Saturday, August 31, 2019

The French Constitution

France is a republic; the institutions of governance of France are defined by theconstitution, more specifically by the current constitution, being that of the Fifth Republic. The Constitution has been modified several times since the start of the Fifth Republic, most recently in July 2008, when the French â€Å"Congress† (A Joint convention of the two chambers of Parliament) approved – by 1 vote over the 60% majority required – constitutional changes proposed by President Sarkozy.The Fifth Republic: The fifth republic was established In 1958, and was largely the ork of General de Gaulle – Its first president, and Michel Debr © his prime minister. It has been amended 1 7 times. Though the French constitution Is parliamentary, It gave relatively extensive powers to the executive (President and Ministers) compared to other western democracies. The executive branch: The head of state and head of the executive is the President, elected by universal suffrage. Since May 201 2, France's president is Franqois Hollande.Originally, a president of the Fifth Republic was elected for a 7-year term (le septennat), renewable any number of times. Since 2002 the President has been elected for a 5- year term (le quinquennat). Since the passing of the 2008 Constitutional reform, the maximum number of terms a president can serve has been limited to two. The President, who is also supreme commander of the military, determines policy with the aid of his Council of Ministers (Conseil des ministres). The residence of the President of the French Republic is the Elys ©e Palace (le palais de l'Elys ©e) in Paris.The President appoints a prime minister (currently – 2012 – Jean-Marc Ayrault) , who forms a government. The residence of the French Prime Minister is at Matignon House (l'H ¶tel Matignon) in Paris. In theory ministers are chosen by the PM; in practice unless the President and the PM are from dfferent sides of the political spectru m (a system known as la cohabitation), PM and president work together to form a government. The President must approve the appointment of government ministers.The cabinet, le Consen des ministres, meets on a weekly basis, and Is presided over by the president. Ministers determine policy and put new legislation before Parliament In the form of bills (projets de 101); wlthln the framework of existing law, hey apply policy through decrees (d ©crets). The legislative branch: The French parliament Is made up of two houses or chambers. The lower and principal house of parliament is the Assembl ©e nationale, or national assembly: the elected by universal suffrage, in general elections ( ©lections l ©gislatives) that take place every five years.Senators are elected by â€Å"grand electors†, who are mostly other local elected representatives. The electoral system for parliamentary elections involves two rounds; a candidate can be elected on the first round by obtaining an abso lute majority of votes cast. The second round is a runoff between two or more candidates, usually two.. The Judicial branch: While the Minister of Justice, le Garde des Sceaux, has powers over the running of the Justice system and public prosecutors, the Judiciary is strongly independent of the executive and legislative branches.The official handbook of French civil law is theCode Civil. Promulgation of laws: New bills (projets de lot), proposed by government, and new pivate members bills (propositions de lot) must be approved by both chambers, before becoming law. However, by virtue of Article 49. of the French constitution, a government can override parliamentary opposition and pass a law without a parilimentary vote. This does not happen frequently, and in the framework of constitutional amendments, president Sarkozy curtailed the possibility of using 49. . Laws and decrees are promulgated when the official text is published in the Official Journal of the French Republic, le Jour nal Officiel. The Constitutional Council The Constitutional Council , le Conseil constitutionnel, exists to determine the constitutionality of new legislation or decrees. It has powers to strike down a bill efore it passes into law, if it is deemed unconstitutional, or to demand the withdrawal of decrees even after promulgation.The Council is made up of nine members, appointed (three each) by the President of the Republic, the leader of the National Assembly, and the leader of the Senate, plus all surviving former heads of state. Political parties; In 2012, France is governed by the Socialist Party and allies..

Friday, August 30, 2019

Diaoyu Island Dispute

Japanese call the island group near as Senkaku Islands whereas Chinese call these islands as Diaoyu Islands. For many years, the two countries have been arguing who the sovereignty of the islands is, but so far, they do not have any conclusion who should possess the islands. This year, at April, the governor of Tokyo, Shintaro Ishihara organizes a event to refund in order to buy the Diaoyu Islands of japan. Later on the government take over the event, they try to nationalize the Islands.The above action course some Hongkongers went to the islands and wanted to tell the world that Diaoyu Island belongs to China. After the incident, many Chinese, including those who live in China and Taiwan, came out and had mass demonstration. Due to this unexpected event, this sensitive topic becomes the major discussion between the government of Chinese and Japan. When we want to discuss this issue, we should insight into the history of the islands. Diaoyu island was first recorded on the Chinese bo ok: Voyage with a Tail Wind. Since then, the Ming and Qing Dynasty were controlling the islands until 1895.After the First Sino-Japanese War, according to the ‘Treaty of Shimonoseki’ in 1895, the Taiwan islands and its islands group were ceded to Japan, but the treaty didn’t include Diaoyu Islands. However, Diaoyu islands were still being controlled by the Imperial Japan and became a part of Ryukyu Islands. After WWII, according to the ‘Supreme Commander for the Allied Powers Instruction Note, No. 677’: ‘For the purpose of this directive, Japan is defined to include the four main islands of Japan (Hokkaido, Honshu, Kyushu and Shikoku) and the approximately 1,000 smaller adjacent islands’.The territories of Japan will only be the 4 main islands and 1,000 small islands, which were not included Diaoyu Island. However, after the WWII both the Republic of China and the People’s Republic of China did not specify Diaoyu islands as a part of the Chinese territory. In 1972, when the Unites States handover Ryukyu Islands came back to Japan, they also handovered the administrative jurisdiction of Diaoyu Island to the Japan government. Owing to the above historical background, both countries, China and Japan, believe in their own version about the sovereignty of the islands and refuse the other’s version.To understand political as power in the Diaoyu islands dispute, Countries that involved: Chinese, Japan and Unites States has demonstrated different faces of power. In the face of ‘Power as decision-making’: This face of power consists of conscious actions that in some way influence the content of decisions. , use Chinese as an example, when every time japan wants to do anything related to the sovereign of Diaoyu Island, like setting up a lighthouse, sending some scientist to Islands, or even recently, nationalize the islands, Chinese government will use there power to affect the Japanese government. Look the action that takes in this time, Chinese tightening customs inspections from Japan as a kind of economic sanctions towards japan. And also many of Chinese traveler cancelled their trip to Japan, will give a big hit to the Japan tourism. With these actions, the Chinese government showed their power to influence the content of decisions. The other face of power is ‘Power as agenda setting’, the ability to set to set or controls the political agenda. Treaty of Mutual Cooperation and Security between the Unites States and Japan’ make sure that if some countries have conflict or at war with Japan, the Unites States will help to protect the Japan. So it makes that the Chinese can’t have a very strong action to fight for the Diaoyu islands. The protection promised by the Unites States to the Japanese, actually set up a line that stop Chinese government to take a further action on fighting back there right. What makes the Chinese or the Japanese believe in their own version about the sovereignty of the islands in dispute and reject that of the Japanese or the Chinese?As the sociologist Max Weber defined that, sovereignty is a community's monopoly on the legitimate use of force. From the Chinese’s viewpoint, Chinese always restate that Diaoyu islands belong to China since the ancient time. They believe their own version because since 1403, the book Voyage with a Tail Wind, and the book: Record of the Imperial Envoy's Visit to Ryukyu in 1534 is the very first record of the islands. Since then, the Chinese Imperial Map of Ming identified Island group name as Diaoyu, which mean fishing is Chinese and these advance prove that Diaoyu islands should be a part of China.Also as even it is not a part of ceded lands of Treaty of Shimonoseki but according to Potsdam Declaration japan should give up the control of all islands except for â€Å"the islands of Honshu, Hokkaido, Kyushu, Shikoku and such minor islands as we determine†. T he Chinese government believes that Japan is now illegally to control the island, so Diaoyu Islands should be handovered back to China. On the other hand, In the Japanese point of view, although Diaoyu islands were found by Chinese, the islands were not effectively governed by the Chinese government.Also after the sign of ‘Treaty of Shimonoseki' in 1895, even though the control of Diaoyu islands wasn’t covered in the treaty, the Japanese has already effectively governed the islands. Moreover, after WWII, according to the ‘Treaty of Peace with Japan’, The Unites States temporarily take the control of the Ryukyu Islands. As Diaoyu islands are a part of the Ryukyu Islands, when Unites States handovered Ryukyu Islands to japan, Chinese government didn’t disagree, so Diaoyu Islands should be remain as a part of Japanese.However, the reason I think that why Japanese/Chinese reject others version, is mainly because the Diaoyu islands problem is not just sim ply the sovereign of a land. According to the United Nations Convention on the Law of the Sea, Exclusive economic zones (EEZs) extend from the edge of the territorial sea out to 200 nautical miles from the baseline. Within this area, the coastal nation has sole exploitation rights over all natural resources. Base on this law, if Diaoyu islands are really a part of japan, the EEZ of Japan will be very close to the coast of Taiwan and Mainland.This will definitely affect the economic interest of China. Furthermore, in 1969, the United Nations Economic Commission for Asia and the Far East (ECAFE) identified a huge among of potential oil and gas reserves in the vicinity of the Diaoyu Islands. If who control there, that country will have the long-term energy source. As Japan itself doesn’t have enough resources for it own use, that huge amount of resources should be very attractive to Japan. So the dispute is not just the sovereign or nationalism. I believe the dispute will be res olved politically instead of militarily.First, if Japan and Chinese use there military power to resolved the dispute, the economic and both county will be damaged. War is an event that consumes a lot of recourses, money, fuel, food etc. A country has to put itself to prepare the war; as a result the country will put lack affect on other area of event. The economic of Japan was in a downturn of many years; a war for Japan may give them a big hit which they can’t handle. As the effect of globalization, on the other hand, if Japan economic collapse, the Chinese economic will also be damage.On the other hand, although ECAFE identified a huge among of potential oil and gas reserves in the vicinity of the Diaoyu Islands, military action, or war take a lot of resources. Even we know that there may be so much potential oil and gas under Diaoyu islands, but it may actually not deserve to put money on the unknowable resources. In the side of global relation, Chinese will not indicate a war to Japan, as the Unites States will involve in the war. In 1960, Japan signed ‘Treaty of Mutual Cooperation and Security between the Unites States and Japan’ with Unites States.The treaty stated that: Either side get military attack on the territory of Japan controls will be deemed to endanger the safety of the other. In the dispute of Diaoyu Islands the Assistant Secretary of State for East Asian and Pacific Affairs restated that Diaoyu Islands were under the Japan’s effective control, the treaty will protect it. It means that, if the PLA attack or occupied the islands, according to the treaty, Unites States have it right to send there troops and participate the war. Chinese government may not have power to fight the country with strongest military power.As the result, Chinese also will resolve the problem militarily. In this dispute, we can see the nationalism demonstrated in both countries. On China, after those Hongkongers landed on the Diaoyu Islands, a nd captured by the Japan Coast Guard. Many different cities in China started to many demonstrate to oppose Japanese’s action. How every these huge demonstrate soon became Irrational violence, people damage cars that made from japan, rob restaurants or stores that related to Japanese, even it was owned by Chinese. Some of these thugs even tried to damage or even enter the Embassy of Japan.Also I this time of demonstrate, the slogans that used were no longer just about ‘Not to buy’, but something’s like: ‘War with Japan! ’ ‘Step in to Tokyo! ’ But the strangest thing is that, these slogans were seen at different cities, but not one. All these were like planned to happen. The above cases can be seen as some kind of expansionist nationalism, as these actions tend to project another nation/race as an enemy. On Japan, after the landing of Hongkongers, 50 members of the Japanese Right-wing politics group included 8 member of National Die landed Diaoyu Island again to restates the Japan sovereign of there.On the other hand, these Japanese Right-wing politics group also organize a demonstrate to oppose Chinese’s action, similar to the one in China, they all clam that the Islands are their land, and they are not welcome the Chinese. Also on both countries’ Internet forum, we can see a lot of post or comments about the dispute. Many of those incite the hatred between two races, this also one of example that we can see the expansionist nationalism. Reference: Xiang, D. (1961). Liang zhong hai dao zhen jing. Beijing: Zhonghua shu ju. Pp. 253 SCAPIN677 – Wikisource, the free online library. (2012, April 2).Retrieved November 25, 2012, from http://en. wikisource. org/wiki/SCAPIN677 Heywood, A. (2007). Politics. Basingstoke: Palgrave Macmillan. Pp. 11 China tightening customs inspections from Japan. (2012, September 21). Retrieved November 26, 2012, form http://www. channelnewsasia. com/stories/afp_asia pacific_business/view/1227266/1/. html Islands dispute with China may hurt Japanese tourism recovery. (2012, September 16). Retrieved November 26, 2012, form http://www. eturbonews. com/31190/islands-dispute-china-may-hurt-japanese-tourism-recovery â€Å" † ( ). (2012, September 25). Retrieved November 25, 2012, from http://news. inhuanet. com/2012-09/25/c_113202698. htm UNITED NATIONS CONVENTION ON THE LAW OF THE SEA . (2012). Retrieved November 26, 2012, from http://www. un. org/Depts/los/convention_agreements/texts/unclos/closindx. htm . (2012, September 21). Retrieved November 25, 2012, from https://www. youtube. com/watch? v=FtwgBDLx8Vg . (2012, Augest 19). Retrieved November 25, 2012, from http://www. bbc. co. uk/zhongwen/trad/world/2012/08/120819_japan_diaoyu_landing. shtml ——————————————– [ 1 ]. Xiang, D. (1961). Liang zhong hai dao zhen jing. Beijing: Zhonghua sh u ju. Pp. 253 [ 2 ].SCAPIN677 – Wikisource, the free online library. (2012, April 2). Retrieved November 25, 2012, from http://en. wikisource. org/wiki/SCAPIN677 [ 3 ]. Heywood, A. (2007). Politics. Basingstoke: Palgrave Macmillan. Pp. 11 [ 4 ]. China tightening customs inspections from Japan. (2012, September 21). Retrieved November 26, 2012, form http://www. channelnewsasia. com/stories/afp_asiapacific_business/view/1227266/1/. html [ 5 ]. Islands dispute with China may hurt Japanese tourism recovery. (2012, September 16). Retrieved November 26, 2012, form http://www. eturbonews. com/31190/islands-dispute-china-may-hurt-japanese-tourism-recovery [ 6 ]. † ( ). (2012, September 25). Retrieved November 25, 2012, from http://news. xinhuanet. com/2012-09/25/c_113202698. htm [ 7 ]. UNITED NATIONS CONVENTION ON THE LAW OF THE SEA . (2012). Retrieved November 26, 2012, from http://www. un. org/Depts/los/convention_agreements/texts/unclos/closindx. htm [ 8 ]. . (2012, Septem ber 21). Retrieved November 25, 2012, from https://www. youtube. com/watch? v=FtwgBDLx8Vg [ 9 ]. . (2012, Augest 19). Retrieved November 25, 2012, from http://www. bbc. co. uk/zhongwen/trad/world/2012/08/120819_japan_diaoyu_landing. shtml

Thursday, August 29, 2019

Developing an interactive timeline Literature review

Developing an interactive timeline - Literature review Example Arthur Conan Doyle collection that would help in attracting more visitors towards their website thereby increase the profitability of the origination. The youth and adults of the present generations prefer to remain away from books and academic materials as involving in various social networking activities has become common among them (Palla & et. al., 2013).   It serves difficult to attract these sections of the people towards reading books for which it has become essential for such organizations to implement an effective interactive timeline in their website that would help in attracting them and therefore spent much time in their websites. Interactive media in the timeline may be in the form of attractive texts, graphics, video, animation or even audio that would attract the people to visit that particular website and spent more time in them (Grigoreanu & et. al., 2009). It is a common trend among all people that they always prefer something that is entertaining and attractive i n nature, rather than the static contents in the website that creates a dull interface. According to Liu & et. al. (2002), it is inherently necessary for the organizations and website designers to develop an interactive timeline that would allow the people of every generation irrespective of their ages to access the particular website without any difficulty. There are various people with deformities such as color blindness and old people for whom the letters and font size should be kept clear and large.

Wednesday, August 28, 2019

Personal essay Example | Topics and Well Written Essays - 750 words - 1

Personal - Essay Example However, the two terms are quite distinctive from one another in the context of a number of differences such as the differences on the level of education and knowledge, responsibilities, and professional advancement. In terms of education, the difference between LPN and RN is quite evident - it is precisely described as the difference between diploma and degree in the respective manner. Now transitioning from LPN to RN definitely has better opportunities for career advancement along with added responsibilities. The latter is very significant that can be identified with the concept of nursing as a lifelong learning; because, â€Å"Nursing is a dynamic, continually evolving discipline that employs critical thinking to integrate increasingly complex knowledge, skills, and technologies and client care activities into evidence-based nursing practice.† (Harrington and Terry, 2009, p. 4) This paper briefly discusses the issue of transition from licensed practical nurses to registered nurses in conjunction with a number of aspects related to both terminologies as well as the transition phase. It also looks into significant issues relevant to LPN-RN transition including the analysis and evaluation of personal goals and expectations, educational as well as professional outlook, and the issue of career transformation with added professional and personal responsibility. With regard to choosing RN programs over LPN programs, licensed practical nurses are now more focused on continuing their education and becoming RNs. Apart from educational improvement and professional enhancement in general, the decision also includes the relevance of personal choices, goals and expectations in particular. With the difference of educational curriculum and learning styles, transition from LPN to RN also involves the aspect of role development. That is to say, the transition from practical nursing education to higher

Tuesday, August 27, 2019

Closed Economy Essay Example | Topics and Well Written Essays - 3000 words

Closed Economy - Essay Example The question here is that why it is not concerned with the threats of United States. Let us not answer this question now and move a little further before answering this question. Official Statistics show that North Korea had an average annual growth rate of around 1.6 percent for the period of 2002-2007 (Walters, pp. 55-57, 2008). However, it shocked the world when it posted a growth rate of more than 3.7 percent in the year 2008 (Library of Congress, pp. 15-19, 2009). Not only had this shock came because this growth is the highest for North Korea for at least the past two decades but also because many neighboring countries of North Korea and even many other countries had either showed negative growth rates for the year 2008 due to the global financial recession. The second question is that what magic lamp North Korea had to show this comparatively unusual and high growth rate during the period of global financial recession and why there was no effect of the recession on its growth. The answers to both these questions lie in the economic structure of North Korea. North Korea is the country, which is the nearest of being called as a closed economy or autarky. It is one of the five remaining socialist states of the world with an entire government planned, state-owned and commands economy where the government intervenes largely. Interestingly, North Korea is a completely nationalized state and the state owns all the assets of the country. Moreover, the citizens do not have to pay any taxes.

Monday, August 26, 2019

Internet Essay Example | Topics and Well Written Essays - 500 words - 2

Internet - Essay Example , the internet has become as effective as the face-to-face interactions, in providing political knowledge to people, and spurring them to political actions. The internet has influenced the political interactions of different regions of the world. This includes America, the Middle East, Africa, and the other entire world parts. In America, the transformation of politics by the internet was influenced by the 2006 white house and congressional selections. Internet continues to play a political role in the advertising different party candidates, helping in party fund-raising, and the spread of both positive and negative information. In the USA, both Democrats and Republicans have used the internet in their political campaigns. These have made use of their party blogs, candidate blogs, use of e-mail, and the interactive websites to aid their campaign process. This has been efficient in assembling crowds for rallies, raising money for the parties, and increasing the party preference for people. What has accelerated the use of the internet is because it is less costly and yet it is highly efficient, compared to the traditional methods, which a re slow and involving. Howard Dean is known for his use of social media during his campaign for the Democratic Presidential ticket, through MeetUp.com, where he managed to get 190,000 online supporters. Through the internet, Dean was able to raise millions of dollars in a matter of a few weeks. Apart from Dean, McCain also utilized the internet in his campaigns in the year 2000. He raised $6.8 million, and had 40,000 online supporters. This shows that the internet is influential in political interactions today (â€Å"Journalist’s Resource† Web). In the Middle East, there are concerns that the internet highly contributed to the political upheaval in the form of the Arab Spring, which started in 2011. The internet is mainly blamed for influencing negatively the politics in the area, as it has contributed to the sustenance, if not

Sunday, August 25, 2019

Smoking Cessation for Young Adults Assignment Example | Topics and Well Written Essays - 750 words

Smoking Cessation for Young Adults - Assignment Example An evaluation design has to be designed which will assess the success of the smoking cessation campaign. Due to the fact that getting a control group was an uphill task to obtain as well as the high costs associated with the campaign, the focus remained squarely in the British Columbia province (Campbell &Stanley, 1966). Interrupted time series design with a single group (simple time series) will be inevitable as a design of choice. This design of the evaluation provides a better platform for addressing the issues emanating from the main objective of the campaign. This evaluation design carries with it features not limited to several variations of interrupted time series, observation time series and the ability to implement the independent time variable in a repeated manner. The evaluation must come before an altogether evaluation of both variables in the end. This helps in determining their interaction. As a practical example, the cessation campaign calls for this features when it splits the year-long period into three segments. There is the first segment that began in March and ended in April, a second one that began in July and ended in August and finally the October to November segment (Roscoe& John, 1969). The interrupted time series design will be implemented in a more than one independent variable varied one after another due to the breaks between them over the one year period of the cessation campaign. For instance, the effects of the media coverage on the radio and television and the newspapers as far as this campaign is concerned are expected to be varying on the smokers. However, this will be captured by the above choice of the evaluation design. The evaluator will be in a better position to drop the elements with no effect or adjust the campaign program as well.  

Saturday, August 24, 2019

Knowledge Bases and Knowledge Management slp 5 Essay

Knowledge Bases and Knowledge Management slp 5 - Essay Example When we run the report, the real data is recovered and joined together with the format, and after that rendered on our screen, from where we can send out it, print it, or spare it. In this lesson, we figured out how to make a report server extend in SQL Server Data Devices (SSDT). A report server undertaking is utilized to make reports that run on a report server. SQL Server Reporting Services (SSRS) is a server-based report era programming framework from Microsoft. It is some piece of suite of Microsoft SQL Server services, including SSAS (SQL Server Analysis Services) and SSIS (SQL Server Integration Services). While SSAS empowers clients to develop uncommon databases for quick investigation of a lot of data, keeping in mind SSIS empowers clients to coordinate data from numerous sources outside Microsoft SQL Server databases, SSRS empowers clients to rapidly and effectively produce reports from Microsoft SQL Server databases. The SSRS administration gives an exceptional interface into Microsoft Visual Studio so that engineers and additionally SQL overseers can unite with SQL databases and utilization SSRS instruments to configuration SQL reports in numerous complex ways. SSRS likewise gives a Report Builder instrument for less specialized IT specialists to arrangement SQL reports of lesser intricacy. Managed by means of a web interface, it might be utilized to get ready and convey an assortment of intuitive and printed reports. SSRS rivals Crystal Reports and different business discernment instruments.SQL Server Reporting Services (SSRS) is a server-based report era programming framework from Microsoft. It is some piece of suite of Microsoft SQL Server services, including SSAS (SQL Server Analysis Services) and SSIS (SQL Server Integration Services). While SSAS empowers clients to develop extraordinary databases for quick examination of a lot of data, keeping in mind SSIS empowers clients to incorporate data from numerous sources

Friday, August 23, 2019

Historical Transitioning and Growth of the U.S. Health Care System Term Paper

Historical Transitioning and Growth of the U.S. Health Care System - Term Paper Example The programs included the Medicare and Medicaid (Rice et al. 2013). There are also different forms of financing in the sector. The public sources comprise the largest health care expenditure in the country. It constitutes 48% followed by the private third party payers (Rice et al. 2013). In the current state, most of the Americans receive the coverage from the private health insurance (Rice et al. 2013). Employers contribute significantly to the privately insured individuals. Additionally, the number of purchasers in the form of health maintenance organizations (HMOs) rose significantly in the last two decades of 20th century (Rice et al. 2013). However, this has decreased over time due to criticism of the tight control put on patients. Further, the preferred provider organizations (PPOs) have increased their dominance in the sector (Rice et al. 2013). There have also been changes in terms of physical, technological, and human resources over time. The changes have been more common since 1970’s. For example, there has been raise in ambulatory facilities and decrease in institutional setting (Rice et al. 2013). The number of beds in the hospitals has also fallen significantly. On the other hand, there has also been rapid advancement in the medical technologies. Such medical technologies include MRIs and CT scanners (Rice et al. 2013). Moreover, there have been changes in employment rates in the sector. The country has enjoyed increased number of physicians, nurses, and therapist since 1990 (Rice et al. 2013). The increase is an indication of more focus on the primary health care. However, there has been decline in the number of dentists, optometrists and pharmacist in the same period (Rice et al. 2013). The sector has also listed the vulnerable population in the country. The trend has been established for a long period in history. Some of vulnerable populations in the country appear to be the racial and ethnic minorities, low-income

Art Review on Piece of Art Work by Ber Vasques Essay

Art Review on Piece of Art Work by Ber Vasques - Essay Example With these stencils he sprayed dark pink paint, which fell onto the sewed pink lines. Regarding the face, the artist used pieces of men’s underwear. He sews the face using this underwear, which had been dyed using different intensities of pink color. This sewing created a great interaction between the external and the internal contours (Cuff & Mattson, 1982). The Spanish adjectives used here had a significant meaning. These adjectives are words that cam up as a result of the subject being portrayed, in other words, the portrait’s subject. These portraits include Sheriff Joe Arpaio in Maricopa County in Arizona. The artist also had a consideration for those audiences who were not Spanish, for instance the English audience. This consideration can be reflected by the fact that the artist used Spanish words, which are understandable to English speakers. These words used are cognates to English. For instance, facista, segregacionista and racista are the different Spanish wor ds, which may mean face, segregation and racist. The portrait was a prison warden. The artist had noticed something about the warden that was a matter of concern. In order to blow the whistle, he applied his artistic capacities to express his point. In the portrait, the artist was capturing the features that were associated with the warden. His portrait was made using pink dye since he was fond of making the prisoners under his responsibility wear pink underwear. Therefore, this was an art of stereotypical and comical stripped uniforms (Grant, 2010). The person portrayed by the artist is famous for his support for Arizona’s Act, The Support Our Law Enforcement and Safe Neighborhood Act. The law enforcement officers used this act in determining the immigration status of an individual especially when the suspicion is reasonable enough that the person is illegitimate immigrant who is only after perpetration of racial profiling. The jail that the portrait is in charge is in bad b ooks since it is accused of violating inmate’s constitutional rights. They for instance, endanger the health of the inmates by denying them medical attention even when they have serious mental and medical issues (Huxley, 1982). The portrait, therefore, reveals the bad side of the prison warden. The department of justice is looking for him so that he can cooperate in the investigations accusing him of unconstitutional seizures and searches as well as discrimination. Therefore, the artist accomplished his goal by beating him in is own game. He used his techniques to hit back at him. He stripped him, compromising his masculinity and then went ahead to dishonor or disrespects him in his own official portrait. What is challenging regarding him is the idea of understanding his hate. It is also harder for his violence, pride and denigration of human beings to be understood since he is an officer, who is expected to be far away from this (Reyner, 2007). The examination of the Ber Vas quez’s image also brings into focus a couple of ideas and messages that were meant to be communicated during the creation of this particular work of art. Consequently, it is very possible to break the image into smaller parts in order to obtain a vivid understanding the whole image. By this deconstruction, it is clear that the interpretation of the ideas conveyed by the image would come not from the actual meaning of the image, but from the different roles played by the different components

Thursday, August 22, 2019

International Management Essay Example for Free

International Management Essay Relationships developed by New-Zealand and Australia to other countries, differ from the rest of the Asian countries. Other Asian countries like Indonesia prefer to build long term relationships that will make more profit for a long time rather then have quick short term money. Another difference is that, most of the Asian countries feel as if the westerns don’t really care about their culture and beliefs, which is somewhat true. We only tend to care about what revolving around America. And this really affects how they look at us. 2- There are so many reasons as to why Indonesian archipelago is unique in Asia. There are 17,000 islands all together in Indonesia. Each island has its own unique features that differ it from another. Some of the island are very rich , meaning, they produce iol, gas etc. While some islands are very dry and dormant. Climate is also different between these islands. Some islands experience heavy rainfall while other islands are experiencing drought. 3- There are many characteristics that the Indonesian workplaces are referred to here. I think that the article is only concentrating on the minimum wage jobs, the type of jobs that do not really need education to do. The article also emphasizes on how businesses have failed and are still failing up to now in Indonesia. The business opportunities that were written in the article are the type of jobs that needs an outsourcing employee, which are of course cheaper. Further on, Indonesian workplaces also experience problems when it comes to foreign management vs locals. 4- The Republic of Indonesia, the worlds fourth most populous nation, has 203 million people living on over one thousand permanently settled islands. I personally think that for a place which has a large population number to be socially stratified like Indonesia isn’t very rare. Simply because people are the same. Some tend to be more intelligent than other some more ambitious. Others are just lazy but others also work hard. Those who possess good character will move to a place that has people with the same characteristics as theirs. They will settle there and produce offspring with the same characteristics as theirs. Those who posses bad characteristics, i. e drug addicts, dumb etc will move to lower stratification. Hence, I think this is why Indonesia seems to socially stratified. 5- Many countries have realized that Indonesia is a good country to do business in and /or being a business partner. Businesses around the world also enjoy the vast markets of goods in Indonesia. There are a lot of business opportunities in Indonesia, For example; agribusiness, automotive industries, construction and infrastructure and many more. One has to keep in mind that even though New Zealand and Australia are in the same Asian sphere with Indonesia, they have very different cultures and the way they do business. Therefore, New Zealanders and Australians have to explore the culture difference and learn how indonesians do things in order for them to be business partners.

Wednesday, August 21, 2019

Computer Crime Legislation in the UK

Computer Crime Legislation in the UK Computer crime is on the increase as there are many users of the internet and social-networking sites. Evaluate the extent to which relevant legislation has intended to serve as a deterrent to such offences. Since the launch of the computers in the mid 1970s, they have played a major role in todays society as it is impossible to live without a computer as most of us are so dependent on them. Computers is used in a number ways such as booking a flight, buying insurance, reading the news, communicating with other people. Another reason people use a computer is to commit crimes. Computer crime has risen at an alarming rate as people think they can be undetected and be anonymous. This is because it is easier to commit a crime in the cyber world than in the real world. When a crime is committed in the real world, physical evidence is always left behind such as blood and fingerprints. In the cyber world there isnt any physical evidence. The thought of their tracks would not be traced, however they are mistaken as tracking down an IP address has become easy to track making it hard for criminals to stay invisible while they are online. An IP address is short for internet protocol address and this identifies a computer on network. The IP addresses are based on the networks that use the TCP/IP protocol. Various activities are committed by not just by criminals but ordinary people as well. These activities would consist of crimes linked to child pornography such as downloading images, stealing identities, hacking to other account to gain information for the third pa rty, creating a virus and money frauds are known to become easier by the use of computers. Credit card numbers, personal id information can also be targeted by programmed automated software. People commit these crimes as they have a thrill of taking advantage of a computer system. Distributed Denial of Service (DDoS) is a common form of attack on computers. This process involves criminals can have controlled access to multiple computers and use them to attack a number of targets or one target. Another form of attack is malicious software (malware). This consists of software that allows criminal to have full control of a system and allowing the malware creator to do whatever they want. The malware can be a number of things such as a virus, worm, Trojan, adware, spyware and a root kit. A virus is the most serious form of attack. This consists the virus affecting the computer or other electronic devices that are passed by other user activity e.g. an email attachment being opened. http://www.seas.ucla.edu/2011, http://www.webopedia.com/2013 As computer crime has risen, the cost of cyber crime is also a threat to the government and the nation. According to the Cabinet office, cyber crime in the UK costs  £27bn a year. These costs are made up of  £21bn to businesses; which is more than the offices annual budget,  £2.2bn to the government and  £3.1bn to public. Baroness Neville-Jones the Security minister stated in a briefing the government was determined to work with industry to tackle cyber crime. At the moment, cyber criminals are fearless because they do not think they will be caught The Police and Justice act 2006 is an act of parliament in the UK. Part 5 of the act the miscellaneous section under chapter 48 introduced the Computer Misuse Act 1990 (CMA). The Computer Misuse Act 1990 (CMA) was passed in 1990 and is part of the UK Parliament. The principle of the act to is frame legislation and controls any activity linked to computer crime and internet fraud. The act was introduced to deal with issues that have occurred by the misuse of computers. The act are based on three offences that cover Unauthorized access to computer material unauthorised access to a computer with intent to commit or facilitate the commission or a further offence and unauthorised modification of computer material The first act Unauthorised access to computer material even though there isnt any physical damage, its an offence when a person is found guilty of using any computer material without permission which makes it illegal. An example of this would be the case of R v Astrid Curzon. Curzon 49 was found guilty of gaining access to a schools email system. She gained access from her home and therefore found private emails from the head teacher to staff members. The email contained discussions about employment of other staff members. Another example of this would be the case of DPP v Bignell [1998]. Two police officers already had access to the police national computer (PNC) that is only used for police purposes. The pair asked the computer operator who used to the computer to obtain information from the DVLA through the police national computer without knowing it was for their own pleasure purposes. The divisional court had stated that the two polices officers didnt commit a crime under section 1 Unauthorized access to computer material. the divisional court believe that the two police officers didnt commit a crime and their conclusions were right, as the decision wasnt over ruled by the House of Lords in Bignell. It was a possible view of the facts that the role of the officers in Bignell had merely been to request another to obtain information by using the computer. The computer operator did not exceed his authority. His authority permitted him to access the data on the computer for the purpose of responding to requests made to him in proper form by police officers. No offence had been committed under section 1 of the CMA. In a more recent article in the Daily Mail online(PUBLISHED: 05:00, 17 December 2012) Hollywood stars Scarlett Johansson, Mila Kunis and Christina Aguilera computer was hacked by Christopher Chaney 36, was arrested for wiretapping and unauthorised access when he hacked into their email accounts. He managed to gain access by using Google and then using the i got forgot my password button. He tried a number of combinations of names and then he reset account passwords by finding pet names, where they were born, and the name of their schools. The most serious incident when Chaney posted nude photographs of Johansson and her then husband all over the internet. The second act unauthorised access to a computer with intent to commit or facilitate the commission or a further offence as stated in the first act no actual physical damage to the computer material. Using the system without permission would make it illegal and committing a on the system would be illegal too. This act mainly covers actions such as using email contents for blackmail. An example of these would be the case of R v Delamare [2003] the defendant was working in bank and was offered  £100 to use the banks computer systems to gain information of other bank details. The third act unauthorised modification of computer material an example of this act would be the case of R v Pavel Cyganok and Ilja Zakrevski [2012].( published 2 July 2012 Last updated at 11:23 2 July) Cyganok and Zakrevski were arrested and convicted of masterminding hi-tech crimes. The pair used a SpyEye Trojan to obtain login details for online accounts. The stolen data was then uploaded to servers which the pair had access to.  £100,000 of the stolen money was stolen and laundered through online accounts allowing criminals to access. The acts are associated with penalties for both individuals and groups of people that are part of a gang. The penalties can be severe for breaching the three offences. The penalties are varied based on what act have been breached. Each of the offences are divided into summary penalties a trail without a jury and an indictment penalties a trail with a jury. In the first act if the individual was found guilty the summary conviction in England and Wales the prison sentence would be a term of 12 months or a fine up to the statutory maximum ( £5000) or both. On a conviction, the prison sentence would be of two years that shouldnt be exceeded or a fine or both. In the second act, the summary conviction is a prison sentence of 6 months or a fine that is not allowed to be exceeded the statutory maximum or both. On a conviction, the prison sentence would be term of five years or a fine or both. In the third act, if the individual was found guilty the summary conviction would be prison sentence of one year or a fine that is not allowed to be exceeded the statutory maximum or both. On a conviction, the prison sentence would be 10 years or a fine or both. Section 35 of the Police and Justice 2006 had amended the Computer misuse act 1990. The amended act looks at new offences which offences 1 and 2 are now combined together into a new offence. A new offence was added into the act 3a offence. This affect took place on 1st October 2008. The three new offences are as follows: Unauthorised access to computer materials (hacking), Carrying out unauthorised acts in relation to a computer and Making, supplying or obtaining articles for use in computer misuse offences. The penalties were also added to the new offences. The police and justice act increased the penalties for the first offence unauthorised access to computer material. The computer misuse act can be compared to other laws and legislations. The Computer Crime Act (CCA) was passed in 1997 is an act of the Malaysian government introduced the legal framework to ease the growth of ICT systems called Cyber laws of Malaysia. The act was given a Royal Assent on June 18, 1997 but didnt come into force on June 1, 2000. This act was introduced purpose of protecting consumers and people that provide a service. The act also protects online businesses and owners of intellectual property. The act was designed to stop offences as computers are misused in a number of ways, as this was added to other existing criminal legislation. The Computer Crime Act and the Computer Misuse Act do have a number of similarities in the case of the three offences; however it differs in more ways. As the Computer Misuse Act as the three offences, the computer crime act looks at a wider range of offences. The CCA looks at the understanding of computers, the computer network, output, c omputer data and the functions it uses. The act looks at computer programs and premises. The definition of a computer in CCA is summarised as any electronic devices that are programmable and has the ability to store data. The CCA looks at more severe penalties compared to the CMA. For the first offence, unauthorised access to computer material the Malaysian law states that if the individual were found guilty the prison sentence would be a maximum sentence that shouldnt be exceeded five years and or a fine of not exceeding RM 50,000 ( £10,273,45) for the 2nd offence, the Malaysian law states for the offence of unauthorised access with intent to commit or facilitate commission of further offences if the individual were found guilty the prison sentence would be a maximum sentence ten years that shouldnt be exceeded and or a fine not exceeding RM 150,000( £30,820,35). For the 3rd offence unauthorized modification of the contents of any computer the Malaysian law states that if the individual was found guilty the prison sentence would be not exceeding seven years and or a fine not exceeding RM 100,000( £20, 546, 90) On a liable prison sentence not exceeding ten years if the act was intentionally brok en and or a fine not exceeding RM 150,000, which is the equivalent to ( £30, 820, 35)   The computer misuse act can also compared to the American law the Computer fraud and abuse act 1986. The act was passed by the united congress. The act is a federal legislation that is aimed to restrict computer crimes that come under the federal jurisdiction.the whole purpose of the act was to strengthen, widen, and clarify to protect computer systems from vandalism. The act also includes the usage of virus and programs that have been intended to destroy a computer system. The law prevents the unauthorized access of any computer system and the obtainment of classified government information. http://ecommerce.hostip.info.2013 Comparing to The Computer Misuse Act and The Computer Crime Act (CCA) 1997, the Computer fraud and abuse act 1986 has more severe penalties. If the individual were guilty of physical damage to a computer system, the prison sentence would be a term of 20 years that shouldnt be exceeded and the fine reaching $250000 ( £155,870.00). Under this law, Prosecutors are challenged to prove that the defendant intentionally caused damages to a computer. The other acts are not so severe than this act.   Even though the computer misuse act is in place, the act still does not stop criminals from committing an offence. In the BBc news online (4 July 2011 Last updated at 19:24 ) The crimes are committed as people want to gain information and sell to a third party. In 2011 it was reported back in 2002 the News of the World newspaper had hacked in to Milly Dowler mobile phone and had listened to the voicemails and then deleted the messages. Later the news of the world was forced to shut down the paper after the hacking scandal as they had admitted interfering with teenagers phone. The victims family and friends said it gave them false hope that she was still alive and Milly had deleted the messages herself. By the time the messages were deleted. By this time, the teenager was already murdered. The hacking was classed as an unlawful interception of communications. This comes under Section 1 of the Regulation of Investigatory Powers Act 2000. In an article in the Daily Mail online, (PUBLISHED: 02:08, 9 June 2012 ) 11,000 people are believed to hunted by the police for using a service of a cyber-crime gangs website that offered false identification and tips on how to commit a crime. The gang had cloned a number the identities of people who a high credit rating. Pay slips bank statements, passports and driving licenses was also sold to the gangs members. The website also offered other services such as different tiers of access as the users where trusted to use the website. One of the services included a platinum profile that cost  £5,500 that came with instructions on how to commit identity fraud. For  £2,000, Confidential Access (CA) offered a 100% Creditmaster profile, which was exclusive to VIP members of the website. The website was claimed to worth be  £200million and had a turnover of  £11m between 2004 and 2008. The paying customers paid from around  £50 for a utility bill to  £800 for a set of three year s professionally sealed. Detective Inspector Tim Dowdeswell said: This was a sophisticated operation which has netted millions of pounds over the years. These cyber criminals not only provided the tools to commit fraud, they instructed their clients in how to use them to make the maximum amount of money, whilst ruining real peoples credit histories into the bargain. We have already brought many of their students in crime to court and will continue to work with other police forces and partners to bring those people who bought and used these identities in their own frauds to justice.   Concluding this essay, computer crime will still be on the increase. Crimes will be committed depending what the motivation is such as greed and pleasurable need. The Computer misuse act 1990 has a number of flaws as it failed in the case of DPP v Bignell [1998] as the prosecutor felt that no crime was committed under section 1 of authorised access. The police national computer (PNC) was used when a police officer obtained information for their own pleasurable needs, even though police officers had access to the PNC. The Computer misuse act 1990 should not have failed, as the police national computer should be used for policing only. Another way it can fail is the source of the crime such as the IP address and hackers would find ways and use another IP address to avoid them getting caught. I do believe that the computer misuse act can work as a deterrent, as it has a high knowledge that projects any computer system that involves criminating activities. The act helps to keep people safe and their personal information safe too. My views on the Computer misuse act 1990 that their punishment should be severe as the Computer fraud and abuse act 1986. I say this because i feel with a harsher punishment people will learn their lesson on not to commit a crime. If an individual served a 12 month prison sentence with a small fine, they would be tempted to commit another crime as they would feel that their punishment was not harsh enough. My recommendations would be that the Computer misuse act 1990 should have harsher punishments matching up to the penalties of the Computer Misuse Act and the Computer Crime Act (CCA) 1997. I also believe that the government should have more power over the individuals who commit crime as 27bn was wasted on computer crimes. I also i believe that the act should at other aspects and not focusing on three sections. If prosecutors are dealing with computer crime cases, they themselves should have an understanding of the act and not allow anymore cases to be dismissed. References BBC News News of the World hacked Milly Dowler phone. 2013. BBC News News of the World hacked Milly Dowler phone. [ONLINE] Available at: http://www.bbc.co.uk/news/uk-14017661. [Accessed 29 December 2012]. Cyber-criminal fraud gang who lived lavish lifestyles jailed for multi-million pound ID scam | Mail Online. 2013. Cyber-criminal fraud gang who lived lavish lifestyles jailed for multi-million pound ID scam | Mail Online. [ONLINE] Available at: http://www.dailymail.co.uk/news/article-2156724/Cyber-criminal-fraud-gang-lived-lavish-lifestyles-jailed-multi-million-pound-ID-scam.html. [Accessed 19 December 2012] Christopher Chaney: Computer hacker who leaked nude photos of Scarlett Johansson is sentenced to 10 years in prison | Mail Online. 2013. Christopher Chaney: Computer hacker who leaked nude photos of Scarlett Johansson is sentenced to 10 years in prison | Mail Online. [ONLINE] Available at: http://www.dailymail.co.uk/news/article-2249693/Christopher-Chaney-Computer-hacker-leaked-nude-photos-Scarlett-Johansson-sentenced-10-years-prison.html. [Accessed 20 December 2012] The cost of cyber crime | Cabinet Office. 2011. The cost of cyber crime | Cabinet Office. [ONLINE] Available at: http://www.cabinetoffice.gov.uk/resource-library/cost-of-cyber-crime. [Accessed 19 December 2012] Bobby Stocks 2013. Why Do People Commit Computer Crimes? | eHow.com. [ONLINE] Available at: http://www.ehow.com/about_4709031_do-people-commit-computer-crimes.html. [Accessed 19 December 2012] What is IP address? An IT Definition From Webopedia.com. 2013. What is IP address? An IT Definition From Webopedia.com. [ONLINE] Available at: http://www.webopedia.com/TERM/I/IP_address.html. [Accessed 20 December 2012] Malicious Software. 2011 Malicious Software. [ONLINE] Available at: http://www.seas.ucla.edu/security/malware.html. [Accessed 20 December 2012] What is DDoS (Distributed Denial of Service) attack? A Word Definition From the Webopedia Computer Dictionary. 2013. What is DDoS (Distributed Denial of Service) attack? A Word Definition From the Webopedia Computer Dictionary. [ONLINE] Available at: http://www.webopedia.com/TERM/D/DDoS_attack.html. [Accessed 20 December 2012] Computer Fraud and Abuse Act of (1986) Information, Law, System, and Damage . 2013. Computer Fraud and Abuse Act of (1986) Information, Law, System, and Damage . [ONLINE] Available at: http://ecommerce.hostip.info/pages/248/Computer-Fraud-Abuse-Act-1986.html. [Accessed 21 December 2012] CyberCrimes: Computer Crime Act 1997. 2009. CyberCrimes: Computer Crime Act 1997. [ONLINE] Available at: http://cybercrimes09.blogspot.co.uk/2009/10/computer-crime-act-1997.html. [Accessed 10 January 2013]. Computer Misuse Act 1990: not yet in force: Legal Guidance: The Crown Prosecution Service. 2013. Computer Misuse Act 1990: not yet in force: Legal Guidance: The Crown Prosecution Service. [ONLINE] Available at: http://www.cps.gov.uk/legal/a_to_c/computer_misuse_act_1990/#an07. [Accessed 10 January 2013]. IMPACT ®:The amended Computer Misuse Act: IMPACT guide to the essentials. 2006 IMPACT ®: The amended Computer Misuse Act: IMPACT guide to the essentials. [ONLINE] Available at: http://impact.freethcartwright.com/2006/11/a_while_ago_we_.html. [Accessed 10 January 2013]. Former beauty queen spied on headteachers email (From Swindon Advertiser). 2012. Former beauty queen spied on headteachers email (From Swindon Advertiser). [ONLINE] Available at: http://www.swindonadvertiser.co.uk/news/local/9881311.Former_beauty_queen_spied_on_headteacher_s_email/. [Accessed 10 January 2013]. Computer Frauds Unauthorised Access + Intent + Modification. 2012. Computer Frauds Unauthorised Access + Intent + Modification. [ONLINE] Available at: http://legal.practitioner.com/regulation/standards_9_3_22.htm. [Accessed 10 January 2013]. BBC News Online bank robbers face jail time for e-crimes. 2012. BBC News Online bank robbers face jail time for e-crimes. [ONLINE] Available at: http://www.bbc.co.uk/news/technology-18672068. [Accessed 10 January 2013]. INTERNET COMPUTER CRIME. 2013.. [ONLINE] Available at: http://www.stjohnsbuildings.com/resources/s/n/4/ComputerCrimeNotes.pdf. [Accessed 10 January 2013].

Tuesday, August 20, 2019

Market Entry Strategies of Wal-Mart

Market Entry Strategies of Wal-Mart Founded in the year 1962, by Sam Walton, Wal-Mart was a single discount store in Rogers situated in the state of Arkansas. Then the growth of the Wal-Mart chain of stores has been tremendous. Initially the chain consisted of 9 stores amounting to a total sale of 1.4 million US dollars and the growth exploded with a overall sale of 118 billion US dollars in the year 1998 and the number of stores amounted to over 2,316 stores. The company also includes discount stores, warehouse outlets offering deep discounts, the whole sale club, supercenters of Wal-Mart. The success story of Wal-Mart is unique in the history of retailing and this success could greatly be attributed to the dynamic leadership of Sam Walton. Its innings in the international arena started when the company inaugurated a store in Mexico in the year 1991. Then the international chain kept on expanding to many nations like Argentina, Canada, Germany, South Korea and Brazil. By the year 1998 the number of international store s of Wal-Mart alone amounted to over 600 and these stores generated a revenue of over 7.5 billion dollars (Wal-Mart Annual report, 2008). The lines of merchandise of Wal-Mart is inclusive of electronics for consumers, goods related to sports, house wares, items for the lawn and the kitchen, apparels, paints, hardwares, items for repairing the automotives and their maintenance, games, grocery, toys, fashion items for homes, goods related to other types of maintenance activities. In the region of the United states, the company plays an important role in the generation of jobs and the number of jobs created by the company amounts to over 800, 000. Apart from this the company is also involved in the supporting of many types of manufacturing jobs in the US and this is being facilitated through the campaign called America first (Wal-Mart Annual report, 2008). International presence of Wal-Mart The company is involved in the serving of over 179 million people in one year and it also possesses over 2 million associates all over the world. The number of stores possessed by Wal-Mart numbers to over 7, 343 and its Sams Clubs are also present in over 14 markets. Hence it is not surprising that it is the biggest retailer in the whole of United States. From the year 2002 the company has been topping the list of fortune 500 list and in the year 2006 it was pushed to the second place, next only to Exxon- Mobil due the rise in the price of oil in that year. In the year 2008, the annual revenue generated by Wal-Mart was over 378 billion dollars (Wal-Mart Annual report, 2008). Hence the company continues to be successful in many nations exploiting the human resources as well as the other resources in the nations. Its idea is to capitalise on the strategy set by the company for global expansions and the present targets of Wal-Mart are the big nations with huge human resources like Russi a and India (Newsweek, 2007). There are lot of strategies employed by the company and it has had a huge impact on the local culture of the retail in every nation it has occupied so far. The major strategies that are used by the company before it ventures into another company are as follows: Establishment of partnership with the organisations and business that are present locally Working in close association with that of the governments of the states and nations Trying to exploit the flourishing purchasing power of the people in the middle class (Newsweek, 2007) Strategies for global expansion The strategy used by Wal-Mart at the multinational level is being modified in such a way that it becomes the transnational strategy and the key aspects of this strategy includes response at the national level, operations at the international level and also taking lessons from the operations that are being conducted on a global scale. The aim of the company in following such an approach is that it should become the best choice for goods that are low cost in the United States as well as the whole world (Fishman, 2006). As the company is basically a retail company it stresses on the concept of orientation of the consumers by acquisition as well as distribution of goods at a low cost and at the same time facilitating learning on a global scale by the process of decentralisation, tackling competition over the borders and by sharing its acquired knowledge. But still in the global business arena, the company is relatively new and on its way to become a leading player. The stress placed by t he company on the concept of national response has to an extent, brought about reductions in the operational efficiency of the company because it was not able to accomplish economy of scale which is enjoyed by the customers when it comes to the products that are standardised. The company is involved in the formulation of blueprints for the managers when it comes to the strategies which they are supposed to follow (Coleman, 1999). According to the needs as well as the culture of the people there is a high level of adaptation and the company has its location which is proximal to its market. The company also shows a lot of sensitivity when it comes to individual needs of every nation and also responds in an appropriate manner to these needs. There is also close contact and co-operative working shown by the company with the respective government so that every rule or legislation that has been passed by the government could also be taken into account while designing the strategies. The company is also involved in a lot of community works by provision of sponsors for the student community and contributes its share to the welfare of the people in the nations where it has its operations. Success factors of Wal-Mart Each of the stores operated by Wal-Mart is from that of the product being stocked by the company which would move towards the equipment at the front end and this would go a long way in helping checkouts in a rapid manner with the philosophy set by the company in place- provision of goods at low prices every day and at the same time providing customer services that are of top quality. Hence the added advantage of the low costs is that the expenses incurred in organisation of promotions for sales could be cut down to a large extent. Moreover the predictability of sales also increases. The company firmly believes in the system of cross docking inventory system and hence has invested a lot in the same. The process of cross docking has led the Wal-Mart to attain economies of scale and this has in turn brought about considerable reductions in the costs that are incurred for sales. In the system followed by Wal-Mart, there is a continuous delivery of the goods to the stores in a time of max imum two days and at times there are no requirements even to inventory them. Hence the shelves of Wal-Mart are refilled faster than four times of the existing competition in the market (Thomson, 1998). This is a particular advantage possessed by the company when it comes to competition. The power of buying of Wal-Mart is leveraged by means of purchasing in bulk quantities and also the company takes care of its own distribution. Hence every day low prices are guaranteed by the company and hence it has become a one stop shop. Hence at present the company owns stores in a variety of companies like argentina, mexico, brazil, Canada, UK, Korea china and also in Germany (Nelson, 1999). Single business strategy The major reason behind the success of Wal-Mart lies in the fact that the company believes and concentrates on the strategy of single business. This is the strategy that has been providing the company with success over a period of over 30 years. In the three decades the company has never believed in the concept of diversification for the sustenance of its growth and also its advantages at the competitive level. Hence the services provided by the company and the low prices offered are the major reasons behinds its success. The concentration on one particular strategy also poses a threat to the company because it is equivalent to place all the eggs in one single bucket (Richter, 1998). Supply chain, distribution The competitive advantage gained by a company depends on the efficiency existing in the system of operation of the company and also on the degree of efficiency of the supply chain. The chain of stores owned by Wal-Mart is highly successful only due to the ability of the company in the distribution of the merchandise from that of a huge network of distribution centers that are modern and are in turn served by means of truck fleet that is private. Wal-Mart has also been highly efficient in the maintenance of a good position in terms of the instock and also in the filling of the shelves that are in the new stores being established by the company every year. This is evident from the fact that though Wal-Mart has increased its sales by 30 in a time of two years, there was only a 12 percent increase in the inventory value at the cost of replacement in the same period of time (The Bay Area Economic Forum, 2003). Hence the strategy of leveraging a chain of supply for the purpose of restricti ng of the growth of the inventory continued to be followed by the company and during the first quarters resulted in a 14 percent increase of the inventories and a subsequent 3 percent increase in the inventories. Wal-Mart was also highly efficient and capable of investing in distribution capacities that are new and particularly this is true in case of the foods sold which is one of the areas responsible for a major portion of the growth shown by the company. The first centre for distribution of food by Wal-Mart located at Clarksville is only 10 years and there are twelve other centers for food distribution which are very new (Economist, 2006). WAL-MART IN INDIA Wal-Marts entry into India The nation of India is very different from the other nations in many ways. Being aware of the historic challenges and changes that have shaped the nation, the Indian government as well as the private sector existing in India have been taking rapid steps for the better shaping of the retail sector that is evolving at a rapid pace. Hence the changes taking place in the sector of retail should be considered keenly by the retailing giants. In the structure of the Indian retail transformations are continually being introduced and it is expected that the retail sector would grow towards 635 billion dollars by the end of the year 2015. The growth of the Indian population compounded by the escalation in the disposable incomes of the people of India is the basis for this boom in the sector of retail. Particularly the retailing of food is experiencing growth by leaps and bounds and the Grocery and Food segment contributes to around 60 percent of the whole of the market of India (Franklin 2001) . It was in the year 2005 that Wal-Mart began to look for ways to venture into India.. This was possible due to the decision of the Indian government to relax the regulations pertaining to the opening of foreign direct investment in India. The initial plan of Wal-Mart was the launching of whole sale stores in the country by means of joint ventures by the year 2008. it also had the initial target of expanding to over 75 nations in time of 7 years. But since the company faced a lot of opposition from the Indian side, they had to hold up their plans. However in the year 2008, there were three stores opened by Bharti retail in the stated of Punjab under the name of Easy days. Sunil Mittal from Bharti also mentioned that the local markets would be the source of over 90 percent of the goods and this combined operation would also lead to Wal-Mart increase its sourcing at the global level from the nation of India. The aim of the joint venture between Bharti and Wal-Mart is that Bharti would su pply Wal-Mart with the products it buys directly from that of the agriculturists, artisans and craftsmen (Goetz and Swaminathan, 2006). The challenges facing Walmart in India India was rated as one of the top international investment destination in 2005 amongst 30 other emerging markets that were short-listed for mass merchant and food retailers who wished to internationalize (Business Credit, 2006). Compared to other countries, India is seen as a rapidly accelerating economy whose gross domestic product (GDP) is rising at an average annual rate of about 7.5 percent continuously for the past three years (Choi, 2006; Economist, 2006) while its retail market has witnessed a growth of 10 percent on average (Business Credit, 2006). It is stated that the Indian retail market with a projection of $250 billion annually, is actually the worlds eighth largest market and it is expected that this will reflect a growth of more than 7% yearly (Dutt, 2005). These factors reflect that it is the strong economic conditions of the country that draw the attention of companies such as Wal-Mart who are interested in starting operations in the Indian retail market. Despite deregulations which have seen the rapid rise of the Indian economy, the retail economy is protected from foreign competition as rules disallow direct foreign investment in this sector. The multi-brand retailers cannot invest directly in the country and are not even allowed to open and operate their own stores (Kravilanz, 2006). This rule has forced Wal-Mart to enter into a partnership venture with Bharti Enterprises, which in turn is an Indian business group that is a leader in countrys telecom sector. This joint venture between Wal-Mart and Bharti has resulted in them managing the supply chain together while it is Bharti Enterprises that will act as franchisees to conduct the retail operations (Lakshman, 2006; Mukherjee, 2006). This particular model in India that has been selected by Wal-Mart will throw open likely challenges pertaining to ownership as well as internalization dimensions of the model. This particular model is not the way Wal-Mart operates in other countries s uch as Germany and South Korea. Thus the company needs to take care that the definition of the model is in tandem with the partnership entered into with Bharti as well as the strengths that are associated with Wal-Marts classic operating model. There have been cases wherein partnerships have failed. This would require Wal-Mart not only to manage its joint -venture closely but simultaneously work patiently with Bharti. Wal-Mart also needs to protect well the huge amount of supply chain and information technology intellectual property that it has introduced in the joint venture. As far as India is concerned this is a big challenge and there is a requirement on part of Wal-Mart to comprehend in detail managing the relation in this context at least. As far as the location is concerned, the size of market undoubtedly makes India an attractive destination which however is limited by many facets that need to be managed in order to ensure success. The present population of India is more than a billion. Despite having a large population that is relatively poor, the strength of Indias middle class population is around 300,000,000 people, which makes the number much larger in comparison to the total US population (Choi, 2006; Economist, 2006). This will prove advantageous to Wal-Mart as it has a large potential to which it usually caters to. The Indian market may be large but is typically characterized by intricate variety and difference. The complexity is clearly visible by differences that exist in religion, language, dialect, value system, food habit, economic buying power, clothing selection, fabric, tradition, and access to transportation. Indeed markets in India comprise of several sub-markets. The main factor will be how successful Wal-Mart is in segmenting the market as per different facets. The ability of Wal-Mart to build merchandise that is local and its ability to locate and supply approximately 75,000 products that are usually sold in a typical supercenter will be put to test (Dutt, 2005). The standards of Indian shoppers are difficult to meet as the Indian middle class customer is usually a value-conscious shopper. This is clearly reflected in the Indian customers mindset of expecting products that meet global standards albeit at process those are Indian.

Monday, August 19, 2019

The Summer Of The Falcon Essay -- essays research papers

The Summer of The Falcon Every popular novel must have an interesting story, suitable conflicts, and a theme. In the novel The Summer Of the Falcon, the author Jean Craighead George parallels the maturation of the main character with the teaching of a bird to fly and take commands. June becomes mature and grows form childhood to adulthood, In the end of the story, June is not a child anymore. Neither is the falcon. It has fully grown and has decided to live independently, without any of June's support. The main theme of the novel is maturity, freedom and realizing the cycle of nature. Of these three, maturity is the most important. When the story begins, June is just a little child, and she hates to do any housework. For example, she dislikes dressing up, cooking, and other chores. We can see that in P.19 "June was still rebellious, "Why can't woman be trained to do something else? Beds and dishes are so horribly dull." But finally, by training the falcon, we can see the comparison between June and Zander(the falcon). First Zander is just a little pet for June. With the training by June, and the mistakes that he fall into the river, he grows matured has been well trained. At the same time, June also has been trained by her mother and, watching the things happen to Zander, June becomes mature too. She helped her mother by carrying suitcases and boxes and walked carefully up the stairs to her room,...

Sunday, August 18, 2019

Kurt Cobain: Collection Of Personal Accounts From Family Relatives :: essays research papers

Kurt Cobain: Collection of Personal Accounts From Family Relatives I would like to share some of the memories and perceptions I have concerning this unique, rare and original human being called Kurt Cobain. I knew Kurt during his teen-age years in the period from about 1979 to 1984. I was in my mid-30s and living in and near Montesano. My sister married Kurt's dad, Don, and also lived in Montesano. My grandfather comprehended the intelligence and individuality in Kurt at a time when Kurt was being beaten down mentally and physically. "Gramps" often told me of his respect for Kurt's tenacity and compassion even though he was in emotional pain. Shortly before Gramps died, he had been talking about Kurt. He looked at me and said words to the effect that he could see a nobility about Kurt that he had never seen in anyone in all his 70 years. One time, Gramps invited Kurt along on one of our steelhead fishing trips. We were spread out a few hundred feet apart along the Wynooche River. All of a sudden, we heard this horrendous combination of screaming, warbling and yodeling from Kurt, who was upstream and out of sight. Gramps told me to run up there and help Kurt, who must have hooked a big fish. When I reached Kurt, he didn't even have his line in the water. When I asked him what was going on, he just looked at me with those piercing eyes and huge grin. He said, "Oh, I'm just trying to thicken my vocal chords so I can scream better!" When I went back to Gramps to tell him, he just grinned and said, "It figures, We'll just let him be!" We can now say, "Thank you, Kurt, for thickening your vocal chords!" Kurt didn't fit the general mold of society in a logging town, and so he was beaten upon by people who didn't understand him. One day I heard that he was in a fight a few blocks away. When I ran to the scene, the fight was over. However, I heard from a friend that Kurt was assaulted by a burly, 250-pound logger type. Evidently, Kurt did not even fight; he just presented the bully with the appropriate hand gesture everytime he was knocked down until the bully gave up. To top it all off, Kurt just had that usual grin on his face! A final footnote to this small remembrance of Kurt: A wonderful picture comes to mind of a rare, sunny day when I peeked out the window into the yard. Kurt Cobain: Collection Of Personal Accounts From Family Relatives :: essays research papers Kurt Cobain: Collection of Personal Accounts From Family Relatives I would like to share some of the memories and perceptions I have concerning this unique, rare and original human being called Kurt Cobain. I knew Kurt during his teen-age years in the period from about 1979 to 1984. I was in my mid-30s and living in and near Montesano. My sister married Kurt's dad, Don, and also lived in Montesano. My grandfather comprehended the intelligence and individuality in Kurt at a time when Kurt was being beaten down mentally and physically. "Gramps" often told me of his respect for Kurt's tenacity and compassion even though he was in emotional pain. Shortly before Gramps died, he had been talking about Kurt. He looked at me and said words to the effect that he could see a nobility about Kurt that he had never seen in anyone in all his 70 years. One time, Gramps invited Kurt along on one of our steelhead fishing trips. We were spread out a few hundred feet apart along the Wynooche River. All of a sudden, we heard this horrendous combination of screaming, warbling and yodeling from Kurt, who was upstream and out of sight. Gramps told me to run up there and help Kurt, who must have hooked a big fish. When I reached Kurt, he didn't even have his line in the water. When I asked him what was going on, he just looked at me with those piercing eyes and huge grin. He said, "Oh, I'm just trying to thicken my vocal chords so I can scream better!" When I went back to Gramps to tell him, he just grinned and said, "It figures, We'll just let him be!" We can now say, "Thank you, Kurt, for thickening your vocal chords!" Kurt didn't fit the general mold of society in a logging town, and so he was beaten upon by people who didn't understand him. One day I heard that he was in a fight a few blocks away. When I ran to the scene, the fight was over. However, I heard from a friend that Kurt was assaulted by a burly, 250-pound logger type. Evidently, Kurt did not even fight; he just presented the bully with the appropriate hand gesture everytime he was knocked down until the bully gave up. To top it all off, Kurt just had that usual grin on his face! A final footnote to this small remembrance of Kurt: A wonderful picture comes to mind of a rare, sunny day when I peeked out the window into the yard.

Saturday, August 17, 2019

Internet working Essay

Today, the Internet and World Wide Web (WWW) are familiar terms to millions of people all over the world. Many people depend on applications enabled by the Internet, such as electronic mail and Web access. In addition, the increase in popularity of business applications places additional emphasis on the internet. The Transmission Control Protocol / Internet Protocol (TCP/IP) protocol suite is the engine for the Internet and networks worldwide. Its simplicity and power has lead to be the single network protocol of choice in the world today so the world has become a global village where the people live their life on the Internet. It has no boundaries or barriers, It is open to all who have access to Internet using computer. The e-commerce and online business has really facilitated the people nowadays. The main design goal of TCP/IP was to build an interconnection of networks, referred to as an internetwork, or internet, that provided universal communication services over heterogeneous physical networks. The clear benefit of such an internetwork is the enabling of communication between hosts on different networks, perhaps separated by a large geographical area. 1. Introduction. The internet has been a useful source of information for the public and made things possible which were impossible in the past . Such as emailing has accelerated the process of Mailing and it hardly takes seconds to reach in any part of the world as the Client are connected to Server and the Server connects the clients to world wide web . it is like cob web which keeps connected to all users at the same time . The Internet’s growth has become explosive and it seems impossible to escape the bombardment of www.com’s seen constantly on television, heard on radio, and seen in magazines. Because the Internet has become such a large part of our lives, a good understanding is needed to use this new tool most effectively. This whitepaper explains the underlying infrastructure and technologies that make the Internet work. It does not go into great depth, but covers enough of each area to give a basic understanding of the concepts involved. For any unanswered questions, a list of resources is provided at the end of the paper. Any comments, suggestions, questions, etc.are encouraged and may be directed to the author at the email address given above. The Internet Frame Work As the Internet is a global network of computers each computer connected to the Internet must have a unique address. Internet addresses are in the form nnn. nnn. nnn. nnn where nun must be a number from 0 – 255. This address is known as an IP address. (IP stands for Internet Protocol; more on this later. ) The picture below illustrates two computers connected to the Internet; your computer with IP address 1. 2. 3. 4 and another computer with IP address 5. 6. 7. 8. The Internet is represented as an abstract object in-between. (As this paper progresses, the Internet portion of Diagram 1 will be explained and redrawn several times as the details of the Internet are exposed. ) Diagram 1. a These IP addresses are actually divided into different classes, where each class has it’s own range and criteria to define the number of hosts and networks. These types of information depends on your network size, criteria and purpose. In the Diagram 1. b, you can find the detail information related with the IP address classes. Diagram 1. b. The decimal representation of Internet addresses If you connect to the Internet through an Internet Service Provider (ISP), you are usually assigned a temporary IP address for the duration of your dial-in session. If you connect to the Internet from a local area network (LAN) your computer might have a permanent IP address or it might obtain a temporary one from a DHCP (Dynamic Host Configuration Protocol) server. In any case, if you are connected to the Internet, your computer has a unique IP address. Hierarchical Versus Flat Address Space Internetwork address space typically takes one of two forms: hierarchical address space or flat address space. A hierarchical address space is organized into numerous subgroups, each successively narrowing an address until it points to a single device (in a manner similar to street addresses). A flat address space is organized into a single group (in a manner similar to U. S. Social Security numbers). Hierarchical addressing offers certain advantages over flat-addressing schemes. Address sorting and recall is simplified through the use of comparison operations. Ireland, for example, in a street address eliminates any other country as a possible location. Fig. 1. 1. Hierarchical and flat address spaces differ in comparison operations. Fig: 1. 2 Source: TCP/IP Illustrated, Volume 1, The Protocols. W. Richard Stevens. Addison-Wesley, Reading, Massachusetts. 1994. The Ping Program If any body who is using Microsoft Windows or a flavor of UNIX and have a connection to the Internet, there is a handy program to see if a computer on the Internet is alive. It is called ping, probably after the sound made by older submarine sonar systems. 1 if you are using Windows, start a command prompt window. If you are using a flavor of UNIX, get to a command prompt. Type ping www. yahoo. com. The ping program will send a ‘ping’ (actually an ICMP (Internet Control Message Protocol) echo request message) to the named computer. The pinged computer will respond with a reply. The ping program will count the time expired until the reply comes back (if it does). Also, if you enter a domain name (i. e. www. yahoo. com) instead of an IP address, ping will resolve the domain name and display the computer’s IP address. More on domain names and address resolution later. Protocol Stacks and Packets So your computer is connected to the Internet and has a unique address. How does it ‘talk’ to other computers connected to the Internet? An example should serve here: Let us say your IP address is 1. 2. 3. 4 and you want to send a message to the computer 5. 6. 7. 8. The message you want to send is â€Å"Hello computer 5. 6. 7. 8! † Obviously, the message must be transmitted over whatever kind of wire connects your computer to the Internet. Let us say you have dialed into your ISP from home and the message must be transmitted over the phone line. Therefore the message must be translated from alphabetic text into electronic signals, transmitted over the Internet, and then translated back into alphabetic text. Now there is the question that how is this accomplished? Through the use of a protocol stack. Every computer needs one to communicate on the Internet and it is usually built into the computer’s operating system (i. e. Windows, UNIX, etc. ). The protocol stack used on the Internet is referred to as the TCP/IP protocol stack because of the two major communication protocols used. The TCP/IP stack looks like this: Protocol Layer: Application Protocols Layer Protocols specific to applications such as WWW, e-mail, FTP, etc. Transmission Control Protocol Layer TCP directs packets to a specific application on a computer using a port number. Internet Protocol Layer. IP directs packets to a specific computer using an IP address. Hardware Layer Converts binary packet data to network signals and back. (E. g. Ethernet network card, modem for phone lines, etc. ) If we were to follow the path that the message â€Å"Hello computer 5. 6. 7. 8! † took from our computer to the computer with IP address 5. 6. 7. 8, it would happen something like this: Diagram 2 The message would start at the top of the protocol stack on your computer and work its way downward. If the message to be sent is long, each stack layer that the message passes through may break the message up into smaller chunks of data. This is because data sent over the Internet (and most computer networks) are sent in manageable chunks. On the Internet, these chunks of data are known as packets. The packets would go through the Application Layer and continue to the TCP layer. Each packet is assigned a port number. Ports will be explained later, but suffice to say that many programs may be using the TCP/IP stack and sending messages. We need to know which program on the destination computer needs to receive the message because it will be listening on a specific port. After going through the TCP layer, the packets proceed to the IP layer. This is where each packet receives its destination address, 5. 6. 7. 8. Now that our message packets have a port number and an IP address, they are ready to be sent over the Internet. The hardware layer takes care of turning our packets containing the alphabetic text of our message into electronic signals and transmitting them over the phone line. On the other end of the phone line your ISP has a direct connection to the Internet. The ISPs router examines the destination address in each packet and determines where to send it. Often, the packet’s next stop is another router. More on routers and Internet infrastructure later. Eventually, the packets reach computer 5. 6. 7. 8. Here, the packets start at the bottom of the destination computer’s TCP/IP stack and work upwards. As the packets go upwards through the stack, all routing data that the sending computer’s stack added (such as IP address and port number) is stripped from the packets. When the data reaches the top of the stack, the packets have been re-assembled into their original form, â€Å"Hello computer 5. 6. 7. 8! † Networking Infrastructure: So now you know how packets travel from one computer to another over the Internet. But what is in-between? What actually makes up the Internet? Let us look at another diagram: Diagram 3. 1 Here we see Diagram 1 redrawn with more detail. The physical connection through the phone network to the Internet Service Provider might have been easy to guess, but beyond that might bear some explanation. The ISP maintains a pool of modems for their dial-in customers. This is managed by some form of computer (usually a dedicated one) which controls data flow from the modem pool to a backbone or dedicated line router. This setup may be referred to as a port server, as it ‘serves’ access to the network. Billing and usage information is usually collected here as well. After your packets traverse the phone network and your ISP’s local equipment, they are routed onto the ISP’s backbone or a backbone the ISP buys bandwidth from. From here the packets will usually journey through several routers and over several backbones, dedicated lines, and other networks until they find their destination, the computer with address 5. 6. 7. 8. But wouldn’t it would be nice if we knew the exact route our packets were taking over the Internet? As it turns out, there is a way†¦ The Trace route Program: If you’re using Microsoft Windows or a flavor of UNIX and have a connection to the Internet, here is another handy Internet program. This one is called trace route and it shows the path your packets are taking to a given Internet destination. Like ping, you must use trace route from a command prompt. In Windows, use tracer www. yahoo. com. From a UNIX prompt, type trace route www. yahoo. com. Like ping, you may also enter IP addresses instead of domain names. Trace route will print out a list of all the routers, computers, and any other Internet entities that your packets must travel through to get to their destination. If you use trace route, you’ll notice that your packets must travel through many things to get to their destination. Most have long names such as sjc2-core1-h2-0-0. atlas. digex. net and fddi0-0. br4. SJC. globalcenter. net. These are Internet routers that decide where to send your packets. Several routers are shown in Diagram 3. 1, but only a few. Diagram 3. 1 is meant to show a simple network structure. The Internet is much more complex.

Contact (Call) Center Managers?

1. What lessons are there from these two examples for contact (call) center managers? Services are different from manufacturing, with the key service difference being the interaction of the customer in the delivery process. Service design is no longer considered to be an art form as logical approaches to better design and management of service systems are emerging. In a facilities-based service, the customer must go to the service facility. In contrast, in a field-based service, the production and consumption of the service takes place in the customer's environment. Internal services refer to services required to support the activities of the larger organization. There is a blurring of manufacturing and service firms since the manufacturer product always has a certain percentage of service content. Services are also seen as the next source of competitive advantage for firms. In services we also consider the amount of customer contact or the physical presence of the customer in the system. Service systems range from those with a high degree of customer contact to those with a low degree of customer contact. Service encounters can be configured in a number of different ways. The service-system design matrix includes six common alternatives. Flowcharting, like in manufacturing process design, is the standard tool for service process design. The flowchart, or service blueprint, emphasizes the importance of design. Poka-yoke systems applied to services prevent mistakes from becoming service defects. Approaches to services include the production line approach, the self-service approach, and the personal attention approach. Service guarantees are not only a marketing tool for services but, from an operations perspective, these guarantees can be used as an improvement incentive and can focus the firm's delivery system on things it must do well to satisfy the customer

Friday, August 16, 2019

TV Dating Show

TV Dating Show – † If you are the one† Oh, My God! There are 24 beautiful and charming young female contestants standing on a stage, each atop a podium with a light panel in front. Stand on the other side of the stage is a young male contestant who looks a little bit nervous because he is trying to impress the 24 ladies to go on a date with him. Wait, what is going on? Uh†¦ , let me tell you that is a real scene from the most popular TV dating show in China, â€Å"If You are the one. This dating show was created for the career oriented men and women between the ages of 20 to 40 a platform to meet their soul ate. It was produced by Jungian Satellite Television. Unlike the traditional way of making friends, this show reflects the men and women's idea of finding love and marriage in today's world. In the show, the 24 female contestants have 4 chances to understand the male constant through his story, career, love life and comments from friends to decide if the m ale contestant is the one whom they have been waiting for by keeping the light panel on after all 4 segments.Because of its novelty, this show attracted many young people and many parents would encourage their children to audition for the show. And Just in a short time, â€Å"Are you the one† has become a popular topic at dinner table. Everyone In China knows this show, even a 5-year old child. To some extent, in â€Å"If You are the one,† the honest and daring conversations on love and personal values between male and female contestants have aroused wide public concern. Sometimes, you may get scared hearing about some surprising Ideas.For Instance, In 2011, a female contestant named Ma Nun, expressed her love view on the show by saying â€Å"I'd rather cry In a BMW than smile on a bicycle. † Immediately after she saying that, she had become an Internet sensation and all most every audience got shocked. Many people criticized her for being selfish, they called h er â€Å"Ammonite,† which means a person only loves money. However, at the same time, People who supported Ma Nun, applauded for her honesty, because not everyone can tell what they actually thing In such a big show.At that time, every Chinese hold different opinions attitudes toward this Issue. After one year, this event ended as a dating shows sensationalists. In fact, I think â€Å"If You are the one† Is not more than a dating show, It Is Like a multi-delusional mirror that reflects today's social values ND also created a buzz about people's morality. Through this dating show, we can see ourselves as one of the contestants on the show. As Earnest Hemingway said â€Å"l know only that what Is moral Is what you feel good after and what Is Immoral Is what you feel bad after. TV Dating Show By Cindy going on? Uh†¦ , let me tell you that is a real scene from the most popular TV dating popular topic at dinner table. Everyone in China knows this show, even a 5-year o ld public concern. Sometimes, you may get scared hearing about some surprising ideas. For instance, In 2011, a female contestant named Ma Nun, expressed her love view on he show by saying â€Å"I'd rather cry in a BMW than smile on a bicycle. Immediately after she saying that, she had become an internet sensation and all most every can tell what they actually thing in such a big show. At that time, every Chinese hold different opinions attitudes toward this issue. After one year, this event ended as a dating shows sensationalistic.

Thursday, August 15, 2019

Social Costs and Externalities of Indonesian Palm Oil

Indonesia is the leading producer and exporter of palm oil across the globe. Oil palm is of high economic status throughout Indonesia, Africa, and most of the East because of its abundance in the region, richness of nutritional and mineral components, and high yields of edible and technical oils. The extensive development of oil palm industries in many tropical countries is due to its extremely high potential productivity. The steady demand of the oil has existed for integration into processed oods, personal care products, and home-cooked meals.Correspondingly, with increased interest in substitution of fossil fuels, palm oil is being demanded for biofuel energy production. The issues with palm oil extraction are many; One including that the high demand from developed nations has lead to the push of cultivation into the rainforests, destroying habitat. Additionally, the production and extracting gives opportunities for small land-holders to participate in the cash economy, but often time big banks and companies acquire their land without notification or compensation. Migrant workers and imported laborers are said to legally conflict with extraction processes.Regardless, a large majority of the rural- poor, working class of Indonesia relies on income from palm oil production. With that, the entire population could be lifted out of poverty. The central obligation Indonesia holds is to lift their unemployed and impoverished majority from those circumstances and boost sustainable economic growth. Since the economy of the country is heavily dependent primarily of the agriculture, forestry and mining sectors, the opening up of forests and further extraction of their natural esources are the most reliable sources toward reaching their financial goals.In relation, externalities and social costs must be taken into account because local production, global markets, and climate change are ever connected in the race to seize reproductive function of renewable resources. Wit h that in mind, Indonesia is the third largest emitter of greenhouse gases in the world as a result of their deforestation, peat land degradation, and forest fires for their expanding industry of palm oil extraction (Business Watch Indonesia, 2007).Meanwhile, Indonesia is a low-lying coastal area and is vulnerable to the climate ffects that they, in fact, are contributing their greenhouse gases to. Additionally, with Indonesia's longitudinal positioning on the equator, it is most susceptible to the sink dynamics resulting from climate change. However, because there is an influx of demand for palm oil for food and industrial consumption, Indonesia has Jumped onto the opportunity to expand their already leading production to meet demand and bring rise to each worker's GDP.Indonesia holds close to 50 percent of share-hold global production on palm oil and to keep up with their plans on extending the ountries production from 22 million tons to 40 million tons by 2020, they are using thi s opportunity to establish programs for promotion of biofuels (Buschmann, The Case of Indonesian Palm Oil, 2011). While rich countries put forth effort to specialize in environmentally friendly production and are implementing boundaries of sustainability in their own economies, they are attracted to productions that are environmentally harmful in developing regions.This shifts the environmental costs from importer to exporter and ultimately leads to unequal ecological exchange from ttempting to make the shift to renewable energy and meet the standards of the Kyoto and Montreal Protocols within their own boundaries. Wealthy nations are continuously working to cut emissions with increased awareness of global climate change. However, the Kyoto Protocol fails to commit those high producing developing nations to those same standards, (BWI, 2010). This is an issue in that rich nations emission reduction is based on their economic development and status.What such nations are not willing to assist in is the sustainable development and growth of the eveloping nations they are importing from through fair trade, technology transfer, and overall financial and technical assistance. Without respect to the natural capital or the environment, Indonesia is doing quite well in terms of progressing as an economically sustainable country. Palm oil and its global importance in the newer- found relation to biodiesel is a valuable asset in providing a brighter quality of life in regards to revenue for more than three million Indonesian workers and their families (Waltermann & Streubel, BWI, 2010).Commonsensically, more people working in a rowing biofuel-centered sector would lead to increasing incomes and overall economic achievement. In the case of Indonesian palm oil, there is a central assumption that represents complex, crisscrossing issues that encompass the different levels of action from a varying range of contributors with multiple interests. This means that although the loc al production is paying the native workers, local production, international trade, and global climate change are all interconnected.The directives put in place by developed economies look to reach a final level of renewable energy consumption. Palm oil is seen for its energetic, technically renewable â€Å"biofuel† use and can have a positive effect on economic growth for both palm oil producers as well as energy producers, at the expense of exploited natural resources and forest habitats. There are undoubtedly counterproductive consequences accompanying the demand for sustainable crude palm oil and the general switch from fossil fuels to â€Å"renewable† fuels.By converting national accounts to â€Å"green economies† (budgets with money for renewable energy allotted into them), there is an alleviation on the debate of translating environmental concerns into conomic variables, but only when applied to sustainable concepts. This is faulty because it rides on the idea that all forms of capital can substitute each other regardless of how the stock of the capital is composed. This means that well-off the while overextending a resources productive capacity (OECD, 2005) The concept of environmental Justice or â€Å"strong sustainability' has limitations on the previously noted substitution of capital.Because there are boundaries on forests' reproductive capacity, the continuity of economic systems are at risk. Most â€Å"westernized† overnments have reached the manufactured and natural capital equilibrium, where they have the ability to access both forms of the goods, and any rise in one will have an expense on the other. Forest products, and in this case palm oil from the Indonesian forests, are shown to have short-term economic gains by conversion of forest to agricultural use in the over-exploitation of the products. This typically leads to long-term loss in income and biological productivity.Also in the case of Indonesian palm oil an d forest loss, the production is exceeding the value of ready-for- production, mature sources. The graph below demonstrates the progression of palm oil production and how Indonesia was able to reliably supply roughly 57 percent of the annual increase with its vast land resources and a suitable climate. However, it is clear that production has extended beyond the mature supplies and gone into areas beyond suitability to reach demand from international markets and an increased interest by native small farm-holders to erect their own private plantations (USDA, Foreign Agricultural Service, 2009).Social and external costs are largely associated with export and import rates, overnment investment and tax systems in the international market. One abrogating externality is the non-tariff trade barriers applied by developed importers. To assure some security when and if free trade is effective and ecological standards go down, these barriers work to restrict the exporters in the market when s upply cannot meet demand. On the other hand, for small farm-holders to establish their plantations, they must qualify for subsidizing credit provided by the Government of Indonesia and prioritize with other startup costs.Because of this possibility the palm oil roduction sector has experienced strong development and expansion across the country, with an average of 8-13% annual growth rates in palm areas over the last decade (USDA, 2009). The Indonesian government, over the past decade, has provided these loans to encourage smallholders' expansion, at rates below market interest. Alongside the enabling of non-commercial plantation ownership, the Government has advocated ownership with programs that provide smallholders with improved seed, fertilizers, and techniques for growth.Additionally, land-use permits ave been reevaluated to allot more time for companies to control profits earned by a plantation. These interventions have brought positive change in the market significantly; non- commercial palm oil farms now account for 44 percent of the total area in the country, second to private commercials (Foreign Agricultural Service, 2009). A major effect of these implementations is the establishment of processing plants. Because fresh fruit bunches require processing within 48 hours of harvest, oil refining plants have been constructed near major concentrations of harvest land.Construction and operation of each plant represents a significant fixed cost for the developer, and typically ends up servicing both commercial and smallholder palm producers that surround it† (Foreign Agricultural Service, 2009). The investment in in contributor in the success of Indonesia's palm oil business. At the expense of the environment's health, and with the push from changes in government economic and political policies, historical highs have been reached leading Indonesia to the number one spot in exporting and producing of palm oil.Nonetheless, without regard to its ommunal u se and benefits to the servicer, service emissions are still added to the atmosphere, more resources and forests are eliminated, reducing the amount of the fruit available for use by the farmers and ruining the habitat of accompanying wildlife. Further success rates in the palm oil sector I believe, at this point, rely on the clarification of one all-encompassing issue. That is, whether or not ecological economies can lead to different assessments of how economic growth, open trade, and the environment can be positively or negatively associated.Investors and roducers have optimistic expectations of improving their economies despite being built on the depletion of a natural capital and possibly misleading those civilians toward a downward trend.