Monday, September 30, 2019

Learning from the Past

Learning about the past Learning about the past has no value for those of us living in the present. Do you agree or disagree? Use specific reasons and examples to support your answer. There are several views from the people, whether important or not for us keep memorizing the thing that had happened in the past and then try to put on ours life now. For this topic, I would like to discuss about the positive and negative impacts that we can get from that. First of all, there are some proverbs said, the bad experiences are the best teacher that can bring us to live more better in the present or future. For instance, when the first time we learned how to drive a car, probably we might have gotten accident because of lack experiences, but by the time we had already used to it, we will able to drive with easily and pretty sure we know how to handle the car even though the road is treacherous. In addition, learning about the past can make us more efficient either in time or money. Moreover, we can give a good impacts to other people too. In general, the child will always follow in his/her parents behavior during the process of maturity. However, there are also some adverse results that we can get if we still stick with something in the past. People who had ever committed with drugs, they should try to forget it. Otherwise, they will never move on. In my opinion, I agree that learning about something in the past can bring us some value, success will not come without failure, especially old history, that can make our next generation become appreciate about their ancestors and interest to know the history of the world.

Sunday, September 29, 2019

Decentralization under Articles of Confederation

The constitution adressed the problems of decentralization powers under the Articles of Confederation. Three problems that existest were no national currency, unicameral legislature, and cogress had no ability to tax. The tension between decentralized and centralized power are argued to still exist through environmental policy, gun control, and disability access. These tensions are illustrated in deforestation, no â€Å"national police† to control firearm distribution, and the Americans with DIsabilities Act. One major problem of decentralized powers under the Articles of Confederation is that there was no national currency.Each state had a different type of currency that could only be used in that state. For example, money in maryland could not be used in virginia and sometimes even had a different value. The Constitution created a national standard and a National Bank to solve this problem. Another problem of decentralized powers is that the Aticles of Confederation had a un icameral legislature, which meant no power check. The three branches of government could not hold any sort of power over the other so it opporated more like three separate functions rather than one government for the people.The newly created bicameral legislature took care of this problem in the Constitution. A third problem was that congress had no ability to tax. After the Constitution was passed, congress could tax and therefore could have money to fund things like job creation and war. There are ongoing tensions between state governments and the federal government when it comes to power and its control over citizens. An environmental policy example is that some states find it more difficult to abide by federal guidelines for deforestation because they have big populations that are growing even larger.A gun control example is that since there is no â€Å"national police† to control the distribution of firearms (both legal and illegal) it will have to be handled by the stat e police which costs states money. State buildings and private buildings are required to be built to accommodate people with disabilities because these people are protected by the Americans with Disabilities Act. Since their civil rights can not be violated, they have to have equal access. This, again, costs states money to bring buildings, streets, etc, up to standard.In central governments the national government has a national policy, in decentralized government states have to meet the guidelines created by the law or face fines/removal of federal funds. The Constitutions was an attempt to address the problems of decentralized goverment which were no national currency, unicameral legislature, and cogress had no ability to tax. The tensions between decentralized and centralized power are still agrued to exist today in environmental policy (deforestation), gun control (no â€Å"national police† for firearm distrabution), and disability access (Americans with Disabilities Act ).

Saturday, September 28, 2019

Principles of Criminal Law Essay Example | Topics and Well Written Essays - 1000 words

Principles of Criminal Law - Essay Example The punishment is the same notwithstanding whether the offender used a weapon against the victim or not. However for the accused person to be liable for such offences, wounding must have occurred. This means that a discontinuity of the skin must occur on the body of the victim, and at least a drop of blood must fall outside the body of the victim (Cross, 1995). It is worth noting that under section 47 of the act, bodily harm, or injury may occur to a person without directly or indirectly applying physical violence to the victim (MacDonald, 1948). The substance of the law in such a case is whether the victim would find such acts perpetrated against them either unpleasant or harmful. The law requires that it is enough for the accused to have foreseen that physical harm to some person might result. In our case, Mr. Steven Roberts committed two acts that resulted to bodily harm and physical injuries to two victims, namely his girl friend and the alleged man whom the girlfriend was cheati ng with against Mr. Steven. However, the substance of the law in the two accounts of this case are different, in that, in the first account, Mr. Steven had no intention of inflicting any bodily injury or physical harm to his girlfriend. He only meant to surprise her, an act that accidentally resulted to the girlfriend falling from the staircase and being injured. However, on the second account, Mr. Steven shoved off the man accompanying his girlfriend to make him move out of the way. In so doing, he ended up inflicting physical harm on the man, through banging him against a glass door that injured him. It can therefore, be found that while in the first account Mr. Steven did not have the intention to harm, in the second account, he ought to have foreseen that physical harm might result to the man he shoved off (Smith, 2008). This therefore makes the two accounts different in the substance of the law, something that means the accused can be liable for the accounts differently. If not found guilty for the first account, it is likely that the second account would make him liable. Thus, it is worth treating the two accounts separately in the attempt to seek legal defense for the case against Mr. Steven (MacDonald, 1975). The first account of Mr. Steven causing bodily harm against her girl friend appears defined within the confinement of section 47 of the 1861 act (Milton, 1996). The first account is admissible under the laws pertaining to common assault, whose punishment is the payment of a recommended fine or an imprisonment not exceeding six months or both. There is a defense available for Mr. Steven against the first account (Smith, 2005). Consent is applicable as one of the defense, where it requires that if the harm caused is not so severe, and there is a recognizable good reason for the offence, then the accused can be relieved of the criminal liability (Greaves, 2006). Since Mr. Steven’s intention was not to harm his girlfriend, then if the injury ha ppens not to be severe, then he can be relieved the criminal responsibility to assault (Smith, 1998). In the second account, Mr. Steven charge is under section 18 of the 1861 act because; he caused wounding and bodily harm to the man accompanying his girlfriend (Glanville, 1983). The proof that wounding was caused is the fact that there was a fall of blood from the body of the victim. The prosecution will be able to prove

Friday, September 27, 2019

Risks management analysis during Development stage of the Channel Term Paper

Risks management analysis during Development stage of the Channel Tunnel Project, Including management of environmental risks du - Term Paper Example (Yan-juan, Ding-li, & Jian-jun, 2009 p2). This is then followed by the assessment of the influence of the excavation on underground strata structures, and how such excavation might lead to their deformation. To reduce the probability of these risks, the Construction, Design and Management Regulations have been developed to aid the monitoring and avoidance of the risks. The necessary controls are then implemented immediately, to prevent the occurrence of the risks (Aritua, 2011 p304). When all that information is collected, a program detailing the nature of the strata and how it might be influenced by the excavation of the tunnel is developed (ProQuest, 2012 p2). The details of the settlement and deformation of the strata are recorded, and a scheme to control the occurrence of the deformation of the strata then generated (Yan-juan, Ding-li, & Jian-jun, 2009 p3). The monitoring and current control strategies are then established, to ensure that the influences of the excavation are cons tantly monitored and Consistent management of the site and the assessment of the structures is done on a real-time basis, and any necessary control and rectification implemented. The risks that were poorly identified were the risks to do with site investigation, which forms the basis for providing adequate information regarding what type of products can be undertaken on the area. This resulted to the establishment of risk registers for tunneling that details every aspect of the site, to ensure that all ground risks have been assessed, and the appropriate features registered, to inform the nature of the most viable project (ProQuest, 2012 p1). Environmental Risk Management during the project life cycle The project life cycle consists of four main stages namely the identification, definition, implementation and the closure stage (Lycett, 2004 p292). However, there are various environmental risks factors that are associated with these stages of the project lifecycle, which contributes to the complexity of the project. The competition for contractors was identified as the major environmental risk, since the construction companies with critical resources and the ability to mobiles are always in constant competition (Aritua, 2011 p310). The organizational structure and the project team coordination is yet another environmental risk factor that was identified, that contributes to the complexity of the project, if not adequately addressed. Social complexity is yet another environmental risk factor, which is contributed by the various actors in the project, and their diverse interests, who may include the politicians and the surrounding communities. Their conflict of interest serves to delay the implementation of the project (Clifton, 2011 p47). However, the reputational risk was poorly assessed. This risk emanates from the direct relationship between the project and the end-users, as well as the stakeholders, since the reputation of a project, is considered a vulnerab le asset, which depends on the project environment to have it sustained (Eisner, 2000 p12). The environmental risks were assessed through assessing the interaction between the project, the people and the organizations, in terms of aspects such as politics and ambiguity, which serves to complicate the

Thursday, September 26, 2019

You can choose the topic Essay Example | Topics and Well Written Essays - 500 words - 2

You can choose the topic - Essay Example These different types of sports shoes will be discussed in detail below. The first category of these sports shoes are soccer shoes which are also commonly known as soccer cleats or football shoes. They are called so because they have cleats or studs. The importance of these cleats is for prevention of injuries due to the differences in the playing field from a normal walking road or pavement ways. The cleats help to maintain balance and prevent slipping on the ground and especially the soft playing ground. The next category is the bowling shoes. These shoes are customized with special soles that are usually smooth and flat with rubber material to prevent friction when sliding while at the same time allowing for the player to be able to brake. The top is made of leather which is to prevent them from quick wear and tear (this is especially so for the rental bowling shoes). The condition provided for these shoes is that the wearer should be careful to prevent them from getting wet or dirty as these two will prevent them from not only sliding well but also from effective braking which thereby provides considerable risks. Other than these two, there are also hiking/ mountain climbing shoes. Hiking shoes are especially made to withstand all types of rough terrain and outdoor activities. In this regard, they are made with special pads or patches on the inside to reduce any form of friction which may cause ankle injuries and blisters. To further prevent blisters and ensure comfort over long distance, these shoes are lined inside with leather. They are also stiff in order to support the foot firmly. For those intending to mountaineer, their shoes have crampons in addition to the above mentioned features to prevent slipping. Lastly, they are also waterproof for those intending to hike on water-prone surfaces. Athletic shoes as

Medicine administration Essay Example | Topics and Well Written Essays - 500 words

Medicine administration - Essay Example He needs to be in school, not at home taking care of a terminally ill patient. Michael lacks the skills needed to take care of a patient suffering from Parkinson’s disease. He is also too young to cope with the challenges that come with taking care of a person suffering from this disease (Tuite, 2009). The work might be emotionally draining and Michael might not know how to handle this. He has not been trained to deal with medical conditions; therefore, he might not know how to handle his mother’s medication (Chemecky, Infortuna and Macklin, 2006). Sometimes, it is hard to administer drugs to persons suffering from Parkinson’s disease, and since Michael is not a trained medicine administrator, he might not know what to do in this situation. Michael should not be allowed to administer drugs to his mother by himself. Since his mother’s condition is very serious, she needs advanced level medications which can only be administered by a professional, which Mich ael is not. According to the law, only simple drugs such as paracetamols can be administered at home. There are age restrictions for drug administration at home. For some medications, the age limit can be anywhere from 13 years (Tuite, 2009).

Wednesday, September 25, 2019

Find a Supreme Court case that deals with Section 1983 violations Essay

Find a Supreme Court case that deals with Section 1983 violations. Research the case in some depth - Essay Example It provides a remedy for deprivation of rights, such that the plaintiff has to prove personal involvement of the defendant, the defendant’s nature and quality of available immunity and the factors that will influence the alleged wrong. Defenses for federal, local and state government are qualified immunity in Section 1983 lawsuits. Additionally, prosecutors, judges and security officers have absolute immunity in Section 1983 lawsuits. Bivens claims that there has to be personal liability acting under the â€Å"Color of Law†. This implies that the person has to be subjected to the cause and must prove that they were deprived of their rights (Lippman 473). A Supreme Court case regarding civil remedies is Darling v. State of Florida; which took place in the Supreme Court of Florida. This case involved an inmate (Darling) challenging the use of lethal injections administered in accordance with sections 27.702 and 945.10, under the Florida Statues (2007). Additionally, the inmate wanted the court to overlook the mentioned sections and mentioned that Capital Collateral Regional Counsel Attorneys could not legally aid capital perpetrators like himself in challenging the execution method under Section 1983. The ruling rejected Darling’s claims but agreed with the claim regarding legal aid; by that permitting attorneys to file section 1983 for their capital defendant clients only of they are challenging the execution method. Clearly this case offered Capital Collateral Regional Counsel Attorneys representing capital defendants’ immunity as per section 1983. True to Bivens’ words, Darling had to prove he was deprived of h is civil rights. This he did by claiming that lethal injection method of execution is an unconstitutional and cruel punishment. This case opened the door for the capital defendant immunity as per section 1983; thereby gaining defense from post-conviction motions. In the light of the supreme law, the Appellee (state of Florida) acted within

Monday, September 23, 2019

I wandered Lonely as a cloud by William Wordsworth Assignment

I wandered Lonely as a cloud by William Wordsworth - Assignment Example As an educationist and poet, he helped to introduce and forge a different genre from the mainstream usual definition and knowledge of poetry thereby introducing romance in his literature (www.cummingsstudyguides.net). It is was one of the inaugural poems in the romantic age thus qualifying it to be a romantic poem. The speaker records that he was walking around in an area where there were valleys and hills and he was lonely or alone. Equivocally, he strides up and climbs on the hill and sees a lake and noticed of the fact that there yellow daffodils moving or waving in the breeze. It is recorded by the poet that the flowers were dancing a sight which is incredible. If a reader or an observer was to compare, then one would safely assert and infer that the lake was out danced by the flowers or the daffodil, a spectacular scene to see. Tentatively, the dancing daffodils occasioned an enormity of wealth in terms of the scene would bring to him in subsequent time (www.100.best-poems.net). Intuitively, the poet drifts from being lonely or empty and started to be joyous at the amazing scene or the dancing daffodils. From that time or moment, each time he feels low or pensive he recollects the memory of joy in him or his heart. Consequently, it that the dancing daffodils brings cheers him up whenever he is in solitude or feeling empty. As a literary device, the poem employs personification in an accurate and aesthetic manner. For instance, there is characterization and personification when the poem mentions that â€Å"the daffodils danced.† In the liberal arts such as poetry this technique and style is known as characterization. When the poem mentions that the daffodils show the inward eye, it is an attempt to role play and characterize the poem or art. A reader easily notices the conciliatory tone from the poem where the poet tries to merge the human experiences with nature without much hustle. However, the mood smacks off nostalgia because it

Sunday, September 22, 2019

The opportunities for Amazing Ideas to establish and launch its Assignment

The opportunities for Amazing Ideas to establish and launch its Transition Windows product in the Australian market - Assignment Example There are opportunities that exist for the company to pursue in the Australian market given its limited strengths. Recommendations These will be founded on facts fathered during the research process on whether the company should go ahead and launch its product-transition windows and make its entrance in the Australian market. Table of Contents Table of Contents 4 Introduction 5 2. Phase one report 5 B. Company mission Statement 5 C. Amazing ideas Strategies 6 D. Industry analysis 6 E. Target Market Profile 6 F. Product Profile 7 G. Country Readiness 7 H. SWOT Analysis 7 3. Phase two report 8 A. Place (Location) 8 B. Macro-level screening 9 C. Indicators of Market Accessibility 9 D. Micro-Level Criteria Screening 10 E. Phase II Conclusions and Recommendation 10 A. Competitive Analysis 11 C. Market entry 11 5. Entry mode 11 6. Market Segmentation 12 7. Promotion 13 8. Summary conclusion and Recommendations 13 Introduction The purpose of this document is to present a study of the opport unities for Amazing Ideas to establish and launch its Transition Windows product in the Australian market. This research process provided an opportunity to prepare a thorough analysis of Amazing Ideas and its product- Transition Windows, in order to present a detailed report on opportunities available in the Australian market. This document includes background information that is developed with the assistance of a SWOT analysis. Using this analysis, both market and sales potentials in Australia were studied resulting into the development of entry strategies and marketing plans with conclusions and recommendations for pursuing this wonderful opportunity in Australia (Stapleton,1997)2. 2. Phase one...This document includes background information that is developed with the assistance of a SWOT analysis. Using this analysis, both market and sales potentials in Australia were studied resulting into the development of entry strategies and marketing plans with conclusions and recommendatio ns for pursuing this wonderful opportunity in Australia (Stapleton,1997) . 2. Phase one report The objective of this phase is to conduct an in-depth situation analysis to establish a basis to assist in determining the company’s opportunities to compete in the market. Here is the scenario. A. Company Background Amazing Ideas a company that is to be headquartered in Australia, is eyeing to venture into the Australian market with its new product, Transition window. This company was established by students from the Swinburne University of Technology in the first year of marketing tutorial class. During this session the students came up with idea of transition windows with hopes of launching their invention which holds a considerable appeal to a potential Australian Market.

Saturday, September 21, 2019

Promotional Activities Essay Example for Free

Promotional Activities Essay Section 1.0 Introduction Throughout this assignment, I will be producing a plan of a promotion campaign for an existing business. I have decided to choose Marks and Spencer Plc. I will be looking at how Marks and Spencer use promotional activities and incorporate them into a promotional mix creating a vital choice in the success of the promotion campaign. As well, I will be considering whether promotional activities can affect a business’ final choice of promotional mix. Marks and Spencer Plc are located all over the UK, with currently 600 stores that range from the large stores to the simply food stores, but their largest store is situated at Marble Arch on London’s Oxford Street. By 1975 Marks and Spencer had opened over 285 international stores. The locations of all Marks and Spencer have nearby bus stops and car parks enabling it to be accessible to its customers, in addition, a large number for the stores have collect by car facilities for customers to pick up their goods at a later time. They currently employ over 75,000 employees in the UK and internationally. Marks and Spencer was founded by Michael Marks in 1884. He opened a stall at Leeds Kirkgate Market and all the items were sold for a penny. In 1894 Thomas Spencer invested  £300 to become Michael’s partner in the company.  ­Ã‚ ­Ã‚ ­ Marks and Spencer have a very user friendly website, that shows their aims and objectives that they want to achieve to be a successful business. It provides links to their promotions and to their online shopping. I will be using this website throughout my coursework. (See appendix A). They have a lot of competition that is mainly the large supermarket chains Sainsbury’s, Tesco, Asda who are all wanting customers to come to their stores because they have the products that customers are looking for at the right price for them. They do not specialise for a specific target market as  they cater for women, men and children in clothing, however their food lines tend to be the more luxurious, high quality and expensive. Their market share is 10.7% for clothing and footwear (See appendix B) and for food the market share is 3.9%. (See appendix B). Their annual turnover in the UK is  £8.16 billion and internationally is  £898 million. (See appendix B). To ensure a business succeeds within the promotional mix, promotion is key in achieving this. I will be looking in depth to see whether Marks and Spencer have achieved this or whether they need more advertisement enabling their customers to become aware of their aims and objectives in finalising the promotion. Marks and Spencer’s objectives are: Continue to invest in and grow our core UK retail business, by introducing new goods and services. Strengthen our UK property portfolio. Drive our MS Direct business. Expand our International business. Integrate Plan A (our ‘eco plan’) into every aspect of how we do business, so that we grow in a sustainable way.

Friday, September 20, 2019

Changes to Crime Rates in the UK

Changes to Crime Rates in the UK Crime has devastating consequences to the economic and social dimensions of any country. Unfortunately despite increased efforts to fight crime halting it seems to be impossible. Slack (2009) points out that official crime figures indicate that the country has the worst rate essentially for all types, or categories of violent crimes when compared to the United States and other countries that appear on the list of the most dangerous countries in the world. Hicks and Allen (1999, 5) indicate that the figure of homicides which include offences of manslaughter, murder and infanticide have doubled since 1960s however, the state that recorded crime fell considerably in the 1990s. They assert that the rising trend of crime that was reported began in 1954 seemingly declining starting 1992 when reported crime peaked. Nonetheless the British Survey reports show the 1990s estimates of unreported crime as standing at fifty six percent and thus making it unclear whether there was indeed a decline in the 1990s. Additionally the rate of crime might have not reduced since statistics show that the average prison population has been increasing since 1940s to approximately sixty five thousand in 1998. Nonetheless the police insist that the crime rates have been declining over the years starting that they did peak in 1995 but have steadily reduced since especially due to government efforts. Home office (2008) statistics also indicate crime rates peaked in 1995 but have since dropped by 42 percent. In 2009 police reports show that crime decreased by five percent when compared to 2007/2008 rates while BCS reports show no significant change in the rates. NIMS (2008) are however of the idea that the overall crime rates have been decreasing over the past few years although some years have experienced slight increases in the rates. In general from the reports it can be concluded that on average the rates of crime have slightly decreased. On the most recent figures, what percentage of all crimes recorded by the police do the following constitute: Murder? Rape? Theft? Car theft? 2008/09 provisional data by the police show 648 occurrences of homicide. This is the lowest recorded figure in the last twenty years. Attempted murders, whose figure stood at 621 in 2007/2008 decreased by approximately forty six incidences or seven percent in 2008/2009. While there was a decline in the homicide offences that involved sharp instruments by approximately 18 incidents, attempted murders that involved knifes rose from approximately 245 to 271 incidents. Generally, of all crimes that the police recorded in the period 2008/09 murder accounted for less than two percent of them. Police records also show that while sexual offences recorded a 4 percent drop women rape increased by 12,000 cases which translates to five percent. Additionally car theft accounted for thirteen percent of all the crimes committed in 2008/09 (Home Office 2009, 16). On the most recent British Crime Survey figures, what is the most commonly experienced form of crime? According to Home Office (2009, 16), British Crime Survey statistics present property crime as the most common misdemeanor experienced by individuals. Property crime accounts for nearly eighty percent of the crimes that were recorded by BCS. Nevertheless this current figure is still lower since the high or peak point in 1995. What is meant by clear-up rates? Tarling (2008, 148) explains that while crime rate refers to the total figure of crimes that the police recorded per 100,000 people, clear up rate is described as the percentage of crime recorded that is solved or detected by the police. Home Office (2009, 131) clarify that the clear up rates may not be definitive indicators or measures of the police investigative performance and thus need to be evaluated or interpreted with care. Give examples of variations in clear up rates between crime categories. What reasons might be given for these variations? According to Home Office (2009, 131) just like in the previous years there was a variation in the clear up rates for the distinct crime types in 2008/09. For instance there was a 95% clear up rate for drug offences but 11% for vehicle offences. Additionally while the clear up rates for burglary stood at thirteen percent, criminal damage rates stood at 14%, robbery at 21%, fraud and offences at 28%, sexual offences 31% and violence against persons 47%. One of the main reasons that have been given for these differences is the nature of crime. For instance drug offences which record the highest rate are easy to clear since they are relatively straightforward to handle; to deal with an offender in possession of such substances a warning may simply be issued to the delinquent. However the rates are much lower in offences against vehicles or burglary since the offences typically come to light much later or days after they have been committed and the offenders have disappeared from the crime scene. Crime mix and the methods that are put into use by the police to detect the various offences can also lead to a variation in the clear up rates. What is the National Crime Recording Standard (NCRS) and why is it important? The NCRS provides general rules and regulations for recording offenses and has been approved and adopted by police forces since 2002 in England and Wales. It requires that all incidents reports whether from witnesses, third parties or victims and whether crime linked or not need result in an incident report registration. The NCRS represents the government attempt to overcome crime recording variations and provide accuracy and consistency in data entry between police divisions and forces. It is also important since it is meant to provide reliable data that is used to measure and compare police divisions and forces performance creating room for improvements (Hallam 2009, 38-41). NCRS also allows a crime recording approach that is victim oriented allowing the forces to fairly serve the populace. Which groups in the population are most at risk of becoming victims of violent crime? The general characteristics of adults that are susceptible or are most at risk of being violent crimes victims has not changed over the years. Essentially the overall risk of one becoming a violent crime victim in the period within 2008/09 was reported as being approximately 3%. Reports also indicate that males were twice as likely as women to become victims of violent crimes. According to the BCS survey the figure for men that had fallen victim to such crimes a year before the analysis stood at about 4 percent compared to 2% for women. Therefore the risk is highest for men than women. In addition risk of facing violent crimes for men decreased as their ages increased. Risk levels were found to be less than 1% for men that were sixty five years and older while those aged between sixteen and twenty four had a risk calculated at 13%. Similar trends were observed in females although the risk rates differed, with those between sixteen and twenty four facing a risk of about 5%. The unempl oyed people risk of becoming victims to such crime stood at 7.6 percent while that of the employed people was recorded at approximately 3%. Unmarried males and females (7.6 percent), students (8.6 percent) and individuals with mixed ethnicity (7 percent) also showed a higher than average risk of becoming violent crimes victims (Home Office 2009, 47). In terms of age and gender, which groups in the population are most likely to be known as  offenders? Offenders are likely to be young and male in terms of gender. In half of the reported violent crimes the offenders were believed or found to be between sixteen and twenty four years of age. Additionally from eighty percent of the incidents male offenders were found to be the main culprits as compared to fourteen percent for their female counterparts. The probability of males committing crime was in fact higher for all crimes. As age increased it became less likely that individuals would commit an offense. While individuals between 16 and 24 had a 55% chance, those between 25 and 39 had a thirty percent chance while those that were forty years and older had a 13 percent chance of committing crime (Home Office 2009, 70). Compared with other countries, is the crime rate in England Wales high, low, or average? Reports by the United Nations and the European Union indicate that the UK has been ranked second based in terms of overall crime rates in the EU, with higher percentages of homicides than those in Italy, German, Spain and France (Slack, 2009). Furthermore the UK is fourth in burglary rates and fifth in robbery rates when compared to most of the western European countries. The UK basically records the highest absolute burglary figure in the EU actually with double the total number of offenses that are recorded in France and Germany. Moreover Britain has been named as the most violent nation in the EU. According to Slack (2009) there are 2034 offenses occurring in every 100, 000 people in the UK, Austrias figures stands at 1677, US 466, South Africa 1609 and Canada 935. The crime rate is therefore generally high when compared with the other countries (Slack, 2009). In comparison with other jurisdictions, is the use of imprisonment in England Wales low, high or average? The proportion or percentage of the population that is imprisoned in any country varies with the conviction rates, crime rates, prison sentences length and tendency to issue prison sentences as opposed to community service or fines. Despite the declining crime rates in the UK imprisonment rates have steadily increased leading to overcrowding in prison facilities. When compared to Japan, Australia, Netherlands, Norway, Finland, Belgium, Austria, France, Spain and Canada the use of imprisonment in the UK is high (US BJS, 2005). Nonetheless when the compared to the United States, Singapore and Portugal, England and Wales use of imprisonment is average. According to BBC (2005) in every population of 100,000, 726 were in prison in the US, 142 in the UK and 58 in Japan in the year 2005.

Thursday, September 19, 2019

General William T. Sherman :: General Sherman Essays

  Ã‚  Ã‚  Ã‚  Ã‚  One of the most colorful characters of the Civil War was a General named William T. Sherman. During the period of the war (1861-1865), General Sherman went full circle from being forced to retire on trumped up charges that he was insane, to becoming a key player in bringing this bloody war to a close. He entered the annals of military history as one of the greatest and most distinguished generals of all time.   Ã‚  Ã‚  Ã‚  Ã‚  William T. Sherman was born to Charles N. Sherman and Mary Hoyt Sherman in Lancaster, Ohio, on February 8, 1820. General Sherman can trace his family history back to England. The Sherman family first came to the New World in 1634, settling in Boston, Massachusetts. Several family members achieved notorial prominence; including Roger Sherman, a signer of the Declaration of Independence, and Daniel Sherman, who sat in the Connecticut General Assembly for 30 years. In addition, Sherman’s father became a state Supreme Court Judge in Ohio. William T. Sherman was once thrown from a horse as a young child and was not expected to live. In 1829, things would once again take a turn for the worse with the Sherman Family. Sherman’s father was away on the circuit when the elder Sherman took ill and died. No doubt this caused a problem for Mrs. Sherman to have to support 10 children. Family members and friends took all but the three youngest children to raise in their homes. A family of prominence took in Young William. Senator Thomas Ewing and his wife took in young William and treated him like their own son. Senator Ewing was the first Secretary of the Interior for the United States. It was Senator Ewing’s influence that helped William get into West Point in 1836. William graduated in 1840, 6th in his class. Sherman would later marry his stepsister Ellen Ewing on May 1, 1850, in the Blair House in Washington, D.C. Sherman and his wife would eventually have several children together, including a young son who die d during the Civil War, just as President Lincoln’s young son had died. One of Sherman’s sons became a Catholic priest at the urging of his mother who was a devout Catholic. General Sherman himself converted to Catholicism but never really accepted the religion as his own. In peacetime, Sherman was unsuccessful at several business attempts just like Ulysses S. Grant. Ironically it was the Civil War that distinguished them as historical immortals.

Wednesday, September 18, 2019

The Apprenticeship of duddy Kravitz :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  In society, most people have an obsession to some extent, these may include such things as a hobby – collecting antiques; or even as simple as having to have things a certain way. For others though, obsession has a different meaning, they might become obsessed with one special object, or possibly attaining a certain goal. They might go about achieving this goal no matter what the consequences to others might be. Mordecai Richler’s book the Apprenticeship of Duddy Kravitz, illustrates one such case of obsession, the title character, Duddy Kravitz becomes obsessed with his grandfather’s saying, â€Å" ‘ A man without land, is nothing.’†, thus starting Duddy on his quest to attain a piece of land. Throughout his quest, Duddy has no regard for the feelings or the relationships he destroys in the process, weather it in his family relations, business relations, or even his personal relations to those that are closest to him.   Ã‚  Ã‚  Ã‚  Ã‚  Duddy was not born into money, his father, Max, was a taxi driver, and pulled in a low income. Max’s brother, Benjy had money and always played favourites with Duddy’s brother, Lennie by giving him money and opportunities. Duddy always had to struggle for his money, and in one his many struggles he borrows his father’s taxi cab, which is his only source of income, but does not return it for three days. He was delivering pin ball machines that he had sold. When he returns he finds his father is furious at him just taking off with the cab without permission. â€Å"They found Max at Eddy’s, and he was furious, ‘who do you think you are?,’ he said ‘that you can run off with my car for three days? Just like that.’† (Richler, 213). Duddy has a way of burning bridges with the people that he most needs, he only thinks of himself, and has no consideration for the feelings of others, even those who does not want t o hurt the most. Duddy’s grandfather, also known as the Zeyda, is Duddy’s mentor and the only person Duddy really looks up to, and the one he does not want to hurt, but ends up hurting him the worst. â€Å"‘Yvette came to see me.’†¦. ’she told me what you did,’ Simcha said, ‘And I don’t want a farm here.’ †¦. ‘I can see what you have planned for me, Duddel. You’ll be good to me. You’d give me everything I wanted. The Apprenticeship of duddy Kravitz :: essays research papers   Ã‚  Ã‚  Ã‚  Ã‚  In society, most people have an obsession to some extent, these may include such things as a hobby – collecting antiques; or even as simple as having to have things a certain way. For others though, obsession has a different meaning, they might become obsessed with one special object, or possibly attaining a certain goal. They might go about achieving this goal no matter what the consequences to others might be. Mordecai Richler’s book the Apprenticeship of Duddy Kravitz, illustrates one such case of obsession, the title character, Duddy Kravitz becomes obsessed with his grandfather’s saying, â€Å" ‘ A man without land, is nothing.’†, thus starting Duddy on his quest to attain a piece of land. Throughout his quest, Duddy has no regard for the feelings or the relationships he destroys in the process, weather it in his family relations, business relations, or even his personal relations to those that are closest to him.   Ã‚  Ã‚  Ã‚  Ã‚  Duddy was not born into money, his father, Max, was a taxi driver, and pulled in a low income. Max’s brother, Benjy had money and always played favourites with Duddy’s brother, Lennie by giving him money and opportunities. Duddy always had to struggle for his money, and in one his many struggles he borrows his father’s taxi cab, which is his only source of income, but does not return it for three days. He was delivering pin ball machines that he had sold. When he returns he finds his father is furious at him just taking off with the cab without permission. â€Å"They found Max at Eddy’s, and he was furious, ‘who do you think you are?,’ he said ‘that you can run off with my car for three days? Just like that.’† (Richler, 213). Duddy has a way of burning bridges with the people that he most needs, he only thinks of himself, and has no consideration for the feelings of others, even those who does not want t o hurt the most. Duddy’s grandfather, also known as the Zeyda, is Duddy’s mentor and the only person Duddy really looks up to, and the one he does not want to hurt, but ends up hurting him the worst. â€Å"‘Yvette came to see me.’†¦. ’she told me what you did,’ Simcha said, ‘And I don’t want a farm here.’ †¦. ‘I can see what you have planned for me, Duddel. You’ll be good to me. You’d give me everything I wanted.

Tuesday, September 17, 2019

World War I :: World War I

World War I, also known as the Great War, was a global war which took place primarily in Europe from 1914 to 1918. The immediate cause of the World War I was the June 28, 1914 assassination of Archduke Franz Ferdinand, heir to the Austro-Hungarian throne, by Gavrilo Princip, a Bosnian Serb citizen of Austria-Hungary and member of the Black Hand. The retaliation by Austria-Hungary against the monarchy of Serbia activated a series of alliances that set off a chain reaction of war declarations. Within a month, much of Europe was in a state of open warfare. And World War II or the Second World War was a global military conflict, the joining of what had initially been two separate conflicts. The first began in Asia in 1937 as the Second Sino-Japanese War; the other began in Europe in 1939 with the German invasion of Poland World War I was fought by two major alliances. The Entente Powers initially consisted of France, England, Russia, and their associated empires. Numerous other states joined these allies, most notably Italy in April 1915, and the United States in April 1917. The Central Powers, named because of their central location on the European continent, initially consisted of Germany and Austria-Hungary and their associated empires. The Ottoman Empire joined the Central Powers in October 1914, followed a year later by Bulgaria. By the conclusion of the war; only The Netherlands, Switzerland, Spain and the Scandinavian nations remained officially neutral among the European countries, though many of those provided financial and material support to one side or the other. World War II was also fought by two major alliances, the Allied and Axis power. The AXIS powers consisted of Germany, Italy (changed sides and split in half 1943) Hungary, Romania Bulgaria, Finland (changed sides 1945) Spain was meant to be neutral but they helped Nazi Germany and Fascist Italy and sent troops to fight alongside the Germans in Russia. The major Allied Powers were Great Britain, France, the Soviet Union, the United States, and China. The fighting of World War I mostly took place along several fronts that broadly encircled the European continent. The Western Front was marked by a system of trenches, breastworks, and fortifications separated by an area known as no man's land. These defenses stretched 475 miles and precipitated a style of fighting known as trench warfare. On the Eastern Front, the vastness of the eastern plains and the limited railroad network prevented the stalemate of the Western Front, though the scale of the conflict was just as large.

Peace Cultures in Action Today Essay

In â€Å"Peace Cultures in Action Today†, the author argues that some small isolated societies manage to create a culture of peace that often ends or is severely modified when they begin interacting with outside cultures. The argument then is that the greater society of the world is less peaceful than these small isolated societies. This theory warrants further study, especially in the area of how these societies react when confronted with societies that do not have the same values. For example, when the Zuni and Inuit are confronted by the larger populace of the United States, do they become more competitive? The interesting question here then is, â€Å"Is competititiveness and aggression a learned behavior? † In the piece, â€Å"To Construct Peace† , Elise and Kenneth Boulding too argue that peaceable existence is a learned behavior and that it can be taught. Elise was nominated for a Nobel Peace Prize for this theory, but it does not seem particularly sound. Even their own pacifist leanings led to conflict. Though the conflict was in the court systems over the right to become a citizen without an oath to bear arms for the country and a battle over their refusal to sign anti-Communist statements during the McCarthy era, it was still a conflict based on their moral standing. Therefore, it is safe to believe that even in people who believe in and are taught to live in peace, conflict may be inevitable when dealing with the real world. Later the same peace cites Thomas Merton and his poetry and meditations against war and his disappointment that the church could support a â€Å"just war† theory. This again is an interesting position that requires more exploration. Should society allow tragic events to continue because of a belief in peace or should war become a tool of peace? The moral and social ambiguities are clear. If a person is being oppressed and his pacificits nature is being used to subjugate or eradicate him, isn’t there some point at which man must fight for his own survival? This is the point that all of the essayists seem to miss. Peace for peace’s sake is a good thing and being taught to attempt peaceful coexistence before immediately turning to aggressive behaviors may be appropriate. However, if the species is to survive, at some point base instincts overcome learning and the fight for survival becomes more powerful that the desire for peace.

Monday, September 16, 2019

Sun Microsystems Strategic Positioning

SUN MICROSYSTEMS: STRATEGIC POSITIONING Susan L. Elvins National American University History, Strategy, International Abstract This thesis will discuss the corporate strategy of Sun Microsystems and the multiple issues they have faced both domestic and internationally. Sun Microsystems provides open source software applications and different types of hardware for business consumers. A benefit Sun Microsystems provides with new technology to customers is offering them the ability to trade computer parts when upgrading. ii CONTENTS Abstract †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ii CHAPTER 1 SUN MICROSYSTEMS: INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 CHAPTER 2 SUN MICROSYSTEMS: HISTORY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 History †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 Continued Growth †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 CHAPTER 3 SUN MICROSYSTEMS: MARKETING †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 SWOT Issues †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 Microsoft vs. Sun Microsystems †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 CHAPTER 4 SUN MICROSYSTEMS: PRODUCT TECHNOLOGY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Software †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 Servers †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. History Conclusion †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 CHAPTER 5 SUN MICROSYSTEMS: CODE OF ETHICS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 Employee Code of Ethics †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8 Employee Relationships †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 9 Anti-Discrimination Policy †¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 CHAPTER 6 SUN MICROSYSTEMS: LEGAL ISSUES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 0 Hardware Patents †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 10 CHAPTER 7 SUN MICROSYSTEMS: INTERNATIONAL COUNTRY ANALYSIS (ITALY) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 11 CHAPTER 8 SUN MICROSYSTEMS: INTERNATIONAL ENVIRONMENT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 12 International Economy Results †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 12 Domestic Economy Results †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 CHAPTER 9 SUN MICROSYSTEMS: INTERNATIONAL DEMOGRAPHICS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 13 iii CHAPTER 10 SUN MICROSYSTEMS: INTERNATIONAL POLITICS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 CHAPTER 11 SUN MICROSYSTEMS: INTERNATIONAL SWOT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 SWOT Analysis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 15 CHAPTER 12 SUN MICROSYSTEMS: GLOBAL BUSINESS STRATEGIES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 Five Business Level Strategies †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 CHAPTER 13 SUN MICROSYSTEMS: CHANGE MANAGEMENT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 Server Management †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦.. 17 CHAPTER 14 SUN MICROSYSTEMS: STRATEGIC CHANGE †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 Product Upgrade †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 18 Storage Management †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 19 Open Source Management †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 CHA PTER 14 IMPLEMENT PLAN OF CHANGE †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 20 Implement Change †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 20 CHAPTER 16 IMPROVEMENT RECOMMENDATIONS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 References †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 22 CERTIFICATE OF AUTHENTICATION NATIONAL AMERICAN UNIVERSITY . 25 APPENDIX A PORTER’S FIVE FORCES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 APPENDIX B GOVERNMENTAL PARTIES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 27 iv History, Strategy, International CHAPTER 1 SUN MICROSYSTEMS: INTRODUCTION Over the last 26 years, Sun has built a strong business strategy to satisfy commercial and consumer buyers with multiple products. When it all comes down to it, Sun Microsystems is one of the most defined and trusted computer manufactures in the globe. This thesis paper discusses the achievements of Sun Microsystems, Inc. Chapter 2 looks into the history of Sun Microsystems. Chapter 3 reviews the choice marketing strategy of Sun and how they have improved their current business position. Chapter 4 examines what products Sun provides consumers in software, storage, desktops, workstations, and microelectronics. Chapter 5 discusses the business code of ethics policy. Chapter 6 explores the legality of Sun Microsystems. Chapters 7 through 11 discuss the international facility of Sun Microsystems in Milan, Italy and chapter 12 explores their global business strategies. 1 History, Strategy, International CHAPTER 2 SUN MICROSYSTEMS: HISTORY In 1982, four people got together and built Sun Microsystems, Inc. in Santa Clara, California. The latest date of 2007 annual reports confirms this company now has 34,000 employees worldwide. According to Hoovers, the top three executives are Jonathan I. Schwartz, President, CEO and Director, then Scott G. McNealy, Chairman, and then Gregory M. Papadopoulos, EVP Research and Development and CTO. (Hoovers, 2008) Since 1982, Sun Microsystems has believed, â€Å"The Network is the Computer† to achieve their company success. History In 1983, Sun made enough revenue to open operations overseas in Europe. (Sun, 2008) This new overseas office gave many capabilities to what Sun could accomplish. For example, Sun opened their doors in multiple international countries to build revenue. The first international operations for Sun opened in Canada in 1985 (Sun, 2008). The following year, operations started in Asia then in Australia. Sun, 2008) In 1988, Sun reached their first $1 million dollars in sales revenue, which is a major milestone. (Sun, 2008) In 1990, Sun introduced the first workstation which was a new plateau reached. (Sun, 2008) This workstation brought new strategy into Sun’s marketing strategy because of opportunity it added. Continued Growth In the late 1990’s, Sun expanded their business horizons int o hardware then built a T1 server which handled the backbone of the Internet. (Sun, 2008) That same year, Sun completed the Micro, Standard, and Enterprise editions of the Java 2 platform 2 Comment [US1]: Period follows citation not before History, Strategy, International 3 application. (Sun, 2008) Java software gives opportunity to developers they previously did not have. This software allows programmers to develop and build ideas more easily. Java is used in web browsers to this day, so it is important to ensure that application stays updated as required. History, Strategy, International CHAPTER 3 SUN MICROSYSTEMS: MARKETING The marketing strategy of Sun Microsystems did change as the company increased the product line because with additions they needed to build a correct strategy. The reason for changing the marketing strategy is to compete with businesses just like them. Sun Microsystems has always ensured that their consumers receive the best products and the best in customer service. In 1992, a great marketing strategy used by Sun was to join with Hewlett Packard and announce new workstations built specifically for technical businesses. As the author of Computerworld magazine stated, â€Å"The companies are pitching their workstations to different customers–Sun wants to displace PCs from commercial desktops and HP is focusing on the midrange and high-end workstation user. (Johnson, 1992, 4) SWOT Issues Just like any other business, Sun has strengths, weaknesses, opportunities, and threats. Keeping those four key points in mind will provide Sun the assistance they need to further their possibilities in the world of technology. Sun was able to acquire the program application MySQL. In many technical circles such as networking, the word â€Å"lampâ₠¬  will be used during a discussion between administrators. An IT article explains how these letters are also read. The letters of lamp each stand for an application used to build a network server; Linux, Apache, MySQL, and PHP. Anonymous, 2008) Microsoft vs. Sun Microsystems Microsoft is a company that many consumers know for the popular operating software they provide, Windows. Some may not be aware of legal issues that had taken 4 Comment [US2]: Magazines and newspapers are in italics History, Strategy, International 5 place between Microsoft and Sun regarding the Java application. A 2004 article put many business owners at ease when the authors stated, â€Å"Just before last Christmas, secret talks aimed at ending one of the bitterest wars in business foundered. (Guth & Clark, 2004, A1) The disagreement began on October 1997 when Microsoft was sued for using Java incorrectly. In January 2001, Microsoft and Sun did reach an agreement finally to settle the 1997 case in which Mic rosoft paid Sun $20 million dollars. (Guth & Clark, 2004) The settlement of this case actually allowed both companies to move forward without regrets. On March 10, 2008, Microsoft and Sun Microsystems met once again and this time it was on better terms. Both companies created an alliance including the grand opening of the Sun/Microsoft Interoperability Center. The center is located in Redmond, Washington, the same location of the headquarters for Microsoft. One benefit this center received was the type of Sun server and storage system. The other benefit was the type of Microsoft server software. (Johnson, 2008) History, Strategy, International 6 CHAPTER 4 SUN MICROSYSTEMS: PRODUCT TECHNOLOGY Software Sun provides many options to consumers when choosing from software. It is not just operating systems. Sun provides Java and Java Enterprise Systems to the consumers. Consumers have the ability to use Mobile Solutions when they are away from their away from their main computer. Business management software is available on levels of security for identity management or systems management. Software tools to assist database maintenance, application management, and development production are also available. The latest version of Solaris is Solaris 10 and it was released in 2004. (Sun, 2008) Servers Sun Microsystems has been busy improving since the original SPARC came onto the market. Now consumers have multiple options within this category to chose. For example, a consumer could choose a â€Å"Blade† server, the â€Å"x64† server, a Netra server, a SPARC erver, an Entry Rack Mount server, a Mid-range server, or a High-End server. Each product has advantages and disadvantages that will match up to a consumer’s needs. If a business still needs to consider options, the Sun web site performs a comparison of the servers. If a business needs something more customized, Sun will provide rack cabinets so the business can build a specialized rack sys tem to meet their own needs. History Conclusion Sun Microsystems provides more than software, main frames, and rack systems to the consumer. Over the last 26 years, Sun has built a strong business strategy to satisfy History, Strategy, International 7 commercial and consumer buyers with multiple products. Sun is a business that believes the best way to earn revenue is to stay focused on important issues. Keeping focus on business strategy and consumer needs will turn growth and revenue into prosperity. History, Strategy, International CHAPTER 5 SUN MICROSYSTEMS: CODE OF ETHICS In 2001, Sun Microsystems built a Business Conduct Office (BCO) to assist employees and board members as necessary. (Corporate, 2008) To ensure employees are assisted in the best possible way, Sun keeps this document consistently updated. An employee can contact the human resources department should they have any questions or concerns. Employee Code of Ethics After employees are hired, they are provided with documentation listing a helpfully written ethics policy each person is required to follow. As an employee, a person is expected to use common sense in the decision-making process. More importantly, Sun requires each employee and board member to follow these company ethical guidelines: â€Å"Be familiar with these Standards of Business Conduct and follow them at all times. Comply with all applicable governmental laws, rules, and regulations in the performance of their duties on Sun’s behalf. Be sensitive to situations which could lead to inappropriate business conduct and avoid engaging in such inappropriate business conduct. Comply fully with the letter and spirit of Sun’s Conflict of Interest policy and always conduct Sun business in a manner that avoids conflicts between personal interests and Sun’s best interests. Promptly bring to the attention of appropriate Sun management or Sun’s Business Conduct Office any known or perceived unacceptable business conduct or illegal behavior. Seek appropriate guidance when it is suspected that business conduct issues. 8 History, Strategy, International 9 Always conduct Sun’s business with honesty and integrity and refrain from conduct that would negatively impact Sun’s reputation. † (Sun Microsystems, 2007) Employee Relationships Businesses must build a working relationship between their employees just as they do with their consumers. It is also important for employees to know they will always have the respect of their employer at all times. Employees are expected to return the same professional conduct as a courtesy to their employer. In addition to professional standards, Sun has a global anti-discrimination policy that protects employee rights. This anti-discrimination policy serves dual purpose because it protects an employee’s rights and it prevents discrimination within the company. Anti-Discrimination Policy In the anti-discrimination policy, there are four types of harassment examples. They are verbal harassment, visual harassment, physical harassment, and sexual demands. (Sun Microsystems, 2007) An example of verbal harassment is co-worker insults another with explicit jokes or makes sexual remarks towards another person. Visual harassment is considered graphic material whether it is written, printed, or sent through email. Physical harassment is considered more sexual driven as a person intentionally brushes up against another in a way that is unwelcome. Sexual demands are defined as unwanted sexual advances. History, Strategy, International CHAPTER 6 SUN MICROSYSTEMS: LEGAL ISSUES Sun Microsystems has a legal department that has the capability to work through multiple situations. For example, Sun took legal action against Microsoft after discovering their Java code was used to advance Microsoft’s Internet Explorer. After Sun and Microsoft ironed legal differences in front of a judge in 2004, both companies emerged with new ideas. According to a 2007 article in the Wall Street Journal, â€Å"Sun has agreed to sell servers that come with Windows installed at the factory. Some customers already run Windows on Sun's x86 systems — those that use chips from Intel Corp. and Advanced Micro Devices Inc. — but had to buy and install the software themselves. † (Lawton & Clark, 2007) The executive vice president of Sun’s systems group stated, â€Å"This is quite a different situation. (Lawton & Clark, 2007) It is obvious seeing Sun and Microsoft business activities they can become allies and begin build something new to benefit the consumer. Hardware Patents Another legal issue was resolved between Sun and a company named Custom Hardware Engineering over a patent dispute. Financial Wire briefly explained this suit in an article because of the delicate legal information involved . This independent service stated, â€Å"Custom Hardware had filed an antitrust counterclaim against the charges and was seeking $140 million in damages. † (FinancialWire, 2007) Sun settled the counterclaim with an amount that has not been disclosed. Because Sun purchased this hardware company, Sun in turn legally owned all rights however; one could possibly see why Custom Hardware attempted to sue for counter damages. 10 History, Strategy, International CHAPTER 7 SUN MICROSYSTEMS: INTERNATIONAL COUNTRY ANALYSIS (ITALY) This section of the Sun Microsystems research paper discusses the international facility. The global center is located in Milan, Italy. The international center provides consumers the exact services that American customers receive. This section provides economic details of Italy such as employment and unemployment. Other information discussed is things pertaining to demographics and the future of how Sun can progressively build its facility in the country. Over the last 26 years, Sun Microsystems has built a strong business strategy to satisfy commercial and consumer buyers with multiple products. When it all comes down to it, Sun Microsystems is one of the most defined and trusted computer corporations across the globe. 11 History, Strategy, International CHAPTER 8 SUN MICROSYSTEMS: INTERNATIONAL ENVIRONMENT Sun has built a center in Milan and it is called the Solution Center. They believe it will â€Å"expand business opportunities, lower development costs, and get products to market quickly†. (Sun, 2008) Customers can choose from products such as Solaris and Linux servers, desktop computers, and other types of storage peripherals. Four services available in the Milan Solution Center are proofs-of concept, benchmarks, product and solution demos, and porting. (Sun, 2008) International Economy Results In Italy, the first economic quarterly period was reported as $387,952 million Euros. It was showing a 0. 7% change from the previous quarterly period with a 1. 9% change from the previous year. Italy, 2008) As of May 2008, the employment rate status was 23,229 and the unemployment rate was 6. 5%. The total imports of goods and services in May 2008 amounted to $40,150 million Euro. Total exports of goods and services in May 2008 amounted to $39,688 million Euro. SDDS data reported the revenue of 2007 being $724,246 million Euro. (Italy, 2008) The Sun fa cility is located in Milan, Italy. Domestic Economy Results As of August 2008, Sun Microsystems reported its fiscal results. The revenue for the fiscal year was $13,888 billion. Revenue results for Q4 of fiscal 2008 are $3. 780 billion. Net-income for the fiscal 2008 earnings is $88 million. Cash earnings from operations of fiscal year are $1. 3 billion. (â€Å"Sun Microsystems,† 2008) 12 History, Strategy, International CHAPTER 9 SUN MICROSYSTEMS: INTERNATIONAL DEMOGRAPHICS On July 2007, a census reported the population of Italy to be 58,147,733 residents approximately. (Intute-World Guide, 2006/2008) The total residents in the labor force as of 2007 were 24. 86 million. The exports of Italy are engineering products, textiles and clothing, production machinery, motor vehicles, transport equipment, chemicals, food, beverages and tobacco, minerals and nonferrous metals. The country of Italy has boundaries to Austria, France, San Marino, Slovenia, Switzerland and the Vatican City including a coastline that spans 7,600 kilometers. (Intute-World Guide, 2006/2008) There are eight seaports, Augusta, Genoa, Livorno, Ravenna, Sarroch, Taranto, Trieste, and Venice. Italy has one gas pipeline and one oil pipeline. Two types of railways and 612 merchant ships are available to carry commercial or industrial cargo. (CIA-The World, 2008) Population According to The World Fact Book, the population of Italy was 58,145,321 as of July 2008. The median age of the male was 41. 4 years. The median age for the female was 44. years. The census of 2001 showed literacy rate for the male population as 98. 8% and the literacy of the female population as 98%. In a census as of 2006, school age expectancy for males was 16 years and school age expectancy was 17 years for females. (CIA-The World, 2008) 13 History, Strategy, International CHAPTER 10 SUN MICROSYSTEMS: INTERNATIONA L POLITICS According to the Maps of the World, there are three government components in Italian politics executive, legislature, and judiciary. (Government and, 2008) The executive area is in essence the Prime Minister while judiciary has control over legal power of the country. Italian citizens are permitted to vote at the age of 18. They can choose from a multiple list of governmental parties listed in Appendix B. (Government and, 2008) 14 History, Strategy, International CHAPTER 11 SUN MICROSYSTEMS: INTERNATIONAL SWOT Even though Sun has a facility in Italy, a SWOT analysis must be followed to ensure business operations move smoothly. SWOT analysis is defined by Bnet. com as, â€Å"an assessment of Strengths, Weaknesses, Opportunities, and Threats. SWOT analysis is used within organizations in the early stages of strategic and marketing planning. It is also used in problem solving, decision making, or for making staff aware of the need for change. It can be used at a personal level when examining your career path or determining possible career development. † (Cnet Networks Inc, 2008) In essence, the SWOT analysis is used to guide a business with structure and conformity. SWOT Analysis The SWOT analysis shows how strengths and weaknesses are internal whereas opportunities and threats are external. Using that philosophy, Sun must keep track of strengths or business advantages at their Milan facility. Sun should consider how to improve the current business status by increasing revenue in the technical market. When a business keeps aware of opportunities, it can improve their status. A few examples provided by QuickMBA. com are, â€Å"an unfulfilled customer need, arrival of new technologies, loosening of regulations, and removal of international trade barriers. † (Swot Analysis, 1999/2007) For example, currently Sun has a few facilities with trade barriers so should they be lifted that will allow easier delivery of product and building of revenue. Furthermore, Sun has 10 General Prohibition restrictions with specific countries and customers. (Sun Microsystems, 1994/2008) These restrictions protect Sun as well as their employees. 15 History, Strategy, International CHAPTER 12 SUN MICROSYSTEMS: GLOBAL BUSINESS STRATEGIES The three strategies business owners can choose from when determining what will work best for their business strategy on a global scale are multi-domestic, global, and transnational. The multi-domestic business strategy focuses on all overseas countries the firm has operations. The global strategy focuses on how products are delivered to the countries. According to Cangemi, â€Å"a transnational strategy seeks to combine aspects of both multidomestic and global strategies in order to emphasize both local responsiveness and global integration and coordination. † (Cangemi, 2008) Five Business Level Strategies Sun builds benefit from the five business level strategies that are cost leadership, differentiation, focused low cost, focused differentiation, and integrated strategy. Sun recognizes five items their business could face while attempting to improve. These items known as Porters Five Forces are competitive rivalry, power of suppliers, power of buyers, threats of substitutes, and threats of new entrants. A visual of Porters five forces is displayed in Appendix A. (Recklies, 2007) Albert Einstein once said, â€Å"Try not to become a man of success but rather to become a man of value. † (Success Quotes, 1994/2007) Sun delivers value to their consumers both domestic and international. Sun has grown to a successful business because of their continuous years of hard work from the CEO and all employees. Sun has proven to succeed in business it takes dedication, communication, and the willingness to work outside of the box. 16 History, Strategy, International CHAPTER 13 SUN MICROSYSTEMS: CHANGE MANAGEMENT Since 1982, Sun Microsystems has followed a structured business plan of goals for company products, services and higher revenue earnings. The 1980’s was a time for many companies to begin automating their systems. While some companies were just beginning to automate, Sun introduced its first workstation for businesses. In 1983, Sun opened the first facility overseas in Europe to expand products and increase revenue. Server Management In 2000, Sun customers who purchased high-end servers experienced a memory glitch error. Because of the error’s location, a statement was released on anonymity. The CIO stated, â€Å"Sun has taken an aggressive approach to addressing these issues with our customers. We have identified the source of the problem and taken steps to ensure that it does not happen again. † (Wagner, 2000, 10) Executives have said even though consumers were requested to sign a nondisclosure agreement to protect proprietary information, Sun plans to releasing a system board before the New Year that should resolve this error. Just as a gardener pull weeds for vegetables growth, Sun executives train personnel so they can grow within the business and excel. 17 History, Strategy, International CHAPTER 14 SUN MICROSYSTEMS: STRATEGIC CHANGE In December 2002, Sun Microsystems accomplished one more business goal after automation of their data center. Gordon Haff, analyst at Illuminata explains, Making effective use of data-center assets always has been an issue, but it's been exacerbated by the technology build-out of a few years ago. People would be very happy with a magic solution that allowed 1,000 servers to be managed as easy as one server, but that doesn't exist today, software developments such as IBM's Project eLiza, Hewlett-Packard's Adaptive Management Platform, and Sun Microsystems' N1 are steps in the right direction. (Greenemeier, 2002) Product Upgrade In April 2004, Sun Microsystems performed a product upgrades to Linux that provided business consumers desktop ease. This Linux version provides a newer version of Enterprise Java desktop. Not only that, system administrators can now control the entire desktop from a central platform. Chris Maresca, senior partner from Olliance Consulting states, â€Å"The desktop is one of the largest cost components of any modern corporation. When you layer on top of that the cost of server-based productivity apps tied to desktops, like Exchange, and you factor in the support costs for the desktops, servers and updates/security patches, plus mandatory hardware upgrades every few years, [the migration case] becomes even more compelling. † (Rooney, 2004) 18 History, Strategy, International 19 Storage Management In 2004, an upgrade that brought positive results to Sun was in the data management department. Sun announced the products StorEdge 6920 and Sun StorEdge 9990 storage devices. Marc Canepa, executive vice president of Sun Microsystems storage products says, â€Å"We don't think of storage as a separate company that just happens to be owned by Sun Microsystems, just like we don't believe that the strategy to reduce cost and complexity is one of going to a customer and taking over the whole operation. † (Fonseca, 2004) Open Source Management The strategy for this project has increased as time progressed because it is a very important product. An example of this is Sun classifying commercial open-source business strategies into four categories. Driver, Feinberg, and Weiss listed them in a Sun Microsystems Open Source 2008 report as: Sponsor open-source projects and solutions as an active member of a community, leverage open-source software embedded in other products and services, support and integrate selected products and services with open-source solutions, and provide direct, commercialized products and services of open-source solutions. (Driver & Feinberg, 2008) History, Strategy, International CHAPTER 14 IMPLEMENT PLAN OF CHANGE Sun Microsystems provides a vast amount of products, which support multiple needs of customers. To ensure the best strategy, Sun Microsystems must implement a plan to improve their current strategic position. When a business uses one strategy continuous, employees tend to become complacent then fall into a comfort zone. When Sun implements a new strategy, they could experience some resistance from employees because they did fall into that comfort zone. Implement Change When a business is ready to improve, management needs to be aware of three things, people, communication, and training. As John Kline explains in his article, â€Å"Implementing organizational change is a difficult and critical task. It has always been that way and is getting more so with the accelerated rate of change in most organizations. † (Kline, 2007) Employees must be aware of the changes made and how it will affect them. It is important for managers to stay communicated with their staff and keep them informed of any changes as they take place. During the process, managers should be training employees so they are prepared for the new conversion. 20 History, Strategy, International CHAPTER 16 IMPROVEMENT RECOMMENDATIONS Sun has a scheduled budget for research and development. The current strategy has allowed this company the ability to build a strong position in technology. Sun purchased a software company to complete a software collection for service-oriented architecture (SOA). Unfortunately, since this purchase Sun has not regained any lost ground. Sun must research what is currently available for storage management software and reconsider improving the plan for usage in mainframe systems. Sun should make a plan of time to review servers being sold. For example, newer technology will allow the company to provide things which older technology could not. A question Sun Microsystems must consider is how to manage replacements of damaged servers from customers when those particular servers have been replaced with newer models. Perhaps it is an opportunity for Sun to offer their customers a discount in such cases. In conclusion, Sun has built a strong business strategy to satisfy commercial and consumer buyers with multiple products. Because marketing is their responsibility, they must track sales and competition then readjust as necessary. Sun Microsystems is a defined and trusted computer corporation that international and domestic markets will work with. 1 History, Strategy, International 22 References Cangemi, R. R. (2008). The Formulation of an International Strategy. Pace University. p26-4. CIA-The World Factbook Italy. (2008). Retrieved August 11, 2008, from CIA Web site: https://www. cia. gov/library/publications/the-world-factbook/print/it. html Cnet Networks Inc. (2008). SWOT Analysis Definition. In BNet. com. San Francisco: C net Networks, Inc. Driver, M. , Feinberg, D. & Weiss. (2008). Open Source at Sun Microsystems, 2008 (Research Note G00156448). Denver, CO: Gartner. Fonseca, B. (2004, September 20). Sun, HP Focus on Storage; Goal is to simplify SAN management. Eweek, p. 31. Government and Politics in Italy. (2008). San Jose, CA: MAP XL Inc. Greenemeier, L. (2002, December 2). Automating the Data Center. InformationWeek (917), 65. Guth, R. A. , & Clark, D. (2004, April 5). Peace Program-Behind Secret Settlement Talks: New Power of Tech Customers; Microsoft, Sun Bury Hatchet, As Big Clients Demand Products Work Together; Gates Spotted in Enemy Camp. Wall Street Journal, p. A1. Hoovers. (2008). Sun Microsystems Executives [Data]. Available from Hoovers, http:// www. hoovers. com/free/co/people. html? ID=14833 Intute-World Guide. (2008). (Original work published 2006) Retrieved August 7, 2008, from Intute Web site: http://www. intute. ac. uk/sciences/worldguide/html/ 920_people. html History, Strategy, International 23 Italy: Economic and financial data. (2008) Retrieved on August 9, 2008 from http://www. istat. it/fmi/ITALY-NSDP. html#Real_Sector Johnson, M. (1992, November 16). Su n, HP Rev Workstations. Computerworld, p. 4. Johnson, R. (2008, March 10). Sun and Microsoft Expand Investment In Interoperability With New Center in Redmond, WA. Sun News. Kline, John A. (2007, January 1). How to implement change in your organization: the key: communicate, communicate, communicate. The Free Library. Recklies, D. (2007, December 30). Porters Five Forces. The Manager. org. Rooney, P. (2004, April 19). Migrating To LINUX. CRN, pp. 28. Success Quotes [Albert Einstein Quote]. (2007). (Original work published 1994) Retrieved August 17, 2008, from Quotations Page Web site: http:// www. quotationspage. com/subjects/success/ Sun Microsystems Export Prohibitions Disclaimer [International Trade Services]. (2008). (Original work published 1994) Retrieved August 17, 2008, from Sun Microsystems Web site: http://www. un. com/sales/its/prohibitions. html Sun Microsystems Reports Final Results for Full Fiscal Year and Fourth Quarter 2008. (2008, August). Sun Newsletter. Sun Microsystems, Inc. (2008). History. Retrieved from Sun Microsystems, Inc. , http://www. sun. com/aboutsun/company/history. jsp Sun Solutions Center: Milan, Italy. (2008) Retrieved on August 9, 2008 from: Sun Microsy stems: http://www. sun. com/solutioncenters/locations/milan/ Sun's Open Source Experiment. (2008, January). IT Week, 13. History, Strategy, International 24 SWOT Analysis. (2007). Original work published 1999) Retrieved August 17, 2008, from Quick MBA Web site: http://www. quickmba. com/strategy/swot/ Wagner, M. (2000, Nov 13). Sun under Fire for Crashes – IT Execs Say Server Vendor was Unresponsive; Hardware Fix for Memory Glitch is coming. Internetweek, PG10. History, Strategy, International CERTIFICATE OF AUTHENTICATION NATIONAL AMERICAN UNIVERSITY GRADUATE STUDIES Submitted to: Dr. Richard H Gayer Submitted by: Susan L. Elvins Course: Strategy and Policy Date of Submission: September 11, 2008 Certificate of Authorship I hereby certify that I am the author of this document and any assistance I received in

Sunday, September 15, 2019

My Ambition To Become an Engineer Essay

â€Å"Try and try until you succeed† These words have always inspired me at every point in my life . It has made me cross all the hurdles that came across and focus on my career goals so far . I have been blessed to have parents who have instilled me with such good values and principles. They have supported me in accomplishing and standing up for the goals I have set forth. With this mindset I gathered knowledge to succeed in my studies and to be one of the best in my class .I am currently pursuing my 12th Grade from Science Stream . I have scored 92% in my 10th grade . Physics has always been my subject of interest which made me score †¦Ã¢â‚¬ ¦ . Besides Physics , Mathematics has always been a strong weapon for me. One of the reasons why I'd chosen Engineering as my career stream was because of my family and relatives . Most of the people in my family belong to a Engineering Background and seeing them brought in me the enthusiasm to become and Engineer .Most of all my da d had been quite a huge part of my inspiration , seeing him work hard to attain the goals he has set in his life and his work place made me even more ambitious that i should not only become a Engineer but explore and become one of the Best Engineers . Universe had always been a mystery for me , I always use to hear new stories about the universe which made me even more keen to explore it and know what else does it consist of . Since then i always wanted to get into the Aeronautics field of Engineering so that i could get the opportunity to be one of those people i use to look up in Magazines and newspapers .

Saturday, September 14, 2019

Christianity vs. Greek Mythology Essay

Throughout many ages religion has been a very important part of history. It shaped many cultures and allowed us to better understand many civilizations. Two of these cultures are those of the Christians and Greeks. Both have similarities and differences in their religious beliefs that have been compared often and I have chosen to discuss the similarities and differences of Christianity and ancient Greek mythology. Christianity is a monotheistic religion, or belief in only one God, and spiritual practices are based on the Old Testament and the teachings of Jesus as written in the New Testament of the Bible, with the role of Jesus as savior and the Son of God. Greek mythology is a polytheistic religion, which is the belief in and worship of multiple deities, called gods and goddesses, belonging to the culture of ancient Greece. Even though their definitions are different, the faith of Christianity and one God and the culture of the Greeks in mythology of many gods are alike in a number of ways. To begin, in both religions humans believe that there are speakers for their God/gods. These people include pastors, priests and nuns in Christianity, and storytellers or prophets in Greek times. Furthermore, the people believe that their God or gods are above humans. Both cultures believe a god is above all mortal and of this earth, and he or she listens to people when they need help, and have supernatural power to help. This is why both the Christians and the Greeks pray to their God and gods for forgiveness. Another similarity between the religious beliefs of these two cultures is that they have explanations for many of ancient mysteries of life and major events on earth. The ancient Greeks and early Christians tried to find an explanation for the evil in the world, and both blame a woman for man’s downfall. Greeks believe a woman named Pandora opened a forbidden box and released all evil into the world. Christians believe a woman named Eve released evil after eating from a forbidden tree. Also, in both the ancient Greek and Christian beliefs of the early world, there exist stories of great floods that destroyed most of humankind. In Greek mythology, Zeus orders a man named Deucalion to make a chest in which he and his family can survive  the flood Zeus was going to bring upon the earth. In the Bible, the account of Christian beliefs, God orders a man named Noah to build an ark in which he and his family, and two of each animal, can survive the destruction from a flood God was going to send. War was also a common characteristic of both the ancient Greek world and of the Biblical world. For example, the Trojan War is a major event in Greek history, and is written about most famously in Homer’s Iliad. The gods always seemed to play important roles in this war, especially Zeus, Ares the god of war, and the other and goddesses living on Mount Olympus. Wars between Greek city-states were also common, with gods and goddesses almost always involved in them in some way. In similar comparison, the Bible accounts many stories of wars between different countries and religious groups, with God being involved in some way in the outcome or fate of the peoples. One of the most famous examples is the war between the Philistines and the Israelites. In this war, God interfered and sent a small shepherd boy David to save the Israelites. David does so by killing the giant Goliath, a super-human thing he would not have been able to accomplish without God’s help. These examples show the cross-cultural belief that war was an important event in the ancient world, and the gods, and God, played significant roles. While Christianity and ancient Greek mythology have many similarities, there are key differences. The main and most obvious difference is that Christian belief is about only one God, and its beliefs and commandments are written about in the Bible. Christians regard the stories told in Bible as actual historical accounts of important people, events and concepts of faith. Greek mythology had 13 major gods and goddesses, and many lesser gods. Different Greek cities also worshipped different deities. There is no book like the â€Å"Bible†, rather many collections of stories that shaped early Greek culture. In short, Greek mythology was created to be the Greek’s science for why things happened. Once they thought they figured out how things really happened, the belief in gods and goddesses faded away from Greek culture. The final difference I want to discuss to compare the ancient Greek creation story and that of Christian belief. In the ancient Greek story, at first there was only Chaos, a shapeless mass of darkness and meaninglessness. Out of Chaos came Nyx (night) and Erebus (the unfathomable deep). The first god to come into existence was Gaea, Mother Earth, though no one knows where she came from or how she came into being. Uranus, Father Sky, was born of Gaea as she slept. He became her husband, and together they had many children. One of these first gods’ descendants was Zeus. After much war between the gods and goddesses, Zeus became most powerful and assigned two lower gods the task of populating the earth with mortal creatures. With that task, one of the two gods granted so many gifts on the lower animals that when the time came to create man, there was nothing left. The beasts already had the sharp teeth and claws, the warm fur and feathers, the tough, protective hides, the wings and shells, speed, size, and strength. The wiser of these two lower gods was given task to figure out what gifts to bestow on man. The gods gave man a more noble, upright stance, so man would be above the beasts, with his face turned toward the heavens rather then down toward the ground. He also gave man an intelligence that reached much higher than the beasts’ mere cunning. In the Christian creation story, God was present in the beginning and He created the universe. At first the earth was shapeless and covered in darkness, and God’s spirit hovered over the waters. God said, â€Å"Let there be light†. And there was light. God divided the day from the night, naming them ‘ day’ and ‘night’. On the second through fifth day God made the heavens, commanded the waters to fill with living creatures and the air to fill with birds. On the sixth day God commanded the earth to bring forth all kinds of living creatures and He saw that it was good. God then said † Let us make man in our own image†. So God created man and woman in his own likeness and gave them authority over all living things. Adam, the first man, was created by God out of soil and given life by God’s breath. Adam named all the animals and birds that God had made, But Adam had no companion of his own so God caused Adam to fall into a deep sleep and created woman – Eve- from one of Adam’s ribs. In addition, unlike the beginning void of Chaos in Greek mythology, God is not a void of nothingness, but the beginning of all  things. God also remains the ruler of the entire world in Biblical stories, while the Greek Chaos is forced out by several actual divine beings, the most important and permanent of those being Zeus. In conclusion I found there to be many interesting similarities between Christian faith and ancient Greek religious culture, but one final difference is that Christianity is practiced today and the Bible widely read in many countries and published in many languages, while ancient Greek belief system has faded away and become the stories of fantastical books, myths and legends.my

Friday, September 13, 2019

Professionalism of aviation in human factor Essay

Professionalism of aviation in human factor - Essay Example The authors also believe that knowledge in the aviation industry is accumulated through several years of experience, training, and exposure to the real world. A lot of accidents have been reported, and 75% of them have been due to unprofessionalism from the pilots and crew members (Kinnaird). The paper looks at an insight of several accidents that have been reported to have been caused by unprofessionalism of the crew members. However, judgment is considered as one of the fundamental aspects in maintaining professionalism in the aviation industry. Judgment acts as a basis of safety according to the authors. The authors argue that it is also through training and discipline that professionalism is developed. As a pilot, courage is necessary while making decisions and accepting the responsibility of the actions an individual takes as a pilot. That is because pilots carry lots of human lives that must be protected. Research indicates that a lot of errors that occur in the aviation industry are usually caused by pilot error. The researchers argue that their findings put pilot errors at 75% of all the mishaps that occur in the aviation industry by the year 2000 (Thompson). It has also been found that personal problems such as medical conditions, stress and family instability also contribute to pilot errors. Alcoholism has also been pointed out by many researchers as a cause for unprofessionalism. Lack of adequate training and newly acquired rules in the aviation industry has also been cited (Rizzo). It must be noted that the current world is quickly changing in terms of science and technology something that has also been rampant in the aviation industry. For this reason, the National Transportation Safety Board insists in atomization in order to enhance professionalism and safety in the industry. Social problems like welcoming a new born in the

Thursday, September 12, 2019

What kind of coping mechanisms employees use under pressure at their Essay

What kind of coping mechanisms employees use under pressure at their job - Essay Example Slovik (2009) said that no one lives without experiencing stress. A study conducted revealed that 70 to 90 percent of the respondents experience stress at the workplace (Stress 2007). It cannot be eliminated since the workers are human beings who are affected by social and environmental factors. An individual might misinterpret another’s action causing emotional stress. It may come from a superior, the customer or even from a subordinate who does not perform according to the corporate standards. Domestic and personal problems can be brought at the workplace that make the worker easily susceptible to stress. Even the physical environment can be a source of stress. Extreme stress, however, is detrimental upon the body, personal relationship and happy life (Slowik 2009). Thus, with the inevitability of stress, the organization has to devise means to meet the problems of stress at the workplace. Even the most efficient worker under stress will perform unsatisfactorily. Poor performance will affect productivity and profitability of the company. Indeed, stress is a serious matter in any organization to take into consideration in its rules and policies. The company has to formulate policies and create a unit that would handle and manage workplace stress and stress-related scenarios. The organisation must also engage a professional with expertise on the subject that would train and inculcate upon the managerial staff on the proper way to manage stress among employees in order not to disrupt the company production and work flow. Stress can result from the demand of the tasks, the demand of the role and the structure of the organization (Khan, Raza, & Ali 2007). It refers to a person’s response to â€Å"stressors in the environment (Khan et al. 2007, p. 2). Selye (1976, cited in Khan et al. 2007) referred to it in the General Adaptation Theory as a response involving biological and physiological aspects. It also refers to

Wednesday, September 11, 2019

Discussion Stories and the Communication Model Essay

Discussion Stories and the Communication Model - Essay Example In all four scenarios, different types of information are gathered, shared and saved in different ways. Like information can be shared through email, electronic documents, voice recording and web presentations. It can be stored directly through web pages means in a digital form or it can be printed through print out and filed them in files. This document which is assembled in the file will be a great asset for the organization. For storing a collaboration experience, you must have knowledge that that has done and stored those types of experiences, awareness of from where the information of the experience will be available and from where you can find that information. I have done research in collaboration in which our group members do not have a time to do research in same time and same place so we prefer to do research in same time, different place. In a same time, different place our group members have done research and sharing information in a same time and different places very easily through chatting, video conference, teleconference, through email, applications/white board sharing, group calendaring and through different resources. Our group members have adopted all these steps for doing that research successfully. Winkler, Ramona. (2002). Keywords and Definitions Around "Collaboration". SAP: The Best Run business Run Sap, Retrieved on 4th January 2012 from