.

Wednesday, October 30, 2019

Market structure Essay Example | Topics and Well Written Essays - 1000 words

Market structure - Essay Example The Spangles candy was a fruity boiled sweet with a slight fix about it, the packaging letters were big fat bottomed font, and they came in several flavors. These candies were popular enough that they made their way into pop culture through songs, and cultural references. â€Å"They were launched a few years ago, but didn't seem to take off. The wording on the packaging was in that big fat-bottomed font, the same one that The Goodies used on their opening titles.† (BBC h2g2, 2011) Available market segments include, persons who were born 5 years prior to the initial release of these candies through persons who were born in the late 1960’s, this would include the ages of 63 – 45. Another market segment could be a foreign market base, the youth market, and potential additional markets like comedy fans. Basic objectives for marketing the Spangles branded candy would be to increase product awareness by 20% in the first year, revive the popular side within the first 6 months, decrease customer resistance to buying our product, which would lead to a 50-100 percent increase in sales within the first year. To accomplish these goals we will need to introduce a valid marketing strategy. In the case of this candy we will want to use focused insertion, and narrow advertising structures. It will be important to introduce the product as a special historical re-launch. An additional objective should be the raised awareness of the Mars ® brand name as a result of the campaign, increases of between 10-15% should be realized in the entire Mars ® line which will make the re-launch a success regardless of the eventual outcome of the Spangles line itself. The price should be approximately what it was at the time of its peak popularity for the initial marketing phase; advertising should be done during the most popular hours of television and radio use for the target market. Distribution should be completed at the popular shopping destinations that already car ry other Mars ® products. One potential approach is to use displays that focus on Spangles as the â€Å"Candy you grew up with.† Another possible approach would include different flavours as well as less boisterous yet still â€Å"retro† looking label on the candy itself. Possibly the â€Å"green† approach can be utilized by promoting the use of recycled materials in the wrappings. Another approach could be the use of popular comedians as personalities promoting the cultural aspects from a comedic point of view on television and radio. If the product is marketed with current pop culture icons as spokespersons the additional benefit would be the appeal to the younger generation. By generating a potential new market and by using easily recognized pop culture icons Mars ® could potentially increase their market share not only through the re-launch of the Spangles boiled sweets but also increased interest in current products. If the marketing approach is followe d the potential for name recognition and additional sales of other popular Mars ® products should increase by 15% or more. Additional approaches can be looked to when the initial launch is complete and sales numbers have been returned. A successful re-launch could mean expanded markets in countries where retirees

Monday, October 28, 2019

Pharmacology and Medical Treatment Essay Example for Free

Pharmacology and Medical Treatment Essay Relating course content to the current health care environment is an integral part of your learning. Two (2) application papers are required in this course. These short papers will give you the opportunity to apply course content. They should be approximately 500 words in length each (2 pages). The topics for these two papers are noted below. Refer to at least one outside source in addition to your text as you prepare each of these papers. Application Paper One: New Pharmaceuticals Application Paper Two: Pain Medications The body of the papers should be approximately 500 words (2 pages); there should also be a title page and a reference page. Papers that are too brief or too verbose could be subject to large point deductions. The papers should be uploaded into the appropriate Dropbox. The file should be named [LastName]AP1.doc or [LastName]AP2.doc respectively. Use APA guidelines. APA requires double-spacing, but I will allow 1 ½ spacing if desired. All sources must be cited in APA format. The full reference should be found at the end of the paper. Links to APA reference guidelines are presented at the end of the course syllabus and an interactive tutorial is located in Week 3. Application Paper 1 (Due Week 4): New Pharmaceuticals TCO 2 deals with new experimental drugs and the steps required to bring new drugs to market. The first application paper deals with this as well. Describe the steps that are required to bring a new pharmaceutical to market. Address topics like human testing, the role of the FDA in approving new drugs, and the cost incurred by drug companies when developing new drugs. Application Paper 2 (Due Week 7): Pain Medications Your first paragraph needs to outline the different types of drug to relieve pain. Then, you ONLY select ONE type of pain medication to describe the mechanism of drug action (Pharmacology) and the therapeutic efficacy. Furthermore, you need to discuss the adverse effects, abuse potential, and  toxicities of such type of drug (if applicable). Finally, you will describe your opinion of using such type of pain medication. The two topic papers are worth 140 points (70 points each) and represent 14% of your total grade. Each paper will be graded on the following: Content50 points Grammar/spelling10 points References/citations10 points Based on the following criteria: Content (double points for this category) 1. The paper fulfills the purpose of the assignment as described in the syllabus and in this document (up to 10 points) 2. The introduction leads logically to the main idea or thesis (up to 10 points) 3. Supporting evidence is developed and analyzed sufficiently (up to 10 points) 4. Conclusion provides insightful closure (up to 10 points) 5. The content flows logically and demonstrates an understanding of the topic (up to 10 points) Grammar/Spelling 1. Sentences are grammatically correct (noun/verb agreement, punctuation, sentence structure, etc.) (up to 5 points) 2. Spelling is correct (e.g., homonyms used correctly, no misspellings) (up to 5 points) References/citations 1. Sources are cited in the body of the paper using APA format (up to 5 points) 2. Reference list is included with the paper that lists only sources cited in the document (up to 5 points) Points will be awarded for each criterion on the following scale: 5 points = few or no weaknesses found; writer satisfies the criteria with distinction 4 points = strengths outweigh the weaknesses; writer shows sound understanding of criteria 3 points = strengths and weaknesses are about equal; writer shows awareness of criteria 2 points = weaknesses outweighs strengths;  writer shows limited understanding of criteria 1 point = weaknesses far outweigh strengths; writer does not show understanding of criteria Five points (5) will be deducted for each the following: No title page included Name is not on title page or in document Insufficient number of sources cited (must have at least one in addition to the course textbook) Please refer to DeVry’s Academic Integrity Policy located in the Policies Tab under Course Home in the online classroom. Any suspected violation of the Academic Integrity Policy will be handled according to the policy.

Saturday, October 26, 2019

Domestic Violence Amd Women :: Violence Against Women Essays

Domestic violence is a terrible problem that we all must face, not only the people who are victims. We need to stop this before the problem develops into anything bigger than it already is. The battered woman, it has been said, lives in a world of terror and her home is her prison (Berger, 1990, pg. 35). For many hundreds of years people weren't worried about domestic violence. In fact, a popular family journal, the Journal of Marriage and Family, did not include a single article on domestic from 1932 to 1969 (Berger, 1990, pg. 27). Suddenly, more women came out and told of the abuse they had once suffered. Researchers report that 1.8-2.9 million women are battered yearly. Not only do the victims suffer physical pain, but they also have to deal with emotional and psychological pain. The victim may have to face reoccurring nightmares, and may never want to trust another man. Much too frequently, the victim blames themselves. The typical response of an abused/battered woman is, "I provoked him . . . I was being a bad wife, mother, and housekeeper," (Peled, 1995, pg. 141). The very sad part about the violence, beside the physical and emotional stress, is that most likely they know the offender or abuser. So, why, why would a person who is loved, want to abuse their spouse or girlfriend? One of the key responses . . . Jealousy. The husband may become very suspicious, afraid of losing his wife. The abuser sees his wife or girlfriend as a possession. The only way, they think, to relieve this built up anger is aggression. To improve their self-esteem, they abuse the victim physically, emotionally, and sometimes, sexually. Another key factor in wife abuse is alcohol. When the man is stressed, he turns to alcohol to relieve it. Little does he know, that the alcohol makes him more irritable. "He started really drinking excessively and that is when the abuse started. He had been drinking . . . I sat down to read the paper and he wanted his supper . . . he kicked the cat to the ceiling . . . he started slapping my face with both hands," (Berger, 1990, pg. 42). Research shows that men who abuse their wives, often saw their own mother abused. Do to witnessing this, the children of battered families usually grow up to have low self-esteem and believe that hitting is right.

Thursday, October 24, 2019

Legal Research Essay

a) Moore v. Richardson, 332 Ark. 255 (1998). Ms. Moore and Mr. Richardson divorced and Ms. Moore was granted custody of their minor daughter. Mr. Richardson was required to pay child support accordingly and have visitation rights. The case is good law. It is binding to Arkansas court. Clearly, Arkansas court made the final judgment about the custody of the child and visitation by the father. b) Glanding v. Industrial Trust Co., 45 A.2d 553 (1945). The Court of Chancery is not given the jurisdiction to award penalties on government cost recovery cases as it is of limited jurisdiction. Therefore its laws are not mandatory as it can be honored by The Supreme Court who will make the decision. Therefore any cost recovery action is not available at equity. Similarly, private cost recovery actions should be addressed at the Superior Court. c) People v. Jackson, 150 Cal. App. 3d Supp. 1 (Cal. App. Dep’t Super. Ct. 1983). The case is mandatory. The required proceeding should be brought forth during the trial and appellate processes. A party has a right to appeal and the courts have the obligation of giving the party permission to change facts during the appeal as long as there is reasonable evidence and facts. Infringement of personal should not occur and statements should be made depending on standard of evidence. However a party is not to change theories in the trial and appeal court. d)Landers v. Staten Island R. Co., 53 N.Y. 450 (1873). Criminal jurisdiction and civil jurisdiction brings about the protective jurisdiction of courts. They necessitate the occasions for instituting the proceedings. Further criminal and civil jurisdiction therefore implies with  respect to the mature of the subject matter and civil or criminal mature of the actions. Such an action therefore does not aim in the creation of another authority. Territorial aspects may come in hand, however the nature of the action determines the jurisdiction the case will be handled. It merely extends the limits of the particular jurisdiction. It is therefore not mandatory. e) Merriman v. Crompton Corp., 282 Kan. 433; 146 P.3d 162 (2006). There are certain analyses that can be determined depending if a court has jurisdiction over a defendant. A person can be submitted to a particular jurisdiction if the person is a citizen or not and depending on whether he/she committed a criminal act in that jurisdiction or whether he/she was transacting any business in that state.

Wednesday, October 23, 2019

Golden Torch Award Essay

Companies have been striving to be the best in their respective field of services and products. Continuous improvement on the part of the management and commitment on the part of the employees is very important to stay competitive especially in the ever-growing market of society. It is not thus surprising that companies strive to earn distinguishing marks of excellence such as world-class awards. One of the most prestigious awards that can be received is the Golden Torch Award. Unlike all other awards, the Golden Torch Award stands out from the rest because it is not only an award of excellence but also of justice and fairness on how the company treats employees regarding their race. Purpose and Background The National Society of Black Engineers, famously known as NSBE, initiated the Golden Torch Awards in the year 1997. However, no exact date is available as to when the first Golden Torch Awards has been held. The NSBE is a preeminent organization that seeks to serve blacks in the fields of engineering and technology (2008 GTA Winners). The organization was pioneered by students of Purdue University in 1971. As the campus student organization flourished in Purdue, the charter members encouraged and coordinated with different universities throughout the country offering engineering courses. Thus, in 1975, the organization became national with over 30 school chapter organizations. The group’s well-known torch symbol represents the member’s everlasting and burning desire to achieve the success in a competitive society resulting to a positive effect on the quality of life for people from all walks of life. The organization seeks to make an impact on society and the world by the accomplishments and contributions of its members to engineering, technology and even in the academe (NSBE Mission). The Golden Torch Award is just one of the many activities that the NSBE has imparted to the society. The said award wishes to recognize brilliance among African-American engineers, scientists and technologists, including organizations that have exhibited a commitment to the recruitment, retention and promotion of minorities (Siebels, 2004, p. 329). It honors different companies, institutions and individual persons who enhance their professions and the world with outstanding intelligence, competent talent and vibrant vision at the same time serving as role models for everyone in advancing opportunities for African-Americans (DiScipio). Furthermore, the award links accomplishments of its awardees with the dreams of college-bound students. The Golden Torch Award is bestowed every year on the annual convention of NSBE, which seeks to raise scholarship funds for deserving high school students (2008 GTA Winners). Award Criteria The mission of NSBE is â€Å"to increase the number of culturally responsible black engineers who excel academically, succeed professionally and impact the community positively† (NSBE Mission). It is thus understandable that the Golden Torch Award is designed to highlight the achievements of distinguished black engineers and technical professionals together with incoming college students (US Navy). Golden Torch Awardees are usually chosen by scrutinizing resumes, professional achievements, community service and other criteria depending on the type of category of the award. A team of judges consisting of professional and academic leaders both in the field of science and engineering selects the winners of the award (Black Engineers). There are no specific criteria available for the award. Additionally, it will be very arduous to do so since the Golden Torch Award is but a general term for numerous awards varying in category. Nevertheless, the objectives of the NSBE can be a great estimation of the factors that determine the qualifications for awardees. The NSBE has five objectives to undertake. First is to motivate and develop student interests in the various engineering disciplines. The organization’s second objective is to make a great effort in amplifying the number of minority students learning engineering at undergraduate and graduate levels. The third is to tender assistance to members searching for advanced degrees in the field of engineering or its related fields and obtaining professional engineering registrations. Fourth is promoting public awareness of engineering and the opportunities for minorities in their respective professions. Fifth is to act as ambassadors regarding issues and innovations that may affect careers of black engineers (NSBE Mission). These different objectives of the organization are met in one way or another in the criteria used for judging of Golden Torch Award winners. Awards given are numerous and have different titles. In the year 2000, the awards given are: National Chair’s Award for Leadership in Technology, Executive Leader of the Year, Achievement Award, Lifetime Achievement in Academia, Lifetime Achievement in Government, Lifetime Achievement in Industry, Pioneer of the Year, Outstanding Woman in Technology, Mike Shin’s Distinguished Fellow of the Year, Distinguished Engineer, Diversity Leadership in Industry, Diversity Leadership in Government, Corporate Community Service, Corporate/Education Partnership, Executive Director’s Award for Advancing Diversity, Pre-College Community Service, High School of the Year, Pre-College Program of the Year, Pre-College Student of the Year, Academic Visionary, Graduate Student of the Year, Minority Engineering Program Director, Pre-College Initiative Program of the Year, Chapter of the Year, Technologist of the Year and Member of the Year (Black Engineers). Additional awards given this 2008 include Janice A. Lumpkin Educator of the Year , Entrepreneur of the Year and Corporate Diversity Leadership Award (2008 GTA Winners). Benefits of the Award Although there are no tangible benefits that the Golden Torch Award can offer, it still speaks of the prestige that its awardees can possess. The honor and the promotion somehow provide the awardees’ company popularity and quality assurance that customers and consumers seek out. The said award becomes a showcase of the high standards that a company achieves throughout its existence. It also brings about the respect and gives the image that the company not only offers quality service but also social responsibility. It can speak of the capable and proficient workforce a corporation may have. As a liaison officer of the US Navy commented, the bestowal of the award can be a great opportunity to acknowledge professionalism (US Navy). Receiving the award, companies and individuals can also avail of the different programs that the NSBE offers such as academic excellence programs, scholarships, leadership trainings, professional development and career opportunities in the field of engineering and technology (NSBE Mission). Nevertheless, to think further a bit, the award has its disadvantage too. Since the NSBE is a group that uplifts racial equality, radical groups that favor racial discrimination may condemn the awardees or the companies. Terrorist groups may instill fear to people that support such groups. Moreover, this threat is not utterly dangerous as long as the companies and organizations have appropriate security measures at hand. Past Winners of the Award Winners of the Golden Torch Award have been credited for their outstanding performance and significant contributions in the field of engineering and technology. One example is United Technologies Corp. (UTC), which is the 2005 Corporate Diversity Leadership. The corporation was appreciated for its professional achievements and commitment to diversity initiatives (DiScipio). UTC works for force diversity, education and community outreach to minority groups. Competently, the company is a dealer of a wide range of high technology products and support services to aerospace and building systems industries. Other past individual winners are Alan Gilkes, Sandra Baylor and Dawn Robinson. Alan Gilkes was awarded Distinguished Engineer of the Year in 2000 for his invention of an electronic Braille display device. Sandra Baylor was winner of the Lifetime Achievement in Industry Award, having seven patents whereas Dawn Robinson, a product manager, is the recipient of the Outstanding Woman in Technology Award (Black Engineers). This year’s award list is as follows: Woodrow Whitlow Jr. , Distinguished Engineer of the Year; Rickey J. Shyne, Lifetime Achievement in Government; Juan E. Gilbert, Pioneer of the Year; Celia D. A. Earle, Outstanding Woman in Technology; Arthur L. George, Lifetime Achievement in Industry; Lorraine N. Fleming, Janice A. Lumpkin Educator of the Year; Cheryle L. Peters, Minority Engineering Program Director of the Year; Jonathan D. Madison, Graduate Student of the Year; Michael A. Thompson, Pre-College Initiative Student of the Year(Male); Kathryn M. Daniels, Pre-College Initiative Student of the Year(Female); Pre-Freshman Program in Engineering and Science, Chicago State University, Pre-College Program of the Year; Benedict Lazare, Entrepreneur of the Year; Dow Promise Program, The Dow Chemical Company, Corporate Community Service; UNCF-Merck Initiative, Merck & Co. , Inc. , Corporate/Education Partnership; Texas Instruments Incorporated, Corporate Diversity Leadership; Akibi Archer, Mike Shinn Distinguished Member of the Year(Male); Wanda Eugene, Mike Shinn Distinguished Member of the Year(Female); Barbara Michelle Nichols, Alumni Extension Member of the Year; and, Edward Tunstel, Alumni Extension Technologist of the Year (2008 GTA Winners). The awardees surely received the honor due to their innovative contributions and achievements. Conclusion In essence, the Golden Torch Award is an excellence in leadership and quality award. Taking this into consideration, a nomination of the Lockheed Martin Corp. is not a bad idea. Lockheed Martin is a leading international defense contractor that operates on aeronautics, electronics and information technology services as well as space and strategic missiles thus employing a large number of work forces from all over the world. The diversity and quality assurance that the company brings to its customers and employees is worthy of a Golden Torch Award by the NSBE. It would not be a long time before the company is acknowledged for its contributions in the field of defense technology. References DiScipio, J.United Technologies Corporation. (2004, December 14). Society of Black Engineers honors UTC for Diversity Leadership. Retrieved May 8, 2008, from http://utc. com/press/releases/2004-12-14. htm. National Society of Black Engineers. (2008, March 3). 2008 GTA Winners: Top Engineers, Corporate Supporters win NSBE ‘Golden Torch’ Honors. Retrieved May 8, 2008, from http://national. nsbe. org/Default. aspx? tabid=138. National Society of Black Engineers. (2000, March 10). Black Engineers are Recognized for their Contributions, Winners Exemplify the Importance of Mentors. Retrieved May 11, 2008, from http://www. nsbe. org/downloads/pr/press/gta00. pdf.

Tuesday, October 22, 2019

The Typical Diet of Sea Otters

The Typical Diet of Sea Otters Sea otters live in the Pacific Ocean and are found in Russia, Alaska, Washington state and California. These furry marine mammals are one of only a few marine animals known  to use tools to obtain their food. A Sea Otters Diet Sea otters eat a wide variety of prey, including marine invertebrates such as echinoderms (sea stars and sea urchins), crustaceans (e.g., crabs), cephalopods (e.g., squid), bivalves  (clams, mussels, abalone), gastropods (snails), and chitons. How Do Sea Otters Eat? Sea otters obtain their food by diving. Using their webbed feet, which are well adapted for swimming, sea otters can dive more than 200 feet and stay underwater for up to 5 minutes. Sea otters can sense prey using their whiskers. They also use their agile front paws to find and grasp their prey. Sea otters are one of the only mammals  that are been known to use tools to obtain and eat their prey. They can use a rock to dislodge mollusks and urchins from the rocks where they are attached. Once at the surface, they often eat by placing the food on their stomachs, and then placing a rock on their stomachs and then smashing the prey on the rock to open it and get at the flesh inside. Prey Preferences Individual otters in an area seem to have different prey preferences.  A study in California found that among an otter population, different otters specialized in diving at different depths to find different prey items. There are deep-diving otters that eat benthic organisms such as urchins, crabs, and abalone, medium-diving otters that forage for clams and worms and others that feed at the surface on organisms such as snails. These dietary preferences may also make certain otters susceptible to disease. For example, sea otters eating snails in Monterey Bay appear more likely to contract Toxoplama gondii, a parasite found in cat feces. Storage Compartments Sea otters have loose skin and baggy pockets underneath their forelimbs. They can store extra food, and rocks used as tools, in these pockets. Impacts on the Ecosystem Sea otters have a high metabolic rate (that is, they use a high amount of energy) that is 2-3 times that of other mammals their size. Sea otters eat about 20-30% of their body weight each day. Otters weigh 35-90 pounds (males weigh more than females). So, a 50-pound otter would need to eat about 10-15 pounds of food per day. The food sea otters eat can impact the entire ecosystem in which they live. Sea otters have been found to play a pivotal role in the habitat and marine life that inhabit a kelp forest. In a kelp forest, sea urchins can graze on the kelp and eat their holdfasts, resulting in deforesting the kelp from an area. But if sea otters are abundant, they eat sea urchins and keep the urchin population in check, which allows kelp to flourish. This, in turn, provides shelter for sea otter pups and a variety of other marine life, including fish. This allows other marine, and even terrestrial animals, to have abundant amounts of prey. Sources: Estes, J.A., Smith, N.S., and J.F. Palmisano. 1978. Sea otter predation and community organization in the Western Aleutian Islands, Alaska. Ecology 59(4):822-833.Johnson, C.K.,  Tinker, M.T., Estes, J.A., Conrad, P.A., Staedler, M., Miller, M.A., Jessup, D.A. and Mazet, J.A.K. 2009. Prey choice and habitat use drive sea otter pathogen exposure in a resource-limited coastal system. Proceedings of the National Academy of Sciences 106(7):2242-2247Laustsen, Paul. 2008. Alaskas Sea-Otter Decline Affects Health of Kelp Forests and Diet of Eagles. USGS.Newsome, S.D.,  M.T. Tinker, D.H. Monson, O.T. Oftedal, K. Ralls, M. Staedler, M.L. Fogel, and J.A. Estes.  2009. Using stable isotopes to investigate individual diet specialization in California sea otters (Enhydra lutris nereis) Ecology 90: 961-974.Righthand, J. 2011. Otters: The Picky Eaters of the Pacific. Smithsonian Magazine.Sea Otters. Vancouver Aquarium.The Marine Mammal Center. Animal Classification: Sea Otter.

Monday, October 21, 2019

Free Essays on Deep Thoughts

If they ever come up with a swashbuckling School, I think one of the courses should be Laughing, Then Jumping Off Something. When you're riding in a time machine way far into the future, don't stick your elbow out the window, or it'll turn into a fossil. It takes a big man to cry, but it takes a bigger man to laugh at that man. At first I thought, if I were Superman, a perfect secret identity would be "Clark Kent, Dentist," because you could save money on tooth X-rays. But then I thought, if a patient said, "How's my back tooth?" and you just looked at it with your X-ray vision and said, "Oh it's okay," then the patient would probably say, "Aren't you going to take an X-ray, stupid?" and you'd say, "Aw *censored* you, get outta here," and then he probably wouldn't even pay his bill. One thing kids like is to be tricked. For instance, I was going to take my little nephew to Disneyland, but instead I drove him to an old burned-out warehouse. "Oh, no," I said. "Disneyland burned down." He cried and cried, but I think that deep down, he thought it was a pretty good joke. I started to drive over to the real Disneyland, but it was getting pretty late. A good way to threaten somebody is to light a stick of dynamite. Then you call the guy and hold the burning fuse up to the phone. "Hear that?" you say. "That's dynamite, baby." Why do people in ship mutinies always ask for "better treatment"? I'd ask for a pinball machine, because with all that rocking back and forth you'd probably be able to get a lot of free games. I'd like to be buried Indian-style, where they put you up on a high rack, above the ground. That way, you could get hit by meteorites and not even feel it. If I lived back in the wild west days, instead of carrying a six-gun in my holster, I'd carry a soldering iron. That way, if some smart-aleck cowboy said something like "Hey, look. He's carrying a soldering iron!" and started laughing, and everybody else started l... Free Essays on Deep Thoughts Free Essays on Deep Thoughts If they ever come up with a swashbuckling School, I think one of the courses should be Laughing, Then Jumping Off Something. When you're riding in a time machine way far into the future, don't stick your elbow out the window, or it'll turn into a fossil. It takes a big man to cry, but it takes a bigger man to laugh at that man. At first I thought, if I were Superman, a perfect secret identity would be "Clark Kent, Dentist," because you could save money on tooth X-rays. But then I thought, if a patient said, "How's my back tooth?" and you just looked at it with your X-ray vision and said, "Oh it's okay," then the patient would probably say, "Aren't you going to take an X-ray, stupid?" and you'd say, "Aw *censored* you, get outta here," and then he probably wouldn't even pay his bill. One thing kids like is to be tricked. For instance, I was going to take my little nephew to Disneyland, but instead I drove him to an old burned-out warehouse. "Oh, no," I said. "Disneyland burned down." He cried and cried, but I think that deep down, he thought it was a pretty good joke. I started to drive over to the real Disneyland, but it was getting pretty late. A good way to threaten somebody is to light a stick of dynamite. Then you call the guy and hold the burning fuse up to the phone. "Hear that?" you say. "That's dynamite, baby." Why do people in ship mutinies always ask for "better treatment"? I'd ask for a pinball machine, because with all that rocking back and forth you'd probably be able to get a lot of free games. I'd like to be buried Indian-style, where they put you up on a high rack, above the ground. That way, you could get hit by meteorites and not even feel it. If I lived back in the wild west days, instead of carrying a six-gun in my holster, I'd carry a soldering iron. That way, if some smart-aleck cowboy said something like "Hey, look. He's carrying a soldering iron!" and started laughing, and everybody else started l...

Sunday, October 20, 2019

Supporting Diversity and Minority Colleagues at Work

Supporting Diversity and Minority Colleagues at Work Making sure employees from different racial backgrounds feel comfortable at work has several benefits, no matter if the company has 15 workers or 1,500. Not only can a diversity friendly workplace enhance team spirit, it can also boost creativity and promote a sense of investment in the company. Fortunately, creating a diversity friendly work environment isn’t rocket science. For the most part, it involves taking the initiative and a healthy dose of common sense. Make the Effort What’s the surefire way to make colleagues from diverse backgrounds feel comfortable at work? Do the basics. For example, if a coworker or employee has a name that’s difficult to pronounce, strive to say the person’s name correctly. If you’re unsure how to pronounce it, ask the employee to say it for you and listen carefully. Even if you still don’t get it quite right, such employees will appreciate the effort rather than you totally butchering their names. On the other hand, employees won’t appreciate you forcing a nickname on them or refusing to utter their name at all. That’s alienating. Save Race-Related Jokes for Later If the joke you want to tell at work includes a rabbi, a priest or a black guy, save it for home. Many jokes about race, religion and culture involve stereotypes. Accordingly, the workplace isn’t the best place to share them, lest you offend a coworker. Who knows? One day a colleague could make your racial group the butt of a joke. Would you find that funny? Even racial banter between colleagues from the same background can be off putting to others. Some people disapprove of racial humor, no matter the source of it. So, consider telling race-based jokes to be inappropriate behavior at work. Keep Stereotypes to Yourself Stereotypes about racial groups abound. While working, it’s necessary to check your race-based assumptions at the door. Say you think all Latinos are good at a certain activity, but the one Latino in your office isn’t. How do you respond? The correct response is no response. Sharing racial generalizations with those targeted by them will only cause emotional damage. Rather than telling your coworker that he defied your expectations, consider reflecting on how you developed the stereotype in question and how to let go of it. Study Cultural Holidays and Traditions Do you know the cultural and religious holidays that your coworkers observe? If they openly discuss certain customs, consider learning more about them. Find out the origins of the holiday or tradition, when they are celebrated each year and what they commemorate. Your colleague will likely be touched that you took time out to learn about the traditions that mean most to her. Whether you’re a manager or a coworker, be understanding if an employee takes time off to observe a particular custom. Practice empathy by contemplating the traditions that matter most to you. Would you be willing to work on those days? Include All Workers in Decisions Think about whose input counts most in your workplace. Are employees from diverse racial backgrounds included? Listening to opinions from a diverse group of people can change the way business is done for the better. A person from a different background may offer a perspective on an issue that no one else has given. This can increase the amount of innovation and creativity in a work setting. Hold a Diversity Workshop If you’re a manager at work, consider enrolling your employees in a diversity training session. They may grumble about it at first. Afterwards, however, they’re likely to value their diverse group of colleagues in new ways and walk away with a deeper sense of cultural awareness. In Closing Don’t be mistaken. Creating a diversity friendly workplace isn’t about political correctness. It’s about making sure that employees of all backgrounds feel valued.

Saturday, October 19, 2019

HRM and leadership 2 Essay Example | Topics and Well Written Essays - 3000 words

HRM and leadership 2 - Essay Example The management of its human resources can be considered to be so well done that its employees in certain countries have tended to side with this corporation whenever any move was made by both the various individuals or rival companies to disrupt its operations (Malone & Roberts, 1996). While in many cases, the process of globalization alongside the liberal economic policies which have come with it and have come to be accepted in many countries have worked towards weakening the strong foundation upon which many trade unions have been built, this has not been the case with those unions that are related to General Motors. One would take the trade unions of Britain and Germany as examples of just how efficient the human resource management of General Motors has become. Despite the fact that the internationalization of the car industry has intensified the economic competition among the various carmakers in the world, General Motors has not had to encounter any of the frictions that other companies in similar business have had to encounter with their trade unions In most cases, the liberal policies that have been adopted by various governments because of globalization have tended to work more in favour of the employers than the workers do. These policies advocate for the flexibility of the labour market and this has meant that the labour market, especially in the automobile industry, has been deregulated and that automakers have been empowered in areas the hiring of workers, their firing, the choice of how much to pay them, as well as the choice of the use of labour (Heffelfinger, 2009). As a result of this, informal employment and other cheap forms of labour have become prevalent because automakers prefer them not only for the cheapness of wages paid to them, but also for the fact that they do not have to cover them in such matters as insurance and safety. This has made it very difficult for trade unions to be able to organize workers into a powerful force because m any of these informally employed people are not members of unions. This has not been the case with General Motors and this is because of the fact that this corporation has chosen to adopt a stand where it cares for all of its employees on a global level, so that many of those who work for it tend to be secure in their jobs, hence being more productive (Brondo & Baba, 2010). The management of General Motors has ensured that it provides the necessary leadership to its employees in matters pertaining to their employment so that the latter have come to appreciate their working conditions as well as feeling secure in their employment, especially in the current world of economic uncertainties. Fair Working Environment The swift change in the development of equipment as well as the globalization of the economy has led to the acceleration of structural adjustment. With the division of labour on the international scene, some of the companies in the automobile industry of developed countries have opted to shift those operations that they consider labour intensive to other countries, such as China and India, where there is cheaper labour. This has led many of their employees in their home countries to lose their jobs and this may account, to some extent, to the high job cuts in the automobile industry in the western countries (Dietrich & Krafft, 2011). This has not bee

Friday, October 18, 2019

Depictions of a decision tree Essay Example | Topics and Well Written Essays - 750 words

Depictions of a decision tree - Essay Example Overall incidence rates reported in 2011, per 100,000 populations are as follows: Due to my chosen reported symptoms and recorded parameters regarding doctor’s findings regarding Leukemia in children, it is important to note that childhood acute lymphoblastic leukemia (ALL) is the most common cancer in children, representing 23% of cancer diagnoses among children who are younger than 15 years of age. ALL occurs in about one of every 29,000 children in the United States each year, and that for AML is about 11000 leukemia cases annually. Approximately, 700 cases of AML occur in people under the age of 20 each year. Due to this aspect pertaining the disease, it is critical to identify this when breaking down statistical data viewing of the group ‘leukemia’ as a whole (Else, Ruchlemer, & Osuji, 2005). It is also important to know the background information pertaining to Leukemia, with regards to race/ethnicity, since the data used involved multiple races and ethnic groups. Leukemia death rate was 7.6 per 100,000 men and women annually. To come up with these rates, people who died in 1998-2002 in the United States were analyzed. The table bellow shows the death rates in accordance to race and gender. Thus, Leukemia in 1st world countries like the US, has an approximate base rate occurrence of 1/10,000 children under the age of 15. Some of the risk factors for leukemia in children include the following: The most known symptoms pertain such things as looking pale, bleeding /bruising easily, regular cases of fever, shortness of breath especially after a small physical activity, and recurrent infections. Examination to identify this disease has a false affirmative toll of 5%– that is, 5% of the time that it says a child has the disease is false. Thus, the false negative rate is 0%– the test correctly diagnoses every child who does have the disease (Gribben, 2008). Despite the test being precise more than 90% of the time, it

Law for Managers Essay Example | Topics and Well Written Essays - 2500 words

Law for Managers - Essay Example The Act operates by enforcing a broad range of regulations by public or government ministries through the use of statutory instruments which since 1974 have given rise to specific provisions for different industries, risks and disciplines. It is against this backdrop that avenues for public supervision were enforced such as the Health and Safety Executive and Health and Safety Commission were set up. To ensure that the provisions of the Act are binding, the state sanctions the use of instruments of coercion such as the imposition of criminal sanctions, fines and prison sentences which can go up to 2 years. Since this Act of UK Parliament is normally abbreviated as HASAWA, HASWA or HSWA 1974, it will be important to sustain the use of HSWA 1974 throughout the discussion, to steer clear of verbiage (Foster, 2010, 275). The development of the law, taking into account the lack of individual liability in other related legislation Dhir (2012, 100) contends that the main factor that trigger ed the creation and passing of HSWA 1974 is the need to protect employees and members of the public from corporate neglect and greed. Particularly, before the ratification of HSWA 1974, work stations and organisations sidestepped the need to protect employees and members of the public and the need to safeguard their safety. ... At the same time, the failure of previous bills to ensure total safety also necessitated the need to have more robust and more comprehensive legislation. Particularly, there has been a successful coordination of efforts to produce the Employed Persons Health and Safety Bill in 1970. Nevertheless, the bill’s failure to address salient issues of workplace safety became more apparent over time. This failure was mainly seen in the Bill chiefly aiming at curtailing the number of deaths and injuries in British factories. For instance, the second provision of this Bill as is enshrined in the Clause 2 (1) (a) places sanctions on the formation of safety representatives and partly, management representatives in factories having more than 100 employees (Kobrin, 2009, 350). Nevertheless, a critical look at this clause leaves one with the knowledge that the representatives could not implement safety measures (Van-Dam, 2011, 231). Secondly, the failure was catapulted by the absence of coope ration between the totality of the workforce and the management. The discord between the two parties greatly affects the appointment of the safety representatives. The same also means that in the event that the safety representatives have been appointed mainly because of the management’s sleight of hand, then it is likely that the safety representatives may cover up for the organisation’s failure to put effective safety measures in place. It is against this backdrop that the National Institute of Industrial Psychology showed cases of consistent failures among companies and work stations to apply well known safety measures on the floor (Muchlinski,

Thursday, October 17, 2019

Meaning of life 3 Essay Example | Topics and Well Written Essays - 1000 words

Meaning of life 3 - Essay Example Contrarily, the incapability to acquire meaning in life causes distress, addiction, boredom, aggression and even depression. Now this is what brings us to what Frankl describes as the state of meaninglessness. Psychological responses to the worst experiences are never predetermined by any given circumstance, no-matter how strong or weak it is. Meaning of life comes from within an individual in spite of the existing despair. Personal responsibility is always the best way for an individual to gain meaning. And this is considered likely if the person does not surrender to negative mind-set of others and be true to him or herself. Frankl states that it is possible to be frequently exposed to death and misery of Auschwitz, yet still get a way of discovering meaning in this grief. Even while death seems to be unavoidable, Frankl thinks that individuals have the central capacity to reflect positively on the all the good things they have achieved in their entire lifetime and to put in perception the current meaning of their grief (Frankl, Viktor 87). When a fella apprehends that it is his destiny to suffer, he will have to consider his grief as his task; his only exceptional mission. And normally this is what is considered to be the state of meaninglessness. A person will have to live with the fact that even during suffering he is alone and experiences a unique situation in the universe. And that no other person is capable of relieving him or suffering for his or her sake. His or her unique opportunity depends on how he or she carries the burden. Frankl describes the diverse phases of psychological response that were common to all the prisoners. These stages are alleged to have ensued in a sequential way, from shock to apathy then to freedom readjustments. He states that he was able to witness the grace even in the worst case scenarios. Frankl quotes â€Å"we who stayed in the concentration camps can never

A critique of leadership and team management style in the light of Vip Essay

A critique of leadership and team management style in the light of Vip model and other current theories - Essay Example Few decades back, dynamics of a household were rigidly defined as father entrusted with the role of a bread winner, and the mother assigned to be the housekeeper. It was, most assuredly, regarded a woman’s duty to ensure that her husband and children were well taken care of. However, the shifting social, economical, and financial conditions, along with the increasing cost of living, has vastly evolved the thinking process, and has resulted, in many families, both parents working for livelihood. In addition, the deteriorating family structure, increasing poverty, and decreasing sense of security, has also resulted in children, from an early age, suffering from confidence and self-esteem issues. The severity of this situation can be realized from the fact that between years 2004 and 2008, eight hundred new children centers were inaugurated in UK and thirty percent of them were opened in extremely disadvantaged communities (Siraj-Blatchford and Manni 2007).This highlights the sig nificant role played by the nurseries and other early year’s centers in the support and growth of their respective communities. If a center succeeds in providing a safe, secure, and a neutral learning environment to its children, it not only provides peace of mind to parents, but most importantly leaves an indelible mark on children’s lives, and molds them to become better individuals. As the beginning proverb hints, taking proper care of a child requires a collective effort, which can only be possible with appropriate leadership and guidance. Therefore, to run a successful early year’s center, a manager is required to have certain specific attributes. My interview was based on three themes, which were Vision, Implementation/Operational, and People Manager/Team Management Skills of the managing practitioner. These themes were based on the â€Å"VIP Model,† which was proposed by Mark Hollingworth (2003, p. 34). According to Hollingworth, a true leader is i n fact a ‘VIP,’ which stands for ‘Visionary, Implementer, and a People Manager’. These three primary leadership traits, in the light of other theories as well, will be mostly explored in this portfolio. Various other themes, such as handling parent-staff interactions, curriculum setting, goals of the center, etc. were also considered, but after careful consideration, it was deduced that Hollingworth’s three categories encompasses majority of the themes. For example, parent-staff meetings is a part of ‘people manager’ category, curriculum setting falls in the ‘implementation’, and goal setting is definitely an element of the ‘vision.’ As shown in Appendix A, The format adopted for the interview was semi-structured, consisting of mostly open ended questions. The justification of using this format was to get a deep insight into the mind of interviewee, and to judge his leadership style according to VIP model and ot her contemporary management theories. In addition, the interview was designed and conducted with the intention of â€Å"establishment of rapport, identification of follow-up questions, and avoidance of leading questions’ (Partington 2001, p. 4). The conversation was carried out with utmost neutrality, empathy, and without any judgmental and sarcastic connotations. On the whole, the interview was primarily structured to find out if Mr. John Smith, our interviewee, has characteristics of becoming a VIP. It should be noted that, due to confidentiality, the real names of our interviewee and care center are not revealed in this report. The significance of having a ‘

Wednesday, October 16, 2019

Meaning of life 3 Essay Example | Topics and Well Written Essays - 1000 words

Meaning of life 3 - Essay Example Contrarily, the incapability to acquire meaning in life causes distress, addiction, boredom, aggression and even depression. Now this is what brings us to what Frankl describes as the state of meaninglessness. Psychological responses to the worst experiences are never predetermined by any given circumstance, no-matter how strong or weak it is. Meaning of life comes from within an individual in spite of the existing despair. Personal responsibility is always the best way for an individual to gain meaning. And this is considered likely if the person does not surrender to negative mind-set of others and be true to him or herself. Frankl states that it is possible to be frequently exposed to death and misery of Auschwitz, yet still get a way of discovering meaning in this grief. Even while death seems to be unavoidable, Frankl thinks that individuals have the central capacity to reflect positively on the all the good things they have achieved in their entire lifetime and to put in perception the current meaning of their grief (Frankl, Viktor 87). When a fella apprehends that it is his destiny to suffer, he will have to consider his grief as his task; his only exceptional mission. And normally this is what is considered to be the state of meaninglessness. A person will have to live with the fact that even during suffering he is alone and experiences a unique situation in the universe. And that no other person is capable of relieving him or suffering for his or her sake. His or her unique opportunity depends on how he or she carries the burden. Frankl describes the diverse phases of psychological response that were common to all the prisoners. These stages are alleged to have ensued in a sequential way, from shock to apathy then to freedom readjustments. He states that he was able to witness the grace even in the worst case scenarios. Frankl quotes â€Å"we who stayed in the concentration camps can never

Tuesday, October 15, 2019

ENTREPRENEURSHIP & INNOVATION IN ORGANISATIONS Assignment

ENTREPRENEURSHIP & INNOVATION IN ORGANISATIONS - Assignment Example 88). Innovation introduces a change, a new combination from what is familiar. Schumpeter, a pioneer in the study of innovation and entrepreneurship, posits that the main force that brings about this structural change is the â€Å"perennial gale of creative destruction† (Schumpeter, 1942). Thinking out of the box seems to be one valuable trait of innovators and entrepreneurs. Although related, the processes of innovation and entrepreneurship are different. Innovation is sparked by a new idea. The idea can be a new technology such as a gadget that can provide more convenience to consumers, a new service like an alternative form of relaxation, a new product, or even a new administrative procedure. Such ideas are driven by needs that are seen by the innovators. Innovation requires creativity. Engle, Mah & Sadri (1997) define Creativity as the ability to develop ideas through one of three processes. One is creation or the development of something new. Another is the synthesis or combination of concepts. The third process is modification or the changing or improvement of things (Anderson, 1992). Indulging in such processes makes the entrepreneur a creative thinker who modifies or rejects previously accepted ideas to build innovations from practically anything. In organizations, innovation becomes the growth of a new idea from its initial state into its actualized form as a full-blown innovation (Roberts, 2006). Schumpeter (1939) mentions various types of innovations: the introduction of new products, new methods of production and new forms of business organization as well as the penetration of new input—and output markets. The people who drive and protect the innovative ideas are the entrepreneurs. They are responsible in designing and developing a programme of activities that push the innovative idea forward.

Monday, October 14, 2019

Tourist Breaks Back on Sentosa Ride Law Analysis Essay Example for Free

Tourist Breaks Back on Sentosa Ride Law Analysis Essay Factual Summary of Case Australian tourist, Michael McCarthy, suffered a fall and broke his back while riding Sentosa’s MegaZip, which is a flying fox adventure ride run by Flying Dragon Adventures (FDA). The riders would initially slide down the zipline fast and would be slowed down by a braking mechanism as they approach the landing platform. However, in this case, McCarthy was travelling towards the landing platform at a faster speed than usual. As a result, he crashed onto the platform and broke several vertebrae in his back. He felt incredible pain and could not breathe for a minute and a half. McCarthy had no immediate medical help as there was no medical staff on-site. He only received assistance half an hour later and was taken to Singapore General Hospital 1 hour 15 minutes later. He received 35 stitches to his back and spent 5 days in and out of the intensive care unit. As for the ride, McCarthy satisfied safety requirements of being at least 0. 7m tall and less than 140kg in weight. This was the first accident in its two-year history of operation. Before the accident, the ride had been taken by at least 200,000 visitors in total and was already taken by 140 people on that day. Alexander Blyth, managing director of the ride, believed that all safety procedures were followed, that nothing failed and nothing snapped. The ride also requires customers to sign indemnity forms, in which contains an exemption clause that states that they are not responsible for any deaths or personal injuries unless through gross negligence. Blyth reported the case to the Building and Construction Authority (BCA), the regulatory body for amusement rides. Lawyers are attempting to seek compensation for McCarthy’s injuries, as they question the validity of the exclusion clause in the indemnity form by bringing up the Unfair Contract Terms Act (UCTA). Following McCarthy’s injuries, McCarthy wants to claim his recoverable losses. It can be assumed that FDA is using its exemption of liability clause as a defence. McCarthy’s lawyers are stating that the exemption clause is invalid under section 2(1) of the UCTA, which states that â€Å"a person cannot exclude or restrict liability for negligence in relation to personal injury or death†. The Contract Before riding, McCarthy was made to sign an indemnity form. The terms of the indemnity form could be regarded as the express terms of the contract between McCarthy and FDA. A contract was formed between both parties when McCarthy signed the indemnity form. Since, the express terms to the contract were introduced before the contract was formed, they are, prima facie, binding to both parties. There was an exemption clause in the contract stating that FDA is not responsible for any deaths or personal injuries unless through gross negligence. Crucial Questions Before we speculate on the legal outcome of the case, a few crucial questions have to be asked. 1. Was FDA negligent? If so, this would render their exemption clause invalid, and they will be made liable for McCarthy’s losses. 2. Did FDA breach any implied terms in the contract? 3. Is BCA liable to any extent? If so, to what extent? Before the crucial questions are asked, it is important to consider the section of The Amusement Ride Safety Act (2011) which states the scope of responsibilities of parties with statutory responsibilities. They are as follows. Parties with statutory responsibilities The Amusement Rides Safety Act (ARSA) defines statutory duties and liabilities for the following stakeholders to ensure proper accountability for the safety of rides: a. Person responsible (i. e. FDA): The person responsible, who is primarily the holder of an operating permit, will be the person who has the charge, management or control of the ride. He will have overall responsibilities for all matters concerning ride safety. b. Ride manager: The ride manager, who is employed by the holder of an operating permit, will manage and oversee daily and routine operations and maintenance of the ride. He has to possess prescribed technical qualifications and experience. c. Qualified person (QP): The qualified person, appointed by the applicant of the permit or the holder of the permit, will carry out specific technical duties, such as certifying technical compliance with design codes, supervising ride installation or modification and conducting annual inspections to ensure ride safety. Was FDA negligent? The court could question whether FDA was negligent in declaring the true safety limits of the ride and if the ride manager was negligent in handling the situation. The safety limit that was declared could have been that the system would not suffer any breakage or malfunction at the stipulated weight but the braking system was unable to be effectively utilized to ensure the safety of the user. In addition, the ride manager could arguably be negligent in the handling of the situation in not pulling on the emergency stop that should have been installed in every amusement ride to stop the ride in the event of an adverse incident. In the event that the ride manager had been negligent in due diligence, the ride manager would also be liable for breaching section 17(1)(a) or ARSA. There are a few possible outcomes regarding negligence on the part of the FDA, and the possibilities of each outcome will be examined. The first possibility is that the court could reason that the FDA was negligent in checking that the braking system was functioning properly and at optimal level. It could state that the braking mechanism is a very integral and crucial component to the system, and hence negligence in the area of ensuring the functionality of the braking system could amount to negligence in ensuring the safety of the system as a whole. In addition to this, the court could also rule the FDA was negligent in ensuring adequate safety limits for the ride. If this was the case, then it is likely FDA will be held fully liable for McCarthy’s recoverable losses. This is because its exemption clause would then be invalid, by virtue of section 2(1) of the UCTA. The second possibility could be that the court could consider contributory negligence as a defence. This however, would be almost impossible because it would be almost impossible for FDA to prove that there was a degree of negligence on the part of McCarthy. It was most likely that McCarthy had to comply with the necessary safety measures before riding, such as wearing a helmet and safety harness. As such, it would be almost impossible for the court to hold both McCarthy and FDA partially liable for McCarthy’s recoverable losses. Did FDA breach any implied terms? If FDA had breached any implied terms in the contract, and McCarthy suffered losses as a result, then it follows that McCarthy can sue FDA for his recoverable losses. The Duty of Care The duty of care can be an implied term in the contract between McCarthy and FDA, even if it was not expressly provided for in the contract. This term would be implied by statute, by virtue of section 13(1)(b)(i) of the ARSA. In addition to the exemption clause being invalid due to negligence, the courts could also rule that FDA’s negligence could have resulted in it breaching its duty of care when the braking mechanism failed to work properly and McCarthy was injured. Furthermore, despite the dangerous nature of the ride, FDA did not have an on-site medical team to ensure that immediate action could be taken in the event of an accident. This is a breach of an implied term for FDA to provide for the safety of its customers in the event of an adverse incident. This term is implied by statute; according to regulation 16(6)(b) of ARSA, â€Å"The operator of an amusement ride shall ensure that at all times when the amusement ride is in operation there are in attendance to render first aid when the necessity arises, a sufficient number of persons who are properly trained by a first aid training organisation acceptable to the Commissioner;† FDA can be held liable for McCarthy’s recoverable losses based on the breach of these implied terms alone. Is BCA liable? Under the ARSA, it states that all amusement rides has to be assessed and certified by a Qualified Person (QP), which must be an amusement ride specialist engineer registered under the Professional Engineers Board. However, as the MegaZip ride involves an aerial ropeway, it is further classified as a major amusement ride under the ARSA. With it being a major amusement ride, the QP is also required to engage and consider the advice and opinion of a conformity assessor (CA). The CA has to carry out procedures such as inspections, tests and certifications to determine if the design and specifications, the proposed installation method or programme or the proposed modification method or programme relating to a major amusement ride or the major modification thereof conform to any technical standard or requirement. Besides technical support, the CA will complement the qualified person with expertise in nontechnical but critical aspects of ride safety such as ride management (e. . layout of queue areas) and crowd control (e. g. access routes and barriers). In order to ascertain whether BCA is liable for the accident, it is important to determine if the accident arose as a result of: 1. QP and CA’s inadequate safety inspections, overlooking of fundamental technical faults and establishing poor safety standards during construction. 2. FDA’s lack of day-to-day management of ride safety. In order to ascertain if the accident occurred due to the QP and CA’s lack of rigorous inspection on the ride, we must determine if they approved the ride without proper assessment of its safety. If the accident arose due to the fault of QP and CA’s poor safety assessment and haphazard approval of the ride, then some degree of liability may fall onto the QP and CA. With this assumption, FDA could then argue that the accident was caused by the QP and CA’s negligence in highlighting and rectifying safety issues during construction. FDA could state that their ride was certified by the QP and CA, assuring FDA that the ride was acceptable and followed all safety aspects. In addition, if FDA was certified through a document of approval signed by the QP and CA, FDA could use this certification as evidence in court to back up their case. This is due to the fact that it would be unfair for FDA to take up the liability if we were to consider that FDA followed all of BCA’s ACRA requirements and sought necessary approval by the QP and CA for the ride. However, the possibility of the scenario above is rather small as it is most likely that at the point of construction, all safety limits proposed by the FDA met the safety requirements of BCA and that the QP and CA properly checked and certified the ride. As the QP and CA’s duties were only restricted to the period of construction, it was the FDA’s responsibility to ensure that the day-to-day operations of the ride were well within the safety limits and that regular maintenance was conducted on the ride. In addition, considering that the accident took place two years after the construction, it would be unfair to attribute blame onto BCA, as the ride would have undergone much wear and tear and weathering. Furthermore, BCA does not have proper control over FDA’s maintenance of safety standards beyond the initial construction phase of the ride. Also, as BCA is a statutory body in ensuring that operators of amusement rides complies with the safety regulations, it would be unreasonable to expect them to be responsible for all safeties of all rides at every point in time. In addition, its role does not extend to ensuring that the ride’s safety features are continuously maintained. As such, it is extremely difficult to hold BCA liable for the accident to any degree, because the onus lies on the FDA to ensure the constant safety of the rides beyond the construction phase. Our Final Evaluation In conclusion, it is highly likely that the court would rule out that FDA was negligent in verifying the safety of the ride, and hold FDA liable for McCarthy’s losses. Assuming McCarthy’s weight was within the true weight limit of the ride, and the braking system of the ride did malfunction on that day, it is most likely that FDA will be held liable as the onus of verifying the efficiency of the brakes is solely on FDA. Should the braking system have been working well that day, but McCarthy’s weight was not within the true weight limit of the ride, it is also most likely that FDA will be held liable in this case as the court can then rule that FDA was negligent in determining the true safety limits of the ride. In saying this, we are assuming that McCarthy was not negligent himself in adhering to any of the safety procedures (e. g. wearing safety harness etc. ). Hence we can assume that there was no contributory negligence on the part of McCarthy. This, in turn, is also not likely as it was not stated in the facts of the case. We can also assume that BCA will also not be held liable to any extent at all, as the onus of ensuring the day-to-day safety of the ride system is on FDA. In a nutshell, from our points of evaluation, we can conclude that the the court will most likely rule that FDA was negligent, be it in verifying the physical safety of the system, or verifying the true safety limits of the system. In committing an act of negligence, the FDA’s exemption clause will be rendered invalid, by virtue of section 2(1) of the UCTA. On these grounds alone, FDA will likely hold liability for McCarthy’s injuries. In addition, FDA’s negligence can also be ruled out to be in breach of the implied duty of care. On these separate grounds alone, it is also likely that FDA can hold liability for McCarthy’s injuries. As such, we can conclude that the likely legal outcome will be that FDA will be held liable for McCarthy’s recoverable losses. If ruled in McCarthy’s favor, it is likely that operations of the ride will be suspended until all investigations and modifications to the ride have been made and verified to be safe. By section 30 of ARSA, FDA â€Å"shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 12 months or to both†. FDA would also be held liable for all costs with regards to McCarthy’s personal injury.

Sunday, October 13, 2019

Hagia Sophia: Architecture Description

Hagia Sophia: Architecture Description Basilicas were used for commerce, as public meeting places and for courts of law. The Hagia Sophia was built as the Byzantine Emperor, Justinians personal imperial church. It was built in the hopes of competing with the Temple of Solomon in Jerusalem. The Forum was built from a vast stoa-lined piazza measuring 660 by 390 feet (200x120m) with exedrae on two sides. The main entrance to the forum is on the southern side, a triumphal arch surmounted by a statue of Trajan in a six-horse chariot. The Basilica Ulpia lies at the north end of the piazza, which was cobbled with rectangular blocks of white marble and decorated by a large equestrian statue of Trajan. On either side of the piazza are markets, also housed by the exedrae. Justinians basilica was at once the culminating architectural achievement of late antiquity and the first masterpiece of Byzantine architecture. Its influence, both architecturally and liturgically, was widespread and enduring in the Eastern Orthodox, Roman Cathol ic, and Muslim worlds alike. The largest columns are of granite, about 19 or 20 meters high and at least 1.5 meters in diameter; the largest weigh well over 70 tons apiece. Under Justinians orders, eight Corinthian columns were disassembled from Baalbek, Lebanon and shipped to Constantinople for the construction of Hagia Sophia. The vast interior has a complex structure. The nave is covered by a central dome which has a maximum diameter of 31.24meters (102ft6in) and a height from floor level of 55.6meters (182ft5in), about one fourth smaller and greater, respectively, than the dome of the Pantheon. The dome seems rendered weightless by the unbroken arcade of 40 arched windows under it, which help flood the colorful interior with light. Due to consecutive repairs in the course of its history, the dome has lost its perfect circular base and has become somewhat elliptical with a diameter varying between 31.24m (102ft6in) and 30.86m (101ft3in). The dome is carried on pendentives — four concave triangular sections of masonry which solve the problem of setting the circular base of a dome on a rectangular base.[15] At Hagia Sophia the weight of the dome passes through the pendentives to four massive piers at the corners. Between them the dome seems to float upon four great arches. These were reinforced with buttresses during Ottoman times, under the guidance of the architect Mimar Sinan. At the western (entrance) and eastern (liturgical) ends, the arched openings are extended by half domes carried on smaller semi-domed exedras. Thus a hierarchy of dome-headed elements builds up to create a vast oblong interior crowned by the main dome, a sequence unexampled in antiquity. Despite all these measures, the weight of the dome remained a problem, which was solved by adding buttresses from the outside. All interior surfaces are sheathed with polychrome marbles, green and white with purple porphyry and gold mosaics, encrusted upon the brick. This sheathing camouflaged the large pillars, giving them, at the same time, a brighter aspect. On the exterior, simple stuccoed walls reveal the clarity of massed vaults and domes. The yellow and red color of the exterior was added by the architect Fossati during the restorations in the 19th century. Looking at the plan of Trajans Basilica, there seems to be good balance and symmetry in the design. The plan shows that the structure was huge, holding thousands of people if needed. The Hagia Sophia, while a large building in its right, to me still looks smaller and less grand because of its closed dome. Trajans basilica was open, giving it an even more open and expanse feeling. Hagia Sophia is also very symmetrical in design. In both cases, these structures were fully functional as community meeting places or religious places of worship. They reflected the wealth and power of their emperors who commissioned their construction. Each structure is huge and larger than life in their design: the Hagia Sophia was adorned with gold and beautiful mosaics on its interior walls while the Trajans Forum was large, open and had several statues and monuments built inside to honor Trajan. Wikipedia contributors. Trajans Forum. Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 9 Apr. 2010. Web. 10 May. 2010. Wikipedia contributors. Hagia Sophia. Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 6 May. 2010. Web. 10 May. 2010.

Saturday, October 12, 2019

Sheriffs Aims in Writing Journeys End :: R.C. Sheriff Journeys End Literature War Essays

Sheriff's Aims in Writing Journey's End What were Sheriff’s aims in writing ‘Journey’s End’ and how successful was he in achieving those aims? Drama has been with us since the times of the Greeks. It is very popular among all age groups. The main aims of a drama are to entertain and to provide a message to the audience. ‘Romeo and Juliet’ is one of the most popular dramas to date. It is a romantic tragedy and is greatly appreciated, even today. It was written by one of the greats, Shakespeare, in the year 1595. The drama that we have in discussion is set in the times of the World War 1. During World War 1, R C Sheriff was an officer in the East Surrey Regiment and was wounded in the battle of Passchendale in 1917. R C Sheriff’s play Journey’s End is based upon his real life experiences during the war – reflecting the way he and his comrades lived and fought throughout the war. The play was first performed in 1928, which is 10 years from the First World War. At this time, people were disillusioned and were ready to face the truth about war. In Journey's End, Sheriff presents a realistic picture of life in the trenches as he had known it and a portrayal of the horrors of the War. This is an anti war story and it is trying to convey peace to the audience. As well as entertaining us, he provides a moral message of peace. There is also a personal touch to the play, as this is reality as seen by him. He manages to provide a social and moral message. In order to achieve these aims he uses literary and dramatic features. Journey's End is set in 1918 when the German army was preparing a massive attack against the allies once again. It is in this backdrop that the play opens. The whole play takes place in the trenches. It is basically the life of the soldiers in the trenches. The dug-out, where they spend their time when off-duty is a dark, enclosed structure. This heightens tension and also involves the audience in the events of the play. The characters are well etched to put forward Sheriff's aims. The focus is on the character of Stanhope, who shows varied emotions as the play proceeds. He is portrayed as a brave company commander out at front but within him, he is falling apart. Professionally, he is trying to control and command the company but personally, he is shattered. Sheriff uses Stanhope as a protagonist to show the long term effects of war on a person.

Friday, October 11, 2019

Management Information System Questions

————————————————- MANAGEMENT INFORMATION SYSTEM Question 1(10 Marks) Discuss five (5) challenges of Management Information System (MIS). Answers Introduction A Management Information System (MIS) provides information which is needed to manage organizations effectively. Management information systems involve three primary resources such as people, technology and information or decision making. Management information systems are distinct from other information systems in that they are used to analyze operation activities in the organization.Academically, the term is commonly used to refer to the group of information management methods tied to the automation support of human decision making, e. g. decision support systems, expert systems and executive information systems. The Challenge of Management Information System (MIS) Although information technology is advancing at a bli nding pace, there is nothing easy or mechanical about building and using information systems. There are five major challenges confronting managers: 1. The information systems investment challengeIt is obvious that one of the greatest challenges facing managers today is ensuring that their companies do indeed obtain meaningful returns on the money they spend on information systems. It’s one thing to use information technology to design, produce, deliver, and maintain new products. It’s another thing to make money doing it. How can organizations obtain a sizable payoff from their investment in information systems? How can management ensure that information systems contribute to corporate value?Senior management can be expected to ask these questions: How can we evaluate our information systems investments as we do other investments? Are we receiving the return on investment from our systems that we should? Do our competitors get more? Far too many firms still cannot answ er these questions. Their executives are likely to have trouble determining how much they actually spend on technology or how to measure the returns on their technology investments. Most companies lack a clear-cut decision-making process for eciding which technology investments to pursue and for managing those investments. 2. The strategic challenge What complementary assets are needed to use information technology effectively? Despite heavy information technology investments, many organizations are not realizing significant business value from their systems, because they lack—or fail to appreciate—the complementary assets required to make their technology assets work. The power of computer hardware and software has grown much more rapidly than the ability of organizations to apply and use this technology.To benefit fully from information technology, realize genuine productivity, and become competitive and effective, many organizations actually need to be redesigned. T hey will have to make fundamental changes in employee and management behavior, develop new work models, retire obsolete work rules, and eliminate the inefficiencies of outmoded business processes and organizational structures. New technology alone will not produce meaningful business benefits. 3. The globalization challengeHow can firms understand the requirements of a global economic environment? The rapid growth in international trade and the emergence of a global economy call for information systems that can support both producing and selling goods in many different countries. In the past, each regional office of a multinational corporation focused on solving its own unique information problems. Given language, cultural, and political differences among countries, this focus frequently resulted in chaos and the failure of central management controls.To develop integrated, multinational, information systems, businesses must develop global hardware, software, and communications stan dards; create cross-cultural accounting and reporting structures; and design transnational business processes. 4. The information technology infrastructure challenge: How can organizations develop an information technology infrastructure that can support their goals when business conditions and technologies are changing so rapidly? Many companies are saddled with expensive and unwieldy information technology platforms that cannot adapt to innovation and change.Their information systems are so complex and brittle that they act as constraints on business strategy and execution. Meeting new business and technology challenges may require redesigning the organization and building a new information technology (IT) infrastructure. Creating the IT infrastructure for a digital firm is an especially formidable task. Most companies are crippled by fragmented and incompatible computer hardware, software, telecommunications networks, and information systems that prevent information from flowing freely between different parts of the organization.Although Internet standards are solving some of these connectivity problems, creating data and computing platforms that span the enterprise—and, increasingly, link the enterprise to external business partners—is rarely as seamless as promised. Many organizations are still struggling to integrate their islands of information and technology. 5. Ethics and security challenge: The responsibility and control challenge: How can organizations ensure that their information systems are used in an ethically and socially responsible manner?How can we design information systems that people can control and understand? Although information systems have provided enormous benefits and efficiencies, they have also created new ethical and social problems and challenges. A major management challenge is to make informed decisions that are sensitive to the negative consequences of information systems as well to the positive ones. Managers face an ongoing struggle to maintain security and control. Today, the threat of unauthorized penetration or disruption of information systems has never been greater.Information systems are so essential to business, government, and daily life that organizations must take special steps to ensure their security, accuracy, and reliability. A firm invites disaster if it uses systems that can be disrupted or accessed by outsiders, that do not work as intended, or that do not deliver information in a form that people can correctly use. Information systems must be designed so that they are secure, function as intended, and so that humans can control the process. QUESTION 2 (10 Marks)Explain with example (s) one (1) of the following Enterprise Applications: a) ERP b) SCM c) CRM Answers a) ERP Introduction In 1990, Gartner Group first employed the acronym ERP as an extension of material requirements planning (MRP), later manufacturing resource planning and computer-integrated manufacturing. W ithout supplanting these terms, ERP came to represent a larger whole, reflecting the evolution of application integration beyond manufacturing. Not all ERP packages were developed from a manufacturing core.Vendors variously began with accounting, maintenance and human resources. By the mid-1990s, ERP systems addressed all core functions of an enterprise. Beyond corporations, governments and non-profit organizations also began to employ ERP systems. Enterprise Resource Planning (ERP) Enterprise Resource Planning (ERP) systems integrate internal and external management information across an entire organization, embracing finance or accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application.Their purpose is to facilitate then flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders. ERP systems can ru n on a variety of computer hardware and network configurations, typically employing a database as a repository for information. Characteristics ERP systems typically include the following characteristics:- * An integrated systems that operates in real time (or next to real time), without relying on periodic updates. * A common database, which supports all applications. * A consistent look and feel throughout each module. Installation of the system without elaborate application/data integration by the Information Technology (IT) department. Examples: * Finance/ Accounting : General ledger, payables, cash management, fixed assets, receivables, budgeting and consolidation. * Human Resources : payroll, training, benefits, 401K, recruiting and diversity management. * Manufacturing : Engineering, bill of materials, work orders, scheduling, capacity, workflow management, quality control, cost management, manufacturing process, manufacturing projects, manufacturing flow, activity based cost ing, product lifecycle management. Supply chain management : Order to cash, inventory, order entry, purchasing, product configurator, supply chain planning, supplier scheduling, inspection of goods, claim processing, commissions. * Project management : Costing, billing, time and expense, performance units, activity management. * Customer relationship management : Sales and marketing, commissions, service, customer contact, call center support. * Data services : Various â€Å"self–service† interfaces for customers, suppliers and/or employees. * Access control : Management of user privileges for various processes. Components:- * Transactional database Management portal/dashboard * Business intelligence system * Customizable reporting * External access via technology such as web services * Search * Document management * Messaging/chat/wiki * Workflow management Connectivity to Plant Floor Information ERP systems connect to real–time data and transaction data in a v ariety of ways. These systems are typically configured by systems integrators, who bring unique knowledge on process, equipment, and vendor solutions. Direct integration—ERP systems have connectivity (communications to plant floor equipment) as part of their product offering.This requires the vendors to offer specific support for the plant floor equipment that their customers operate. ERP vendors must be expert in their own products, and connectivity to other vendor products, including competitors. Database integration—ERP systems connect to plant floor data sources through staging tables in a database. Plant floor systems deposit the necessary information into the database. The ERP system reads the information in the table. The benefit of staging is that ERP vendors do not need to master the complexities of equipment integration. Connectivity becomes the responsibility of the systems integrator.Enterprise appliance transaction modules (EATM)—These devices commu nicate directly with plant floor equipment and with the ERP system via methods supported by the ERP system. EATM can employ a staging table, Web Services, or system–specific program interfaces (APIs). The benefit of an EATM is that it offers an off–the–shelf solution. Custom–integration solutions—Many system integrators offer custom solutions. These systems tend to have the highest level of initial integration cost, and can have a higher long term maintenance and reliability costs. Long term costs can be minimized through careful system testing and thorough documentation.Custom–integrated solutions typically run on workstation or server class computers. Implementation ERP's scope usually implies significant changes to staff work processes and practices. Generally, three types of services are available to help implement such changes—consulting, customization, and support. Implementation time depends on business size, number of modules, customization, the scope of process changes, and the readiness of the customer to take ownership for the project. Modular ERP systems can be implemented in stages. The typical project for a large enterprise consumes about 14 months and requires around 150 consultants.Small projects can require months; multinational and other large implementations can take years. Customization can substantially increase implementation times. Process preparation Implementing ERP typically requires changes in existing business processes. Poor understanding of needed process changes prior to starting implementation is a main reason for project failure. It is therefore crucial that organizations thoroughly analyze business processes before implementation. This analysis can identify opportunities for process modernization. It also enables an assessment of the alignment of current processes with those provided by the ERP system.Research indicates that the risk of business process mismatch is decreased by: * linking current processes to the organization's strategy; * analyzing the effectiveness of each process; * understanding existing automated solutions. ERP implementation is considerably more difficult (and politically charged) in decentralized organizations, because they often have different processes, business rules, data semantics, authorization hierarchies and decision centers. This may require migrating some business units before others, delaying implementation to work through the necessary changes for each unit, possibly reducing integration (e. . linking via Master data management) or customizing the system to meet specific needs. A potential disadvantage is that adopting â€Å"standard† processes can lead to a loss of competitive advantage. While this has happened, losses in one area are often offset by gains in other areas, increasing overall competitive advantage. Configuration Configuring an ERP system is largely a matter of balancing the way the customer wants t he system to work with the way it was designed to work. ERP systems typically build many changeable parameters that modify system operation.For example, an organization can select the type of inventory accounting—FIFO or LIFO—to employ, whether to recognize revenue by geographical unit, product line, or distribution channel and whether to pay for shipping costs when a customer returns a purchase. Customization ERP systems are theoretically based on industry best practices and are intended to be deployed â€Å"as is†. ERP vendors do offer customers configuration options that allow organizations to incorporate their own business rules but there are often functionality gaps remaining even after the configuration is complete.ERP customers have several options to reconcile functionality gaps, each with their own pros/cons. Technical solutions include rewriting part of the delivered functionality, writing a homegrown bolt-on/add-on module within the ERP system, or int erfacing to an external system. All three of these options are varying degrees of system customization, with the first being the most invasive and costly to maintain. Alternatively, there are non-technical options such as changing business practices and/or organizational policies to better match the delivered ERP functionality.Key differences between customization and configuration include: * Customization is always optional, whereas the software must always be configured before use (e. g. , setting up cost/profit center structures, organizational trees, purchase approval rules, etc. ) * The software was designed to handle various configurations, and behaves predictably in any allowed configuration. * The effect of configuration changes on system behavior and performance is predictable and is the responsibility of the ERP vendor. The effect of customization is less predictable, is the customer's responsibility and increases testing activities. Configuration changes survive upgrades to new software versions. Some customizations (e. g. code that uses pre–defined â€Å"hooks† that are called before/after displaying data screens) survive upgrades, though they require retesting. Other customizations (e. g. those involving changes to fundamental data structures) are overwritten during upgrades and must be re-implemented. Customization Advantages: * Improves user acceptance * Offers the potential to obtain competitive advantage vis-a-vis companies using only standard features. Customization Disadvantages: * Increases time and resources required to both implement and maintain. Inhibits seamless communication between suppliers and customers who use the same ERP system un-customized. * Over reliance on customization undermines the principles of ERP as a standardizing software platform Extensions ERP systems can be extended with third–party software. ERP vendors typically provide access to data and functionality through published interfaces. Extensio ns offer features such as:- * archiving, reporting and republishing; * capturing transactional data, e. g. using scanners, tills or RFID * access to specialized data/capabilities, such as syndicated marketing data and associated trend analytics. advanced planning and scheduling (APS) Data migration Data migration is the process of moving/copying and restructuring data from an existing system to the ERP system. Migration is critical to implementation success and requires significant planning. Unfortunately, since migration is one of the final activities before the production phase, it often receives insufficient attention. The following steps can structure migration planning: * Identify the data to be migrated * Determine migration timing * Generate the data templates * Freeze the toolset Decide on migration-related setups * Define data archiving policies and procedures. Comparison to special–purpose applications Advantages The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expense. Decisions can be made more quickly and with fewer errors. Data becomes visible across the organization. Tasks that benefit from this integration include: * Sales forecasting, which allows inventory optimization * Chronological history of every transaction through relevant data compilation in every area of operation. Order tracking, from acceptance through fulfillment * Revenue tracking, from invoice through cash receipt * Matching purchase orders (what was ordered), inventory receipts (what arrived), and costing (what the vendor invoiced) ERP systems centralize business data, bringing the following benefits: * They eliminate the need to synchronize changes between multiple systems—consolidation of finance, marketing and sales, human resource, and manufacturing applications * They bring legitimacy and transparency in each bit of statistical data. They enable standard product naming/coding. * They provide a comprehensive enterprise view (no â€Å"islands of information†). They make real–time information available to management anywhere, any time to make proper decisions. * They protect sensitive data by consolidating multiple security systems into a single structure. Disadvantages * Customization is problematic. * Re–engineering business processes to fit the ERP system may damage competitiveness and/or divert focus from other critical activities * ERP can cost more than less integrated and or less comprehensive solutions. High switching costs associated with ERP can increase the ERP vendor's negotiating power which can result in higher support, maintenance, and upgrade expenses. * Overcoming resistance to sharing sensitive information between departments can divert management attention. * Integration of truly independent businesses can create unnecessary dependencies. * Extensive training requirements take resources from daily operations. Due to ERP's architectur e (OLTP, On-Line Transaction Processing) ERP systems are not well suited for production planning and supply chain management (SCM) The limitations of ERP have been recognized sparking new trends in ERP application development, the four significant developments being made in ERP are, creating a more flexible ERP, Web-Enable ERP, Enterprise ERP and e-Business Suites, each of which will potentially address the failings of the current ERP. QUESTION 3 (18 Marks) Describe with example all stages of System Development Lifecycle.Answers Introduction The Systems development life cycle (SDLC), or Software development process in systems engineering, information systems and software engineering, is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems. In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling th e creation of an information system: the software development process.Software development contains set of activities which when performed in coordination and in accordance with one another result in the desired result. Software development methodologies are used for the computer based information systems. The growth of the information’s has to pass through various phases or stages these stages are known as System Development Life Cycle (SDLC). The SDLC follows a well defined process by which the system is conceived, developed and implemented. To understand system development, we need to recognize that a candidate system has a life cycle, much like a living system or a new product.Systems analysis and design are based to the system life cycle. The stages are described below. The analyst must progress from one stage to another methodically, answering key questions and achieving results in each stage. Figure 1 : System Development Life Cycle (SDLC) Stages Step 1: Recognition of Need – What is the Problem? One must know what the problem is before it can be solved. The basis for a candidate system is recognition of a need for improving an information system or a procedure. For example, a supervisor may want to investigate the system flow in purchasing.Or a bank president has been getting complaints about the long lines in the drive – in. This need leads to a preliminary survey or an initial investigation to determine whether an alternative system can solve the problem. It entails looking into the duplication of effort bottlenecks, inefficient existing procedures, or whether parts of the existing system would be candidates for computerization. If the problem is serious enough, management may want to have an analyst look at it, such an assignment implies a commitment, especially if the analyst hired from the utside. In larger environments, where formal procedures are the norm, the analyst’s first task is to prepare a statement specifying the scope and objective of the problem. He/she then reviews it with the user for accuracy at this stage, only a rough â€Å"ball parle† estimate of the development cost of the project may be reached. However, an accurate cost of the next phase – the feasibility study – can be produced. Step 2: Feasibility Study Depending on the results of the initial investigation, the survey is expanded to a more detailed feasibility study.As we shall learn, a feasibility study is a test of a system proposal according to its workability impact on the organization, ability to meet user needs, and effective use of resources. It focuses on their major questions: * What are the user’s demonstrable needs and how does a candidate system meet them? * What resources are available for given candidate systems? Is the problem worth solving? * What are the likely impact of the candidate system on the organization? How will it fit within the organization’s master MIS plan?Each of these questions must be answered carefully. They revolve around investigation and evaluation of the problem, identification and description of candidate systems, specification of performance and the cost of each system, and final selection of the best system. The objective of a feasibility study is not to solve the problem but to acquire a sense of its scope. During the study, the problem definition is crystallized and aspects of the problem to be included in the system are determined. Consequently, costs and benefits are estimated with greater accuracy at this stage.The result of the feasibility study is a formal proposal. This is simply a report – a formal document detailing the nature and scope of the proposed solution. The proposal summarizes what is known and what is going to be done. It consists of the following. 1. Statement of the Problem – a carefully worded statement of the problem that led to analysis. 2. Summary of Findings and Recommendations – a list of the major findings and recommendations of the study. It is ideal for the user who required quick access to the results of the analysis of the system under study.Conclusions are stated, followed by a list of the recommendations and a justification for them. 3. Details of Findings – An outline of the methods and procedures undertaken by the existing system, followed by coverage of objectives ; procedures of the candidate system. Included are also discussions of output reports, file structures, and costs and benefits of the candidate system. 4. Recommendations and Conclusions – special recommendations regarding the candidate system, including the personal assignments costs, project schedules, and target dates.Three key considerations are involved in the feasibility analysis: economic, technical, behavioral. Let’s briefly review each consideration and how it relates to the systems effort. * Economic Feasibility: Economic analysis is the most frequently use d method for evaluating the effectiveness of a candidate system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system.Otherwise, further justification or alterations in the proposed system will have to be made if it is to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. * Technical Feasibility: Technical feasibility centers around the existing computer system (hardware, software etc. ) and to what extent it can support the proposed addition. For example, if the current computer is operating at 80 per cent capacity – an arbitrary ceiling – then running another application could overload the system or require additional hardware.This involves financial considerations to accommodate technical enhancements. If the budget is a serious constraint, then the project is judged not feasible. * Behavioral Feasibility: People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user staff is likely to have towards the development of a computerized system. It is common knowledge that computer installations have something to do with turnover, transfers, retraining, and changes in employee job status.Therefore, it is understandable that the introduction of a candidate system requires special effort to educate, sell, and train the staff on new ways of conducting business. After the proposal is viewed by management it becomes a formal agreement that paves the way for actual design and implementation. This is a crucial decision point in the life cycle. Many projects die here, whereas the more promising ones continue through implementation. Changes in the proposal are made in writing, depending on the complexity, size, and cost of the project. It is simply common sense to verify changes before committing the project to design.Step 3: Analysis It is a detailed study of the various operations performed by the system and their relationship within and outside of the system. A key question is – what must be done to solve the problem? One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate system should consider other related systems. During analysis, data are collected on available files, decision points, and transactions handled by the present system. We shall learn about some logical system models and tools that are used in analysis.It requires special skills and sensitivity to the subjects being interviewed. Bias in data collection and interpretation can be problem. Training, experience and common sense are required for collection of the information needed to do the analysis. Once analysis is completed the analyst has a firm understanding of what is to be done. The next step is to decide how the problem might be solved. Thus, in the systems design, we move from the logical to the physical aspects of the life cycle. Step 4: Design The most creative and challenging phase of the system life cycle is system design.The term design describes both a final system and a process by which it is developed. It refers to the technical specifications (analogous to the engineer’s blueprints) that will be applied in implementing the candidate system. It also includes the constructions of programs and programme testing. The key question here is – How should the problem be solved?. The first step is to determine how the output is to be produced and in what format. Samples of the output (and input) are also available. Second, input data and master files (data base) have to be designed to meet the requirements of the proposed output.The operational (processing) phase are handled through programme constru ction and testing, including a list of the programmes needed to meet the system’s objectives and complete documentation. Finally, details related to justification of the system and an estimate of   the impact of the candidate system on the user and the organization are documented and evaluated by management as a step toward implementation. The final report prior to the implementation phase includes procedural flowcharts, record layouts, report layouts, and a workable plan for implementing the candidate system.Information on personnel, money, hardware, facilities and their estimated cost must also be available. At this point, projected costs must be close to actual costs of implementation. In some firms, separate groups of programmer do the programming whereas other firms employ analyst programmers who do analysis and design as well as code programs. For this discussion, we assume that analysis and programming is carried out by two separate persons. There are certain functio ns, though, that the analyst must perform while programs are being written operating procedures and documentation must be completed.Security and auditing procedures must also be developed. Step 5: Testing No system design is ever perfect. Communication problems, programmers negligence or time constraints create errors that most be eliminated before the system is ready for user acceptance testing. A system is tested for online response, volume of transactions, stress, recovery form failure and usability. Then comes system testing, which verifies that the whole set of programs hangs together, following system testing is acceptance testing or running the system with live   data by the actual use.System testing requires a test plan that consists of several key activities and steps for programs, string, system and user acceptance testing. The system performance criteria deal with turnaround time, backup, file protection, and the human factor. Step 6: Implementation This phase is less c reative than system design. It is primarily concerned with user training, site preparation, and file conversion. When the candidate system is linked to terminals and remote sites the telecommunication network and tests of the network along with the system are also included under implementation.During the final testing, user acceptance is tested, followed by user training. Depending on the nature of the system, extensive user training may be required, conversion usually takes place at about the same time the user is being trained or later. In the extreme, the programmer is falsely viewed as someone who ought to be isolated from other aspects of system development. Programming is itself design work, however. The initial parameter of the candidate system should be modified as a result of programming efforts. Programming provides a â€Å"reality test† for the assumptions made by the analyst.It is therefore a mistake to exclude programmers from the initial system design. System te sting checks the readiness and accuracy of the system to access, update and retrieve data from new files. Once the programmes become available, test data are read into the computer and processed against the file(s) provided for testing. If successful, the program(s) is then run with â€Å"live† data. Otherwise, a diagnostic procedure is used to local and correct errors in the program. In most programs, a parallel run is conducted where the new system runs simultaneously with the ‘old’ systems.This method, though costly, provides added assurance against errors in the candidate system and also gives the user-staff an opportunity to gain experience through operation. In some cases, however, parallel processing is not practical. For example, it is not plausible to run two parallel online point-to-sale (POS) systems for a retail chain. In any case, after the candidate system proves itself, the old system is phased out. Step 7: Evaluation During systems testing, the sy stem is used experimentally to ensure that the software does not fail.In other words, we can say that it will run according to its specifications and in the way users expect. Special test data are input for processing, and the results examined. A limited number of users may be allowed to use the system so that analyst can see whether to use it in unforeseen ways. It is desirable to discover any surprises before the organization implements the system and depends on it. Implementation is the process of having systems personnel check out and put new equipment into use, train users, install the new application and construct any files of data needed to use it.This phase is less creative than system design. Depending on the size of the organisation that will be involved in using the application and the risk involved in its use, systems developers may choose to test the operation in only one area of the Firm with only one or two persons. Sometimes, they will run both old and new system in parallel way to compare the results. In still other situations, system developers stop using the old system one day and start using the new one the next.Evaluation of the system is performed to identify its strengths and weaknesses. The actual evaluation can occur along any one of the following dimensions: * Operational Evaluation: Assessment of the manner in which the system functions, impact. * Organizational Impact: Identification and measurement of benefits to the organisation in such areas as financial concerns, operational efficiency and competitive impact. * User Manager Assessment: Evaluation of the attitudes of senior and user manager within the organization, as well as end-users. Development Performance: Evaluation of the development process in accordance with such yardsticks as overall development time and effort, conformance to budgets and standards and other project management criteria. Step 8: Post – Implementation and Maintenance Maintenance is necessary to eli minate errors in the working system during its working life and to tune the system to any variations in its working environment. Often small system deficiencies are found as a system is brought into operation and changes are made to remove them. System planners must always plan for resource availability to carry out these maintenance functions.The importance of maintenance is to continue to bring the new system to standards. After the installation phase is completed and the user staff is adjusted to changes created by the candidate system, evaluation and maintenance being. Like any system there is an ageing process the requires periodic maintenance of hardware ; software. If the new information is inconsistent with the design specifications, then changes have to be made. Hardware also requires periodic maintenance to keep in time with design specification. The importance of maintenance is to continue to bring the new system to standards. BIBLIOGRAFIGordon b. Davis ; Margrethe H. Ols on. (1985). Management Information Systems : Conceptual Foundations, Structure and Development. New York : McGraw-Hill. Lucey. T. (1987). Management Information Systems. 5th Ed. Eastleigh, Hants : D. P Pubns. O’Brien, James A. (2002). Management Information Systems : Managing Information Technology in the E-Business Enterprise. Boston : McGraw-Hill. Robert C. Nickerson, Saravanan Muthaiyah. (2004). Introduction to Information Systems. Petaling Jaya : Prentice Hall. McLeod Raymond, P. Shell George. (2004). Management Information Systems. N. J. : Pearson Prentice Hall.