Wednesday, December 25, 2019

Racial Discrimination Is A Social Injustice Essay

Racial discrimination is a social injustice we face in society. In the United States, racial discrimination against minorities in the criminal justice system triggers a range of societal issues that influence African Americans, particularly males. African Americans have been affected in this area in two significant regards. First, African Americans are more likely to be victimized by crime than are other groups. This creates a set of individual and community problems which impede upon other areas of productive activity. Second, the dramatic rates at which African American males have come under some form of criminal justice supervision has created a complex set of consequences which affect not only individual victims and offenders, but families and communities as well. These conditions now disproportionately affect African American males and other minorities due to their overwhelming numbers within the criminal justice system. Did you know that 49% of prison inmates nationally are Afr ican American, compared to their 13% share of the overall population in the United States. The Fourteenth Amendment addresses many aspects of citizenship and the rights of citizens. This amendment was adopted in 1868. It was primarily concerned with details of reintegrating the southern states after the Civil War and defining some of the rights of recently freed slaves. The first section of the amendment, however, was to revolutionize federalism. It stated that no state could â€Å"deprive anyShow MoreRelatedRacial Discrimination : A Social Injustice That People Of Color1764 Words   |  8 PagesRacial Discrimination is a social injustice that people of color have been subject to for years. In the U.S., racial discrimination against people of color in the justice system generates a wide variety of public issues that influence the life possibilities of the Latino and Black communities.   Race, status, and class are some of the main reasons for legal inequality. Laws were created in an effort to ensure the safety and stability of everyone everywhere. With that being said, however, the lawsRead MoreRacial Discrimination And Its Effects On People And Society1653 Words   |  7 PagesRacial discrimination has many effects on people and the society, and these effects are mostly negative. In To Kill a Mockingbird, Harper Lee, the author, demonstrates racial discrimination and its effects through Tom Robinson s case. Tom Robinson is accused of raping and beating Mayella, and Atticus Finch is the man who steps up to defend this innocent man in the town of Maycomb, where everyone was decided from racial prejudice. In the three following sources, Montgomery Boycott, White PeopleRead MoreInjustice And Social Injustices1532 Words   |  7 PagesIntroduction Though the concept of social injustice is universal in nature, the experience varies with each person. Factors like a person’ race, or gender can further influence the severity of the injustice; victims caught in the overlap between discriminations often go unrecognized by the law and society. Many people recognize the names Michael Brown, Eric Garner, and Tamir Rice as African Americans who were murdered by local police. But names like Michelle Cusseaux, Tanish Anderson, and MeaganRead MoreThe Colors Of Racism By John Steinbeck And Of Mice And Men 1330 Words   |  6 Pagesindividuals has become commonplace, due to social injustice. In particular, racial discrimination prevails among African American societies due to the color of their skin, and the stereotypical notions of racial superiority that the white race illuminates. For over three-hundred years, the African American communities have been oppressed due to a mere lack of social equality and respect. Due to the preced ent of slavery set before the nineteen thirties, the social conditions were deemed as horrific andRead MoreRacial Mixed Jurry Reforms973 Words   |  4 PagesRacial Mixed Jury Reforms [Writer’s Name] [Institute Name] Details: The Supreme Court has repeatedly asserted that a defendant is not entitled to a jury composed in whole or in part of persons of his own race. Although these rulings establish that states are not obligated to use racially mixed juries, they do not prohibit states from doing so. In fact, a number of policymakers and legal scholars have proposed reformsRead MoreRace Relations And Social Inequality1610 Words   |  7 Pageswritten to discuss social inequality related to race relations. By comparing two articles â€Å"Ethno-Racial Attitudes and Social Inequality† and â€Å"What happens before? A field experiment exploring how pay and representation differentially shape bias on the pathway into organizations† this paper will explore racial social injustices with the intent to showcase the thinking about race relations and social inequality. Points of Interest Racial inequality is a volatileRead MoreThe Nineteen Sixties Riots: Disasters Waiting to Happen Essay843 Words   |  4 Pages The 1960s was a very turbulent time in American history. Cities across the country saw hundreds of incidents of racial violence. Various federal and state commissions were assembled to investigate the causes of these riots. Each individual riot had its own specific immediate precipitating incidents--among them the Chicago riots of 1965 which erupted after a Negro woman was accidentally killed by a fire engine and the Daytona riots of 1966, which broke out after a Negro man was deliberately gunnedRead MoreRacial Separatism1395 Words   |  6 PagesRacial separatism is the belief, most of the time based on racism, that different races should remain segregated and apart from one another. Racism is the belief that a particular race is superior or inferior to another, that his or she predetermines a persons social and moral traits and born biological charact eristics. The introduction of these terms produces racial discrimination within a society. Racial discrimination has been a thorn in the side of yesterdays, todays and future generationsRead MoreAnalysis Of Martin Luther Kings Letter From Birmingham Jail925 Words   |  4 Pagesprotest of discrimination against African-Americans. King firmly believed that non-violent protest, in the form of sit-ins, boycotts, and picketing, would raise awareness of the prejudices African-Americans suffered and, in turn, lead to progress in gaining equal rights between the races. His â€Å"Letter from Birmingham Jail,† which he wrote during his incarceration in response to the idea that the battle for civil rights should be fought in court, not via protests, states that â€Å"injustice anywhere isRead MoreInjustice: Slavery and Different Types882 Words   |  4 Pagesâ€Å"Injustice is part of life. There is no way to avoid it† Injustice (Noun) Lack of fairness or justice Oxford Dictionary Injustice (Noun) Lack of fairness or justice Oxford Dictionary Injustice refers to either the absence, or the opposite, of justice. The term is applied either in reference to a particular event or act, or to a larger incident. Injustice is played in today’s society, a lot. You hear about major

Tuesday, December 17, 2019

A Brief Look at Amnesia - 696 Words

Amnesia is when people forget things easily. They tend to forget information that is stored in their memory. If you are a little forgetful it doesn’t mean you have amnesia, but if you forget a lot of memories that you should have not forgot you have amnesia. Examples of amnesia are important milestones in your life, memorable events, key people in life, and important fact that we have been told or taught. Just like you see something happen and then someone asks you what happened and you can’t remember. Normal causes could be from brain damage or using sedative drugs. Alzheimer’s disease is one of the big diseases you could get from amnesia. People find it hard to imagine the future if they have amnesia. (Researchers form Washington University in St. Louis, Christina Nordqvist. 2009) used advanced brain imaging techniques to show the remembering the past and envisioning the future may go hand-in-hand, with each process sparking strikingly similar patterns of activ ity within precisely the same broad network of brain regions. Remembering events and experiences is a very complex brain process. Although amnesia is a popular theme for movies and books, it is a very rare condition (Christina Nordqvist, 2009). Retrograde Amnesia is when you get a blow to the head that could lose memory for certain details or events that occurred prior. The lost memories return slowly, but the older memoires tend to come back first. In almost all cases investigated, memories for recent events haveShow MoreRelatedRecent Epidemiological Studies Have Linked Mild Traumatic1509 Words   |  7 Pagesathletes who suffer a head injury. The SAC measures orientation, immediate memory, concentration, delayed recall, neurologic screening, and exertional maneuvers. SAC also includes a graded checklist, a brief neurologic examination, and records the presence of post-traumatic and retrograde amnesia. The validity of SAC in the absence of baseline score is uncertain. The Post-Concussion Symptom Scale and Graded Symptom Checklist uses a seven-point scale including symptoms associated with concussionRead MoreThe Myth Of Sanity : Divided Consciousness And The Promise Of Awareness1366 Words   |  6 PagesA good daydream every once in a while is a relaxing, borderline meditative phenomenon that allows the conscious mind to escape for a brief moment in time. Whether it happens when watching an interesting movie or when zoning out of a boring class, this process of the mind leaving reality occurs every day multiple times a day. The idea of severing or dissociating the mind from reality has both beneficial and detrimental effects. Martha Stout, a clinical psychologist and author of the text The MythRead MoreThe Atkinson And Shiffrin Human Memory Model From Stimuli956 Words   |  4 Pagesand attend to seeing what is on the laptop screen and hearing the information. Sensory memory, with some meaning, when selected, goes to the second stage, which is s hort-term memory (Wheeler, 2016). The second stage, short-term memory, is also brief and lasts â€Å"about 20 to 30 seconds† if it does not get transferred to long-term memory (Wheeler). Furthermore, according to Dr. Wheeler, trying to recall more than seven things or groups of more than seven numbers can be challenging. For example,Read MoreThe First Criteria For Dissociative Identity Disorder1801 Words   |  8 Pagesoccurred in those that have been diagnosed with PTSD, therefore, before the criteria for diagnosing DID was added to the DSM-III, patients with DID were often misdiagnosed as having Schizophrenia. However, the symptoms of DID is different once we look deep into it, they have significant memory loss at time, for events, people etc. Switching between personalities can happen at any moment, patients with DID are often accused of lying because they cannot remember what they’ve done or said. DID patientsRead MorePost Traumatic Stress Disorder ( Ptsd ) E ssay1161 Words   |  5 PagesA moment is defined as a brief period of time. (Merriam Webster) The average lifespan of a person consists of 27,375 days, that is 39,420,000 minutes. Within those hundreds of thousands of minutes humans have the opportunity to experience a moment. These experiences can be either good, bad or neutral. A significant moment in my life was the moment I was sexually assaulted. For a long period of time that experience held a negative impact in my life but also taught me that there are too many ongoingRead MoreWhat I Know Who Gave The Girl My Number881 Words   |  4 Pageswarm like honey. Sweet relief from the cold reality that had been soaking its way through my clothes. The neon signs spoke prophecy, â€Å"Cold Drinks Here†. The chosen one, I do my part to fulfill destiny. â€Å"Rick, you still open?† Not even bothering to look up from the sink behind the bar, â€Å"Now you know damn well I closed two hours ago.† I took my regular s eat in front of the bar. The wooden stool welcomed me back like a clingy ex-girlfriend two days out from her last break up. An embrace that felt familiarRead MoreEvaluation Of A Single Patient Suffering From A Severe Korsakoff s Syndrome1812 Words   |  8 Pagesdysfunction based on the case study of a single patient suffering from a severe Korsakoff’s syndrome. Researchers focused on three main purposes for this study. One being to critically assess if selective impairment of episodic memory is affected due to amnesia without impairment of semantic memory. When confabulations appear, is it due to faulty memories or only when the patient is using specific forms of recall. Finally researchers were looking to answer the question: are provoked confabulations theRead MoreA Reflection On My Sexual Assault Taught Me Essay1214 Words   |  5 Pages A moment is defined as a brief period of time. The average lifespan of a person consists of 27,375 days, that is 39,420,000 minutes (Center for Disease Control and Prevention). Within those hundreds of thousands of minutes, humans have the endless opportunity to experience a moment. A significant moment in my life was when I was sexually assaulted seven years ago. For a long time this moment held a negative impact on my life. Nonetheless, this moment is also what taught me how to love myself, forgiveRead More Ketamine: An Escape From Reality Essay1514 Words   |  7 Pagesa good grade on a test, a delicious dessert, or hearing your favorite song, she is experiencing the brain’s chemicals acting as a reward (1). In 1954, James Olds and Peter Milner discovered that rats would learn to press a lever if rewarded with a brief burst of electric stimulation. This discovery was significant because it suggested the existence of a pleasure center in the brain. The electrical self-stimu lation was most effective when applied to the medial forebrain bundle, which goes from theRead MoreEssay about Evaluation of Two Models Of Memory1413 Words   |  6 PagesStore, the short-term memory store and the long-term memory store. The environment makes available a variety of sources of information. The information comes in through the sensory system – through one of the five human senses. For a brief time it gets stored in the sensory memory store; 2 seconds for auditory and 0.5 second for visual information. It is an exact copy of the stimulus, although it lasts for a very short time. The experiment done by Sperling in 1960, where

Monday, December 9, 2019

Soil Profile free essay sample

Soil forms the surface layer of the earths crust. The development of soil is a constructive process in where disintegrated material resulted from weathering of rocks and minerals get converted into the soil body. Soil profile is the vertical section of soil showing the various layers from the surface to the unaffected parent material. The soil contains three main layers. The surface soil or that layer of soil at the top which is liable to leaching and from which some soil constituents have been removed is known as horizon A or the horizon of eluviation. The intermediate layer in which the materials leached from horizon A have been re-deposited is known as horizon B or the horizon of illuviation. The parent material from which the soil is formed is known as horizon C. The different soil horizons differed due to the colour change form one part to another. Soil Profile | Diagram of the true soil profile Results From the field study practical, on the 20th September 2012, four different soil samples were looked at. We will write a custom essay sample on Soil Profile or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Each soil sample had a bit of difference from each other. Inserted is a map that shows the location where each soil sample was taken from. Soil Profile of soil sample A- it contained a topsoil depth of 6cm and a subsoil depth of 18cm giving a total depth of 24cm. the depth showed sign of rock particles. The soil in that area was loosed. It had no moisture due to the direct impact of the sun on it. Although being directly in the sun there was colour changes in the soil. The topsoil had a dark golden brown colour while the subsoil had a golden brown colour. Soil type was considered to be clay. The location had a lot to do with its contents since it was close to construction site, the soil contain concrete sediments. Soil sample B had a topsoil depth of 16cm and a subsoil depth of 6cm giving a total depth of 22cm. Man mainly influenced the soil sample profile. Profile was near a construction site, so it contained materials that were transported and deposited there. Consist of big rocks (stones), which made it difficult for the profile to be dug into. Soil Sample C had only one distinct layer when compared to the real soil profile. The depth was 20 cm. The sample was located on a slope. Due to its slope like location, the soil was dry. The sloped caused all water to drain out. This soil sample was near a construction site. Filled with transported materials such as sand sediments and underlying rocks. The soil was loose and lacked moisture. Soil Sample D only showed one profile. It had a depth of 45cm. The soil was covered with sediments. Its showed that the soil was place there and compressed. There was underlying rocks and animal life found in the soil sample. The soil was compacted and had a lot of moisture due to its nearness to water (river). It had a very distinct brown colour also.

Sunday, December 1, 2019

The Truth About Lying General Statements English Literature Essay Essay Example

The Truth About Lying General Statements English Literature Essay Paper Is it non astonishing that lying has become so common in the universe that people forget the difference between the world and falsity? Everyone associates with prevarications so frequently that one underestimates its effects. Arthur Miller does a great occupation demoing the bad impact lies tend to hold on persons in his drama Death of a Salesman . Claims: We will write a custom essay sample on The Truth About Lying General Statements English Literature Essay specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Truth About Lying General Statements English Literature Essay specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Truth About Lying General Statements English Literature Essay specifically for you FOR ONLY $16.38 $13.9/page Hire Writer 1. Every twenty-four hours lies cause injury to one s trust in a relationship. 2. Furthermore, lies cause one to go emotionally unstable. 3. Along with emotional effects, lies cause 1s societal life to flux down the drain. Thesis: Lies are obstructions that harm one s internal provinces of life which makes one unable to pass on with everyone. Topic Sentence: Although prevarications are used to avoid aching one s relationship, they destroy the trust between people. Example 1: Take Willy from Mr. Miller s drama, Death of a Salesman as an illustration, his boy, Biff tells him, You -You gave her Mama s stockings! Do nt touch me, you -liar! You fake! You phony small bogus! You fake! ( Miller, 121 ) Punch has fundamentally stopped believing in his male parent and does non desire hear anything from him. Explanation 1: Therefore, lies damage the trust in a relationship, which leads to unsuccessful relationships between the prevaricator and their household. As a consequence, unneeded struggles are created between people, which affect the ambiance of the drama. Reasoning Sentence: As people begin to lie, the prevarications create a boundary between loved 1s, which causes one non to swear the prevaricator any longer. Topic Sentence: Furthermore, lies non merely destruct trust in a relationship, but they besides torture one emotionally. Example 1: In the drama Death of a Salesman , Willy is ever lying to his household about his success in his occupation, but in the terminal he can non command himself and he bursts out stating the truth. He begins by stating Linda, Oh, I ll strike hard em dead following hebdomad. I ll travel to Hartford. I m really good liked in Hartford. You know, the problem is, Linda, people do nt look to take me. I know it when I walk in. They seem to laugh at me. ( Miller, 36 ) He finishes with stating Linda how fat and foolish he looks. Explanation 1: Lies are ever pretermiting one s true abilities which tears one down to a point where one can non command his or her emotions when the truth seems to face them frequently. Initially lies stand in forepart of one to protect them from experiencing ashamed of the truth and in the terminal that favour injuries one so profoundly that they want to decease. Example 2: In Death of a Salesman , Willy explodes at Linda by stating, There s nil the affair with him ( Biff ) . He s got spirit, personality Loaded with it. Loaded! What is he stealing? He s giving it back, is nt he? What did I state him? I neer in my life told him anything but nice things. ( Miller, 40-41 ) Explanation 2: Once one begins to conceal the truth from him or herself, he or she begins to believe that, that prevarication has become their world and starts to go aggressive. As a consequence, lies cause one to go emotionally weak ; therefore one can non command his or her emotions. As shown in this state of affairs Willy becomes angry and makes Linda call and does non recognize that he is harming Biffs life by learning him non so nice things. Reasoning Sentence: Lies emotionally stress out each and every person to a certain extent that can harm one s life because for every minute one stands by these lies the prevaricator becomes weaker and weaker to support themselves against person. Topic Sentence: Furthermore, lies cause one to miss communicating accomplishments and lose their connexions with people around them. Example 1: Mr. Miller clearly shows this in his drama, mentioned before, when Willy asks Howard for a new arrangement at his occupation utilizing prevarications. Willy demandingly provinces, I averaged a hundred and 70 dollars a hebdomad in the twelvemonth of 1928! ( Miller, 82 ) Howard replies impatiently, You ll hold to pardon me, Willy, I got ta see some people. ( Miller, 82 ) Explanation 1: Lies make one become a individual that will non take no for an reply. While implementing their prevarications upon everyone they meet, persons lack the ability to pass on with one another professionally because they sound ill-mannered and objectionable. This causes people to believe twice before they talk to this individual. Example 2: This is besides demonstrated in the drama Death of a Salesman when Biff says, How the snake pit did I of all time get the thought I was a salesman at that place? I even believed myself that I d been a salesman for him! And so he gave me one expression and -I realized what a pathetic prevarications my whole life has been! ( Miller, 104 ) Explanation 2: Liing contributes to the failure to pass on with person because one can non warrant why one needs something because one realizes his or her life is a prevarication and feels ashamed of anticipating a batch more out of their prevarications. Reasoning Sentence: As said before, lying merely means injury to each person ; it causes one to lose all their contacts from the past and hereafter. Restated Thesis: Lies are harmful words that destroy one from within their organic structure to outside their organic structure. Claims: 1. The trust between persons or groups is broken. 2. Lies cause one to go sensitive and sometimes forceful. 3. Liing besides causes communicating with one another to lessening. General Statement: One must understand prevarications are non reality, but are instead what take one to their day of reckoning. *Ms. Weisman I did non cognize if for the thesis we were suppose to include the rubric of the drama so I merely included it in general statements because I was taught non to from old English classes* Work Cited Miller, Arthur. Death of a Salesman. New York: Penguin Books, 1976.

Tuesday, November 26, 2019

Free Essays on Shamanism

Within Native American groups, shamans are considered to be ritual specialists. The word shaman literally means, â€Å"one who is excited, moved or raised.† Shamans are intermediaries between the spirit and ordinary world. When Native Americans were first moved off of their lands and put into reservations, Europeans did not really want anything to do with their religious practices. Many were even banned by the Europeans. Now, however, with the rise in popularity of new age religions, many Americans are taking an interest in Native American religious practices without fully understanding their implications. The only real similarities between traditional Native American shamanism and the newfound plastic medicine man practices are the actions performed. The vision quests performed by both may be very similar, involving the same actions. This is the same with the sweat lodge ceremonies. The problem is that the new age interpretations of shamanism do not fully address all of the implications of the ceremonies. For example, at www.shamanicvisions.com, there is a page devoted to the songs used during ceremonies. The songs themselves should not be the focus of the ceremonies. As found with Native American shamanism, the ceremonies had less to do with the songs themselves, but more to do with their context and meaning. This website seems to focus more on the songs and instruments used, rather than their spiritual meaning when used during a ceremony. Another ridiculous section at www.shamanicvisions.com is the recognition of Winnie the Pooh having â€Å"shamanic undertones.† One example the author of the webpage uses to explain this was that Winnie the Pooh had a boat called â€Å"The Floating Bear.† I can easily see why this would offend Native Americans. Shamanism should not be treated so lightheartedly. I found www.shamanschool.com equally as offensive as the previous site. The first page contains a banner stating, â€Å"Need help with angry b... Free Essays on Shamanism Free Essays on Shamanism Within Native American groups, shamans are considered to be ritual specialists. The word shaman literally means, â€Å"one who is excited, moved or raised.† Shamans are intermediaries between the spirit and ordinary world. When Native Americans were first moved off of their lands and put into reservations, Europeans did not really want anything to do with their religious practices. Many were even banned by the Europeans. Now, however, with the rise in popularity of new age religions, many Americans are taking an interest in Native American religious practices without fully understanding their implications. The only real similarities between traditional Native American shamanism and the newfound plastic medicine man practices are the actions performed. The vision quests performed by both may be very similar, involving the same actions. This is the same with the sweat lodge ceremonies. The problem is that the new age interpretations of shamanism do not fully address all of the implications of the ceremonies. For example, at www.shamanicvisions.com, there is a page devoted to the songs used during ceremonies. The songs themselves should not be the focus of the ceremonies. As found with Native American shamanism, the ceremonies had less to do with the songs themselves, but more to do with their context and meaning. This website seems to focus more on the songs and instruments used, rather than their spiritual meaning when used during a ceremony. Another ridiculous section at www.shamanicvisions.com is the recognition of Winnie the Pooh having â€Å"shamanic undertones.† One example the author of the webpage uses to explain this was that Winnie the Pooh had a boat called â€Å"The Floating Bear.† I can easily see why this would offend Native Americans. Shamanism should not be treated so lightheartedly. I found www.shamanschool.com equally as offensive as the previous site. The first page contains a banner stating, â€Å"Need help with angry b...

Friday, November 22, 2019

Why you should interview for a job you don’t want

Why you should interview for a job you don’t want Job hunting is a lot of work, whether you’re unemployed or looking while working. You put so much effort into revamping your resume, networking in person and online, and writing cover letters with the hopes of landing something truly great. And then, after weeks or months of the hunt, there’s a bite- you’re offered an interview. But, you’re not excited. At all. Maybe you’re waiting to hear back from your dream company. Maybe you’re just hesitant to accept anything less than awesome before you’ve really gotten yourself out there. You might think the best use of your time is to decline politely and wait for something better to come along. But sometimes it’s smart to take the interview, even when you already know you don’t want the job. Here are some reasons why.You might find you do want the job.You never know when the job you don’t think you want turns out to be a perfect fit. Part of the interview process, we often forget, is for the company to sell you on the position (not just for you to sell yourself to them). Go in, see the workplace, and let them woo you. Find out about the company culture and meet the people with whom you’ll be working. On paper, it’s hard to get a sense of what the day-to-day of a job will be like. In person, your perspective might shift. Don’t cut out options before you know everything about them.Practice makes perfect.The more you get used to putting on your most professional clothes, signing in at an unfamiliar front desk, and sitting in front of strangers while they ask you about your professional expertise, the better you will get at the entire process. If you’re at the start of your career or haven’t been on the market for a while, every interview is excellent practice for the next interview you get. You’ll get your anecdotes down pat and start to get a sense of the questions managers in your chosen field ask people at yo ur level. You’ll want to be as sharp as possible for the interview you’ll get for your dream job. Get all the kinks out when the stakes are low and you’re not buzzing with nerves.You might meet someone to connect with down the line.It’s also always possible that you will meet someone in the course of interviewing who can lead you to your dream job. First, if you get an appointment with a recruiter, they often interview for multiple positions- and sometimes at different companies. Comport yourself professionally and you never know what networking wins you might rack up- he or she will keep you in mind for gigs in the future. Second, if you make a great impression but ultimately turn down the position, you now know a face and name at the company. Maybe for your next move you’ll want to touch base to see what’s open. You can absolutely do so if you rock your interview- even if you don’t take the job.You can use an offer for leverage.Say you really want job X, but they’re dragging their feet in making decisions or final offers. Maybe you’re even on a third or fourth round of interviews. But you’ve also interviewed for jobs Y and Z- and both have made offers. Now you can go back to job X and tell them other companies are vying for you. Don’t be too forceful or demanding; just be truthful. You can politely tell them you have other offers on the table and ask about their decision timeline. Being in demand is always a desirable trait.Bottom line: be careful not to waste your time, especially if you’re still working full time and have to steal away for interviews. If you know there’s no possible way you want to work at a certain company or in a specific position, don’t take the interview. Use your judgment and feel free to pass up duds. Just don’t stay away if you’re not totally certain a job isn’t for you.

Thursday, November 21, 2019

Why South African Constitution is better than the United State's Essay

Why South African Constitution is better than the United State's constitution - Essay Example The constitution also provides for the bills of right, how it enshrines bills of right is one of the most important issues that are being looked for in the constitution to demonstrate its efficacy. One can make a conclusion whether the constitution is meant to suppress its citizen or for their prosperity. How it recognizes the freedom and the rights of the citizen for economic growth is also a factor to consider in assessing the accommodative nature of the constitution.1 Difference in the US and SA Constitution Mark Kende in his writing has compared the constitution of the US and that of South Africa with assertion that the South African constitution in this regard remains detailed and inclusive than that of the US. Kende posits that the US constitution provides more for the negative values as compared with the South African constitution, this he summarizes in his theory that liberty should presume subsistence.2 Kende also urges that the human right experts have caste the fundamental human rights in to three generations; the political and civil rights, socio-economic rights, and green right. In this reference of human rights classification, Cass Sustein also resonates with Kende that in the consideration of the three classifications, the South African constitution remains admirable compared with that of the US.3

Tuesday, November 19, 2019

Computers and Science Assignment Example | Topics and Well Written Essays - 250 words - 1

Computers and Science - Assignment Example For this topic we will base our discussion on a computer program that is used for Chemistry solve a data collection. 7E Learning Model Based Computer-Assisted Teaching Materials on Precipitation Titrations use the quasi experimental design was used (Gay as cited by Kunduz 2013 787). The scenarios based on the 7E as based on real life chemical problems written by authors (786). The aim was to develop a computer assisted device which involved animations and laboratory academically computer software†¦ used in unit ‘precipitationtitration’ (789). This is very helpful for students who find it difficult during titrations this study can help with the analysis of data, instrument and procedures and findings. Didactic Analysis of the web acid-base titration simulations applied in pre-graduate chemistry. The acid base titrations accessible via the internet covered three part topics algorithm of titration course, course of titration curve and concentration calculation (Machkova 2013 837). This simulation was used for learning practice (837). The didactic analysis is used by teach about the curves for titration and the presentation of titration. This is helpful for people doing research on acid base titrations. Computer study has proved to be useful in doing difficult technical work not as compared to traditional work whereby man was the problem solver. Since titrations prove to be difficult to students the 7E learning model may be useful to teachers who would rather explain using a research already done and in abstract view of the whole process of the research. Thus the students may know the expected results for the research also the 7E learning model contains questions before the result. The Didactic Analysis is also a good research model as it gives learners choice on which specific research they want The program should also be able to get results from the individual growth rate so as to be able to calculate the average growth rate of the total

Sunday, November 17, 2019

Pre 1914 Poetry William Blake Essay Example for Free

Pre 1914 Poetry William Blake Essay These poems Holy Thursday (experience) and Holy Thursday (innocence) are set on Ascension Day in a service in St. Pauls church. This was a special occasion for the orphans who came from London Charity Schools. The Holy Thursday (innocence) poem can be interpreted in two different ways. The impression we get at first is that the orphans are treated well and they lead happy lives but after reading Holy Thursday (experience) you start to realise that there is a negative way of understanding the same poem. This view shows the orphans to be mistreated and very unhappy. The phrase their innocent faces clean suggests children that are being well looked after rather than being abandoned and roaming the streets of London. There is a suggestion that the children have companions, are well behaved and have a sense of order by the line the children walking two by two This is further added to by the phrase In red, blue and green which implies that they were dressed in bright, smart uniforms rather than rags. The children have angelic guardians to nurture and protect them, as implied by the lines Grey-headed beadles walked before who have wands are described as white as snow which makes us feel that these are enchanted guardians who are pure and magical. Another phrase that adds to this is the sentence Wise guardians to the poor. There is further reference to the good work that the guardians are doing when William Blake uses the term Multitudes of lambs implying the guardians are shepherding and guiding innocent creatures. The idea of lambs conjures up the image of animals all grouped together making sure that they are all safe. The orphans are referred to as flowers in the second paragraph, implying delicate, natural and beautiful. Flowers signify peace implying that the children are good-natured. Seated in companies they sit like good well-behaved pupils in a school, to say their nature is calm and peaceful rather than loud and rowdy. Their god-fearing nature is implied by the words raising their innocent hands probably referring to prayer as they are hopeful and eager. In the last paragraph William Blake is saying the children enjoy going to church, praying and singing hymns as like a mighty wind they raise to heaven the voice of song.Overall the poem has a lively rhythm with pace to give it a beat and fluidity. Now I am going to analyse Holy Thursday (experience) poem. In the first stanza Blake describes England as a country which is rich and fruitful. This would appear to be his own experience of life in England but this statement can be interpreted in different ways. Blake could have meant that England is rich in that there is fruit and food but it is poor because of the amount of orphans. He uses holy to infer that England is a Christian Country and asks why babies should be reduced to misery and fed and looked after by people who dont care for them Cold and usurious hand?. In the second stanza he asks three rhetorical questions. We know the trembling cry isnt a song and that whatever is crying is probably alone and maybe crying out for help. Can it be a song of joy? Perhaps it could be a song of joy for the favoured few who live in the rich and fruitful land but for the many poor children roaming the streets of London it isnt. It is a land of poverty. In the previous poem Holy Thursday (innocence) he says that the children raise to heaven the voice of song. He obviously believes that songs can lift a spirit and in Holy Thursday (experience) it hurts him, that there are no songs of joy going heavenwards form children who are so pure. Normally to see how rich a country a country is you measure the amount of wealth the country but here Blake is measuring the happiness by asking if their singing which is usually a sign of happiness from children. The third stanza describes their happiness in terms of the climate. Their lives are like a place where the; sun does never shine. And their fields are bleak and bare. In the third line he contrasts their journey through life with that of Christs crown of thorns. The image that this reflects is of a painful way through life. And the next line is echoed in a later work by C.S Lewis who uses the term eternal winter to mean a place, like Siberia, that is unbearably sad and where happiness does not exist. This metaphor makes us aware that there is never any joy of warmth in their lives and that emotionally they are completely bereft and emotionally starved of love. In the last paragraph he again refers to the environment and the weather to describe a situation where everything would be all right and Babe cam never hunger there. This completely fails to show the real reason why those children are poor. Rain and sunshine wont get them out of the grinding poverty that they are in. It is simply used as a metaphor to change the childrens situation from eternal winter to dry warm summer in which they would appear to be happy. Throughout the poem there is a lack of colour and description so it is difficult to conjure up any image other than of a grey bleak landscape, where grey people and grey children exist in a society that doesnt value them. In Holy Thursday (innocence) he uses descriptive words such as clean, two by two, red, blue, green and as white as snow to conjure up a picture of London that is quite different. Blake also appears to be attacking the church in other poems for its splendour and wealth but also its lack of humanity and awareness of the multitudes of lambs which could be led to the slaughter and misery of poverty. Reading the Holy Thursday (experience) makes you reconsider the poem Holy Thursday (innocence) and its approach. In a negative this is my interpretation.In the first stanza it is implied that the thousands of orphans are being made to scrub their faces clean so much that it hurts. This cleanliness of the children is only a faà ¯Ã‚ ¿Ã‚ ½ade to give a good impression when the phrase their innocent faces clean appears. This implies that the children are disciplined and regimented. This makes a good impression on the carers. This is also show in red and blue and green because it shows that they are being made to wear a uniform. Being forced to wear uniforms means that the orphans also lose their individuality. Grey-headed beadles walked before could show that these carers are bad people who order the children around and make them walk two and two like in the military. This also implies that these bad people are egotistical because they only look after themselves and they might only be looking after the children for extra money. These military officers have canes to beat the children with as it says with wands as white as snow. This idea of the children being part of a military force is backed up by the quote seated in companies they sit. Because the army is sectioned off into companies, they stand in a certain order and they are very obedient. These flowers of London town implies that the children are innocent and pure but like flowers they will eventually die. Flowers are also vulnerable and easily ruined. The comparison between the groups of children and the multitudes of lambs implies that the orphans like the lamps, group together like pure innocent creatures. The image of the lamb also stands for the idea of vulnerability and sacrifice. Like the lambs the orphans are forced to do what the carers tell them to do, and may face an early death as victims of a cruel world. Thousands of little boys and girls suggests that there are any poor orphans who are homeless. This shows that there is a large scale of poverty. The orphans plead for help by raising their innocent hands. Like a mighty windvoice of song implies that the wind is like a destructive hurricane ready to sweep their lives away. Ironically the wise guardians of the poor are there to look after the orphans for the money and are not concerned about the orphans at all. The rhythm of the poem in this negative view is a like a strict military march.

Thursday, November 14, 2019

The Leadership Secrets of Santa Claus Essay examples -- essays researc

The following is a book report about: The Leadership Secrets of Santa Claus, and was written by, (Cottrell, et al., 2003). This is an eighty-page leadership skill-building book, published by the Performance Systems Corporation in 2003. There are eight main points (Santa Secrets) discussed by the authors in this book and I agree with them all. However, I will attempt to reveal why I agree that to â€Å"Build A Wonderful Workshop† is important, discuss one secret (â€Å"Listen To The Elves†) I see being practiced in my unit, and express how I will spearhead effecting to â€Å"Share The Milk And Cookies†. I agree with the authors’ idea of â€Å"Building a wonderful workshop†. This chapter speaks on making our mission our main idea while remembering our core values to help us stay focused on our teammates and purpose. Our mission, values, and team are the foundation, cornerstone, and core of what we do, how well we do it, why we do it, and how we see each other in our given roles. If we as a team earnestly keep this statement and all it incorporates as our focus, then I believe the other eight â€Å"secrets† cannot be far off. One of the â€Å"secrets† I see being practiced in my unit is: â€Å"Listen to the Elves†. In this chapter the author discusses the importance of inviting participation from the team. The author also encourages the reader to notice how others perceive them and to spend some time walking in their teammates shoes. I believe this motto involves the entire team, is a constant work in progress...

Tuesday, November 12, 2019

Principles of the Constitution

Principles of the Constitution & the Branches of the Federal Government Grand Canyon University: POS 301 10. 30. 12 co.uk/is-the-constitution-a-living-document/">Principles of the Constitution: A Chart The Effectiveness of Checks and Balances The founding fathers could see issues with giving too much power to any one part of the government. They had witnessed what ha happened in Pennsylvania when their legislature, uncheched by a judiciary or executive, ignored essential liberties which lead to the deprivation of rights to Quakers based on their religious beliefs. The fathers knew we had out not to make this mistake again. Patterson, 2011) Thus, a system where each branch shared in a bit of the others' power was created to ensure there would exist no monopoly on political power. To analyze the effectiveness of this system, the motivations behind the system must be revisited. Checks and balances were a means for political moderation. This ensures that all change is well considered by all, and executed in a just manner. Considering issues in the nation's history such as womens' suffrage and other civil rights, the rate at which our nation has shifted policy has sometimes dragged its feet.Policy was well thought out, however at a slow rate. Specifically, there was nearly a century between the freeing of the slaves and the culmination of the Civil Rights movement. While it was a huge decision to be considered, the rights guaranteed to American citizens were being withheld or violated. If we are to consider the system in an international forum, we see that it comes down to the unique execution of the checks and balances. Again, considering the goal is political moderation, consider Mexico.Mexico has a similar institutional system of checks and balances, yet has an international reputation for being politically extreme. Considering Britain, a nation with unicameral legislature fused with the executive and no mechanism for judicial review, they still maintain a po litically moderate reputation. (Patterson, 2011) There is no universal best system, at least thus far. Where there have been issues with the timeliness of our own system, change does eventually occur even while maintaining that moderation which was a goal of the framers. The Three Branches of Government Legislative |Executive |Judicial | |Consists of Senate and House of |Consists of President and the Cabinet. |Consists of the federal court system, highest | |Representatives |Commander of the armed forces. |of which is the Supreme Court of the United | |Draft and approve laws for proposal to the |Essentially the leader of the nation. |States (SCOtUS) | |executive. Can sign proposed legislation into law. |Responsible for hearing cases of suit for | |Requires passing through both houses: the |Power to veto proposed legislation. |federal cases and cases where | |Senate and House of Representatives. |Appoints Supreme Court Judges and other |constitutionality may be in question. | |Have t he power to overturn executive veto with|federal officials. |Review constitutionality of policy when | |2/3 majority vote. |The cabinet carries out and enforces laws. |brought in suit. |Have the power to amend the Constitution |Cabinet members: agriculture, commerce, |Nine justices ensures a decision. Each | |Power to coin monies. |defense, education, energy, health, homeland |decision will have Court's Opinion, a | |Power to establish and maintain armed forces. |security, housing, interior, justice, labor, |commentary of the decision. | |Have the power to declare war. |state, transportation, treasury and veterans |Below the SCOtUS is the appellate court | | |affairs. system. Cases work up through the lower courts| | | |to the SCOtUS. | | | |Appellate court charged with hearing regional | | | |cases. | Branch Interaction The two bodies of Congress, the Senate and the House of Representatives, work together (sometimes with input from the President) to draft and discuss new policy.If after policy is written, voted upon and approved by both legislative bodies, that policy is given to the President (executive) to approve and write into law, or veto. After this the Supreme Court (judicial) has the power to review policy and weigh in on its constitutional legitimacy. A Bill Becoming a Law Following the skeleton of interaction between the branches of government previously discussed, the Bill starts as proposal from a legislative member. The bill is categorized and sent to the appropriate committee to be discussed, argued and tweaked.If the bill survives without being tabled, it is presented to both houses of Congress for debate and vote. If the bill passes these votes, it is presented to the President to either sign and enact the policy into law or to veto (deny) it. Effectiveness of the Process of Government There is a desire to have present a democracy, where the will of the majority will be driving force behind politics and policy change. To keep the majority in c heck, however, a republic is also in place. This puts into place the system of representation which will be accepting of the will of the majority (or its constituency) but not held captive by it. Patterson, 2011) The methods of selection also put varying degrees of separation between the masses and those governing, for example Representatives being elected by the people, the President being selected by the Electoral College, and Justices of the Supreme Court being nominated by the President & confirmed by Congress. What must be considered is whether or not the will and needs of the people are being represented in the making of policy. To be put in a position of representing people takes election from a particular geographic area. Those ho will be elected will, logically, be those individuals who hold and support the values of the majority of voting members of that constituency. That their job depends upon being elected initially, and then re-elected, it is in the politician's be st interest to hold his constituency’s interests at heart. Loosely, it is job security. Whether or not the agendas of the constituency or the politician's personal agenda are more represented depends on the individual representative. The framers believed it would take a representing body that was virtuous for the republic to work well in execution.But it is the whim of the people who is elected to represent them, at least in terms of Congress. It takes individual citizens being learned of actions being levied by their representatives and the individuals' duty to contact that representative or change voting habits. There is a tremendous amount of accountability on all sides to ensure the process represents the people as accurately as possible. References: Patterson, T. E. (2011). The american democracy (10th ed. ). New York, NY: McGraw Hill. ———————– Goals of the Framers -Establish a government which could be strong enough to me et the needs of the nation. –Maintain integrity of states' rights –Maximize liberty and citizen influence Political Mechanics Installed –Specific granting and denial of power –Bill of Rights for personal liberties –Elections –Separation of Power and Checks and Balances Between Them: Legislative – Executive – Judicial To Accomplish This Executive (President and Cabinet) Legislative: Congress (Senate and House of Reps) Judicial (Supreme Court) Executive over Legislative -Power of veto -Recommendation of policy -Execution of policy Can call special sessions of Congress Legislative over Judicial -Dictates size and jurisdiction of courts -May rewrite judicially interpreted policy Judicial over Legislative -May interpret Constitutional legitimacy of policy -May declare policy unconstitutional Legislative over Executive -May overturn veto or impeach -Approves treaties and appointments -Enacts budget Judicial over Executive -May declar e executive action unlawful, against policy or unconstitutional – Executive over Judicial -Nominates those to serve as judges. -Can pardon anyone tried within the system (Patterson, 2011) ———————– 8

Saturday, November 9, 2019

Identify and describe EA’s value chain and value chain costs

* Discuss whether EA has evolved any of its activities into competencies that give the company a competitive advantage. Value Chain Value Chain describes the activities within and around an organization which together create a product or service. Primary activities are directly concerned with the creation or delivery of a product or service. Support activities help to improve the effectiveness of efficiency of primary activities. (Johnson, Scholes & Whittington, 2005) Value Chain in EA for Creating Value Primary Activities In-bounds * EA is able to negotiate volume discounts with console makers (Sony & Nintendo) that supplied the CDs and DVDs. Operations * EA has a virtuous strategy for the game creation and evaluation. * State-of-the-art tools use to allow for more cost-effective product development and to efficiently convert games designed on one game platform to other platforms. (Compatibility of games) * Have a strong relationship with console manufacturers. * Has an edge on its competitors that no other game software company has EA's ability to localize games or to launch games on multiple platforms in multiple countries in multiple languages. * Strong alliance with Cinema, Sports & other entertainment companies. * EA invested heavily in the development of tools and technologies that would facilitate the creation of new games for the existing (and future) game-playing Out-bounds * â€Å"Proud of† games, i.e. family entertainment games for video game consoles, PCs, mobiles, hand held and online. Marketing & Sales * Boost its budgets for marketing and advertising, particularly TV advertising. * Electronic Arts marketing its products worldwide under four brand logos: EA Sports, EA Sports Big, EA Games, and Pogo. (Diversification of games) * Has a good relation with mass market retailers (like Wal-Mart, Toys â€Å"R† Us, Best Buy etc.), getting more shelf space for its games. * EA's games available in approximately 80,000 retail locations worldwide. Services * Manufacturer's guarantee * Launching game patches for extending games including new missions and characters. Support Activities Procurement * License agreements to create software games with the console manufacturers. (Sony, Microsoft, Nintendo etc.) * Agreement with the America Online (AOL), to be exclusive provider of a broad aggregation of online games. Human Resource Management * Focused strategy is in place for human resource management and development. EA invests time and money in training people, and retaining and developing them. * Offer healthy working environment, providing Gym, Sports Pitch, Coffee Bar etc. * Present and former staff has praised Larry Probst's leadership for his ability to motivate and energize people. Infrastructure We can categorize EA's infrastructure in three ways; * Product Structure – Making products for Video consoles, Hand held, Mobile games, and Software games. * Geographical Structure – Two major design studios in Vancouver and Los Angeles and smaller design studios in San Francisco, Orlando, London, and Tokyo. * Functional Structure – Employees tend to be specialist in the business functions important to EA, such as manufacturing, marketing, finance, and human resources. Technology Development * State-of-the-art tools use to allow for more cost-effective product development and to efficiently convert games designed on one game platform to other platforms. * Electronic Arts has a reputation for new product development and creativity. Linkages * License with the console makers for creation of software games and also getting discounted supply of CDs, DVDs or optical disks. * Geographical infrastructure allows EA to localize its games. * Rewording people creates more productivity from the employees From the value chain in EA, it points out that how the value creates and how these activities relate to the cost reduction. EA must keep maintaining and improving these values-create activities. Unique Resources Unique Resources are those resources that critically underpin competitive advantage and that others can not easily imitate or obtain. (Johnson, Scholes & Whittington, 2005) The Unique Resources OF EA * Acquisition of design studios world wide, to localize its games. * Heavily invested in R & D, facilitate the creation of new games for the existing and future game-playing * The commonality fleet * EA website – Pogo.com * The motivations among EA staff Core Competence Core competences are the activities and processes through which resources are deployed in such a way as to achieve competitive advantage in ways that others can not imitate or obtain. (Johnson, Scholes & Whittington, 2005) Core Competence of Ryanair * The good and long-term relationship with; o Console Manufacturers – Sony, Microsoft, Nintendo o Mass Market Retailers – Wal-Mart, Toys â€Å"R† Us, Best Buy o Cinema, Sports and other entertainment industries o AOL – To operate the games channel online on AOL * Diversification of games * Boost its budgets for marketing and advertising, particularly TV advertising. Dynamic Capabilities Dynamic capabilities are an organization's abilities to develop and change competences to meet the needs of rapidly changing environment Dynamic capabilities of EA * Invested in the development of tools and technologies for creation of games for the â€Å"new class of beast† consoles. * Strategic acquisition of ‘Jamadat' for the rapidly growing business of providing games on mobile phones The Value Network In most industries, it is rather unusual that a single company performs all activities from product design, production of components, and final assembly to delivery to the final user by itself. Most often, organizations are elements of a value system or supply chain. The value network is the set of inter-organizational links are relationships that are necessary to create a product or service. (Source: M.E. Porter) So the production of games not only depends on the EA's Value Chain but also on the suppliers, channels and customer value chains. That when console makers are launching their new consoles; when the retailers have more buying capacity and shelf space and when the product is floating into the customers value chain.

Thursday, November 7, 2019

Definition Essay on Success

Definition Essay on Success Definition Essay on Success The definition of success differs from one person to another. Most people work hard throughout their lives to achieve success. That might mean acquiring an education, being able to take care of one’s family, achieving a life’s ambition, or making money. One interesting view about success is that it means something different to each person. Also, perceptions of success can be faulty. A person may seem to be successful, but scandal and ruin can easily follow if a person has made poor choices to achieve his ideal of success. It is not uncommon to hear people confess that the people whom they thought were very successful in life turned out to be rather miserable. Some of the individual who are successful especially when measured in terms of material wealth are often afraid of other people trying to take advantage of them. Basically one common observation in life is that it is difficult if not close to impossible to be successful in every aspect of life. In most cases, o ne can be successful in one part of life and be a total failure in another. When one is looking for success, one should concentrate on one’s strengths rather than pursuing goals in those areas where they are likely not to enjoy a certain degree of achievement. There are many areas in one’s life that are generally considered important. These include the self, business, family, environment, material things, community, work, spiritually, business, and friends. In order to be truly successful, one needs to balance each of these areas. It is rather obvious that these areas cannot be of equal importance to everyone, and this is why people tend to work towards being successful in some areas in their lives while neglecting the other areas. It is, however, not a good idea to ignore any of these parts even though it is important to set priorities. Even when capitalizing on one’s strengths, an individual should strive to improve in other areas, as well. It is important to strive for a well-balanced life. For instance, if one works hard towards being successful and ends up becoming a workaholic, one may lose friends and family and in the long run, one may end up damaging his health or overall well-being. One should always try to keep each of the components of his life in harmony with each other. Some definition essay writing tips: When writing this kind of an essay, one should always begin by defining what success is. However, one cannot describe what one does not know. One should, therefore, demonstrate to the reader that he knows the meaning of success. He can offer the reader a definition and examples. After defining success one should write what success means in different areas of life. One should also note the importance of balancing priorities and offer an example or two. Are you looking for a high-quality custom essay written from scratch? Do you need writing assistance? Visit and we will help you!

Tuesday, November 5, 2019

How to Study for a College Midterm

How to Study for a College Midterm Midterms can be intimidating, whether youre a first-semester college student or getting ready to graduate. Because your grade might be heavily dependent on how you do on your midterm exams, being as prepared as possible is important for your success. But just what are the best ways to prepare? In essence: how do you study for a midterm in the best way possible? 1. Go to Class Regularly and Pay Attention If your midterm is over a month away, your class attendance might seem pretty disconnected from your study plan. But going to class every time, and paying attention while youre there, is one of the most effective steps you can take when preparing for a midterm or other important exam. After all, the time you spend in class involves you learning and interacting with the material. And its much better to do so in shorter snippets over the course of a semester than to try to learn, in just one night, all of the things that have been covered over the last month in class. 2. Stay Caught Up with Your Homework Staying on top of your reading is a simple but highly important step to take when preparing for midterms. Additionally, if you really focus on your reading the first time you complete it, you can do things like highlighting, taking notes, and making flashcards that can later be transformed into study aids. 3. Talk to Your Professor About the Exam It may seem obvious or even a little intimidating, but talking to your professor in advance of the exam can be a great way to prepare. He or she can help you understand concepts youre not totally clear on and can tell you where to best focus your efforts. After all, if your professor is both the writer of the exam and someone who can help you be efficient in your preparations, why wouldnt you use him or her as a resource? 4. Begin Studying at Least One Week in Advance If your exam is tomorrow and youre just starting to study, then youre not really studying youre cramming. Studying should take place over a period of time and should allow you to really understand the material, not just memorize it the night before an exam. Beginning to study at least one week in advance is a smart way to reduce your stress, prepare your mind, give yourself time to absorb and remember the material youre learning, and overall do well when exam day finally arrives. 5. Come Up With a Study Plan Planning to study and planning how to study are two very different things. Instead of staring blankly at your textbook or course reader during the time youre supposed to be preparing, come up with a plan. For example, on certain days, plan to review your notes from class and highlight key elements you need to remember. On another day, plan to review a particular chapter or lesson that you think is especially important. In essence, make a to-do list of what kind of studying youll do and when so that, when you do sit down for some quality study time, you can make the most of your efforts. 6. Prepare Any Materials Youll Need in Advance If, for example, your professor says its okay to bring a page of notes to the test, make that page well in advance. That way, youll be able to refer to what you need quickly. The last thing you want to be doing during a timed exam is learning how to use the materials you brought with you. Additionally, as you make any materials youll need for the exam, you can use them as study aids as well. 7. Be Physically Prepared Before the Exam This may not seem like a traditional way of studying, but being on top of your physical game is important. Eat a  good breakfast,  Ã¢â‚¬â€¹get some sleep,  have the materials youll need already in your backpack, and check your stress at the door. Studying involves preparing your brain for the exam, and your brain has physical needs, too. Treat it kindly the day before and the day of your midterm so that all of your other studying can be put to good use.

Sunday, November 3, 2019

Alabama Department of Corrections Research Paper

Alabama Department of Corrections - Research Paper Example Introduction Alabama Department of Corrections is the agency responsible for the confinement of convicted inmates in the state of Alabama (Donal, 9). Throughout the history of the agency, it operated a farming system where the prisoners were deployed to the farms as laborers. This effectively ended in 1870, from when the prisoners were rendered idle. The agency seeks to confine, manage and rehabilitate the inmates, while providing them a suitable environment and eventually re-introducing them into the society (Donal, 11). Planning in this agency is made through the publication of monthly plans and statistical reports. Through planning, the department of planning and research produces an annual fiscal report, develops monthly management reports and prepares and analyses models for projections of the agency operations (Donal, 22). The agency evaluates the states and the national correctional standards and aligns their standards to these requirements. The agency has a research and plann ing division that oversees the planning functions of the agency. The accounting division is responsible for making the projections of the agency’s annual operational budget. These two divisions are the ones responsible for all the planning, publication and release of the reports prepared by the agency. All the reports have to be analyzed and approved by the higher departmental authority before they are released (Donal, 17). Discussion Problem solving and decision making in the agency follows a well pre-determined procedure. At the helm of decision making is the commissioner of the agency, who is responsible for most of the decisions affecting the agency, including the appointments to key positions of the agency (Donal, 34). It is the authority of the commissioner to determine the qualifications of the deputy commissioners, associate commissioners and other employees of the agency. Subject to the laws issued by the state and the federal government, the commissioner then appoin ts some individuals to fill in these positions. The commissioner is also bestowed with the decision making regarding the appropriate divisions that the agency should have (Donal, 45). Decisions regarding the operations of the divisions are made by the respective divisional directors. While the accounting division’s director determines the budget for the annual operations of the agency, the research and planning division determines the reports that should be published. However, all the decisions made by the divisions and their directors are subject to the approval of the higher office of the commissioner (Donal, 38). The agency follows well laid bureaucratic models of human relationships, where by one individual is answerable to the other depending on the position they hold in the agency. For example, an associate commissioner of the agency will serve in the positions as required by the commissioner of the agency (Donal, 50). Another example of such bureaucratic relationships is that of the deputy commissioners and the commissioner. The commissioner determines what role the deputy commissioners are to undertake in the agency. He also determines the roles that the employees of the agency should play (Donal, 52). Yet another demonstration of the bureaucratic nature of the relationships in the agency is the procedures that reports should follow before they are r

Thursday, October 31, 2019

Contract Law Questions Essay Example | Topics and Well Written Essays - 4000 words

Contract Law Questions - Essay Example Moreover, the purpose of equitable estoppel is to prevent an unconscionable exercise of rights by one party to bring about significant detriment to another party2. Therefore, for example, if a third party such as a consumer has suffered significant detriment as a result of the reliance on a promise made by a manufacturer, relief may be accorded by the Court on grounds of equity and prevention of unconscionable transactions. Equity will determine relief rather than formal contractual provisions and this position has taken precedence in several cases - equity has been acknowledged as a right that will provide relief for a party who has been wrong by the unconscionable exercise of a legal contractual party.3 This could be the basis that can be successfully used to circumvent the doctrine of privity in contract. There are certain separate contractual requirements that have been laid out for minors because the law classes them in the group of people who are mentally incapacitated and therefore incapable of entering into a binding contract with anyone. A minor may enter into contracts only for necessities such as food, clothing and other supplies, which do not include luxury supplies4. In the case of such items as well, a minor is not obligated to pay the full contractual price but may pay a lower price, which is reasonable.5 Therefore, applying this to Toby’s case, the catering of food items for a party cannot be strictly categorized under necessities and since Toby, as a minor, is considered by law to be mentally incapable of entering into a contract or of understanding the legal ramifications that accrue form contractual obligations, his claim that he does not have to pay is likely to hold good under the law.

Tuesday, October 29, 2019

What does work mean Essay Example | Topics and Well Written Essays - 500 words

What does work mean - Essay Example Scientifically, work is related to change of energy to come up with finished good for consumption or for visible results (Loutfi, 2001, p. 87). According to scholars of physical science, work can only be done when force is applied to an object. There are different categories of work, which include Full time in which an individual is found to be in working place actively carrying out daily chores for about thirty-eight hours for every seven days (Batsleer, & Davies, 2010 p. 52). A full-time worker enjoys right to leave every year during which he is supposed to receive regular monthly payment.Furthermore, the full-time worker should be granted sick and individual excuse from the job. Additionally, full-time work enjoys right to work in a good environment and early information in event of any changes at the workplace (Lederman, &Teresi, 1993, p. 62). Part-time workers are found working for few hours a day but they have the specific time to attend job.Moreover, casual workers attend job at regular hours and they do not have to work every day. Their pay is not fixed and they do not enjoy the benefit of work protection and increment of payment (Friedman, 2005, p. 77).On the other hand, Contract workers are employees who make some agreement with business organizations or individuals to do some job for the organization setting particular remunerations.Basing our discussion on studies carried out about work, scholars have observed that people engage in work so as to earn their living.

Sunday, October 27, 2019

Analysis of the Security Management Market in Hong Kong

Analysis of the Security Management Market in Hong Kong The Security Management Industry INTRODUCTION Security management is the combination of hardware, software, and services that normalizes, aggregates, correlates, and visualizes data from disparate security products. Security management is a broad term that encompasses several currently distinct market segments. With the presence of the Internet, spam is becoming increasingly costly and dangerous as spammers deliver more virulent payloads through email attachments. According to a recent IDC (2004) study, the volume of spam messages sent daily worldwide jumped from 7 billion in 2002 to 23 billion in 2004. The Hong Kong Population has increasingly Internet users. This boom in the electronic commerce creates ease in communication and on business transactions however this has also compromised the internal data security with the presence of hackers. Industry analysts believe that increased spending on internet security products and the establishment of a corporate data security policy is equally important in avoiding information leakage. Estimated information security spending in Hong Kong will reach USD 231 million in 2003 and will maintain a stable growth to reach USD 252 million in 2004. U.S. security products enjoy an excellent reputation in Hong Kong and should continue to dominate the market. According to Braunberg (2004), a major early driver for security management products is the need to get a handle on event data emanating from intrusion detection systems. Many security management products are chiefly concerned with the consolidation, correlation and prioritization of this type of data. These event management and correlation products address the volume of data and its heterogeneous origin, both in terms of devices and vendors. SECURITY MANAGEMENT MARKET IN HONG KONG Market Highlights The continuous increase in demand for communication internationally, internet has been increasingly in demand. With the Internet in business transactions, companies expanded sales opportunities through e-commerce and reduce business costs. With the presence of Internet, companies can broadly expand customer base. However, in spite of all these benefits that companies experienced with Internet, it has also brought some costs to companies. Internet opens up network and servers to external and internal attacks. In order to guard against these attacks, Hong Kong companies have increasingly felt the need to purchase Internet security. According to the report of HKCERT (2004), the number of PCs installed in Hong Kong has skewed to the low end. In the survey conducted, it shows that 63.5% of the surveyed companies had installed 1-9 PCs and only 1.3% had installed 100 PCs or above. Consumer Analysis In the report of HKCERT (2002), industry players estimated that the Hong Kong market for internet security products and services in 2001 was USD 231 million and will reach USD 252 million in 2004. Generally U.S. internet security products are the major players and are enjoying an excellent reputation in Hong Kong and are continually dominating the market. Industry Estimates The survey of HKCERT in 2004 showed that Hong Kong companies adopted security technologies to secure their computer form attacks. The survey includes 3,000 companies from different industry sectors in Hong Kong. According to the survey anti-virus software was the most popular security measure, being used by 90.9% of the companies interviewed in 2004. Physical security (65.5%), Firewall (65.4%) and Password (60.6%) were the next three common security measures adopted (HKCERT, 2004). The information security awareness of the companies in Hong Kong has increased considerably as the percentage of companies without any security measures in place dropped from 10.1% in 2003 to 3.6% in 2004 (HKCERT, 2004) As the survey shows, the use of firewall has significantly increased in 2004. This is due to the increasing awareness of a number of companies that the basic security tools can not completely stop virus and because software vendors pay great effort in promoting their products. From the table above, US rank number one in the list showing that US is the major host of malware in 2006. On the other hand, Hong Kong only is on the 9th place however it is still a major contributor of malware in the world. Sophos notes that up to 90% of all spam is now relayed from zombie computers, hi-jacked by Trojan horses, worms and viruses under the control of hackers. This means that they do not need to be based in the same country as the computers being used to send the spam (IET, 2007). Sophos found that the most prolific email threats during 2006 were the Mytob, Netsky, Sober and Zafi families of worms, which together accounted for more than 75% of all infected email (IET, 2007). According to the report, email will continue to be an important vector for malware authors, though the increasing adoption of email gateway security is making hackers turn to other routes for infection (IET, 2007). Malware infection will continue to affect many websites. SophosLabs is uncovering an average of 5,000 new URLs hosting malicious code each day (IET, 2007). In 2006, it has been discovered that there is a decrease in use of spyware due to multiple Trojan downloaders. Statistics reveal that in January 2006 spyware accounted for 50.43% of all infected email, while 40.32% were emails linking to websites containing Trojan downloaders. By December 2006 the figures had been reversed, with the latter now accounting for 51.24%, and spyware-infected emails reduced to 41.87%.(IET, 2007) Market Channels In Hong Kong, consumer-oriented products such as anti-virus, overseas companies usually market their products via local distributors who will then channel the products to resellers and in some cases directly to retailers. For enterprise-oriented products, which require value-added services such as system integration and after-sales support, overseas companies can go through local distributors and/or resellers. (Chau, 2003) Competitive Analysis The internet security market has four segments: anti-virus, firewall, encryption software, and Security Authentication, Authorization Administration. Anti-virus Software Anti-virus software identifies and/or eliminates harmful software and macros. Anti-virus are mostly software based. The major players in Hong Kong for the consumer market includes Symantec/Norton which possesses 50% of the market share in Hong Kong, Norman, Nai/McAfee, and Trend Micro which are basically US origin (Chau, 2003). According to Chau (2003), consumers of Anti-virus are generally price sensitive and usually seek for products with established brand name. In the enterprise market of anti-virus, the major players include Trend Micro, NAI/McAfee, Norman and Symantec (Chau, 2003). According to the analysis, enterprise users will usually seek professional opinions from their I.T. service provider and are more likely to focus on brand reputation and offered features and pricing is not the main concern, although with the downturn in the economy, companies are becoming more price-sensitive (Chau, 2003) Firewall Firewall software/hardware identifies and blocks access to certain applications and data. There are two categories of firewall products: software and hardware. The players in Hong Kongs software firewall market are Check Point Software which dominates the market of 60% market share, Computer Associates, Symantec and Secure Computing (Chau, 2003). In the hardware firewall market, the major players are Netscreen with 50% market share, Cisco (PIX) with 20% market share, Sonic Wall, Watchguard and Nokie of Finland (Chau, 2003). According to the report, the price for software firewalls averages USD 20 per user. On the hardware firewalls side, the number of users and the kinds of features determine the price. A low-end firewall server costs USD 600 to USD 700, a mid-range server costs USD 2,000 to USD 4,000, and a high-end server costs USD 10,000 and above. Netscreen and Sonic Wall are quite common in small to medium-sized enterprises. Cisco targets large corporations. Brand reputation and price are the prime concerns for buyers. According to industry players, there is an increasing preference for hardware firewalls over software firewalls because the hardware firewall has a speed advantage and is easier to maintain. (Chau, 2003) Encryption Encryption software is a security product that uses crypto-graphical algorithms to protect the confidentiality of data, applications, and user identities. According to the study, the most commonly-used standards in Hong Kong are SSH, SSL, PGP, RSA, and DES. Different standards are used for different objectives. SSH is mostly used to secure TCP connections between remote sites. SSL is commonly used in web browsers to secure web traffic. PGP is used for email encryption. RSA is for PKI system authentication and authorization. DES or 3DES are commonly used in the banking sector. (Chau, 2003) According to the report of Chau (2003), the major players in encryption in Hong are PGP, Utimaco, F-Secure, SSH (Security Shell), and RSA. Security 3A Software Security 3A (administration, authorization, and authentication) software is used for administering security on computer systems and includes the processes of defining, creating, changing, deleting, and auditing users. Authentication software is used for verifying users identities and avoiding repudiation. Authorization software determines data access according to corporate policy. Administrative software includes internet access control, email scanning, intrusion detection and vulnerability assessment, and security management. The major players in PKI system in Hong Kong are Baltimore of UK, Verisign, and Entrust (Chau, 2003). Intrusion Detection Systems (IDS) An intrusion detection system (IDS) examines system or network activity to find possible intrusions or attacks. Intrusion detection systems are either network-based or host-based. Network-based IDS are more common. According to the report of Chau (2003), the major players of IDS in Hong Kong are ISS (Real Secure) which dominate in the market of 65% market share, Enterasys (Dragon), Symantec (Intruder Alert), Tripwire (Tripwire), Computer Associates (Entrust Intrusion Protection) and Cisco (Secure IDS). In the analysis it has been known that IDS end-users are mostly medium to large enterprises and the most significant purchasing criteria for end users are reliability and compatibility and price is not a key factor (Chau, 2003). Content Security Products The major players of content security products includes Clearswift which has 50% market share, Websense which has 25% market share, Trend Micro and Serve Control (Chau, 2003). Market Trends According to the report, on corporate side, the demand for network-based anti-virus would likely to increase than the demand for desktop-based anti-virus products since mostly viruses attacks are usually via internet (Chau, 2003). On the other hand, in the consumer side, consumer market would likely to fade away since consumers are downloading free anti-virus from the Internet. It is expected that ISPs will increasingly provide AV protection as a value-added service to the users (Chau, 2003). In the firewall software, it has been expected that the demand for hardware-based appliance products would likely to increase for small and medium-sized companies. (Chau, 2003) For Intrusion detection and vulnerability assessment, it is predicted that it will become very popular as enterprises will shift to a balance between internal and external threats. In addition, the distinction between host-based and network-based IDS is becoming blurry with the creation of IDS consoles that receive data from both the network sensors and host agents. Integrated solutions will become the trend. (Chau, 2003) Market Driver There are several market drivers of security management market. Chau (2003) identified some of these market drivers. In his report, he enumerated three of these market drivers which includes the Internet growth, telecommuting trend, and government generated awareness of Internet security. Internet Growth In Hong Kong, the Internet has become the prevalent communication means between business transaction and even between employees with the increasing trend of globalization. According to Hong Kong Government survey in 2001, 1.25 million households or 61% of all households in Hong Kong has PCs of which 80% are connected to the Internet compared to 50% households with PCs in 2000 of which only 36% are connected to the Internet in 2000 (Chau, 2003). Generally, consumers are making use of the internet to send emails, surf the web, carry out research, conduct on line banking transactions, and make low-value purchases. The survey estimated that around 6% of all persons over 14 had used one or more types of online purchasing services for personal matters in the 12 months before the survey (Chau, 2003). On the other hand, on the business side, more than one third of businesses in Hong Kong have internet connections. In 2001, about 12% of businesses had delivered their goods, services or information through electronic means which is 4% higher than that in 2000. The estimated amount of business receipts received from selling goods, services or information through electronic means in 2000 was USD 1 billion. Increased connectivity to the internet creates higher chances of hacker attacks, especially if the users have a constant live connection, such as through a DSL line. (Chau, 2003) According to the Hong Kong Commercial Crimes Bureau, reports of computer-related offenses increased from 235 incidents in 2001 to 210 in the first nine months in 2002. Computer attacks had affected 5,460 computers in the past 12 months. Financial loss caused by computer-related crimes rose from USD 195,000 in 2001 to USD 236,000 in 2002. The Computer Crime Section of the Hong Kong Commercial Crimes Bureau believes that only 0.3% of the victims reported hacking incidents, fearing that doing so would damage their reputation. Facing increasing internal and external hacking threats, companies are seeking security tools to protect their network and to maintain public confidence. (Chau, 2003) Telecommuting Trend Another major driver of security products, according to Chau (2003), is the increasing decentralization of the work force, such as mobile sales teams in the insurance industry who need to access corporate networks via PDAs. There is an increasing trend of businesses and organizations which benefit from employees ability to dial into corporate networks via the internet, however, this often creates information security risks within the organization, resulting in increased dependence on, and greater deployment of, security products (Chau, 2003). Government-generated awareness of internet security Another major driver of security products is the government awareness on the importance of Internet security. With this awareness, government organizations are formed. Like for example the SAR Government. The SAR Government is committed to providing a safe and secure environment to foster the development of e-commerce in Hong Kong in which has built a public key infrastructure (PKI) through the establishment of a public certification authority and a voluntary CA recognition scheme in Hong Kong (Chau, 2003). Currently, there are four recognized certification authorities operating in Hong Kong which includes JETCO, Digi-Sign Certification Ltd., HiTRUST.Com and the Hong Kong Postmaster General. In addition to the establishment of the PKI systems, the Hong Kong Government has also engaged substantial resources to educate the public regarding the importance of information security. For instance, the Crime Prevention Unit of the Technology Crime Division of the Hong Kong Police is responsible for providing advice on all aspects of computer security. It also produces educational materials on raising computer security awareness and makes presentations on technology crime prevention topics. (Chau, 2003) In addition to the market drivers in which Chau has enumerated, there are still other market drivers of security management market. Braunberg (2004) identified two major groups of market drivers which are the near-tern market drivers and long-term market drivers. Under the near-term market drivers are manage or prevent, perimeter management, vulnerability assessment, embracing standards and the brains of the operation. Long-term market drivers include complexity and cost, device and security integration, knowledge database resources, lack of trust, on demand of computing and social engineering. Near-Term Market Drivers Manage or Prevent. In the analysis of Braunberg (2004), the chief driver of event management solutions is the continuing and hugely annoying number of false positives pouring out of intrusion detection systems. According to him, a counter driver to growth in the managed security segment is the emergence of intrusion prevention systems, particularly in-line solutions that can perform real-time data blocking (Braunberg, 2004). The adoption of intrusion prevention system could inhibit spending on event management systems and security management vendors should consider these products competitive to their own (Braunberg, 2004) Perimeter Management. Security management products has evolve due tot to the demand of securing the perimeter. According to Braunberg (2004), security management solutions are evolving to integrate data from a host of perimeter products in which event management systems often evolved along separate lines with products for firewall, antivirus, and IDS. Vulnerability Assessments. According to Braunberg (2004), one of the near- term drivers for which end-users are of concern is understanding what the security risks are. Generally, clients are looking to leverage vulnerability assessments to help prioritize emerging threats. Increasingly vulnerability data is being leveraged in event management systems (Braunberg, 2004). Embracing Standards. According to Braunberg (2004), the industry is a long way from embracing standards for sharing event information but some progress has been made over the last year. The Internet Engineering Task Forces Incident Object Description and Exchange Format (IODEF) draft specification is gaining some traction and its adoption would be a significant step forward for the market (Braunberg, 2004) The Brains of this Operation. According to Braunbergs analysis (2004), the infatuation with IPS will be short-lived unless significant improvements can be made in reducing false positives in events however security management products will increasingly play a major role in providing the analytic smarts behind IPS solutions. Long-Term Market Drivers: Complexity and Cost. With the increasingly complexity in the web-based business models, the more tangled is the security solutions for the end-users. According to Braunberg (2004), businesses building online strategies from scratch can be overwhelmed by the initial investment of security solutions, while those trying to adapt existing solutions to evolving security concerns are besieged by maintenance costs. Device and Security Integration. According to Braunberg (2004), equipment makers are paying much closer attention to imbedded security functionality in devices and are actively attempting to integrate security as a value-added service in order to change the thinking of the end users of security products as an â€Å"add-on† or an extraneous component of infrastructure. In addition, vendors are looking to unite service providers with standards programs that simplify client understanding and reduce the complexity of product buying (Braunberg, 2004). Knowledge Database Resources. Another market driver for security products is to actively secure the knowledge database from attack patterns and other descriptions of the enemies. The security products vendors should reinvent a faster response to the known threats. According to Braunberg (2004), multi-product vendors particularly will look to evolve from real-time monitoring to broader real-time management. Lack of Trust: According to Braunberg (2004), end users, whether they are corporate users putting a business plan on a server or a consumer buying a CD, have ingrained habits that they are not necessarily willing to give up. For example, no matter how good an online banks security system is, a consumer will have to be convinced that its services are not only as good as a brick and mortar banks services, but better (Braunberg, 2004). On demand Computing: According to Braunberg (2004), the availability of ubiquitous computing resources on demand will further drive the need for sophisticated, highly flexible security management solutions that combine both identity management and event management. According to him, the demand for more esoteric offerings such as GRID computing is the major long-term driver for security management solutions (Braunberg, 2004). Social Engineering. According to Braunberg (2004), clients are still facing risks in security that employees represent just through the human desire to be helpful, and hackers exploit this through â€Å"social engineering.† According to him, a component of managed security will need elements of employee training to build awareness of outside threats (Braunberg, 2004). According to the analysis of Braunberg (2004), the security segment will continually be strong in which the diversity of interest ranges from an array of different types of companies which indicates a leverage of controlling security function. In addition, since end users demand has also evolve in which they demand for more in-depth defensive strategies ad best of breed approaches to purchasing decisions, security solution in turn has become more complex. Case Study: Trend Micro Enterprise History In 1988, Trend Micro Incorporated was founded by Steve Chang and his wife in California. Trend Micro Incorporated is a global leader in network antivirus and Internet content security software and services. The company led the migration of virus protection from the desktop to the network server and the Internet gateway—gaining a reputation for vision and technological innovation along the way. Trend Micro focuses on outbreak prevention and on providing customers with a comprehensive approach to managing the outbreak lifecycle and the impact of network worms and virus threats to productivity and information, through initiatives such as Trend Micro Enterprise Protection Strategy. Trend Micro ha grown into a transnational organization with more than 2,500 employees representing more than 30 countries around the globe. Many of the leading high-tech and security industry analysts have tracked Trend Micros growth and performance for the last several years, hailing the company as â€Å"visionary†, citing its leadership and innovation in the security industry. According to Brian Burke, IDC Research Manager, â€Å"Trend Micro has consistently demonstrated a strong position in the Secure Content Management market. To remain successful Trend Micro has adapted quickly to market challenges and the evolution of security threats such as spyware, phishing and spam, in which financial gain has become the number one driving force. Given Trend Micros track record and its strong upward momentum, we expect the company to continue delivering innovative solutions that provide customers with timely protection against unpredictable threats.† Trend Micro has earned a reputation for turning great ideas into cutting-edge technology. In recognition of the antivirus companys strategy and vision, the analyst firm Gartner has hailed Trend Micro as a visionary malicious code management supplier for four consecutive years. Citing its flexible and efficient transnational management model, BusinessWeek acknowledged Trend Micro as one ofa new breed of high-tech companies that are defying conventional wisdom. According to IDC, Trend Micro has held the top global market share in internet gateway antivirus for six consecutive years. A history of innovation In 1995 Trend Micro became an industry pioneer in the migration of virus protection from the desktop to the server level, with the launch of Trend Microâ„ ¢ ServerProtec. In 1997 it launched the industrys first virus protection for the Internet gateway with InterScan VirusWall. Since then, it has demonstrated a history of innovation in server-based antivirus products that has contributed to the leadership position it holds today in this market (according to the recent IDC report Worldwide Antivirus 2004-2008 Forecast and 2003 Competitive Vendor Shares. Trend Micro continues to shift the paradigms of antivirus security with cutting-edge products, services and strategies like Trend Micro Network VirusWall, Outbreak Prevention Services, and its Enterprise Protection Strategy. Trend Micro is committed to following its path of innovation to help companies manage todays ever-increasingly complex, fast-spreading malware threats. SWOT Analysis Strengths Business and security knowledge Trend Micro has been a pioneer and innovator in the antivirus software market since 1988, anticipating trends and developing products and services to protect information as new computing standards have been adopted around the world. Service and support excellence, that is, Trend Micro products and services are backed by TrendLabs a global network of antivirus research and support centers. TrendLabs monitors potential security threats worldwide and develops the means to help customers prevent the spread of outbreaks, minimize the impact of new threats, and restore their networks. Flexible workforce through contingent workers for seasonal/cyclical projects Loyal, hardworking, and diverse workforce who, in addition to good compensation, have an opportunity to do well Multinational corporation operating through regional subsidiaries to minimize cultural differences Low employee turnover Relatively rapid product development processes that allow for timely updating and release of new products Revenues and profits rising at 30% a year with merger/acquisition or investment in 92 companies over past five years Software products have high name recognition, broad-based corporate and consumer acceptance and numerous powerful features that are in use worldwide, thereby promoting standardization and competitive advantage through their ease of integration and cost-effectiveness Top rating from Fortune for best company to work at and most admired company Worlds largest software company with global name recognition and strong reputation for innovative products Weaknesses Perceived by many as a cut-throat competitor that uses its dominant market position to marginalize competition by stealing/destroying the competitions products, stifling product innovation, and decreasing the availability of competitor products Products have a single application focus and do not work well with or on-top of other products Reputation has suffered because of entanglement in antitrust and â€Å"permatemps† Vizcaino litigation Misperceptions of securitys value or purpose Opportunities Cheaper global telecommunication costs open new markets as people connect to the Internet in which in turn increases the need for security products Mobile phone applications and exploitation of personal digital assistants represent a growth industry so that strategic alliances could provide the company with opportunity in a market where it currently has little or no significant presence Business Continuity Reduced Costs Potential Revenue Opportunities Trend Micro holds the top market share for both worldwide Internet gateway and email-server based antivirus sales. Threats Currency exchange rates affect demand for application/operation software and hardware, and fluctuating currencies can negatively impact revenues in the global marketplace Recession or economic slowdown in the global market impacts personal computer equipment sales and their need for an operating systems which in turn would slowdown the need for security systems Software piracy of commercial and consumer applications software on a global scale threatens revenue streams Technology life cycle is shorter and shorter Inconsistency across the enterprise Loss of sponsorship or visibility Current Strategy The continuous success of Trend Micro is guided by its strategies. Innovation was always been the strategy of a technological company however in Trend Micro, innovation was not the only strategy implemented. There are many essentials that are to be considered. The current strategy of Trend Micro are the following. â€Å"Focus On the Essentials and Sacrifice the Rest† It is known that focus is important and essential for the success of any business. According to Steve Chang, strategy is about focusing on essential and sacrificing the rest. (Chang, 2002) in addition, according to Peter Firstbrook, program director, security risk strategies, META Group, Trend Micro has done just that, having an amazing laser-like focus on their business. And the authors of a Harvard Business School case study commented: â€Å"Although very entrepreneurial, Steve Chang held fast to a single strategic focus for over a decade. Rather than attempt to provide all security products to all customers, Trend Micro concentrated on developing ‘best-of-breed antivirus solutions.† (Pain and Bettcher, 2003) Trend micros consistent and persistent focus allowed the company to build their strengths and consistently leading the market. Innovation Isnt Just About Your Software Products Trend Micro has many product firsts under its belt: the first antivirus product for a server in 1993; the first Internet gateway protection antivirus software in 1996; the first e-mail anti-virus software product in 1998; the first Internet content security service in 1999. However, for the Trend Micro innovation applies to more than just the products. It is a pervasive notion that applies to other areas of your business as well. Innovation should be seen new type of global organization and in a new service offering. According to Steve Hamm in a 2003 Business Week article, Borders are So 20th Century, Trend Micro is an example of a new form of global organization, transnational organization in which aimed to transcend nationality altogether. Hamm quotes C. K. Prahalad, a professor at the University of Michigan Business School, who says â€Å"Theres a fundamental rethinking about what is a multinational companyDoes it have a home country? What does headquarters mean? Can you fragment your corporate functions globally?† (Hamm, 2003) According to Hamm (2003) Trend micro was one of the first responder to viruses which can deliver services in 30 minutes before the market leader Symantec. He commented that â€Å"Trend Micro is able to respond so quickly because its not organized like most companies. (Hamm, 2003) The strategy of Trend Micro is to spread its top executives, engineers, and support staff around the world. The main virus response center is in the Philippines,