Friday, January 24, 2020
health and fitness Essay -- essays research papers
à à à à à à à à à à à à à à à Health and Fitness à à à à à When I think about people who are into health and fitness and people who are not, I notice the two groups differ greatly. These two groups have two totally different lifestyles. à à à à à People who are into health and fitness wake up to a bright sunny morning, every morning, and debate with themselves if they should go on a short or a long morning run. On the last half of their morning run these people one already thinking what healthy tasty breakfast they can satisfy the hunger built up on the fun. After they decide what to eat they plan there day with the most things they can pack in their schedule. To these people everyday is a good day. à à à à à There are also those types of people who could care less about fitness and health. These people wake up in the morning slamming their alarm clocks so hard its like dropping an anvil on a marble. And when they open their eyes no matter how nice the morning weather is, these people always see it as being real dark and gloomy, like the middle of the winter in the coldest of weather. Breakfast is a maybe to them, a maybe ill eat breakfast today or, a maybe ill have time for breakfast today knowing they are already late to begin with. The best invention for these people is an alarm clock with a snooze button. à à à à à Eating is a wh...
Thursday, January 16, 2020
Pleasant ville essay Essay
A new idea can throw off a whole community. Donââ¬â¢t believe me? Watch Pleasantville, a movie on how a pair of twins, brother and sister, completely change a city. They are transported from the modern world, to a quaint town in a T.V. show called Pleasantville. As quick as the pair of twins spread their ideas they try even harder to stop them, not wanting to change how the whole community functions. But it proved to be impossible and soon everything was changing, for the better and for the worse. Sociologists can view this movie in three different perspectives: the functionalist, conflict, and interactionist perspective. The Conflict Perspective is shown throughout the movie. This perspective focuses on those forces in society that promote change and competition. In this movie, an example would be the colored vs. the black and white folks. Violence aroused between the colored vs. the black and whiteââ¬â¢s. Soon the black and white folks began to vandalize the colored peopleââ¬â¢s shops, homes, and even went as far as to racism laws; they viewed the colored people as different individuals because they were accepting change. The colored vs. the black and whiteââ¬â¢s is viewed as a conflict perspective because of the change that is accruing from the black and whiteââ¬â¢s racism toward the colored people; like only gray and white paint, the Lovers Lane and the library being closed up, colored and the black and whiteââ¬â¢s sit separated at court, and no umbrellas on sale. Another example would be the momsââ¬â¢ inner conflict within her; she accepts the change but is too afraid to show it. She is in love with Mr. Johnson but she has to choose to either stay true to her husband or too follow her heart. This is an example of conflict perspective because the wife is beginning to change because of the conflict within her; like not going to sleep at the same time as her husband, not wanting to be a house wife anymore, not having food ready for her husband when he gets home, and last but not least becoming colored. The functionalist perspective is employed by those who view society as a set of interrelated parts that work together to create a stable social system. Since not everything in society is positive, a dysfunction is the negative consequence an element has for the stability of the social system. This is shown in the movie when theà roles of daughter and mother have changed. Instead of the mom giving her daughter ââ¬Å"the talkâ⬠itââ¬â¢s the other way around. This is an example of functional perspective because the mother is no longer doing her job. Another example would be the firemen. They are not exactly doing their job either; instead of stopping fires they rescue cats from trees because fire does not really exist in Pleasantville. They donââ¬â¢t really start doing their job until the twins show up and the first fire occurs and even then bud has to show them how to do their job and stop the fire! The last type is interactionist perspective, which is how individuals interact with each otherââ¬â¢s in society. Sociologists would focus on how soon after Mary Sueââ¬â¢s relations with her brother improved, and soon after she would ask him for advice and confide in him. The fact that they were stranded in a 1950ââ¬â¢s T.V. show makes them stick together. Another example is how the kids were acting more provocative and became sexually active. This was a huge change from their previous, obedient character. Also after a few days, Mary Sueââ¬â¢s friends were speaking in the same ââ¬â¢90s dialect. This is shown when her friend remarks ââ¬Å"Cool!â⬠Mary Sue changed the way they communicated with her ideas. All these examples fall under interactionist perspective because the characters began to change the way they talk and how they interact with one another. The key theme in this movie is change. It shows that change can be both positive and negative, with the Functionalist, conflict, and interactionist perspectives. As the plot progresses, Pleasantville changes increasingly and colors begin to appear, symbolizing the spread of new ideas. Without change, a society truly cannot function.
Wednesday, January 8, 2020
Video Games - 1979 Words
Introduction: Video games are a prime source of entertainment for teens in todayââ¬â¢s world. These games are progressing every year, and as technology gets better so do the games, with more realistic sound effects, graphics and story lines. This trend is bringing the industry to produce more games than before. These games are becoming more realistic and violent. In recent years the production of video games centered around violence has increased with the release of games like Call of Duty: Modern Warfare, Halo, Gears of War and Grand Theft Auto, to name a few. Kids, teens and adults spend hours glued to the screen playing these games, meaning hours of non-stop gun shooting and knife swiping. Recently parents and psychologists have beenâ⬠¦show more contentâ⬠¦The method used in this experiment was primarily observation and survey based, which is weak evidence. The data does not support the claim and does not take into account outside factors such as susceptibility to aggr ession and oneââ¬â¢s perception of aggressive behavior. These subjective variables cause error in the results and bring data, which is insufficient. These findings also measured short-term effects. Christopher Ferguson and colleagues from Texas AM International University and University of Wisconsin also studied the relationship between exposures to violent video games and aggression. This study was done primarily through observing behavior of subjects. In their first study participants were either randomized or allowed to choose to play a violent or nonviolent game. Although males were more aggressive than females, neither randomized exposure to violent-video-game conditions nor previous real-life exposure to violent video games caused any differences in aggression (Ferguson). Study 2 looked at correlations between trait aggression, violent criminal acts, and exposure to both violent games and family violence. Results indicated that trait aggression, family violence, and being male were predictive of violent crime, but exposure to violent games was not (Ferguson). From the data collected it could be seen that family violence and innate aggression wereShow MoreRelatedVideo Game : Video Games1658 Words à |à 7 PagesVideo games first entered into the world around the 1970s, while the violence started occurring in the games about 20 years later (Anderson and Bushman 354). Some of the first violent video games included ââ¬Å"Mortal Kombat, Street Fighter, and Wolfenstein 3Dâ⬠which had amazing effects that were top notch at the time (Anderson and Bushman 354). Wolfenstein 3D was the first big video game that gave gamers the opportunity to shoot in the first person point of view (Anderson, Buckley, and Gentile 5). OverRead MoreVideo Game : Video Games1584 Words à |à 7 Pagesviolent video games that are commonly played by boys and girls, young and old alike in todayââ¬â¢s society. Many experts fear that this violence in video games increases violence in people in real life, causing people to act out as if they were in the video game, increasing aggressive behavior so much that it could actually escalate to shooting, stabbing, and killing people. There have already been many cases of these extreme examples of violence in the news that share a connection with video games. EricRead MoreVideo Games : Video Game1933 Words à |à 8 PagesEnglish 132 9 March 2015 Video Games A video game is an electronic game that involves human interaction to generate visual feedback on a video device. The word video in video game means any type of display device that can produce two- or three-dimensional images. The electronic systems used to play video games are called platforms; examples of these are video game consoles and personal computers. Platforms can range from small handheld devices to large computers. Some video games can become popular andRead MoreVideo Games And The Video Game Industry2174 Words à |à 9 PagesVideo Games and the Video Game Industry The video game Pong was introduced in 1972 and can be considered the beginning of the video gaming industry. Unlike the game Pong, the controversies surrounding video games today are not quite as simple. Certain media outlets often portray video games to be bad for individualââ¬â¢s health and behaviour. There are still some people in the world that believe video games are contributing to the decline of todayââ¬â¢s generation. However, video games and their industryRead MoreVideo Games And The Video Game1301 Words à |à 6 Pages The 2000ââ¬â¢s and 2010ââ¬â¢s has become the most transformative age for video games and the gamers who make them popular. Within the last 15 years the amount of gaming devices in homes has risen to eighty-eight percent. This is a large leap from where the original ââ¬Å"Brown Boxâ⬠console created by Ralph Baer in nineteen sixty-seven, but video games didnââ¬â¢t just go through a cut scene and magically appear in everyoneââ¬â¢s home s. They have had it rough from lawsuits, heavy competition between companies, and evenRead MoreVideo Game And Video Games1905 Words à |à 8 PagesINTRODUCTION 1.1 Background of the Study Involving human interaction with a user interface,a video game is an electronic game which generates visual feedback on a video device such as a TV screen or computer monitor. The word video in video games traditionally referred to a raster display gadget, but it now indicates any type of display gadget that can form two or three-dimensional images. In allowing a video game to operate,platform refers to the specific combination of electronic components or computerRead MoreVideo Games And The Video Game917 Words à |à 4 Pagesothers for the rest. When it comes the video gaming industry, companies like Microsoft, Sony, and Nintendo have developed new ways for the population to enjoy new entertainment and hobbies. However, when these companies create new systems to be flawless, users always seem to find at least one problem. The problem is not the gaming consoles themselves, but the the violent video games that companies create for these consoles. Allowing children to purchase these games, are one of many reasons why the youthRead MoreVideo Game : Violent Video Games927 Words à |à 4 PagesThe video game industry possible causing behavioral problems for people of all ages. Video game violence isnââ¬â¢t breaking news for years people have played games with murder and sexual innuendos. People ask why violent video games are so attractive, maybe itââ¬â¢s a way to escape from real life or even therapeutic. History shows us that human being like violence, in roman time gladiators killed people and animals for sport with huge number of people as an audience. Today the video game industry has foundRead MoreVideo Games And The Video Game Industry1290 Words à |à 6 Pagesthe mainstream video game industry has seemed to operate under the same apparent assumptions: girls donââ¬â¢t play big action games, boys like the sexualization of girls in video games and wonââ¬â¢t play as a female character unless she is heavily sexualized, and that girls play video games for the attention of boys. These assumptions are what allows the gaming industry to continue to focus on their male players, particularly young men, despite the fact that the number of women playing games today may somedayRead MoreVideo Games and Violent Video Games Effect1225 Words à |à 5 Pages A video game is ââ¬Å"an electronic game in which players control images on a television or computer screenâ⬠(Merriam-Webster). Video games have been entertaining and challenging gamers since the Game Boy to modern console games. Despite the simplicity of the definition of video games, a video game, especially ones containing violence can have a large effect on the gamer. Because of the realism and advancements in the video game industry, video games can influence the player, and can make the gamer
Monday, December 30, 2019
The New Equipment Finance Subsidiary Of First Certificate...
Weââ¬â¢re back to consider another transaction for credit approval. This one caused some spirited debate. I have changed the names and circumstances for this example and Iââ¬â¢ve simplified the presentation to fit this article length. Borrower: PimerMed Products, Inc. Lender: The new equipment finance subsidiary of First Certificate Bank (FCB), a local $2.2 billion bank Relationship: No previous/existing relationship with the bank but PimerMed is an attractive bank prospect for FCB Amount: $6MM Equipment: primary manufacturing equipment for expansion and efficiency Term: 60 Month capital lease Pricing: 4% yield (a below average spread for FCB) Overview: PimerMed is a $110MM specialized cardio medical device manufacturer started in 1985 by Gerald Pimer, current Chairman, CEO and 100% shareholder. Mr. Pimer is a well-respected executive in the industry but his daughter is now actively managing the business. The company is considered to be one of the top 3 privately held companies in its segment. Trends are positive for sales growth and cash flow, but the growth has slowed substantially in recent years. Mr. Pimer personally has significant real estate interests. His net worth is estimated to be in the $15MM range with personal debt of approximately $25MM. He no longer offers his personal guaranty for new PimerMed obligations. Financial Highlights: PimerMed is a $110MM revenue company. The business has a diverse customer base with both long time and recently acquired clients. No singleShow MoreRelatedWould You Do The Deal?919 Words à |à 4 Pagesexample and Iââ¬â¢ve simplified the presentation to fit this article length. Borrower: PimerMed Products, Inc. Lender: The new equipment finance subsidiary of First Certificate Bank (FCB), a local $2.2 billion bank Relationship: No previous/existing relationship with the bank but PimerMed is an attractive bank prospect for FCB Amount: $6MM Equipment: primary manufacturing equipment for expansion and efficiency Term: 60 Month capital lease Pricing: 4% yield (a below average spread for FCB) Overview:Read MoreVietnamââ¬â¢s Textile Industry7086 Words à |à 29 Pages Vietnamââ¬â¢s economy is driven primarily by tourism and exports as investment is hard due to the absence of transparency in the legal and regulatory system. Company Basics Our company is the Augusta Textile Company, founded in 1985. Being fairly new, it has remained a mid-sized apparel importing firm that involves the exportation of clothing, as well as selling to local shops. Currently, the company employs 200 full-time employees, about 50 part-time employees, and a managerial team consistingRead MoreAssignment2 Fin100989 Words à |à 4 Pages Business Finance and the Capital Structure FIN 100 Strayer University August 4, 2014 Business Financing and the Capital Structure Small business can finance their firms through debt or through equity sources of capital. Debt sources typically include; short or long-term loans from wealthy individuals to banks, while equity sources often include the ownerââ¬â¢s wealthy individuals and/or Angel Networks. Venture capital is not a typical source of equity financing for most small businessRead MoreInternship Report on Hbl6597 Words à |à 27 PagesINTERNSHIP REPORT ON ââ¬Å"HABIB BANK LIMITEDâ⬠SUBMITTED BY Sadia Siddiqui Reg#14365 Enrollment# 02-211082-11 SUBMISSION DATE MAY 15, 2012 Acknowledgements: All the praises are for the almighty, Allah who bestowed me with the ability and potential to complete this Internship. I also pay my gratitude to the Almighty for enabling me to complete this Internship Report within due course of time. Words are very few to express enormous humble obligations to my affectionate Parents for their prayers and strongRead MoreNbfc13828 Words à |à 56 PagesINTRODUCTION: We studied about banks, apart from banks the Indian Financial System has a large number of privately owned, decentralised and small sized financial institutions known as Non-banking financial companies. In recent times, the non-financial companies (NBFCs) have contributed to the Indian economic growth by providing deposit facilities and specialized credit to certain segments of the society such as unorganized sector and small borrowers. In the Indian Financial System, the NBFCs playRead MoreHistory of the Banking Idustry in Zimbabwe3381 Words à |à 14 Pagesthe Reserve Bank of Zimbabwe, Discount Houses, Commercial Banks, Merchant Banks, Finance Houses, Building Societies and The Post Office Savings Bank. The development of the Zimbabwean banking sector can be analysed within three separate periods, which the banking industry went through different development phases. PRIOR 1991 PERIOD The financial system in Zimbabwe inherited a regulated environment and it has for years pursued segmented or specialised funding. For instance merchant banks were restrictedRead MoreMerchant Banking18039 Words à |à 73 PagesBanking. Functions Merchant banking is a service oriented industry. Merchant banks all over the world carry out the same set of services. Merchant banks in India carry out the following functions and services specifically. 1. Corporate Counseling 2. Project counseling 3. Pre-investment Studies 4. Capital restructuring 5. Credit Syndication 6. Issue Management and underwriting 7. Portfolio Management 8. Working Capital Finance 9. Acceptance Credit and Bill discounting 10. Mergers, Amalgamations and TakeoversRead MoreThe Stock Of A Company1261 Words à |à 6 Pagesinvestors to get paid out in terms of shares in case a company may be financially unwilling to pay out. Q6: Par value is very essential for any investing body, this enable them to identify the acceptable value for the nominal value stated in the certificate for their common stock. This is meant to assure the investors that no one else will acquire a favourable price after they have made their purchases. Q7: Consolidated financial statements are prepared because they can be used in the determinationRead MoreThe Accounting Profession and Nat39077 Words à |à 157 Pages1 No. 1 March, 2009 THE EFFECT OF AUDIT ON CORPORATE SUSTAINABILITY, GROWTH AND DEVELOPMENT By J. R. A. Adefiranye Abstract For profitability and liquidity, companies need adequate finances. Finance stakeholders (that is, shareholders, creditors and other financial lenders) are the providers of these finances. Their interests and beliefs in the activities of the companies are required to make them invest. A recent share investments survey in Lagos and Abuja, involving 100 respondents coveringRead MoreProject Report on Comparative Study of Icici Bank Nd Hdfc Bank8770 Words à |à 36 Pages A SUMMER TRAINING REPORT On COMPARISON BETWEEN ICICI BANK amp; HDFC BANK SUBMITTED TO PUNJAB TECHNICAL UNIVERSITY JALANDHAR In partial fulfillment of the Requirements for the award of Degree of Master of Business Administration SUBMITTED BY: SUBMITTED TO: ROHIT
Sunday, December 22, 2019
A Very Brief Biography of William Shakespeare - 1609 Words
William Shakespeare William Shakespeare, man with intelligence, creativity, and with great passion for love, was one of the most prestige playwright, poet, and actor from the British Literature. He contributed his whole life writing some of the finest and well known plays and poems that are still highly valued in the present literary world. Shakespeareââ¬â¢s conventional themes for most of his plays and poems are about universal matters such as love, jealousy, and beauty which were common focus during the Renaissance era. During this period, Shakespeareââ¬â¢s poems, Sonnet 29 and Sonnet 130, demonstrates his views and morals regarding love to convey the theme of triumph of true love over beauty and wealth. William Shakespeare born and raised in ââ¬Å"provincial town of Stratford upon Avon in 1954â⬠to wealthy merchant John Shakespeare and Mary Arden (Ruby198). Being a son of a merchant, he was able to attend one of the finest grammar school in town, The Kingââ¬â¢s New School, where he co uld attain education under highly qualified tutors which benefited his writing skills. At the age 18, Shakespeare married Ann Hathaway, who was eight years older than him followed by three children. Since Shakespeareââ¬â¢s lyrics are mostly about love, passion and beauty, it is believed by the audience that the lady in his sonnets represents his wife, however, it has been implied that, ââ¬Å"no one can determine to what degree Shakespeareââ¬â¢s personal experiences are reflected in his sonnetsâ⬠(Hacht 798). HeShow MoreRelatedWilliam Shakespeare: A Legendary Author Essay896 Words à |à 4 PagesWilliam Shakespeareââ¬â¢s intellectual use of the English language is what brought him prosperity throughout his lifetime, and what brings us to tears and laughter in the modern world. The life of Shakespeare is of great importance to English literature because of his many contributions including poetry, stories, and plays. However, many people do not know that he also owne d a business. ââ¬Å"William Shakespeare was a professional actor, a businessman, and a playwright. Today, nearly four hundred yearsRead MoreDelving into the Personality of Shakespeare in ââ¬Å"What Was He Really Like? by Stanley Wells653 Words à |à 3 PagesMost biographies written about William Shakespeare attempt to explain his life chronologically from birth to death. These accounts aim to describe his life through discussing his works and accomplishments. The problem with this pattern is that there are only so many ways humans can rewrite the same facts about the same person. Contrary to most papers about Shakespeare, the essay titled ââ¬Å"What Was He Really Like?â⬠, written by Stanley Wells, focuses internally on who Shakespeare was as an ordinary personRead MoreShakespeare and Women vs. Society and Queen Elizabeth Essay1366 Words à |à 6 PagesQueen Elizabeth fought for women to be seen as equals to men through her reign. But in loving the theatre, she never allow ed women to be on the stage; forcing men to play the role of men and women makes her ideals and societys hypocritical. William Shakespeare writes using strong women characters, such as Katherine Minola and Juliet Capulet, to show the society he inhabits just how important women are. Through his writing he shows that he views women as strong and independent. In Romeo and JulietRead MoreWilliam Shakespeare s Life And Accomplishments1819 Words à |à 8 Pages As we all know William Shakespeare was a well known and a highly sought after writer, but did he really deserve all that fame? As early as 1709, with Nicholas Rowe s publication of his edition of Shakespeare s works, the little information that we had about William Shakespeare began to show. Other than several early minor accounts, the preface of Nicholas Rowe s edition contained the first biography of William Shakespeare. Rowe presented eleven known facts about Shakespeare s life. By 1821,Read MoreEssay on The Unaccounted for Period of William Shakespeares Life1954 Words à |à 8 PagesThe Unaccounted for Period of William Shakespeares Life William Shakespeare was born on April 26th 1564[1] in Stratford on-Avon to parents John and Mary. Growing up, he received a good education for a country boy of that period. He attended the village elementary school, was tutored by his mother and others, and learned a great deal by himself[2]. At the age of 18 he married Anne Hathaway, had his first child, Susanna in 1583 followed by twins Judith and Hamnet in 1585. DocumentationRead MoreEnglish Reflection924 Words à |à 4 Pagesinclude, irresolute, consecrate, escarpment, monolithic, incandescent, and much more. Although our class spend numerous hours perfecting our essays, Mrs.Yu had us research and discover interesting facts about William Shakespeare. To begin our Shakespeare research, I wrote a biography on Shakespeare with the help of my index cards packed with useful information. Soon after learning about Shakespeareââ¬â¢s life, we began to read his plays, which introduced us to a new form of the english la nguage. DespiteRead MoreEssay on Biography of John Marshall1607 Words à |à 7 PagesBiography of John Marshall John Marshall was born on September 24, 1755 in prince William County, Virginia. His father moved the family from there before john was ten to a valley in the Blue Ridge Mountains, about 30 miles away. Unlike most frontier dwellings, the home Thomas Marshall built was of frame construction rather than log and was one and a half story. Both parents, while not formally educated, were considered adequately educated for the ties and could read and write. They held a significantRead More An Analysis of Arnolds Essay, The Function of Criticism at The Present Time1226 Words à |à 5 Pagesanalyzing Matthew Arnoldââ¬Ës essay through my reading of his essay. It becomes clear that Arnold defends the importance of criticism. Thatââ¬â¢s to say he tries to display that the critical mind is of a paramount importance as well as the creative mind. A Brief Biography Arnold, Matthew 1822-1888, English poet and critic, he was a leading literary figure of the Victorian period, and the foremost literary figure of his age. His writings have a distinct style which is characterized by the use of symbolism and earnestnessRead MoreA Brief Biography of Agatha Christie1750 Words à |à 7 Pagesloving parents and was the youngest of three children. Louis Montant Miller, was her brother who was ten years older than she, and her sister, Margaret Frary Miller, was eleven years older. The children were brought up in a comfortable home, but not very wealthy. A tragic moment in Agathaââ¬â¢s childhood was when her father, Frederick Alvah Miller, confessed to cheating on her mother, Clarissa Margaret Boehmer. He didnââ¬â¢t reveal this disappointing information to his family until after Clarissa passed awayRead MoreOthello : William Shakespeare s Othello2542 Words à |à 11 PagesJack Martin Mrs. Siplivy British Literature 3 March 2015 Othello Introduction Shakespeare is the second most quoted writer in the English language ââ¬â after the various writers of the Bible. Many of Shakespeareââ¬â¢s ideas for the play Othello came from a collection of tales written by Giraldi Cinthio. In Othello the character of Iago acts as the prominent main character throughout the play, even though he plays the role of the antagonist to the other central characters in the comedy Iago is the tragic
Saturday, December 14, 2019
Save the Ailing Earth from Vehicular Pollution Free Essays
Delhi Metro (Hindi: Dilli Me? ro) is a rapid transit system serving Delhi, Gurgaon and Noida in the National Capital Region of India. The network consists of five lines with a total length of 125. 67à kilometres (78. We will write a custom essay sample on Save the Ailing Earth from Vehicular Pollution or any similar topic only for you Order Now 09à mi). The metro has 107 stations of which 17 are underground. It has a combination of elevated, at-grade and underground lines and uses both broad gauge and standard gauge rolling stock. Delhi Metro is being built and operated by the Delhi Metro Rail Corporation Limited (DMRC).As of April 2010, DMRC operates more than 100 trains daily between 6:00 ââ¬â 23:00 with a frequency of 3 to 4. 5 minutes. [5] The trains have four to six coaches[6] and the power output is supplied by 25-kilo volt, 50 Hz AC through overhead catenary. The metro has an average daily ridership of over a million commuters,[3] and has carried over a billion commuters in seven years since its inception. The concept of a mass rapid transit for Delhi first emerged from a traffic and travel characteristics study carried out in the city in 1969. 8] Over the next several years, many official committees by a variety of government departments were commissioned to examine issues related to technology, route alignment and governmental jurisdiction.In 1984, the Delhi Development Authority and the Urban Arts Commission came up with a proposal for developing a multi-modal transport system, which would consist of constructing three underground mass rapid transit corridors as well augmenting the cityââ¬â¢s existing suburban railway and road transport networks. 10] While extensive technical studies and search for financing the project were in progress, the city expanded significantly resulting in a two-fold rise in population and a fivefold rise in the number of vehicles between 1981 and 1998. [10] Consequently, traffic congestion and pollution soared, as an increasing number of commuters took to private vehicles with the existing bus system unable to bear the load. 8] An attempt at privatising the bus transport system in 1992 merely compounded the problem, with inexperienced operators plying poorly maintained, noisy and polluting buses on lengthy routes, resulting in long waiting times, unreliable service, extreme overcrowding, unqualified drivers, speeding and reckless driving. [11] To rectify the situation, the Government of India and the Government of Delhi jointly set up a company called the Delhi Metro Rail Corporation (DMRC) on March 5, 1995 with E. Sreedharan as the managing director. [12 How to cite Save the Ailing Earth from Vehicular Pollution, Papers
Friday, December 6, 2019
The Case Study of Procter and Gamle-Free-Samples for Students
Question: Discuss about the Case Study of Procter and Gamle. Answer: Introduction Technology is something that is being used by the business organizations and users from all across the globe. There are many technological tools and components that are used by the business units to execute the business operations and tasks. The technical tools have provided the business units with a lot many advantages for the ease of execution of operations and the streamlining of the activities as well. The report covers the case study of Procter and Gamble (PG) by explaining the importance of information governance in the organization. There is also an analysis of the use of Information Technology and Information System in the other organization along with the use of cloud computing, cloud-based applications, social media integration, and possible areas of improvements and importance of security in the organization. Procter and Gamble Role of Senior Leadership in Information Governance Information Governance (IG) is defined as a set of discipline including a number of different processes and methods so that information security is maintained and the business objectives are achieved. The business organizations in the present time are making use of technology for the management if their information sets and for the execution of the business tasks and operations. There are several assets that the organizations must manage so that the streamlining of the business activities is achieved. One such significant asset for the organization is the information and data sets. Procter Gamble (PG) is a multi-national corporation that is based out of America and has its headquarters in downtown Cincinnati, Ohio. The Company is a manufacturer of family, household and personal care products. The company has done numerous modifications and enhancements to make sure that information management is carried out in an adequate manner. Information Governance is one of the major pillars to make sure that the information and data sets are correctly managed and organized. There are a lot many activities that are involved in the management and organization of information. It is, therefore necessary that the resources are selected for the information governance. Senior resources and leadership engaged with the organization has a lot of responsibility for required information governance (Ico, 2014). PG is a multi-national company that was set-up in the year 1859 and now operates in more than 180 countries all across the globe. Due to widespread operations, customer base and office units, there are huge clusters of data sets that PG manages on a per day basis. The senior leadership and management of the organization took several steps for adequate and efficient information governance and management. The senior leadership started with the setting up of Global Business Units (GBUs) for the company. These GBUs were formed on the basis of the various product categories that are offered by the organization, such as personal care, health care etc. The next step of action was to set up Market Development Organizations (MDOs) to make sure that the company had a competitive advantage over the local firms and units. Global Business Services (GBSs) along with several corporate functions were executed. This practice led to the classification and allocation of more than 129,000 employees to four different verticals. This initiative was taken so that the management of the employees could be done with ease (Wolverhampton, 2017). Passerini was provided with the charge of GBS in the year 2003. IT capabilities and efficiencies of the organization were transformed as an outcome. Information and Decision Solutions (IDS) were the units that were set up and brought in action so that information sets could be handled in a better manner and the information organization could be done correctly. This also proved to be of a great aid in the analytics and decision making activities for the business executives. Bob McDonald was termed as the companys CEO and President in the year 2009. Bob further transformed the IT practices and laid a great emphasis on the IT capabilities. Technology is changing at a rapid pace and it is necessary that the organizations adapt to such changing face of technology. The senior leadership at PG adopted the idea of changing technology and data analytics including other technologies under the domain of Business Intelligence were adapted for better information management and analysis. The senior leaders and middle level managers worked together to enhance the technological capabilities. The company experienced increased profits and revenues as an outcome. The senior leadership that is engaged with an organization thus has a huge role to play in information organization, management and governance. The senior leadership carries out the tasks around activity monitoring along with control and evaluation. A number of verification and validation activities are carried out by the senior leaders in the form of reviews, inspections and walkthroughs. Such practices bring out the areas of improvements and the necessary changes that shall be made. The senior leadership in an organization is always aware about the organizational strategies, vision, mission, purpose and goals. There are several resources in an organization structure with resources deployed at different levels. The senior leadership is at the higher level in the structure and has the utmost clarity on the goals and business objectives. Also, in order to execute the changes that are highlighted, it is necessary to have the necessary authority and ownership for the same. The senior leadership has an authority to bring the steps in action and can also manage the resources in an efficient manner (Arma, 2011). PG could witness and experience the business gains due to the efficiency and capability of its senior leadership and management. The skill set of the senior leaders and their decision making abilities led to the enhancement of the organizational profits and also led to the higher customer engagement and satisfaction levels. Critical Analysis of the Organization on the Use of Is IT Organization Overview XYZ is a business organization that works in the domain of finance and provides financial solutions to its customers. The company has its headquarters in Sydney, Australia and is spread over five different locations in the country. The company currently has more than 260 employees in different departments and units. The company has made sure that the information sets are adequately managed and the latest technology is always adopted by the organization. There are numerous cloud services, social media platforms and likewise that are used and implemented in the organization. Cloud Infrastructure in the Organization Cloud computing is defined as a form of computing that utilizes the computing resources over the network for the execution of business operations and activities. There are various cloud services and platforms that have been developed for the execution of business tasks. XYZ Company has included a lot many cloud services and activities in its structure, such as cloud based database, digital market, cloud-based Customer Relationship Management (CRM) systems, cloud-based finance management and account management systems along with communication protocols (Iyoob, 2015). Cloud Delivery Model: Platform as a Service (PaaS) The company makes use of the cloud delivery model as cloud Platform as a Service (PaaS). This model is used in the business applications and development of the financial solutions for the clients making use of cloud resources and elements. This is the cloud model that provides the framework for the development as well as the customization of the business tasks and activities (Intel, 2013). The company carries out a number of business tasks and operations in terms of development, testing and many others. The use of the PaaS model in the organization leads to the simplification of the tasks and is also a cost-effective approach. The cloud vendors that the company works with include Amazon Web Services (AWS) and Microsoft Azure. These cloud vendors manage the operating system framework along with information storage and virtualization activities. The company also makes use of an enterprise PaaS solution so that a self-service portal is formed for the management and organization of the entire computing infrastructure. The model also works well with the private cloud deployment model that is used by the organization (Nasr and Ouf, 2012). The PaaS model provides a number of advantages to the company in terms of automatic updates along with the decrease in the costs. The model also provides the business organization with the necessary compatibility with the rest of the technical solutions and components that are used. Private Cloud Model The deployment model that is used in the company is the private cloud model. This model makes sure that the cloud services are securely used by the clients in the virtual environment. There is an enhanced control and privacy that is reflected in the business organization with the use of this model. This model also provides a number of benefits to the organization which are as listed below. The primary advantage that the cloud model provides to the company is the security of information and data sets. The model also offers the benefits in terms of dedicated resources along with firewalls and on-site resources. Enhanced control is another benefit that is offered by the cloud model to the organization as well as its resources. The tracking of the progress and the applications also becomes easy (Ibm, 2009). There are several resources that are engaged in the organization. Resource allocation is improved because of the cloud model and the availability of the resources does not appear as a challenge for the senior management and leadership (Gorelik, 2013). Application reliability is always maintained with the aid of virtual partitioning. Cloud Software - CRM Customer Relationship Management (CRM) is software that is used by the business organizations for better customer engagement and management of the customer data and information sets. There are several cloud-based CRM systems that are available in the market and the one that is used by the XYZ Company is the Salesforce CRM. This software is designed by Salesforce and it has provided XYZ Company with the capability to easily manage the customer data and information. There are several other benefits and features that are included in this software as automated analysis of the data sets, social media integration, improved workflows and improved customer engagement along with many others. The company has managed to gain benefits out of this CRM system due to the correct implementation of the software in the company. One of the essential activities that were carried out as the first step of implementation was the planning of the cloud-based implementation of Salesforce CRM. The step included the definition of the objectives along with the definition of the schedule and budget. The next step included the allocation of the roles and duties to the members of the project team. Stakeholder management was also carried out efficiently so that the stakeholders remained satisfied of the outcomes of the system. Salesforce CRM is a system that had to be customized as per the requirements of the organization. This was done with ease owing to the planned implementation of the software using the phased approach for the same. Setting up of the Key Performance Indicators (KPIs) was the next step and the Salesforce report builder was also used to keep a track of the progress. Maintenance and support activities were carried out as the final step of the implementation process. The use and implementation of cloud-based CRM has made sure that there are several advantages offered to the organization. The customers can easily contact the business organization in case they get stuck during the execution of a specific operation or activity. There are also other benefits that are offered in terms of improved customer relations and engagement. Social Media Platforms Social media has come up as an integral part of the business organizations in the present era. It has become mandatory to ensure that social media presence is made and is reflected to the stakeholders and the customers. There are also dedicated social media management teams that are being set up in the organizations for the management of social media platforms and networks (Modeus, 2013). XYZ Company also made sure that it included the social media platforms and networks in its business tasks and activities. There are numerous social media accounts, such as Facebook, Twitter, Instagram and likewise that have been set up by the company and are managed for a variety of different purposes, such as information sharing and handling, management of customer relationships along with marketing and advertising tasks. The social media networks that have been set up by the organization are managed by the social media management team that comprises of social media managers, social media advertisers, social media analysts and associates. These social media accounts are used by the company to make sure that the information is handled in a better way and there are maximum benefits that are gained out of the same (Cvijikj, 2011). The customer interaction has also improved as a result of the social media integration that is carried out by the organization along with speedy resolution of customer queries and complaints. Impacts on the Organization The company is making use of numerous information systems and technology in their architecture. There have been positive impacts of the same on the organization along with the emergence of a few points of concern. The implementation of these systems has led to the improvement of sharing of information along with the enhancement of the communication capabilities internally as well as with the external stakeholders. The enhanced communication and sharing has also allowed better employee integration and connection. The employees have gained the ability to immediately connect with their supervisors for guidance and resolution of the queries. The automated system has led to the enhancement of the decision making abilities along with the decision support activities. There are Decision Support Systems (DSS) and Management Information Systems (MIS) that have been implemented so that the senior management and leadership can take decisions quickly using the information and data sets that have been provided to them (Esmt, 2016). Big Data tools are also being used in the organization for advanced management and analysis of the data sets. There are huge clusters of data that are used by the organization on a daily basis. Big Data tools have provided the capability to make sure that these data sets are correctly organized and managed. These tools are integrated with other technical tools and applications as well. There have been a few negative implications of the information systems and technologies in the organization in terms of the security attacks and risks. The data sets that are associated with XYZ Company comprise of the financial and accounting details of the customers and employees along with the personal information of these entities. There are also details of the projects undertaken by the company along with the shareholder and stakeholder that is involved. The exposure of such information to the entities that are not authorized to view or modify them may lead to adverse impacts. There can also be legal obligations due to the occurrence of such cases. The company makes use of cloud-based services and applications, such as private cloud model, customer relationship management system and many more. There are also social media platforms and networks that are used. The attacks on such applications and the data sets that are associated with these applications can be dangerous for the or ganization. In case of XYZ Company, security is one of the aspects that needs to be enhanced for the organization. Possible Improvements Technology is something that is witnessing a constant change. There are new tools and technologies that are being developed on a daily basis and XYZ Company is also required to maintain pace with the same. There are changes and improvements that are required to be done in the infrastructure and the architecture along with the procedures and methodologies that are used for maintenance, management and deployment of the technology. The organization is spread over five locations and each of these locations has its own set up and resources. The employees that are engaged with these locations need to communicate and collaborate with the internal staff members along with the external stakeholders. It has been observed that there are cases of inefficient and ineffective communication that come up that lead to further issues. There are also issues in the networking infrastructure of the organization which can be improved. It is also necessary to make sure that the network integration is improved so that the resource sharing capabilities are improved. The company currently follows only the private cloud for the deployment of cloud services and applications. There are other cloud models that can be used, such as community and hybrid cloud models. These models provide a combination of public and private cloud models which provide the best of the both models. There are scenarios wherein it is necessary to use public cloud only. Hybrid cloud will provide the organization with the capability to use both. There are also numerous NoSQL databases that are available. Such databases shall be used by the organization in place of the SQL databases and MySQL databases. These databases will be easy to integrate with the Big Data tools along with the Business Intelligence tools. (He, 2014). The organization works on the finance solutions and services for the customers. The information category that is usually associated with such solutions and services is generally extremely critical in nature. The organization shall, therefore make sure that the security of the applications is maintained. There are new and improved security tools and controls that must be used and implemented in the organization (Utica, 2014). The security attacks can have extremely severe consequences on the information properties along with the customer trust in the organization. The occurrence of security events, such as denial of service attacks, attacks on information integrity, confidentiality, and availability may lead to legal obligations as well (Msb, 2015). There are many security controls that shall be used and implemented in the organization to avoid the security attacks and risks. There are numerous network-based security attacks that take place which shall be prevented and avoided by usin g the techniques as intrusion detection and prevention systems along with other tools like network monitors and scanners. This will provide the organization with the complete network activity being carried out. There are also other security tools that have been developed in the form of anti-malware and anti-denial tools. These tools shall be installed and implemented across the organization and all of the associated systems. Malware attacks and denial of service attacks will be avoided as a result. The use and application of such security controls will provide the organizations with the ability to avoid, control, detect and prevent the security risks and attacks. The further security attacks will also be avoided as a result. The Business Intelligence tools that are used in the organization shall also be further enhanced. There must be use of data analysis and data warehouse tools that must be used. This will allow the organization to understand the customer preferences and choices along with the estimation of the customer needs and demands. The level of customer satisfaction and the customer engagement will also rise with the use of such tools and technologies. Importance of Security in Information Management There are several properties of information that need to be managed and maintained. Some of these properties include security of information, reliability of information, information privacy etc. One of the most significant aspects of information is the security of information sets. There are different data sets that are used in the organization, such as public data sets, private data sets, confidential and critical data sets, sensitive data and many more. The organization works on the finance solutions and services for the customers. The information category that is usually associated with such solutions and services is generally extremely critical in nature. There are various forms of security attacks that may take place in the organization, such as denial of service and distributed denial of service attacks, media and message alteration attacks, information breaches and loss, information leakage, physical security attacks and likewise. These attacks can have a negative implication on the confidentiality, integrity and availability of the information along with a poor implication on the information security and privacy (Kissel, 2013). Also, the frequent occurrence of security risks and attacks leads to the deteriorated customer trust and satisfaction. The level of customer engagement may also come down as an outcome along with the legal obligation. The data sets that are associated with XYZ Company comprise of the financial and accounting details of the customers and employees along with the personal information of these entities. There are also details of the projects undertaken by the company along with the shareholder and stakeholder that is involved. The exposure of such information to the entities that are not authorized to view or modify them may lead to adverse impacts. There can also be legal obligations due to the occurrence of such cases. The company makes use of cloud-based services and applications, such as private cloud model, customer relationship management system and many more. There are also social media platforms and networks that are used. The attacks on such applications and the data sets that are associated with these applications can be dangerous for the organization. The employees that are engaged with the organizations are provided with access to the internal data and information sets and there is a great level of authority that is usually provided to the employees. There are insider threats and attacks that may take place that are given shape by the employees and such attacks have a great impact on the information security along with the reputation of the organization. This is because of the reason that employees may pass on the sensitive details to the competitors of the business organization which may be misused to gain a competitive edge in the market (Geant, 2010). There are many security controls that shall be used and implemented in the organization to avoid the security attacks and risks. There are numerous network-based security attacks that take place which shall be prevented and avoided by using the techniques as intrusion detection and prevention systems along with other tools like network monitors and scanners. This will provide the organization with the complete network activity being carried out. There are also other security tools that have been developed in the form of anti-malware and anti-denial tools. These tools shall be installed and implemented across the organization and all of the associated systems. Malware attacks and denial of service attacks will be avoided as a result. The use and application of such security controls will provide the organizations with the ability to avoid, control, detect and prevent the security risks and attacks. The further security attacks will also be avoided as a result. Disaster Recovery and Risk Management In order to make sure that the security of information is maintained, it is necessary to carry out risk management process as well. Such a process will make sure that all of the security risks and attacks that may be possible in the organization are identified in advance. There is a specific risk management process that shall be designed and identified. The risk management process must include risk identification, risk assessment, risk evaluation, risk treatment, risk control and closure. In such a process, all of the possible security risks from the areas of network security, information security, malware attacks etc. will be identified and assessed. The specific treatment strategies will also be mapped with the security risks that will be identified. However, in spite of all of the efforts and initiatives, there may be cases of security occurrence and attacks. In such cases, it would be essential to have a disaster recovery plan and policy in place. This policy and plan will comprise of the measures that shall be followed in case of a security attack to control the damage and minimize the downtime. The plan will comprise of the back-up tasks and processes that the organization must follow. In this manner, even if a malicious entity succeeds in capturing the data sets, the organization will have a copy of its information sets ready in advance. Similarly, the plan will cover the encryption and cryptography processes that shall be used and implemented in the organization for the control of the disasters and associated activities. Conclusion PG is a multi-national company that was set-up in the year 1859 and now operates in more than 180 countries all across the globe. Due to widespread operations, customer base and office units, there are huge clusters of data sets that PG manages on a per day basis. The senior leadership and management of the organization took several steps for adequate and efficient information governance and management. The senior leadership that is engaged with an organization has a huge role to play in information organization, management and governance. The senior leadership carries out the tasks around activity monitoring along with control and evaluation. A number of verification and validation activities are carried out by the senior leaders in the form of reviews, inspections and walkthroughs. Such practices bring out the areas of improvements and the necessary changes that shall be made. Cloud computing is defined as a form of computing that utilizes the computing resources over the network for the execution of business operations and activities. There are various cloud services and platforms that have been developed for the execution of business tasks. XYZ Company, a finance corporation, has included a lot many cloud services and activities in its structure, such as cloud based database, digital market, cloud-based Customer Relationship Management (CRM) systems, cloud-based finance management and account management systems along with communication protocols. The company carries out a number of business tasks and operations in terms of development, testing and many others. The use of the PaaS model in the organization leads to the simplification of the tasks and is also a cost-effective approach. The deployment model that is used in the company is the private cloud model. This model makes sure that the cloud services are securely used by the clients in the virtual en vironment. There is an enhanced control and privacy that is reflected in the business organization with the use of this model. Social media has come up as an integral part of the business organizations in the present era. It has become mandatory to ensure that social media presence is made and is reflected to the stakeholders and the customers. There are also dedicated social media management teams that are being set up in the organizations for the management of social media platforms and networks. There are various forms of security attacks that may take place in the organization, such as denial of service and distributed denial of service attacks, media and message alteration attacks, information breaches and loss, information leakage, physical security attacks and likewise. These attacks can have a negative implication on the confidentiality, integrity and availability of the information along with a poor implication on the information security and privacy. The organization must make use of the security controls and risk management strategies for avoiding the same. References Arma (2011). Senior Leadership Imperative to Information Governance Success. [online] Arma.org. Available at: https://www.arma.org/r1/news/newswire/2011/07/27/senior-leadership-imperative-to-information-governance-success [Accessed 26 Nov. 2017]. Cvijikj, I. (2011). Social Media Integration into the GS1 Framework. [online] Available at: https://cocoa.ethz.ch/downloads/2013/05/1230_AUTOIDLAB-WP-BIZAPP-058.pdf [Accessed 26 Nov. 2017]. Esmt (2016). The Evolving Role of Information Systems and Technology in Organizations: A Strategic Perspective. [online] Available at: https://www.esmt.org/sites/default/files/peppard-c01.pdf [Accessed 26 Nov. 2017]. Geant (2010). Information Security Policy. [online] Available at: https://services.geant.net/sites/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4-ufs126.pdf [Accessed 26 Nov. 2017]. Gorelik, E. (2013). Cloud Computing Models. [online] Web.mit.edu. Available at: https://web.mit.edu/smadnick/www/wp/2013-01.pdf [Accessed 26 Nov. 2017]. He, X. (2014). Business Intelligence and Big Data Analytics: An Overview. [online] Available at: https://core.ac.uk/download/pdf/55334437.pdf [Accessed 26 Nov. 2017]. Ibm (2009). The Benefits of Cloud Computing. [online] Ibm.com. Available at: https://www.ibm.com/ibm/files/H300444G23392G14/13Benefits_of_Cloud_Computing_634KB.pdf [Accessed 23 Nov. 2017]. Ico (2014). Information governance strategy 2014-16. [online] Available at: https://ico.org.uk/media/about-the-ico/policies-and-procedures/1043029/information-governance-strategy-2014-2016.pdf [Accessed 26 Nov. 2017]. Intel (2013). Virtualization and Cloud Computing. [online] Intel.com. Available at: https://www.intel.com/content/dam/www/public/us/en/documents/guides/cloud-computing-virtualization-building-private-iaas-guide.pdf [Accessed 23 Nov. 2017]. Iyoob, I. (2015). Cloud Computing Operations Research. [online] Available at: https://www.columbia.edu/~ad3217/publications/cloudOR.pdf [Accessed 26 Nov. 2017]. Kissel, R. (2013). Glossary of Key Information Security Terms. [online] Available at: https://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf [Accessed 26 Nov. 2017]. Modeus, G. (2013). Social media - Integrate it and perform better?. [online] Available at: https://www.diva-portal.org/smash/get/diva2:632477/FULLTEXT01.pdf [Accessed 26 Nov. 2017]. Msb (2015). Strategy for information security in Sweden 2010 2015. [online] Available at: https://www.msb.se/RibData/Filer/pdf/25940.PDF [Accessed 26 Nov. 2017]. Nasr, D. and Ouf, S. (2012). A Proposed Smart E-Learning System Using Cloud Computing Services: PaaS, IaaS and Web 3.0. International Journal of Emerging Technologies in Learning (iJET), 7(3). Utica (2014). The Need for Security. [online] Available at: https://www.utica.edu/faculty_staff/qma/needforsecurity.pdf [Accessed 26 Nov. 2017]. Wolverhampton (2017). Information Governance Board Definitions, Roles and Responsibilities. [online] Available at: https://wolverhampton.moderngov.co.uk/documents/s4114/Appendix%20B%20-%20Information%20Governance%20Board%20Definitions%20Roles%20and%20Responsabilities.pdf [Accessed 26 Nov. 2017].
Subscribe to:
Posts (Atom)