart, 2014).The functions and presence of ethical committees at Walmart are consistent with the requirements of Parraga (2013) to corporate ethics infrastructure, but the position of ethics committees in the companys structure is different. It is not cle ar whether the members of Walmarts ethics committee are elected or appointed, but corporate responsibility report does not mention any election procedure. Furthermore, committees are strongly integrated into the companys structure and therefore lack objectivity and independence. Hence, Walmart should introduce a more independent system of ethics committees where members would be of different origin and would be elected for a particular term. In this case, Walmart will be able to improve its ethical objectivity and quality of ethical decision-making.

Monday, October 21, 2019

Welfare Reformation essays

Welfare Reformation essays This week we offered a plan to end welfare as we know it-a plan that will encourage personality and help strengthen our families through tougher child support, more education and training, and an absolute requirement to go to work after a period of time. -Bill Clinton, radio address, 6/18/94 The welfare system is in deep distress. From the time of Franklin Delano Roosevelt to the current reigning of Bill Clinton, many a bills have been brought for to reform it. Originally, Roosevelt established the system as a type of government stripend to financially challenged individuals; however, it was not intended to act as a dependent income for them (Tucker 45). Even though many changes have been made over the past three years, it has not made much of an impact on the problems at hand (Pear). Officials discovered that many welfare recipients misuse the benefits. Studies have shown that the welfare system should begin by providing job placement, ending benefits for illegitimacy, and educating the young. First, the aspect of job placement is directly related to the misuse of welfare. In order to succeed at rising employment rates, current wages have to increase dramatically. A welfare check ranges form $5.53 to $17.50 an hour; in a like manner, minimum wage is less than an hourly welfare check (Tilly 8). People desire the higher money of a welfare check to that of a low-paying job (Tweedie 117; Tanner 18). This dependency on receiving the check causes many problems not just with the current generation, but future generations will also be similarly affected. These children are acquiring the habits of their parent or parents, thus creating a permanent underclass (Tucker 45). Economic incentives for staying on welfare should be abolished. People should no longer be allowed to remain on the system for extended periods of time. In accordance with the lesser incentives, the government should place more emphasis on rai...

Sunday, October 20, 2019

A Brief History of Prosthetics

A Brief History of Prosthetics The history of prosthetics and amputation surgery begins at the very dawning of human medicine. In the three great western civilizations of Egypt, Greece and Rome, the first true rehabilitation aids recognized as prostheses were made. Early use of prosthetics goes back to at least the fifth Egyptian Dynasty that reigned between 2750 to 2625 B.C. The oldest known splint was unearthed by archaeologists from that period. But the earliest known written reference to an artificial limb was made around 500 B.C. During the time, Herodotus wrote of a prisoner who escaped from his chains by cutting off his foot, which he later replaced with a wooden substitute. An artificial limb dating from 300 B.C., was a copper and wood leg that was unearthed at Capri, Italy in 1858. In 1529, French surgeon  Ambroise Pare  (1510-1590) introduced amputation as a lifesaving measure in medicine. Soon after, Pare started developing prosthetic limbs in a scientific manner. And in 1863, Dubois L Parmelee of New York City made a significant improvement to the attachment of artificial limbs by fastening a body socket to the limb with atmospheric pressure. While he was not the first person to do so, he was the first to make it practical enough to be used in medical practices. In 1898, a doctor named Vanghetti came up with an artificial limb that could move through muscle contraction. It wasn’t until the middle of the 20th century that major advancements were made in the attachment of lower limbs. In 1945, the National Academy of Sciences established the Artificial Limb Program as a way to improve the quality of life of World War II veterans who suffered the lost of limbs in combat. A year later, researchers at the University of California at Berkeley developed a suction sock for the above-knee prosthesis. Fast forward to 1975 and  the year an inventor named Ysidro M. Martinez took things a major step further by creating a below-the-knee prosthesis that avoided some of the problems associated with conventional artificial limbs. Instead of replicating the natural limb with articulated joints in the ankle or foot which tended to lead to poor gait, Martinez, an amputee himself, took a theoretical approach in his design. His prosthesis relies on a high center of mass and is light in weight to facilitate acceleration and deceleration and reduce friction. The foot is also considerably shorter to control acceleration forces, further reducing the friction and pressure. New advances to keep an eye involve the growing use of 3-D printing, which has allowed for the fast, precise manufacturing of artificial limbs that traditionally have been custom-built by hand. The U.S. government’s National Institutes of Health has recently established the 3D Print Exchange program as a way to provide researchers and students with the necessary modeling and software tools to fabricate prosthetics using 3D printing machines.   But beyond prosthetic limbs, here’s another fun fact: Pare could also have laid claim to be the father of facial prosthetics, making artificial eyes from enameled gold, silver, porcelain and glass. Thats your fun fact of the day

Saturday, October 19, 2019

The Global Business Environment Essay Example | Topics and Well Written Essays - 2500 words

The Global Business Environment - Essay Example The environment in which Toyota operates is becoming extremely tough every day. All businesses are facing problems today due to increasing costs, cultural diversity, globalization and decrease in global demand. The world has seen a great financial crisis in recent years and economies are still to recover from it fully. In such environment companies are finding it hard to produce and sell its product to customers. The external environment is also affecting organizations in new ways because media and communication technology has developed so much and any ethical issue can seriously hurt the reputation of the company. Competition is also increasing in business environment as companies are trying to innovate and market their products in better ways. In this report we will conduct an external environmental analysis for Toyota. We will talk about markets, competition and regulations that can have an impact on the company. The ethical issues, corporate social responsibility and environmenta l policy and its affect on Toyota will also be discussed. This paper will deal with the external environment and not with the strategy of Toyota. Markets, Competition and Regulation Markets are evolving at a great pace in today’s fast moving world and it is important to keep in mind the changing demand of target market. Competition is also increasing as companies are trying to increase efficiency by decreasing costs and improving quality of their products. Regulations are also getting stern everyday and automobile companies have to keep in mind the safety standards set by the companies. This means increase in testing of cars which will lead to greater costs. In this section the impact of markets, competition and regulation on Toyota will be discussed. Markets and its Impact of Toyota The main target market of Toyota is the middle class income group of the world. These are the people who cannot afford luxurious cars but want vehicles that are cheap but durable vehicles. Toyota provides cars to middle income people of the world and prices are also lower in comparison to BMW and Mercedes. Over the years this target market has been consisted as they cannot switch to expensive cars and they also don’t switch to cheaper manufacturers. This is why this market of Toyota was considered relative safe and loyal to Toyota. But this is changing because now the target market of Toyota is also evolving. The target market is demanding innovation in designs and specifications. The medium income group target market has become more aware of the different brands in the market. They have also become more design oriented and are demanding newer and better designs. Car movies and games have informed the market about fast cars and sleek designs therefore they want these things in their cars. This problem is staring Toyota in the face because design was never a strong point of the company and its focus was on durability and prices. Evolving markets are in this way impact ing the business strategy of Toyota. The main strategy of Toyota is that of reducing service costs by giving customers quality and durability (Harrup & Janssens, 2008). This is causing problems because the markets of Toyota are evolving and they are demanding better designs from the company. The external environment is therefore impacting the strategy of Toyota. The increasing focus on design and specification of the market can decrease the demand of Toyota cars. Customers will look for new car manufacturers

Friday, October 18, 2019

How asian american are changing the face of america Research Paper

How asian american are changing the face of america - Research Paper Example 125-189) are just few of the many ethnic, ancestral and racial groups spread all over the United States. This paper tries to focus over the Asian Americans part with three prominent examples and dynamics involved with their lives and lifestyles. In addition, this paper also tries to understand the concepts of globalization, Trans-nationalism and multiracialism. Popular historian Yuji Ichioka deserves all the credit for inventing the term of Asian Americans. Before this term, people usually referred Asian Americans with the name of Orientals meaning the people from the east (Lott, pp. 46-192). It is not unusual to know that these were the social activists of the 1970’s that made this term popular within and outside America and all this was happening because of the social rights movement of that time for this community in the United states. According to the basic definition, â€Å"Asian Americans are those Americans who have an Asian origin at least from the side of one parent† (Min, pp. 11-29). The most common groups in Asian Americans are of â€Å"Chinese Americans, Indian Americans, Pakistani Americans, Japanese Americans, Cambodian Americans, Korean Americans, Vietnamese Americans, Filipino Americans† (Kitano, & Daniels, pp. 85-129) and other groups. â€Å"The demographics and data reveal that Asian Americans form the third largest racial minority group in the United States after the white Americans and African Americans† (Hune, pp. 256-387). In addition, studies have also revealed that Asian Americans are the ones with the highest levels of educational attainment and lowest poverty rate (Kitano, & Daniels, pp. 85-129). They also perform well when compared with others on the scales of household incomes and savings and personal incomes. Chinese Americans make the largest ethnic sub group followed by Filipino

Following the Steps of Narrative Structure Essay

Following the Steps of Narrative Structure - Essay Example Weak and simple story lines do not need a complex structure as they ruin the effectiveness of the content. Complex story lines need a well structured format of narration. This makes it simple and effective to bring out the intended topic of narration. Generally, there are structures that exist when writing narratives without the consideration of influencing factors. According to Hemmingway writing a narrative should clearly based on the right structure and format regardless the audience and the content in the narrative (85). This paper will focus on the writing structure of narratives. Additionally, it will clearly show the steps involved when coming up with a narrative structure. It will greatly borrow from the Freytag’s Pyramid. Thursby says that in introducing a narrative the exposition should be the first structure step (97). The exposition should be well and easily understood. It should also be very effective in terms of content and structure. In many occasions the exposition creates the intended picture to the audience. It provides the audience with what to expect from the narrative in terms of content. The exposition should be an analysis of characters involved, the relationship between the characters and the drama or story connecting the characters to the narrative. It also meant to create an attentive mood from the audience or the intended reader. The exposition also provides a depth analysis of the topic and the setting of the narrative. According to Hemmingway the exposition or introduction of a narrative should provide the audience or intended person with all the information they need to understand the story (126). In words by Thursby then there is rising action which provides a greater picture on the characters in the narrative (157). The rising action segment gives an introduction to the main conflict in the narrative. The conflict should be designed in way that both the negative and positive influences are

SLP 2 HRM - 402 CONDUCTING NEED ASSESSMENTS Essay

SLP 2 HRM - 402 CONDUCTING NEED ASSESSMENTS - Essay Example This process also helps new employees to know what the organization expects from them. Implementation of training strategies in organizations also helps in attracting a pool of qualified employees who want to join organizations that also consider their professional development. This process also helps organizations have employees who are able to support their goals, which in turn supports their growth and expansion. Training also improves the level of motivation and efficiency of employees. Finally, this process decreases the need for employees to be supervised. This means that supervisors can use the time to perform more productive activities in the organization. Employees usually need to be trained in various areas from the time when they join and organization, for example, new employees need to be trained on the goals and objective of the company. They also need to be trained on how the company expects them to perform their duties. This is crucial because organizations do not have the same way of performing tasks. New employees will benefit in terms of being able to easily perform their duties. They will be more comfortable and confident in their tasks. Training is also crucial when new processes or technologies are introduced to the company. This will help employees gain knowledge on how to better perform tasks. New technology is useless if employees do not know how to make use of them. Employees will benefit by being more efficient in their duties as they apply the new processes or technologies. The process of training is intricate and challenging. Organizations need to divide up the process of training in different separate steps. For training to be successful, it is crucial for the organization to perform a training needs assessment. This makes sure that training concentrates on an employee’s weakness in order to improve the quality and the quantity of output. With a greater knowledge of the training

Thursday, October 17, 2019

After Visiting Local Museum Essay Example | Topics and Well Written Essays - 750 words

After Visiting Local Museum - Essay Example Visiting the museum, I had two agendas, one was an academic agenda, while the other was having a good time in the place and getting to know more about different things about the Native Americans. What caught my attention most was the atmosphere of the museum. The outside of the museum was serene and extremely quiet. The compound was dotted with different types of trees and shrubs that gave the compound an anaesthetic look and feeling. Its paved walkways gave the museum a decent feeling and look, which was captivating to the visitors. There were different species of flowers planted in close intervals, with the well-trimmed glass surrounding its compound. The first instance, the place looked less of a museum, with the neat compound with the extra efforts extended towards making it a beautiful place to captivate the attention of the people and the visitors. The outside walls of the one storey building housing the museum were red, with large windows that let in adequate light into the interior of the museum. The architectural design of the museum was very similar to that of a learning institution. Its interior walls were coloured bright, making it brightly lit from the inside. The arrangement of the collection was appealing. The arrangement of the collection pieces were in accordance to their respective categories. The professionalism used in the arrangement and the labelling of the artefacts as well as cultural pieces was amazing. Not a single piece appeared mistakenly placed, as their descriptions matched with the categories placed in.

Business Organisations and the Law Essay Example | Topics and Well Written Essays - 2500 words

Business Organisations and the Law - Essay Example Principally, UK company law is ruled by the Companies Act of 2006, the Insolvency Act 1986, the Company Directors Disqualification Act 1986 and the old Companies Act 1985. A limited company can be registered in England and Wales, Scotland, Northern Ireland and Australia. Registration of business firms in Great Britain is done through Companies House while the registration of companies in Northern Ireland is through the Department of Enterprise, Trade and Investment (Davies 2008; Companies Act 2006; Sealy and Worthington 2007). 1. Private company limited by shares - this type of business organization has a share capital and the accountability of each member is restricted to the amount not paid on shares that a member holds; this type of private company cannot sell its shares to the general public 2. Private company limited by guarantee - here, a member does not throw in any amount as a contribution to the capital during its lifetime as it does not purchase shares. The member's liability is limited to the amount that he/she has agreed to contribute to the company's assets if it decides to wind up its activities 3. 3. Private unlimited company - this form of business organisation may or may not have a share capital and there is no limit to its members' liability and since there are no limitations on members' liability, the company can disclose less information compared to other types of companies 4. Public limited company - this kind of group has a share capital and the liability of every member is limited to the amount unpaid on shares that a member holds; it can also offer its shares for sale to the general public and likewise can be quoted on the stock exchange. Administrative Receivership In the United Kingdom, administrative receivership10 is a process whereby a creditor can enforce security against a business firm's assets endeavoring to gain settlement or compensation of the secured debt. Previously, it was the most accepted scheme of enforcement by secured creditors, however, recent governmental restructuring and legal developments in several jurisdictions have significantly diminished its importance in specific nations11. Administrative receivership diverges from simple receivership in that an administrative receiver is assigned over all of the assets and tasks of the business firm. This signifies that an administrative receiver can, as a rule, only be assigned by the holder of a floating charge. Because of this remarkable responsibility, bankruptcy/insolvency legislation more often than not endows broader powers to administrative receivers and likewise also have power over the exercise of those powers in an effort to take the edge off potential prejudice to unsecured creditors. Normally, an administrative receiver is an accountant with substantial knowledge, familiarity and understanding regarding insolvency matters. Current Implication As it is, administrative receivership is a significant component of contemporary insolvency practice. Today, business firms that plunge into financial complexities may well have security packages that were created prior to the 15th of September 2003, a circumstance

Wednesday, October 16, 2019

After Visiting Local Museum Essay Example | Topics and Well Written Essays - 750 words

After Visiting Local Museum - Essay Example Visiting the museum, I had two agendas, one was an academic agenda, while the other was having a good time in the place and getting to know more about different things about the Native Americans. What caught my attention most was the atmosphere of the museum. The outside of the museum was serene and extremely quiet. The compound was dotted with different types of trees and shrubs that gave the compound an anaesthetic look and feeling. Its paved walkways gave the museum a decent feeling and look, which was captivating to the visitors. There were different species of flowers planted in close intervals, with the well-trimmed glass surrounding its compound. The first instance, the place looked less of a museum, with the neat compound with the extra efforts extended towards making it a beautiful place to captivate the attention of the people and the visitors. The outside walls of the one storey building housing the museum were red, with large windows that let in adequate light into the interior of the museum. The architectural design of the museum was very similar to that of a learning institution. Its interior walls were coloured bright, making it brightly lit from the inside. The arrangement of the collection was appealing. The arrangement of the collection pieces were in accordance to their respective categories. The professionalism used in the arrangement and the labelling of the artefacts as well as cultural pieces was amazing. Not a single piece appeared mistakenly placed, as their descriptions matched with the categories placed in.

Tuesday, October 15, 2019

Juliet is the Better Lover Essay Example for Free

Juliet is the Better Lover Essay Romeo and Juliet is Shakespeare’s greatest love story. With all the characters mixed up in love, hate, war and friendship, the bard’s tale spearheads a current debate on whether Romeo or Juliet was the better lover. This paper attempts to prove why Juliet is by far the better lover compared to Romeo. Experts have reason to believe that Romeo and Juliet were actually juveniles. Romeo was fourteen and Juliet was thirteen. This was evident in Elizabethan royalties where sons and daughters of the rich found themselves pre-arranged to sons and daughter of the same class. Girls were allowed to marry as young as 12. Between Romeo and Juliet, Juliet sacrificed more because she had to pursue her love to Romeo given the fact that she was a girl and was the younger of lover. Being a woman, much less a girl during the Elizabethan times meant following very strict rules. Breaking of these rules meant dishonor, disgrace and punishment from her parents. Although the Romeo deserves the same fate from his parents, the gender difference makes all the difference. â€Å"Elizabethan Women were totally dominated by the male members of their family. They were expected to instantly obey not only their father but also their brothers and any other male members of the family. The punishment for disobey was the whipping stool the Elizabethan girls were beaten into submission and disobedience was seen as a crime against their religion. † (2005) Of the many definitions of love, Scott Peck describes it in his book The Road Less Traveled as; â€Å"The will to extend one’s self for the purpose of nurturing one’s own or another’s spiritual growth. † (Peck, 1978) In this definition between Juliet and Romeo, it is Juliet who has extended herself. Trusting her life to the poison of the priest, she totally follows the plan hoping that through her sacrifice, Romeo and herself can live happily ever after. During those times when total faith is expected and practiced in society, the belief in earthly concoctions is almost equal to belief in witches’ ways. But because of her love for Romeo, Juliet allows her heartbeat to stop for three days choosing a life with her Romeo than a well-off life with her parents and Paris. Compared to the sacrifice of Romeo and Juliet, it is Juliet’s sacrifice that can be considered weighty because she became consistent with her selflessness for her lover. Romeo couldn’t sacrifice his vengeance for his friend who was killed by Juliet’s cousin which made the turns in the story. If love is self-sacrifice then Romeo is a better lover because he killed himself for the love of Juliet but love is not self-sacrifice per se. Love is the act of expanding oneself so that one could evolve from something to something better. To note, Juliet died twice for her Romeo. The first time was when she drank the poison and the second time was when she stabbed herself. So in the matter of the number of times the lovers tried to kill themselves for the love of the lover, it is still Juliet that outnumbered Romeo. She not only outnumbered Romeo in the time she killed herself but in the ways she did it. Romeo only used the poison once but Juliet used the poison and used the dagger to lead her to bleed to death upon her realization that her Romeo was dead. Juliet is the better lover because she was the first one who had to endure a lover’s loss. When Romeo was banished, she grieved for her Romeo more than for her cousin. If Romeo did not instantly grieve the death of his friend, maybe Juliet’s cousin would still be alive, but then again the greatest love story would not have been told. Romeo grieved for Juliet only upon knowing of her death, which made very dramatic and weighty due to his committing suicide. However, the drama did not climax at the end of his suicide but it further gained heights when Juliet took the dagger and impaled it into her chest. â€Å"Suicide is not something that happens for a simple reason. It is impossible to rap up in a nutshell the many reasons a person may want to die. The reasons for suicide range from critical injury and fatal illness to momentary sadness or a sudden and emotionally jarring shock. Some reasons may seem logical (if you are in pain and dying anyway, why prolong the suffering? ) while others seem ridiculous (a crush dumped on you in front of friends and you feel humiliated) but whatever the reason, to the person thinking of suicide, they are unbearable. The fact of the matter is that the vast majority of suicides are the result of a complex combination of circumstances, emotions and a psyche in turmoil. † (Hardcastle, 2007) For Juliet, it was definitely a combination of perplexities during that very moment. But surely among them, she had the option of just continuing her life free of anything and everything. She could start anew because she was dead to her parents and families anyway. However, since she was also young and in shock about the death of her Romeo, the dagger was a quick solution to make her be eternally together with Romeo. Juliet definitely chose love. Physiologically, Juliet is more capable of being the better lover. At fourteen, boys will be boys as could be proven by the rage Romeo had when his enemy killed his friend. The clouding of the mind, never mind if he was about to kill his bride’s cousin but the rage of testosterone controlled Romeo. There are physiological differences between girls and boys that would prove their capability of experiencing true and mature love, as explained by Dr. Gurian, 1999. 1. Adolescent boys are four times more likely to be diagnosed as emotionally disturbed than adolescent girls. Given this, Romeo most likely had decided to kill himself but that decision may have been influenced with disturbed thoughts. 2. Adolescent males are four times as likely to commit suicide as adolescent females. Given this data, the suicide of Romeo would not count so much as Juliet’s suicide due to gender difference. 3. Adolescent males are routinely found to channel other primary feelings; hurt, pain, grief, into anger. Given this, there would be a possibility for Romeo to have committed suicide due to anger at the whole world than due to love for Juliet. 4. Adolescent boys are 15 times as likely as adolescent females to be victims of violent crime. Adolescent boys commit violent crime at a higher rate than adult offenders. Given this data, the suicide of Romeo does not count more in intensity than Juliet in terms of the violence confronting the adolescents. The shock, fear, courage and other emotions of putting the dagger towards her heart has more weight due to the gender difference. 5. Millions of adolescent boys experience post-traumatic stress due to family, cultural, and socio-economic situations. A post-traumatic boy is ten times more likely than his female peer to act out in a way that is dangerous to another person. Proving who the better lover is most difficult but like in any debate, the definitions must be stated clearly. For this paper, love has been defined as the act of self-sacrifice in the most mature circumstances. Love is an act where a person would consistently show in her actions and decisions that she is bound to another because she wishes the other person expansion of himself with her along with him. The sacrifice of Juliet comes early on in the play as can be taken from the excerpt; â€Å"O Romeo, Romeo, wherefore art thou Romeo? Deny thy father and refuse thy name, or if thou wilt not, be but sworn my love, and I’ll no longer be a Capulet. † The line illustrates that Juliet will decide not to be Capulet if Romeo do not relinquish his name. This decision also illustrates how Juliet was ready to sacrifice her whole identity just for the sake of her lover. Maybe, for Romeo to become the better lover, he should have been more mature than Juliet. Meantime, the bard’s tale is a unique example of truly big women’s capacity to love is. References: †¦. , 2007. Elizabethan Women. http://www. william-shakespeare. info/elizabethan-women. htm Peck, Scott. M. MD. 1978. The Road Less Travelled. P. 81. Touchstone New York Hardcastle, Mike. 2007. Teen Advice. http://teenadvice. about. com/mbiopage. htm Gurian, Michael. PhD. 1999. Ten things each of us should know about adolescent boys.

Monday, October 14, 2019

Effect of Politics on Airlines and Breweries

Effect of Politics on Airlines and Breweries The Effect of Political Factors on the Airline Industry and the Brewing Industry, 2005 Politics has a huge impact on all businesses, and the range of its influence is broad. Political factors include statutes which may be implemented because of a UK governmental decision or a decision in Europe, or by the UK being a signatory to an international agreement. Other legislation arises in response to issues such as terrorist threats. Other political influences include trade agreements, restrictions and opportunities arising from foreign governments’ policies or opposition groups in the form of political parties or pressure groups formed by the public to address specific issues, who may challenge, delay or obstruct government plans. This essay looks at the impact of recent political factors on the airline and brewing industries. The Airline Industry In a speech delivered in June 2005, Derek Twigg, the Transport Minister outlined progress on the Aviation White Paper. He recognised issues with capacity, particularly with recent increases in demand for low-cost flights (Twigg 2005). A fifth terminal at Heathrow Airport is being constructed, and additional runways are planned at Stansted and Heathrow. However, there is opposition, focused on noise pollution, fuel pollution, the strain on roads and rail links to airports, and the destruction of countryside to accommodate airport expansion. The government’s pursuit of its policies depends, stated Twigg, on the ability to meet strict environmental standards, and airlines’ increased expansion depends on successful implementation of these policies. Energy Policy The UK government has secured a commitment from airlines to improve fuel efficiency and reduce emissions, but this will require investment from the airlines. The industry must strike a balance, spending on initiatives to become more ‘green’ in return for an infrastructure development policy from the government. Terrorism The 9/11 terrorist attack on the US had immediate consequences, with a drop in demand. This has had particular impact in the US, where a number of airlines have survived only because of Chapter 11 of US bankruptcy laws, which allows continued trading with protection from creditors until profitability is achieved. United Airlines has been operating under Chapter 11 for 3 years. Delta and Northwest are entering Chapter 11, and will probably follow a similar policy to United, focusing on international flights and disposing of smaller planes used for domestic flights (Field 2005). They will therefore continue to compete in the international market with protection: UK airlines would probably be forced out of business if they were to find themselves in a similar position. US anti-terror legislation requires foreign operators to undergo an audit by the Federal Aviation Administration, and to have a Part 129 Licence. Demand for transatlantic charters has been difficult to meet at times, due to many carriers not having the necessary authorisation (Wastnage 2005). Meeting new legislative demands has an economic effect on businesses due to the additional financial and human resources required. Terrorist attacks in holiday resorts are considered by many to be a response to foreign policy, particularly that of the UK and US. Consumer response is to book a holiday in an area considered safe, rather than to forego the holiday altogether, suggesting that airlines carrying holidaymakers should consider a portfolio of varied destinations. The instability of the market due to international politics has encouraged some airlines to carry out work through contractors (for example, Air Atlanta), who will provide aircraft and crew without the demand for the level of commitment required with an airline’s own staff and aircraft investment. The Influence of Europe The UK is required to adhere to European laws which may affect airlines. For example, UK legislation is being broadened to encompass an EC directive on Age Discrimination. From October 2006, one of its effects will be to outlaw forced retirement before age 65 unless it can be justified (www.agepositive.gov.uk). Current practice at British Airways is to retire pilots at 55: as many transfer to other airlines, it would appear unjustified. Salaries are much higher for pilots with long service at BA and the effect of having to keep them rather than employing cheaper new pilots could affect profits. Iraq War The Iraq war has impacted on oil prices. It has been argued that the agenda behind the US/UK decision to go to war was oil-influenced, with the US increasingly reliant on Gulf oil and hence having a particular interest in control of oilfields in the region (Cable 2003). Airlines are particularly sensitive to changes in oil prices due to their large amount of fuel consumption, and all airlines have recently had to choose between reflecting rising fuel costs in ticket prices or accepting reduced profits. Global Change The ‘BRIC’ nations – Brazil, Russia, India and China – are set to become more economically influential in coming decades. China has recently removed the barriers to private airline companies. Domestic flights in China have increased by 20% over a year, which equates to 17,000 extra flights per month (Brown 2005), as planes replace trains as the preferred method of domestic transport. This generates business for aeroplane manufacturers but places additional demands on the world oil supply. It is also part of a larger trend of China engaging more with the global economy, with the consequence of boosting wealth and consumption among its population. The Brewing Industry Environmental Issues Brewing, as with airlines, is affected by green issues. In July 2005, the British Beer and Pub Association reported a continuing fall in the energy used to produce a pint of beer to achieve double the industry’s target, reducing CO2 emissions by 13.9% (www.beerandpub.com, press release 16/2005). Although reducing emissions requires investment, meeting targets qualifies the industry for a rebate on the Climate Change Levy. Changes in Student Funding The student market is important to the brewing industry. Changes to student finances over the last 15 years have seen a switch from non-repayable grants to repayable loans to support study, with tuition fees added to student costs. This has not reduced student spending as might be expected. The average student spends  £7000 per year and 70% of students have part-time jobs (Turner 2005). Debt is accepted as the norm to meet study and living costs, with a wide range of lending sources available. Money for drinking is hence readily available, and Reachstudents, an independent marketing consultancy, claims that 29% of student spending is on entertainment (www.reachstudents.co.uk), including drinking. Extension of Licensing Hours The UK Government has proposed extended licensing hours in England and Wales: however, legislation is being opposed by the Conservatives and LibDems as well as medical bodies and organisations working to reduce alcohol problems. Implementation in November is threatened which could affect permissions granted for Christmas and New Year and reduce takings during the most profitable trading period of the year (Wintour 2005). Smoking Ban Initial plans to implement a smoking ban only in pubs where food is served have been changed in favour of an outright ban on smoking in all pubs (e.g. Carr-Brown 2005). Spirit is the UK’s largest pub chain and owns brands including Chef and Brewer. It suggests a gradual transition to pubs becoming non-smoking, anticipating that an immediate implementation could result in 5000 pub closures and 75,000 job losses across all pub companies. The chain JD Wetherspoon has already begun introducing a complete ban on smoking in a number of its pubs. However, it has recently reported a 4% drop in profits, with an even higher figure of 7% among its non-smoking pubs (Anon 2005). Binge drinking Binge drinking is somewhat double-edged for the brewing industry. On the surface, the increase in drinking to excess would appear to bode well for brewing industry profits. However, drinking large volumes often takes place in conjunction with drinks promotions, where lower prices mean a higher quantity must be consumed to give the same profit. JD Wetherspoon, responding to a recent drop in profits, suggested that the proliferation of binge drinking was keeping many consumers away from town centres and pubs (Anon 2005). Government policy on binge drinking has been criticised for its reluctance to take more extreme measures (e.g Plant 2004): however, there is pressure on the government to take steps to tackle binge drinking and the consequences for the brewing industry are uncertain. Could it open up a more profitable market by creating a more pleasant drinking atmosphere, encouraging more people to drink moderately? Or could the amount drunk in the UK drop significantly, or measures be too little to impact on the current situation? Fuel Prices The brewing industry is affected by the increase in fuel prices caused in part by the Iraq conflict, discussed previously. Transport and distribution costs have been increased by the rise in fuel costs, and consumer spending is also impacted by increased petrol and diesel costs reducing disposable income. While world oil prices affect fuel costs to some extent, a far greater proportion of the cost of a litre of petrol or diesel is the tax – both fuel duty and VAT – which are set by the Chancellor: domestic policy is having more effect than global oil price trends. Conclusion From the above, it can be seen that politics both in the UK and around the world impact on the airline and brewing industries in many different ways. While the industries can have some impact through lobbying the government, or by encouraging public support for industry-friendly policies, a significant proportion of political influences cannot be impacted by the industry, and potential threats and opportunities must therefore be addressed in each organisation’s business strategy. Bibliography Anon (2005) Wetherspoon presses on with no-smoking pubs (Press Association) in The Guardian September 3 2005 Brown C (2005) Air travel recovers to spread its wings above 9/11 clouds in The Scotsman 11 April 2005 Cable V (2003) Saddam’s other weapon of mass destruction: the potential economic fallout from a war in Iraq (from January 2003 lecture) www.lse.ac.uk/collections/globalDimensions/research/vcable.htm Cambridge Marketing College (1999) Marketing Operations (BPP Publishing, UK) Carr-Brown J (2005) Total ban on smoking in pubs and clubs a step nearer in The Sunday Times, 9 October 2005 Diageo plc (2005) Press release 1 September 2005: Preliminary results for the year ended 30 June 2005 at www.diageo.co.uk Field D (2005) Delta and Northwest shelter from creditors in Flight International 20-26 September 2005 (Reed Businss Information, UK) p10 Hall W (2005) British Drinking: A Suitable Case for Treatment? Editorial in The British Medical Journal2005;331:527-528(10September) Meikle J (2005) Pub firm changes tack on smoking ban in The Guardian September 5 2005 Plant M (2004) The alcohol harm reduction strategy for England in British Medical Journal 328 pp905-6 (17th April 2004) Turner S (2005) Drink in the Atmosphere in The Guardian, July 12 2005 Twigg (2005) Speech on UK government aviation policy, 28 June, by Derek Twigg, Transport Minister www.dft.gov.uk/stellent/groups/dft_aviation/documents/page/dft_aviation_038580.hcsp Wastnage J (2005) Brokers split on effects of tighter US security in Flight International 13-19 September 2005 (Reed Businss Information, UK) p35 Wintour P (2005) Minister cites support of police chiefs to head off licensing rebellion in The Guardian October 11 2005 Websites Brewers continue to lead battle on emissions British Beer and Pub Association 28 July 2005 Download Ref: 16/2005 www.beerandpub.com/download.asp?id_Doc=2121 www.agepositive.gov.uk (Government website devoted to Age Discrimination Legislation issues). www.reachstudents.co.uk Student statistics and profile