Wednesday, November 27, 2019

Different Implementation of Cloud System

Abstract Cloud system has become one of the most important business strategies in the current competitive business environment. The increasing need for communication, data analysis, data storage, and dissemination demands for improved information technology infrastructure that may not be available within a given business unit.Advertising We will write a custom essay sample on Different Implementation of Cloud System specifically for you for only $16.05 $11/page Learn More This has made it necessary for many firms such as Samsung and Nike, to outsource these services from vendors which offer cloud computing. This strategy not only improves communication within various departments, but also makes it possible for the company to monitor movement of products from the production plants to the market. However, the issue of privacy and security of the data has been cited as its main challenge. Background Effective supply chain has become very vital for many firm s as the market become increasingly competitive in various industries. According to Gibb (2006, p. 89), firms which operate in the global market have the pressure of delivering their products to the market within the shortest time possible and in the right shape. The processes in supply chain management must be shortened to ensure that associated costs at every stage are significantly reduced. For instance, products should take the shortest time at storage as a way of reducing costs of storage, and the risk of damage when products take longer than expected in these stores. It is also important to ensure that goods on transit are effectively monitored to ensure that they arrive at the desired markets within the time that was set (Molen Brace 2010, p. 25). It is only through this that a firm can ensure that its products are consistently available in various global stores. Reduced costs of product delivery are also an assurance that the cost of delivering products to the market will b e reduced. This will mean that the firm will be able to charge competitive prices in the market. According to Berger (2006, p. 21), cloud computing business models offers these companies a solution in making their supply chain strategies efficient and cost effective. In this research, the focus will be on how Samsung and Nike have used cloud computing models to improve their supply chain in the market. Cloud Computing Model According to Carmel and Tija (2006, p. 18), cloud computing has gained popularity as firms around the world try to find ways of improving the quality of products in the market. Many firms around the world have come to realize that to achieve efficiency, they cannot afford to undertake all the activities involved in delivering products to the customers.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More For this reason, most firms are specializing in activities they consider most important in maintaining the quality of their products and brands in the market, and outsourcing other activities from other vendors in the market (Jamsa 2013, p. 84). This is the concept under which could computing model in the supply chain come in within a given firm. Instead of making heavy infrastructural investment to purchase servers, firms have opted for cloud computing models which are considered more reliable and very effective in managing information in supply chain. According to Jae-Nam (2008, p. 570), cloud computing has been very vital in four main areas of operation within a business unit. These areas include planning and forecasting, logistics, sourcing and procurement, and service management processes. Each of the stages is very important and correct application of cloud computing strategies in the key to achieving success in the market. However, to achieve this, (Dutrà ©nit Vera-Cruz 2007, p. 326) warns that it is important to identify specific activities th at are cloud friendly. The figure below identifies activities that are cloud friendly based on the sensitivity of the data and the network effect. According to Djellal Gallouj (2013, p. 60), this is the first step towards a successful use of cloud computing model in supply chain management. There are some specific activities that cannot be carried out using cloud computing model because of the sensitivity of data sharing. Some of the sensitive information may be leaked to competitors if this model is used in some processes, making the firm vulnerable to its competitors (Rhoton 2009, p. 57). This means that not every process would need cloud computing as an appropriate strategy in achieving the desired success in the market. After identifying the processes that need cloud computing technologies, it is important to understand the business model that will be appropriate for the individual task within the supply chain. The business model can be classified as HaaS (Hardware as a Servic e), SaaS (Software as a Service), and cloud computing (Kaplan Norton 2006, p. 109).Advertising We will write a custom essay sample on Different Implementation of Cloud System specifically for you for only $16.05 $11/page Learn More Hardware as a Service is increasingly becoming popular among business units around the world. In this business model, a central provider leases computing power to firms upon request. This model seeks to eliminate the cost of putting up the infrastructure, by enabling a firm to lease these services from the central providers. In this model, the user rents the asset for the specific period when the services are necessary. This model allows a firm to contract a central service provider to maintain and administer hardware system within an organisation through on site services or remotely depending on the needs of the setup. According to Koontz and Weihrich (2013, p. 50), Software as a Service is another business model where soft ware applications are hosted central service provider or vendor and made available to the users through an internet network. Many companies have found this strategy very useful in cutting the cost and improving efficiency of their operation. This is because this model enables them to access web-based solution without the need to maintain servers or set up IT infrastructure (Sosinsky 2011, p. 48). In the current business environment where physical space is becoming scarce, this is one of the most important strategies that any firm can use to achieve efficiency in its supply chain management. Other important components of cloud computing include Infrastructure as a Service, Process as a Service, and Platform as a Service. Application of cloud computing business model can use either of the components or a combination of two or three based on the needs at that particular time. According to Mukherjee (2009, p. 29), firms have the task of identifying the specific needs of the company and finding the model that would be the most appropriate at that particular time. The next step would be to identify the service provider that would offer the best services within the desired timeframe. At this stage, it would be necessary to discuss how some of the leading firms in the world are using cloud computing in their supply chain to achieve success in their respective industries.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Cloud Computing in Samsung Corporation Samsung is operating in one of the most competitive industries in the world where success of a firm is hinged on the superiority of the strategies it uses in the market. The electronic industry has become very competitive as many firms, especially those from China, have infiltrated the industry with cheap products. According to Parker (2012, p. 38), the electronic industry has remained competitive in the world market, and the market environment has numerous challenges that makes it difficult for firms with inferior strategies to survive. Motorola Inc was once one of the leading firms in this industry, but it was forced out of the market because of its inability to adapt to the emerging technologies. Nokia is currently surviving to remain competitive and it has since been replaced by Samsung as the top manufacturer of mobile phones. The success of Samsung can be directly attributed to its emphasis in using modern technologies in various stages o f product delivery. However, this success was not achieved overnight. It involved a vigorous process of working through various strategies available in the market to achieve specific objectives within changing market environment. Supply chain was once one of the most challenging management tasks for Samsung. With its main manufacturing plant in South Korea, Samsung was finding it difficult to avail its products in the world market, especially the U.S. market that was considered very lucrative. Some of the main competitors of this firm were actually American firms with their production plants within the United States. This meant that they did not have to incur the cost transporting products to the market. This gave them a competitive advantage over Samsung which had to move its products miles away to the markets in this country and various other parts of the world. According to Winkler (2011, p. 81), customers prefer buying products that are always reliable in the market. When a cust omer plans to purchase a Samsung television, camera, phone, or laptop, he or she would be pleased if he or she finds a variety of this brand to choose from in the stores. In case the brand is not in the store, such a customer would switch loyalty to competing brands in the market. This was one of the biggest challenges that this firm had to address in its supply chain management. The supply chain and marketing units realized that one of the biggest weaknesses in their supply chain was poor communication system between the marketing unit and various departments, especially those who were in the field. Communication breakdown was a common phenomenon at the firm as the system went down when it was needed the most. The firm spent a lot in purchasing the infrastructure for the serves and in hiring qualified personnel to ensure that the server was operating optimally. Despite this heavy investment in IT infrastructure, Samsung was not getting the results it expected. Communication between the firm and its agents in the world market remained disruptive and unpredictable. In some cases where there were agencies, it forced some of the employees to make direct phone calls which were not only very expensive, but also lacked references that are always important when undertaking important business tasks. As the firm was growing, its servers were becoming weak, and this was affecting its supply chain. To solve this problem, Samsung employed cloud computing business model in its supply chain management. In order to back-up its servers, this firm decided to introduce Hardware as a Service from CharTec Business Solutions as a way of solving the constant problem of constant server breakdown. CharTec was assigned the task of developing and administer hardware assets to help improve communication within the firm. This firm was to provide Samsung with a strong server and other related hardware services that would help in improving the communication system within the firm. Given th e increasing amount of information that needed storage, analysis, and transfer, the firm noted that the best approach would be to rent the services from this firm. CharTec would be responsible for monitoring the servers to ensure that it was operating optimally and that data flow and data storage within the firm was effective enough to meet the needs of Samsung. The HaaS component of Cloud Computing Business Model offered the solution that Samsung needed to improve is supply chain (Sherman Zhu 2013, p. 71). The firm was able to get the right information about the products needed in the market. It would also monitor the movements of various products from various sources to the firm, and from the firm to the market. The serves became strong enough to support the increased need for information flow and storage within the firm. This partly explains why Samsung has been very successful in the market Cloud Computing in Nike Nike is one the leading firms in the apparel industry. For a lon g time, firms in this industry believed in marketing using the mass media as a way of reaching its customers. Bick-and moter stores was the only way of selling products to the customers. This meant that firms had to developed huge stores along busy streets in order to attract as many customers as possible. The stores had to be strategically arranged in order to appeal to the customers. Supply chain took a simple model where the outlets would make direct phone calls to the production units in case the stocks for the products had gone down. With the increasing customers, this business model started failing (Wejman 2010, p. 24). It was common to experience a scenario where by the time products are released from the production plants, the shelves at various outlets would be lacking the products. This meant that customers would not be able to get the products they desired. Things became worse when firms in this industry started embracing online business. The servers of this firm were too weak to support online business even after the management decided that the firm would go online. The supply chain and marketing units realized that there was a need to introduce cloud computing business strategies as a way of changing its supply chain from the analogue system to a digital one. The management needed both the HaaS and SaaS components of cloud computing business model. HaaS was needed because the current infrastructural IT assets at the firm were not able to support the increasing need for information. This was outsourced from Equus Managed Services Solutions. SaaS was needed to improve the software applications that were used by the firm (Yeaple 2006, p. 610). NetSuite was considered the most appropriate firm for this service. NetSuite was assigned the task of offering software solution that would help the marketing unit to track movement of cargo while on transit. The cloud had to make all relevant information available to different employees of the firm at differen t locations around the world. The communication system between different departments also had to be improved. This is one of the business models that have enabled Nike to become the leading firm in this industry. Challenges of using cloud computing in supply chain According to Beard (2008, p. 17), many firms have embraced cloud computing business strategy as one of the best ways of improving communication system. However, there are a number of challenges that have hindered its effective usage in the market. One of the main challenges is the issue of security and privacy of the information in the cloud. Given that the information is managed by a third party, its security is not guaranteed. Halpert (2011, p. 70) also notes that the quality of the service may be compromised because the service provider is serving many companies. This system also poses challenge with the billing system that should be highly secure. Conclusion It is clear from the discussion above that cloud computing is gaining popularity in supply chain management. Cloud in supply chains offers a completely new approach of managing supply chain within a firm. It involves integration of the emerging technologies into supply chain system in order to improve speed, reliability, and efficiency of delivering products into the market. It improves communication in the process of delivering products to the market. Many firms around the world are currently using various models of cloud computing in their supply chain as a way of improving their efficiency in the market. List of References Beard, H 2008, Cloud computing: Best practices for managing and measuring processes for on-demand computing, applications and data centers in the cloud with SLAs, Cengage, New York. Berger, S 2006, How We compete: What companies around the World are doing to make it in today’s global economy, Currency-Doubleday, New York. Carmel, E Tija, P 2006, Offshoring information technology: Sourcing and outsourcing to a glo bal workforce, Cambridge University Press, Cambridge. Djellal, F Gallouj, F 2013, Measuring and improving productivity in services issues, strategies and challenges, Edward Elgar, Cheltenham. Dutrà ©nit, G Vera-Cruz, A 2007, ‘Triggers of the technological capability accumulation in MNCs’ subsidiaries: The maquilas in Mexico’, International Journal of Technology and Globalisation, vol. 3. no. 3, pp. 315-336. Gibb, F 2006, ‘A framework for business continuity management, International Journal of Information Management, vol. 26. no. 2, pp. 128- 141. Halpert, B 2011, Auditing Cloud Computing: A Security and Privacy Guide, Wiley, New Jersey. Jae-Nam, L 2008, ‘Exploring the vendor’s process model in information technology Outsourcing’, Communications of AIS, vol. 22. no. 1, pp. 569-589. Jamsa, K 2013, Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more, Jones Bartlett Learning, Burlington. Kaplan, R Norton, D 2006, ‘How to Implement a New Strategy without Disrupting Your Organization’, Harvard Business Review, vol. 4 no. 3, 100-109. Koontz, H Weihrich, H 2013, Essentials of management: an international Perspective, McGraw-Hill, New York. Molen, F Brace, C 2010, Get ready for cloud computing: A comprehensive guide to virtualization and cloud computing, Van Haren Publishing, Zaltbommel. Mukherjee, P 2009, Operations management, and productivity Techniques, PHILearning, New Delhi. Parker, D 2012, Service operations management: the total experience, Edward Elgar, Cheltenham. Rhoton, J 2009, Cloud computing explained: Handbook for enterprise implementation, Recursive Ltd, London. Sherman, H Zhu, J 2013, Service productivity management improving service performance using data envelopment analysis (DEA), Springer, New York. Sosinsky, B 2011, Cloud computing bible, Wiley, Indianapolis. Wejman, B 2010, ‘Continental Airlines: Outsourcing IT to Support Business Tr ansformation’, International Journal of Communication, vol. 2. no. 1, pp. 19-25. Winkler, V 2011, Securing the Cloud: Cloud Computer Security Techniques and Tactics, Elsevier Science, Burlington. Yeaple, E 2006, ‘Offshoring: Foreign direct investment and the structure of US trade’, Journal of the European Economic Association, vol. 4. no. 2, pp. 602-611. This essay on Different Implementation of Cloud System was written and submitted by user Swarm to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Free Essays on A Clockwork Orange

of both. The story begins at the start of a wild and violent night with Alex and his friends sitting in a diner. To start a typical night they encounter an old man walking the streets, so they harass and hit him. However, this is not just any ordinary harassing episode but more of a complete and utter pounding. They beat the defenseless man until he is all bloody and disfigured. They then send him on his way, half naked and crawling home, later that night they saw an old drunken man sitti... Free Essays on A Clockwork Orange Free Essays on A Clockwork Orange A Clockwork Orange By: Many of us like to think that humanity as a whole is progressing to a better future where we will live united and in peace with one another. Nevertheless, there are those among us that do not share these beliefs. In A Clockwork Orange, by Anthony Burgess, a futuristic world is turned upside down and in shambles. This 1962 classic is a frightful depiction of what our society could become and possibly, what it already is. Drugs almost seem to be legal and unregulated and subsequently are widely used. The prison system is overcrowded with young punk criminals who are inherently evil with no regard for humanity, or any part of society for that matter. Youth take over the streets at night and beat anyone they encounter. The elderly sit around in bars and drink the remainder of their lives away. The people have become desensitized to violence, because it is so prevalent in their lives. A Clockwork Orange is a very intriguing story that deals with many social problems, not offeri ng a solution, but pointing out obstacles in the way of the creation of a more perfect society. A Clockwork Orange is written in the first person by the main character, Alex. Three of his "droogs"(friends) that help him in his crimes are Dim, Pete, and Georgie. Throughout the story, the author creates his own language called "nadsat", which is used by the youth of the futuristic world. "Nadsat" is a mix of Russian, English, and the slang words of both. The story begins at the start of a wild and violent night with Alex and his friends sitting in a diner. To start a typical night they encounter an old man walking the streets, so they harass and hit him. However, this is not just any ordinary harassing episode but more of a complete and utter pounding. They beat the defenseless man until he is all bloody and disfigured. They then send him on his way, half naked and crawling home, later that night they saw an old drunken man sitti...

Thursday, November 21, 2019

Article Review pertaining to Ethics Example | Topics and Well Written Essays - 500 words

Review pertaining to Ethics - Article Example Most of these stories flowing within the companies are well established and openly expressed narratives with a clear design. However, some stories are fragmented and hidden from the public lime light. Stories have a moral position within organizations as they contain and deal with both bad and good issues. We can therefore conclude that story telling is a suitable tool for studying ethics within organizations (Gabriel, 2004). Stories on the other hand can be informative of leadership styles used within a company. This is because stories may refer to more democratic and empowering leadership. Instead of direct and intimidating command, stories are interpreted with a view to influence the listener or the follower. On the contrary, an empowering story may turn out to be disempowering to the follower or precisely to employees in an organization. Stories can also be used as a seduction or manipulation tool to staff in an organization. Manipulation in many cases is viewed as a non-ethical way of leadership. The use of hidden power is accounted for as stories are seen as latent way to influence followers (Boje, 2001). Plato stated that anyone who narrates the story governs. To further clarify; this means the narrator has the ability to influence followers through a discursive reality. The narrator can create a publicly expressed social reality and shape it to their desired motives. This places focus on ethical dimensions in leadership stories. Through this, an individual may have either good or bad intentions while narrating their story. The narrator may purse to conceal his intentions with manipulation unknowingly to the listener on the power wield attempts falling upon them. Thus, such a position of leadership is termed as bad and unethical (Ciulla, 2005). This begs the question of what kind of leader possess powerful story telling techniques and resources. A charismatic leader

Wednesday, November 20, 2019

Public Finance in the Health Care System Essay Example | Topics and Well Written Essays - 500 words

Public Finance in the Health Care System - Essay Example Progressive reports show that the number of then uninsured in Vermont has been going down. There were 8.4 percent uninsured persons in Vermont in 2000 and 6.8 percent uninsured persons in 2012. Eighty percent of the uninsured Vermonters cited the cost of health insurance as a major reason why they did not take insurance covers. In 2012 it was found that most uninsured Vermonters were unmarried, male, poor, young, working and without a college degree. According to 2012 statistics, there are more Vermonters who are working but are uninsured (75 %) than Vermonters who are working and are insured (65%). The median annual income of uninsured Vermonters was in 2012 was 201% of the federal poverty line (Smith et. al., 2013). In 2010, the Kaiser Family Foundation surveyed the Medicaid Payment per enrolled. The survey showed that Vermont spent $10,550 per every aged person covered under Medicaid. It was also found that the spending per every disabled Medicaid enrollee in Vermont was $17,936. Every adult Medicaid enrollee cost Vermont $3,437 in 2010 whereas the state spent $3,667 on every child Medicaid enrollee. In the same year, Vermont spent $5,099 on every Medicaid medically needy enrollee (Cuckle et. al., 2011). Vermont raises over 95% of its revenue from taxes. The statewide property tax is estimated at $1,035.7 million in Vermont’s state fiscal year 2015 and as such, it is the state’s largest source of revenue. Personal income tax makes up one-third of non-property-tax revenue in Vermont. The sale and use tax is the third largest source of income, followed by rooms and meals taxes. Federal funds represent approximately one-third of Vermont’s funding for state programs. In January 2014, it was estimated that available general fund in Vermont was 76%, available transportation fund was 14% and available education fund was estimated at 10% (Snyder et. al., 2012). In 2010, there were 15.2% Vermonter adults in

Sunday, November 17, 2019

Product Excellence Using Six Sigma Assignment Example | Topics and Well Written Essays - 5000 words

Product Excellence Using Six Sigma - Assignment Example The literature on integration method between Design for X and DFSS is explained below which can help in identifying the principles of design for X in the context of DFSS along with the critical analysis on the implementation of Design for excellence and DFSS. The section will first explain the literature on the concept of the design for excellence and then critically evaluate the factors that can identify the loopholes in the designing procedures. Design for X is the term used for the product development. It is referred to as a system or strategy, which is used in the product development lifecycle (Eder & Hosnedi, 2010, p. 180). The design for X is another name of a model for excellence. The system incorporates wide variety and collection of product development design guidelines. In order to improve the technical features of a particular product, the design guidelines provided in the design for X can help in the development, controlling and innovation phase of the product development . The guidelines also educate or increase the procedural knowledge of the engineers, who are involved in the product development cycle with technical expertise. 1. The guidelines are based on the experienced engineers and their past experiences. The new entrants may have the problems of clearly understanding the technicalities, which are described under design for X. The experience-based guidelines may have the dependencies of the context and assumptions on the basis of which the design was developed. Therefore, the design may change over time. It can be explained with the help of the example of apple incorporation i.e. Steve Jobs left Tim Cook some problems such as despite of the fact that Tim Cook initially followed the same designs, which were actually followed by Steve Jobs and used the experienced-based guidelines of Steve Jobs but it was initially proved to be difficult for the Tim cook to understand the fact that the success story of Apple Inc., was not based on the existing designs but on the innovation of new designs at different intervals (Yarow, 2014).  Ã‚  

Friday, November 15, 2019

Positive Reinforcement Vs Punishment In Enhancing Learning

Positive Reinforcement Vs Punishment In Enhancing Learning Positive reinforcement is the conveyance of a stimulus that has the preferred effect on strengthening a certain behavior while punishment is the introduction of a stimulus that has an effect of declining certain behavior. Positive reinforcement is a method applied to strengthen good deeds and do away with bad behavior in children. Positive reinforcement also instills a sense of self-worth and inspires self-belief in children. The most common forms of positive reinforcement given to children include, praising or rewarding a child which raises the child chance of cleaning his/her room. Punishment is used to refer to addition of something aversive so as to discourage the behavior. The most general case involves reprimanding a child for disobedience. The reason why the children change behavior after a punishment is that they always relate reprimanding with negative behavior. Since children fear reprimanding children therefore avoid involving in negative behavior which calls for punishments. Positive reinforcements versus punishments as means for learning Proponents of positive reinforcements argue that use of reprimanding to boost learning in children is an aversive method that is painful and uncomfortable. According to (Coon, 2005), people and conditions related with punishments have a tendency of becoming feared, disliked and relented. This aversive attitude of punishments makes it particularly poor as means used to for making children to learn. When used as a means to promote learning in children, punishments will only instill fear and children will not be willing to learn. Supporters of positive reinforcement suggest that positive attention can be used to keep improving the childrens behavior. Natrajan, (2003), argues that a parent might try to set future goals with the child and this promotes the child to learn quickly. On the contrary, punishments instill fear in the children and they develop a low regard on any goal that might be set by the parent. Natrajan, (2003), further argues that punishments cannot be used in goal setting. Positive reinforcements can work well with children by giving them tangible items or praising child for a task well done or even a hug. The children will learn to improve their behavior since they like rewards and gifts. Advocates of punishments argue that, when children get used to being rewarded with tangible items in order to involve in positive behaviors. In such a situation rewards and gifts can become a problem when they are too expensive for the parent to provide. According to Natrajan, (2003), gifts and rewards can be ineffective in promoting learning in children since children can develop an attitude that they have to be given rewards in order to perform specific tasks. In addition, advocating for a rewarding culture in children does not instill a sense of responsibility in them and children learn to perform tasks only because they expect to be paid. Advocates of positive reinforcement also argued that parents have been worried that positive attention might lead to ruining their children. However, supporters of positive reinforcement have maintained that positive attention encourages the children to yearn doing good in order to get support of parents. Proponents of positive attention, argue that rewards or commending children can ruin them only when given while not due. Proponents of positive reinforcements suggest that it would work well when a parent notices her child wrong things, by commenting something negative about the behavior. According, to Natrajan, (2003), such a comment from a parent might act as a reward for the undesirable behavior and the child will change since the children have realized the parent is not happy with the behavior. Supporters of positive reinforce also advocate for a parent to wait and notice when the child does something right and takes the opportunity to explain the wrong behavior. Proponents of positive reinforcements argue that when commending the child the focus should be on the parents feeling rather than criticizing the child. An example is when a parent notices her child assisting another child in a home care, the parent should commend the child with words such as that makes meà ¢Ã¢â€š ¬Ã‚ ¦..proud of you.In such a situation the child feels esteemed and this promotes the good behavior. Advocates of punishments suggest that while using punishments as a means of teaching children, then, the punishments should be mild. According to, (Coon, 2005), when the punishments are too mild they can become ineffective. For instance, a child who is fond of snatching toys form her sister should not only be punished but the sister should also be congratulated for sharing toys with the others. According to, (Coon, 2005), reprimanding informs the person the response was not right but it does give the person the direction of the right thing. In circumstances that pose immediate hazard to children, like a situation where a child reaches for something hot or a picking a toy that rolls in the middle of the road, mild reprimanding will be applicable to stop disaster. Reprimanding in such circumstances works best if it produces actions that are incompatible with the response the individual wants to suppress. For instance, when a child stretches his/her hand to reach a hot stove, its best to reprimand the child by slapping the outstretched hand so that it is withdrawn immediately. Advocates of punishments argue that reprimanding lowers the possibility that a response will be repeated. According to (Coon, 2005), for punishments to be effective they need to be given after the undesired response takes place. A punishment works effectively by reducing the frequency of occurrence of the undesirable behavior. According to (Coon, 2005), the effectiveness of punishments in bringing to an end the undesirable behavior depends on their timing, strength and regularity. Reprimanding work best when it takes place when undesirable behavior is being witnessed and immediately afterwards and when it is applied each time such a response occurs. Advocates of punishments suggest that severe reprimanding following a situation that could have resulted to danger is extremely effective in bringing to an end to a behavior. For example, when a 12 year old child gets a shock by putting his/her finger in a light socket that may be the last time the child ever tries such. In many situations reprimanding on temporarily only suppress the behavior and responses restrained by mild punishments more often than not resurface. Supporters of positive reinforcements, according to Perry, (1973), argue that reprimanding cannot eliminate such vices like lying in children. Rutter, (1987), maintains that reprimanding only motivates the children to be better at lying and use the refined lying skills to other situations in which lying may advance their interests. He further adds that when children become experts in lying there is no any height of punishments that will change their behavior. According to (Rutter, 1987), use of positive reinforcement is more effective in stimulating learning in children than use of caning. For example, offering a piece of candy for a child who scores high marks on a test promotes the child to do better in future tests. In addition, use of verbal praise, such as telling the child well done my child stimulates a child to improve the performance in future tests. Advocates of punishments argue that reprimanding is stronger and lasts for a long time as compared to positive reinforcement. According to (Coon, Mitterer, 2008), in case a parent has a particular task which they wish their children to perform, and after accomplishing the task badly they are reprimanded on the other hand when they do them well they are reinforced mildly and they will accomplish the task mediocre. According to (Perry, 1973), when a parent displays discontent with the child when the accomplishment is poor then, the children are likely to change the situation. Cameron (2006), argues that the society has used punishments rather than positive reinforcements to promote desirable behavior although the results have not always been positive. Teachers have been known to reprimand children who do not complete their homework with the hope that students will be able grow a sense of accountability for their work. In addition, Cameron (2006), argues that parents condemn their childrens working routines so that they can instill high standard of success. Punishment systems have been created and maintained as means of accomplishing aims of high output, contentment with success, concern for others and so on. Use of punitive means as a means to encourage learning should not be used since reprimanding is among the main source of external have power over peoples characters. Cameron (2007), argues that since disciplinary means have resulted to serious negative effects has lead to society condemning the usage of any external form of influence. Many researchers have also condemned use of punishment as a means of learning since it involves external control of human behavior and has negative effects. Punishments should not be used as a means to promote learning since students enjoy school environment and work hard particularly when there is a properly set positive reinforce system. Children admire and enjoy learning do so without being punished. Positive reinforcement works by making children self-motivated to accomplish their goals. Advocates of positive reinforcement argue, punishments should not be used promote learning, since use of punitive systems has not been able to encourage learning but instead it has resulted to bitterness, sense of low self-worth, dissatisfaction and attempts to overthrow those in power. Cameron (2007) argues that use of disciplinary means has backfired. Typically children, learn by early interactions with the caregivers to use socially appropriate skills to meet their needs. According to Stormont et al., (2007), this pattern of communication is governed by principles of positive reinforcements. This principle of positive reinforcement demonstrates that when the character is contingently obeyed by an object or events find strengthening, they are likely to continue to use the behavior. For instance majority of the children have continued to request for an item using polite language like please and this behavior reform those who comply. Advocates positive reinforcements argue that use of punishment to enhance learning in children is an aversive method that is painful and uncomfortable. According to (Coon, 2005), people and conditions related with punishments have a tendency of becoming feared, disliked and relented. This aversive attitude of reprimanding makes it particularly poor as means used to for making children to learn. Advocates of positive reinforcements suggest that, it is among the best method of instilling a learning behavior in children. According to (Rutter, 1987), when positive reinforcements are used correctly, it can have good results in influencing children behavior. Rutter, (1987), further maintains that children adapt quickly and are willing to act in behaviors that are desired by their parents. Supporters of positive reinforcement in addition imply that use of reprimanding should be discouraged in children upbringing. Hawes Shores (2001), also support that yelling to children when they have been found involved in undesirable behavior as a form of punishment. The advocates of positive reinforcement argue that instead of yelling at childrens for wrong doing, parents should reward them when the behavior is desirable so that the rewards add to stimulate the good behavior. Advocates of punishments as a means to promote learning suggest that reprimanding should be used as a means of training when children display risky and dangerous behavior. Perry (1973), maintains that a parent cannot use positive reinforcement such as a reward to bring an end to dangerous behavior running into traffic. Use of punishment would be the best remedy to discourage such wrong behavior. Supporters of punishments have also suggested that very negative reprimanding to be effective is changing children behavior. If two children are fighting over a toy, the best remedy to bring an end to the fight over the toy would be by removing the toy (Perry, 1973). Advocates of positive reinforcement argue that among the benefits of using positive reinforcement particularly in a classroom setup is that children become more attentive and take more interest in learning. Contrary, to this when the cane is applied to reprimand wrong responses; the children develop fear of participating actively in classrooms. Hawes, Shores (2001), maintain that when children are commended or rewarded with touchable items for right answers they develop desire to learn and enhanced participation in classroom. Advocates of positive reinforcements argue against using punishments as a mode of instilling behavioral change in children. Rutter (1987) suggests that positive reinforcement is a better psychological means of bring out behavior change in children and at the same time its simpler to utilize. According to (Perry, 1973), parents are required to weigh the consequences of using punishments and those of positive reinforce and then make the best choice. My own view is that I support the use punishment when children engage in wrong behaviors. According to the Bible spare the rod and spoil the child suggests that children should be reprimanded in order to stop undesirable behavior. Considerable punishment need to be applied to bring about behavioral change. The timing and intensity of the punishments should be dependent upon specific stimulus expected from children. For example, if a parent finds a 12 year putting objects in power socket, the child should be reprimanded and informed of hazards of electricity. The choices of whether to use positive reinforcement or punishments depend on the parent or the caregiver.

Tuesday, November 12, 2019

Integrated Marketing Communication and Branding Essay

Abstract In an increasingly competitive marketplace, greater emphasis is being placed on brand image development as the basis for consumer discrimination. Advertising has a central role to play in developing brand image, whether at the corporate, retail or product level. It informs consumers of the functional capabilities of the brand while simultaneously imbuing the brand with symbolic values and meanings relevant to the consumer. These two functions of advertising closely parallel the informational and transformational schools of advertising effects and theories on the central and peripheral routes to consumer persuasion. Such dichotomous approaches to explanation are unlikely to represent the reality of consumer choice in that brand image is likely to be formed by the simultaneous absorption of advertising messages based on both the functional and expressive capabilities of brands. Source: http://www.emeraldinsight.com/case_studies.htm/journals.htm?articleid=857593&show=html&WT.mc_id=alsor ead Abstract Purchase intentions for apparel products often require physical examination prior to purchase. Hence, greater risk is associated with shopping online for apparel products, making it important to examine factors that reduce various risks influencing online purchase intentions. This study examines and compares the impact of two of the most important risk reducers for online apparel shopping – product brand image and online store image – on specific types of perceived risks and online purchase intentions for apparel. The results show that product brand image influences consumers’ online purchase intentions both directly and indirectly by reducing various risk perceptions. Online store image impacts purchase intentions indirectly by decreasing risk perceptions. The results of this study provide fresh insight into understanding the impact of product brand image and online store image on each type of perceived risk associated with online shopping Source: http://www.sciencedirect.com/science/article/pii/S096969891200029X Abstract Purpose – From an integrated marketing communications perspective, this study aims to analyses what level of consistency among brand messages is more effective in terms of customer-based brand equity. In particular it aims to evaluate its impact on brand knowledge structure, and how brand familiarity moderates this influence.. Source: http://www.emeraldinsight.com/case_studies.htm/journals.htm?articleid=17014825&show=html&WT.mc_id=alsoread

Sunday, November 10, 2019

A King at War with Parliament

A King at War With Parliament The English Civil War began in 1642 between King Charles I and Parliament. Wealthy nobles, known as Royalists, supported the king. Supporters of Parliament included Puritans, who were led by Oliver Cromwell. Cromwell eventually became commander-in-chief of Parliament’s army. A number of battles took place between the king’s troops and Cromwell’s army, some of which are shown on the map below. The first battle, which took place at Edgehill, did not gain ground for either side. After a series of victories, however, Cromwell and Parliament took control of London and, eventually, England.In 1649 Charles I was publicly beheaded, and Parliament alone ruled England. [pic] Map Activity 1. ON THE MAP, LABEL THE AREA OF ENGLAND. 2. Use a bright color to trace the borders of the area controlled by Parliament at the start of the war in 1642. 3. Use a second bright color to circle the location of the first battle of the war. 4. Use two different light colors to trace the routes of forces that arrived from outside England in support of the king and in support of Parliament. Analyzing Maps 5. REGION BASED ON THE MAP, WHO CONTROLLED A LARGER AREA OF ENGLAND AT THE START OF THE WAR IN 1642? . Location From which country did forces invade England in support of King Charles I at the battle of Nantwich in 1644? 7. Location Troops from which country joined the Parliament army to defeat King Charles I at Marston Moor? 8. Region Based on the map, which area of England did Parliament gain in their victory at Marston Moor? 9. Location Based on the map, did King Charles I or Parliament win the battle at Lostwithiel and gain control of southwest England? 10. Region Based on the map, which small portions of England remained in the control of the king and his forces in December 1645?

Friday, November 8, 2019

Spiders in Space on Skylab 3

Spiders in Space on Skylab 3 Anita and Arabella, two female cross spiders (Araneus diadematus) went into orbit in 1973 for the Skylab 3 space station. Like the STS-107 experiment, the Skylab experiment was a student project. Judy Miles, from Lexington, Massachusetts, wanted to know if spiders could spin webs in near-weightlessness. The experiment was set up so that a spider, released by an astronaut (Owen Garriot) into a box similar to a window frame, would be able to build a web. A camera was positioned to take photos and videos of the webs and spider activities. Three days before the launch, each spider was fed a house fly. They were provided with a water-soaked sponge in their storage vials. The launch took place on July 28, 1973. Both Arabella and Anita needed some time to adapt to near-weightlessness. Neither spider, kept in holding vials, voluntarily entered the experiment cage. Both Arabella and Anita made what has been described as erratic swimming motions upon ejection into the experiment cage. After a day in the spider box, Arabella produced her first rudimentary web in a corner of the frame. The next day, she produced a complete web. These results prompted the crewmembers to extend the initial protocol. They fed the spiders bits of rare filet mignon and provided additional water (note: A. diadematus can survive up to three weeks without food if an adequate water supply is available.) On August 13th, half of Arabellas web was removed, to prompt her to build another. Although she ingested the remainder of the web, she did not build a new one. The spider was provided with water and proceeded to build a new web. This second complete web was more symmetrical than the first full web. Both spiders died during the mission. They both showed evidence of dehydration. When the returned web samples were examined, it was determined that the thread spun in flight was finer than that spun preflight. Although the web patterns made in orbit were not significantly different from those that were built on Earth (aside from a possible unusual distribution of radial angles), there were differences in the characteristics of the thread. In addition to being thinner overall, the silk spun in orbit exhibited variations in thickness, where it was thin in some places and thick in others (on Earth it has a uniform width). The start and stop nature of the silk appeared to be an adaptation of the spider to control the elasticity of the silk and resulting web. Spiders in Space Since Skylab After the Skylab experiment, Space Technology and Research Students (STARS) conducted a study on spiders planned for STS-93 and STS-107. This was an Australian experiment designed and conducted by students from Glen Waverley Secondary College to test the reaction garden orb weaver spiders to near-weightlessness. Unfortunately, STS-107 was the ill-fated, catastrophic launch of the Space Shuttle Columbia. CSI-01 started on ISS Expedition 14 and was completed on ISS Expedition 15. CSI-02 was performed on ISS Expeditions 15 through 17. The International Space Station (ISS) conducted two well-publicized experiments on spiders . The first investigation was Commercial Bioprocessing Apparatus Science Insert Number 3 or CSI-03. CSI-03 launched to the ISS on the Space Shuttle Endeavour on November 14, 2008. The habitat included two orb weaver spiders (Larinioides patagiatus or genus Metepeira), which students could view from Earth to compare the feeding and web-building of the spiders in space against those housed in classrooms. The orb weaver species were selected based on the symmetrical webs they weave on Earth. The spiders appeared to thrive in near-weightlessness. The second experiment to house spiders on the ISS was CSI-05. The goal of the spider experiment was to examine the changes in web construction over time (45 days). Again, students had the opportunity to compare the activities of spiders in space with those in classrooms. CSI-05 used golden orb weaver spiders (Nephila claviceps), which produce golden yellow silk and different webs from the orb weavers on CSI-03. Again, the spiders constructed webs and also successfully caught fruit flies as prey. Golden orb weaver spiders were selected for CSI-05. Joe Raedle / Getty Images Sources Witt, P. N., M. B. Scarboro, D. B. Peakall, and R. Gause. (1977) Spider web-building in outer space: Evaluation of records from the Skylab spider experiment. Am. J. Arachnol. 4:115.

Wednesday, November 6, 2019

Biography of Lord Byron, English Poet and Aristocrat

Biography of Lord Byron, English Poet and Aristocrat Lord Byron is considered to be one of the greatest British writers and poets of his time. He became a leader in the Romantic Period, alongside contemporaries like William Wordsworth, John Keats, and Percy Bysshe and Mary Shelley. Fast Facts: Lord Byron Occupation: English poet, romanticistBorn: 22 January 1788 in London, EnglandDied: 19 April 1824 in Missolonghi, Ottoman EmpireParents: Captain John â€Å"Mad Jack† Byron and Catherine GordonEducation: Trinity College, CambridgePublish Works: Hours of Idleness; Childe Harold’s Pilgrimage, She Walks in Beauty, Don JuanSpouse: Anne Isabella MilbankeChildren: Ada Lovelace and Allegra ByronFamous Quote: There is pleasure in the pathless woods, there is rapture in the lonely shore, there is society where none intrudes, by the deep sea, and music in its roar; I love not Man the less but Nature more. Lord Byron’s personal life was marked by tumultuous love affairs and inappropriate sexual relationships, unpaid debts, and illegitimate children. Lady Caroline Lamb, with whom Byron had an affair, famously labeled him â€Å"mad, bad, and dangerous to know.† He died in 1824 at the age of 36 from a fever he contracted during his travels in Greece. His most notable works include Don Juan, She Walks in Beauty, and Childe Harold’s Pilgrimage. Early Life Lord Byron was born in 1788 in London under the full name George Gordon Noel, sixth Baron Byron. He was raised in Aberdeen, Scotland, by his mother after his father fled the family and died in 1791 in France. Byron inherited his title at the age of 10, though he later adopted his mother-in-law’s family name, Noel, in order to inherit half of her estate. Imagno/Hulton Archive/Getty Images Byron’s mother was prone to mood swings and heavy drinking. Due to mistreatment by his mother coupled with a deformed foot and an uneven temper, Byron lacked discipline and structure in his formative years. He was educated at Harrow School in London, followed by Trinity College at Cambridge, though he spent most of his time at the latter engaging in sexual relationships and sporting activities. It was during this time that he began writing and publishing works.   Marriage, Affairs, and Children Lord Byron first showed his affections for a distant cousin who indulged him for a while before rejecting his affections. In subsequent years, Byron had promiscuous affairs with many women, including Lady Caroline Lamb, Lady Oxford, and his half-sister, Augusta Leigh, who later gave birth to a daughter widely considered to be Byron’s. Lord Byron married Anne Isabella Milbanke in January 1815, and the following year she gave birth to a daughter, Augusta Ada (later Ada Lovelace). Shortly after the birth of their daughter, Lord and Lady Byron separated, with Anne Isabella indicating the cause to be his incestual relations with his half-sister. During this time, Lord Byron developed a close relationship with Percy and Mary Shelley and Mary’s sister Claire Clairmont, who also had a daughter with Byron called Allegra.   Travels After completing his education at Cambridge, Lord Byron embarked on a two-year journey across Spain, Portugal, Malta, Albania, and Greece, from which he drew inspiration for Childe Harold’s Pilgrimage. After Byron finalized the separation from his wife, he left England permanently for Switzerland, where he spent time with the Shelleys. He went on to travel across Italy engaging in promiscuous affairs, writing and publishing work along the way. He spent six years in Italy, where he wrote and released Don Juan. Newstead Abbey, Nottinghamshire, 18th century. The abbey was formerly an Augustinian priory but was converted into a domestic home following the Dissolution of the Monasteries. It is the ancestral home of Lord Byron. Hulton Archive / Getty Images In 1823, Lord Byron was asked to assist in the Greek War of Independence from the Ottoman Empire. He sold his estate in England to raise money for the Greek cause, part of which he used to enable a fleet of ships to sail to Missolonghi, where he planned to help attack the Turks. Death While in Missolonghi, Lord Byron contracted a fever and died at the age of 36. His heart was removed and buried in Missolonghi, and his body was returned to England. His burial at Westminster Abbey was denied, so Byron was buried in his family tomb in Newstead. He was deeply mourned in England and in Greece.   Legacy After spurning his initial affections, Lady Caroline Lamb labeled Lord Byron â€Å"mad, bad, and dangerous to know,† a statement that stuck with him for life and beyond. Because of his generous financial support and acts of bravery in the Greek Wars of Independence, Lord Byron is widely considered to be a Greek national hero. However, his true legacy is the collection of work he left behind. Don Juan Don Juan is a satirical epic poem written by Lord Byron during the last years of his life. It is based on the legendary womanizer Don Juan, though Lord Byron reversed these character traits to make Don Juan easily susceptible to seduction. The poem is considered to be a reflection of Byron’s personal character and the disappointment with which he felt constantly burdened. Don Juan is comprised of 16 completed sections, called cantos and a final, 17th canto that remained unfinished at the time of Byron’s death in 1824. Childe Harold’s Pilgrimage Written and released between 1812 and 1818, Childe Harold’s Pilgrimage tells the story of a young man who travels the world to fill the void left by disillusionment and sadness he feels as a result of the revolutionary wars on the European continent. Much of the content in Childe is derived from Byron’s personal travels from Portugal to Constantinople. Sources Byron, George Gordon.  Don Juan. Pantianos Classics, 2016.Byron, George Gordon, and Jerome J. McGann.  Lord Byron, the Major Works. Oxford University Press, 2008.Eisler, Benita.  Byron: Child of Passion, Fool of Fame. Vintage Books, 2000.Galt, John.  The Life of Lord Byron. Kindle ed., 1832.MacCarthy, Fiona.  Byron: Life and Legend. John Murray, 2014.

Sunday, November 3, 2019

Compare and Analyse Essay Example | Topics and Well Written Essays - 2500 words

Compare and Analyse - Essay Example This has been caused by a sudden advancement in times and seasons. The times when general technology as well and information technology was left for the media alone, no longer exist (Wherle, 2009, pg76). Currently, almost everyone in the world is an IT expert since people have the idea of how to use a technology. However, it should be considered that this is the main aspect of life, that has witnessed a continuous advancement, hence emergence of the term technology development. Documentaries have been made using technology. Bob Dylan’s â€Å"Don’t look back† and Michael’s â€Å"Roger and Me†, are some to the documentaries that portrays a sense of a well used technology (Pennebaker, 1968, pg65). This essay compares the two documentary’s use of technology. Where, apart from the message in the movies, technology has proved a phenomenon to put into considering when watching this movie. First, it is noted here that, the media portrays a gap between message and medium, where Dylan’s’ manager by the name Albert Grossman who is the movie producer airs his client. Many will take this incident as a bad omen, however to him; he literally does it without thinking or rather taking it as a bad omen. Notably, during the cutting and editing of the documentary, it is clear as per the presentations that Grossman’s presence is felt (Eason, 2010, pg26). As much as this might be considered as an artistic job, the truth is that it portrayed a flattering idea at the edge. In this context, it can be noted that the question of centralization became centrally framed; this is evident prior to the presentation of each character. The film is made to be viewed in a very different phenomenon. The sound of observational documentary such as Don’t Look Back is muddy that makes it difficult for a person to differentiate particular person speech and the general uproar. In essence, the quality of the sound in the documentary is wanting since it is difficult to distinguish a

Friday, November 1, 2019

Managing Organisations and People Essay Example | Topics and Well Written Essays - 2500 words

Managing Organisations and People - Essay Example In essence, Ansoff's model of strategic growth is used by Chase in the efforts of enabling the Tyrrell Crisp business to grow. The acknowledgement of Mr Chase that consumer is ready to pay more for traditional products because of the exceptional ingredient are also a concept that can be noted in this model. His packaging which was meant for the locals and therefore designed to suit their needs was equally of importance. This goes along with the Ansoff's model such that the redesigning of the packaging shows that or aims at the existing customers in a new market. This eventually reflects the qualities of Ansoff's model of new products being sold in existing market and new products sold in new markets. In this regards the concept of market penetration is crucial. This is a strategy Chase uses to penetrate the market a market that is apparently not saturated. He does this by attracting new customers for the product and ensuring that the existing ones are adequately furnished by the product and are satisfied. Mr. Chase attains this by aggressively doing the marketing for the product and selling it directly to t he consumers cutting off the link of the distributors who he considers not enthusiastic. In terms of market penetration, Chase uses the strategy to ensure that he makes his sales to the stores. It is to this effect that it can be deducted that distributors if not well managed or well laid out can lead to the detriment of the company rather than the flourishing of the company. Another concept that Mr. Chase use which is a concept in the Ansoff's model is that of diversification. He intends to diversify into other products including cereal bars, biscuits and muesli. Diversification enables the company not to rely heavily on one product. This enables the company to easily overcome any disaster which may be associated with a single product. In this sense diversification according to this model involves the introduction of new products. For long term survival of a company diversification is essential since reliance on one product can lead to uncertainty of the company's future. The behavior approach was researched on in the 1940s since the researchers wanted to find out the source of effective leadership. They considered behaviors of individuals since there was a belief that behaviors could be observed in an objective manner and measured (Allen: 1997). They equally believed that behaviors could be measured. In this regards a researcher Kurt Lewin 1938 gave information that led to the basis of behavior approach of leadership. In this he identified a range of leadership behaviors including democratic style, autocratic style and laissez-faire style. However there is no particular style that has been identified as the most effective in leadership and thus many managers and leaders use a mixer of this styles where appropriate or where the styles suite them. By reflecting the mode of leadership manifested by Chase it shows that Mr. Chase use various types of leadership skills to ensure that his company's products reach various destined locations. This approach th erefore enabled the company to penetrate the Market. The behavior approach of leadership has the views in relation to motivation and can be categorized into two views known as theory X and theory Y. these