Saturday, August 31, 2019

Curleys Wife Character †of Men and Mice Essay

Of Men and Mice is not kind in its portrayal of women. In fact, women are treated with contempt throughout the course of the book. Steinbeck generally depicts women as troublemakers who bring ruin to men and drive them mad. Curley’s wife, who walks the ranch as a temptress seems to be a prime example of the destructive tendency. Despite the author’s rendering, Curley’s wife emerges as a relatively complex and interesting character. Although her purpose is rather simple in the book’s opening pages, she is the â€Å"tramp†, â€Å"tart† and â€Å"bitch† that threatens to destroy male happiness and longevity. The social setting of the novel is also important, as it could later explain characters attitudes towards other people. It is set in the U.S. in the 1930s; this is the time of the Great Depression. This was a result of the First World War. It affected the rich and poor alike, factory workers and farmers, bankers and stockbrokers. In s hort, it affected everyone; no one was left untouched. But of all the people hurt, farmers were the worst off. Curley’s wife is first introduced in person to us in a symbolic way; this is shown when George is talking to Lennie about the dream and when Curley’s wife first meets both men. â€Å"Both men glanced up, for a rectangle of sunshine in the doorway was cut off.† The symbolic meaning of the word sunshine is hope, freedom, happiness and dreams. This foreshadows that she may cause trouble or come in the way and could ruin it all for Lennie and George. She is also described as a â€Å"girl†, which tells us that she is very playful, childish and vulnerable. Her appearance later in the novel becomes more complex. But even before this we are forewarned about her, Candy tells George and Lennie about her, making her out at the wrong type to begin with, â€Å"Married to weeks and got the eye? Maybe that is why Curley’s pants is full of ants,† giving us the impression she was a person not to socialis e with. Also tells us that the men on the ranch know that Curley knows that is wife looks at the rest of them, hoping for one of them to try and get close to her, so he can then create a situation for a fight. As Candy relaxes he also goes on to get them to have the same opinion as him about her by saying, ‘well, you look her over, mister. You see if she ain’t a tart†, and the reply from George, ‘Purty?’ making sure that we see her as ‘jail bait†. Then when we first get to see her she is dressed as if she is going out to a party, and Steinbeck also enforces the concept that she is trouble and a tart, by describing her appearance, â€Å"she had full rouged lips†, â€Å"red mules, on the insteps of which were little bouquets of red ostrich feathers†, using the colour red as a foreshadow that she is dangerous. This is the first time also that we see that she is attractive and that she knows it, also that she wants the men to look at her, â€Å"she put her hands behind her back and leaned against the door frame so that her body was thrown forward†, forcing the men to look at her curves. This first sign of nativity shows that she doesn’t understand her affect on men, showing her age as a teenager and her understanding of her sexual attractiveness. We also get an insight to her life with her husband and why she is always coming around the rest of the men. When Candy tells George and Lennie about Curley having his glove full of â€Å"Vaseline† and that he was keeping â€Å"that hand soft for his wife†, tells us that she was also being beaten up, and that nobody could see the bruises because Curley had softened his hand, or he hit her in places where we couldn’t see the bruises. This is the first time we see her as a victim needing help. We also see that see can be cruel, and willing to misuse power. When she confronts Lennie, Candy, and Crooks in the stable, she admits to feeling a kind of shameless dissatisfaction with her life. Her vulnerability at this moment and later when she admits to Lennie her dream of becoming a movie star makes her utterly human and much more interesting than the stereotypical vixen in fancy clothes. She seeks out even greater weakness in others, preying upon Lennie’s mental handicap â€Å"they left all the weak ones here†, Candy’s debilitating age, â€Å"tell an’ be damned. Nobody’d would listen to you, and you know it† and the colour of Crook’s skin â€Å"you know what I can do to you if you open your trap?† in order to steel herself against harm. Dreams are a major reoccurring theme, when Lennie tells Curley’s wife of his and George’s dream she just says â€Å"baloney†, but she has a dream of her own and she proceeds to talk Lennie about it. She has dreamt of being a movie star, which nearly came true when she encountered an actor. ‘He says I could go with that show†, but like most young girl s was forbade from her mother, ‘my ol’ lady wouldn’ let me†. So having her dream pulled out from underneath her she rebelled, and married Curley. However she always wanted to achieve something of herself and loved attention. â€Å"Curley’s wife lay with a half-covering of yellow hay. And the meanness and the planning and the discontent and the ache for attention were all gone from her face. She was very pretty and simple, and her face was sweet and young. Now her rouged cheeks and her reddened lips made her seem alive and sleeping very lightly. The curls, tiny little sausages, were spread on the hay behind her head, and her lips were parted†, this is the first time we are shown her true self – she was a young, innocent, lonely young girl. When you take away all the walls she had erected you come back to a young girl wanting to be loved, who saw Lennie as a way out from Curley’s abusive relationship. As Lennie could hurt Curley, but not realising the danger she was ultimately putting herself into. So in conclusion Curley’s wife is the most depressed and lonely characters in the novel. She has no friends, no future, no respect; she doesn’t even deserve a name. All she wants is someone to talk to but in her mind the only way she can do this is by flaunting herself to the men to get noticed. This leads her to be perceived as a â€Å"tart† by the men. She represents absolute loneliness and desperation to achieve something better in life. Even though she is very lonely, she comes across as a very beautiful woman. She flaunts herself by dressing and acting in a â€Å"tart† like manner, but really she is just making use of her body to gain the attention of the workers to soothe her. If anyone would give her a break, treat her like a person, she would idolise them. Her craving for contact is immense but she, with her background is incapable of conceiving any contact without some sexual context, she is not particularly oversexed, but has been forced to recognise that her sexuality is the only weapon she has, and the only thing that gets her noticed. Consequently she is a little starved. She knows nothing about sex, except the mass information girls tell each other. All through the novel the men make out that Curley’s wife is trouble. But yet there was never any proof that Curley’s wife has ever caused any of the trouble or conflicts. The only trouble she caused was when she died.

Friday, August 30, 2019

Buddhism Worksheet Essay

1. Explain the basic Buddhist teachings including the three marks of reality, the Four Noble Truths, and the Noble Eightfold Path. Answer: The basic teachings of Buddhism are based around what are called the three jewels. The first is Buddha or an ideal human who others should imitate. The second is Dharma which is the Buddhist lessons on how to see things in a worldly manny. Finally, is Sangha which refers to the community of monks and nuns. The Buddha focused on two major things in his teachings how to reduce suffering in ourselves and others and how to attain inner peace. In the Buddhist teachings are cover the three realities which are change, identity, and suffering (Molloy, 2013). . The first which is constant change refers to the fact that the world is constantly changing around us. The second wenches lack of permanent identity refers to the fact that we are constantly changing as we age and go through the world learn new things and experiencing things. And finally of the presence of distress, Buddha states, we will always experience some sort of sorrow or dissatisfaction in our lives part of obtaining pe rsonal peace or inner peace is accepting that. Buddhist teachings also include worker hold four Noble truths. The first of the truths it is called â€Å"to live is to suffer†. The idea that suffering exists from day one being born causes pain and suffering, getting disease causes pain and suffering, the decay of time causes pain and suffering, and ultimately death causes pain and suffering. The point is that there are so many things going on in life that cause suffering and many of them cannot be avoided. The second truths is â€Å"suffering comes from desire†. There are many forms of suffering that comes from wanting something or thinking that something is necessary, suffering can also come from stress, hunger or other outside sources. Lastly, is â€Å"to end suffering, end desire†. The basic idea with this one is that we must shed all of your unnecessary wants and desires. It’s carried out to an  extreme with the monks who give up material possessions personal property personal wealth they go so far as to shave their heads slither completely bald and give up all connection to their lives before becoming monks. In the last of the Noble truths is â€Å"release from suffering is possible and can be obtained by following the eightfold path†. The idea here, I believe is pretty self-explanatory if you follow this path or recommendations on how to live as laid out by Buddha you will attain inner peace and move beyond the suffering of this world. 2. Describe the three major Buddhist traditions—Theravada, Mahayana, and Vajrayana—and how each tradition developed from the early teachings. Answer: The first of the Buddhist traditions is Theravada whose name means the way of the elders. This group takes a very stark approach to Buddhist teachings they’re very conservative group their goal is to commute continue the tradition of passing Buddhist teachings from one generation to the next without changing them. Communities of monks who stress the ideal to reach enlightenment through meditation. Though the monks say that ordinary or sometimes referred to as laypeople can obtain nirvana the life of a monk is a sure path to obtaining it. The second of the three major schools is Mahayana; this name means the big vehicle. They stress that nirvana is obtainable by everyone and also that enlightenment is a call to compassion. Their order maintains that in order to save yourself you must save others. This group is thought to of been mostly Indian in origin and therefore included many of the practices of Indian culture because the attitudes of the early Buddhists did not always fulfill the religious needs of many people. This school of Buddhism is considered the source of some of the most extraordinary creations of the human mind in areas such as art, philosophy, architecture, psychology, and ceremony. The schools also very widespread in eastern Asia it spread in too many areas including China. The third school Buddhism is vajrayana, the name means time and vehicle. When my and Buddhism entered Tibet and blended with their shamanism the result was Tibetan Buddhism. Although vajrayana includes other forms of esoteric Buddhism Tibetan Buddhism is the most well-known. The first form of Buddhism entered Tibet was actually called Tantric Buddhism. This form of Buddhism opposed  the original detachment from the world and its negative attitude towards bodily pleasure they thought that the body and all of its energies can be used to reach enlightenment. References Molloy, M. (2013). Experiencing the world’s religions: Tradition, challenge, and change (6th ed.). New York, NY: McGraw-Hill.

Thursday, August 29, 2019

Chapter Study Questions 1 & 2 Essay Example for Free

Chapter Study Questions 1 & 2 Essay 1.What percentage of Texans live in urban areas (cities & suburbs)?   90% of the population now lives in crowed cities and suburbs. 2.Name the three cities in Texas that are three of the largest in US?   Houston, San Antonio and Dallas 3.What are the three diverse economic businesses in Texas? 4 Oil and gas producer now work alongside high-tech companies, telecommunications giants, and other important business sectors. 4.In what areas does Texas consistently rank at the bottom in state spending compared to other states? 4 Texas consistently ranks near the bottom of the states in spending on education, welfare, and healthcare for poor. 5.Is Texas a high-tax, high-business regulatory state or is it low-tax, low-regulatory?   Texas is low-tax and low-regulatory climate. 6.Are Texas well informed about government and elected officials? Do they trust government? 4 Texans are woefully ignorant of their state and local government and the public officials who make important decisions affecting their daily lives. 7.Does Texas have a regressive or progressive tax system and what do these mean?   Texas has a regressive tax system, which means a tax that imposes a disproportionately heavier burden on low-income people than on the more affluent. 8.What is meant by economic diversification and has Texas done this? 6 Economic diversification is the development of new and varied business activities. New business were encouraged to relocated to or expand in Texas after the oil and gas industry, which had been the base of the state’s economy, suffered a major recession in the 1980’s. 9.What is meant by ‘cowboy rugged individualism’ and how has this impacted Texans’ views of government as a solution to problems?   The cowboy rugged individualism, with strong connotations of self-help and independence, symbolizes a political culture in Texas that does not like to look to government as a solution to many of its problems. It is the kind of individualism that continues to be exploited by political candidates in campaign ads. 10. What impact did having a frontier have on Texans? On might argue that the â€Å"wide-open spaces† of the frontier shaped Texan’s  view of their autonomy, independence, and vulnerability. It has clearly shaped attitudes toward land and the legal right to use land as one sees fit. 11. What three combined groups now make up the majority of Texans and how does their historical experiences differ from that of Anglos? What celebration are part of their political culture?   African American, Hispanic, and Asian Americans. The white population have limited relevance to the relevance to the cultural and historical experiences of many African American and Hispanic Texans. For African American is Martin Luther King Jr’s birthday as state holiday in 1991. And for Hispanics is the Cinco de Mayo. 12.Just what does political culture mean and describe the individualistic subculture in terms of government size, assistance, politics, and primary goals? 9 Political culture a widely shared set of views, attitudes, beliefs and customs of a people as to how their government should be organized and run. Individualistic subculture holds that politics and government function as a marketplace. Government does not have to be concerned with creating a good or moral society but exists for strictly. Government should be limited, and its intervention in the private activities of its citizens should be kept to a minimum. The Government primary function is to ensure the stability of a society so that individuals can pursue their own interests. 13. Describe the moralistic subculture in terms of government size, assistance, politics, and primary goals? 9-10 Moralistic subculture is a view that government’s primary reasonability is to promote the public welfare and should actively use its authority and power to improve the social and economic well-being of its citizens. The Moralistic subculture regards politics as one of the great activities of a man in his search for the good society. 14.Describe the traditionalistic subculture in terms of government size, assistance, politics, and primary goals? 10 a view that political power should e concentrated in the hands of a few elite citizens who belong to established families or influential social groups. Public policy basically serves the interests of this small group. The traditionalistic subculture  holds the view that there is a hierarchical arrangement to the political order. This hierarchy serves to limit the power and influence of general public, while allocating authority to few individuals who comprise self-perpetuating elites. 15. In what states or colonies did you originally find these three subcultures and what two best describe Texas? 16. How big is the Native American population in Texas and of the three remaining groups, do they have the right to have casinos? 11 Alabama-Coushatta, Tigua and Kickappo are the three small Native American groups that live on reservations in Texas. And the Native American population is less than one-half of 1 percent of the States total population. They have been denied the right to run casinos on their reservation. Even thought, their leader consider casinos a major potential source of revenue, jobs and economic development for their people, but recent efforts to change state law have been unsuccessful. 17. Were there ever a great many Hispanics in Texas prior to 1830 and what was it down to by 1887? How much had this increased by 1930, 1990, and 2012? 12 Prior 1830 the Hispanic population were a small minority of the population. By 1887 the Hispanic population had declined to approximately 4 percent of state’s population. In 1930 it was 12 percent and was concentrated in the border counties from Brownsville to el Paso. By 1990s, it had reached 25 percent, spurred by immigration from Mexico and other Latin American countries. By 2012 the Hispanics comprised 37.6 percent of the state’s population. 18.What two ethnic or racial groups are growing the fastest in Texas and by 2030-what group will be the largest? How have Hispanics done in terms of elected officials compared to other states?12 The two ethnic will be Asian and Hispanics. However the Hispanics are likely to exceed 50 percent of the state’s total. 19. Compare the %s of Anglos, African Americans, Hispanics, and Asians found in Texas in 1860 and those found in 2010? Chart 13 In 1860 it was a percent of 63.2% of Anglo. The 30.3 % are African American and 6.5% were Hispanic. However in 2010, 45.3% were Anglo, 11.5% were African American, 37.6% were Hispanic and 5.6% were other. 20.Where do African Americans tend to live in Texas?   African American settled in large numbers in the urban areas of Dallas, Fort Worth, Houston and Austin. 21. In 2010, how many Texans were there and what was the growth rate of the state compared to the national growth rate and where did people move from and to in the US? 16 According to the 2010 census, the state’s population was 25,145,561, an increase of approximately 4.3 million people in ten years. This growth rate of 20.6 percent was significantly higher than the national growth rate of growth rate of 9.7 percent. Chapter Study Questions 1 & 2. (2016, Mar 16).

Wednesday, August 28, 2019

Summary Essay Example | Topics and Well Written Essays - 500 words - 147

Summary - Essay Example He stressed on necessity to separate Islam of the Prophet Mohammad which never teaches terror from Islam Kharijites. Mustafa Ceric said war against terrorism imply a war against Islam, because terrorists proclaimed they were acting on behalf of Muslims. Tim Sebastian asked Mustafa Ceric if there too much hatred preached within Muslim tradition. Mustafa Ceric answered that hatred should be stopped both from Muslims and non-Muslims sides. Ramzi E. Khoury said the war was about oil, therefore it’s â€Å"a godless war†. He doubted that current Western authorities are religious persons. Second part basically specified panelists’ opinions while answering audience’s questions. Anas Altikriti pointed, that 9/11 changed situation and it’s no more only geopolitical, like The Gulf War was. Feisal Abdul Rauf spoke about fear West has of Islam. Anas Altikriti retorted, it confirmed that war was religious. Feisal Abdul Rauf disagreed, because Western people were just afraid of losing control on own lands. Both panelists highlighted the role of media in negative image of Islam. Second question brought a thesis, though Muslims themselves shouldn’t allow terrorists speak on behalf of all Muslims, US government and media oppose the positive image of Islam. Mustafa Ceric specified, US had enough power to change this image, therefore Muslims should stay open for dialog. Feisal Abdul Rauf specified, Muslims should â€Å"de-link† Islam and help Western people to understand Muslims. Audience asked, if a background of war change an oppression of Mus lims on West. Feisal Abdul Rauf stressed on necessity to separate reality form perception, because war can be shaped in different ways. Mustafa Ceric pointed later, that 9/11 revealed anti-Muslims views, therefore it was act against Muslims

Tuesday, August 27, 2019

Social economy Essay Example | Topics and Well Written Essays - 1000 words

Social economy - Essay Example There are several advantages associated with focusing on women as agents of development. There is of greater significance in a woman’s education than the man’s education. The fact that most women are uneducated, as compared men, this has had a hindrance to women having exposure and understand their worth and potential. Actually, most women who are not learned do not understand their rights to have a voice to speak on their won. Women make the highest population of people in the world and using them as agents of change is a great way of improving both economic and social life. Therefore, educating women is one of the ways of developing the world and this is possible if women have access to education and health and the issue has a significant intrinsic value. Treating both genders equally is a way of reducing gender imbalances existing in most communities. With equal education, women have enhanced capacity to contribute to the economic progress. Human capital gained throu gh education improves the levels of productivity of individuals. From many researches, women have been deprived the right to learn and this issue is quite problematic because it showers the social efficiency. The economic benefits of educating boys are equal to those of educating males. However, the social benefits gained from suing women as the agents for development is higher than those of investing to educate males are. Women education has great and powerful effects on the social efficiency. The social outcomes of focusing women as development agents’ are very high as compared to those of applying men. Kudumbasree means prosperity of the family where women orient themselves in community based poverty alleviation programme by use of micro credit and self help groups implemented in Kerala by the State Government. Grameen Bank is a bank that offers services and credit meant to develop the social economic status of Bangladesh communities. The bank

Monday, August 26, 2019

Provide an argument for the claim that (some) mental states are not Essay - 1

Provide an argument for the claim that (some) mental states are not identical to any brain state - Essay Example Furthermore, it will discuss the relevant concepts in philosophy that will either affirm or negate these suppositions. In order to make this possible, the monist and dualist concepts are also discussed. Some mental states (beliefs) are not identical to any brain state The first argument being focused in this paper is the difference between mental and brain states. As mentioned earlier, these two are different concepts. Many people are confused and often use these two interchangeably. The mental state has a deeper context compared to that of the brain state. This is so because it refers to the state of a person’s thoughts regarding pain or happiness, what a person believes in, and also ideas and aspirations. On the other hand, the brain state refers to the literal condition of the nervous system like a brain activity. According to Adam Sennet (chap. 5), some mental states, like beliefs, are not identical or similar to any brain state. This is because beliefs are not part of any physiological activities of the body particularly inside the brain. the famous philosopher Descartes (qtd. in Carruthers 7) postulated that the mind is not spatial but has the ability to think, while the body is spatial but is unable to think; hence, the body is only capable of biological and physiological activities. ... nd Y are very similar, then they should have the very same attributes, which is not true in the concept of the mind (beliefs) and the body (brain state). Hence, if X and Y have different attributes, they can never be considered as identical. The differences in the mental and brain states include the argument of certainty (Wright). The mind can be certain about pain or desires but the brain cannot be certain about anything because it lacks a logical attribute. There is a great disparity between the mental state and the brain state as clearly stated by this Law. There are, however, some arguments by other philosophers like Carruthers that the Leibniz’ Law does not apply to mental states including beliefs, pains, and desires. He argues that if X and Y are not very similar substances, then X and Y must have the same intrinsic attributes or properties (Carruthers 8). He believes that the mental state does not have a property of belief. Thus, he sticks to his argument that the two s ubstances are very similar because they are one (Wright). The Monist Concept This concept does not hold the proposition that there are two kinds of substances. It holds that there is only one kind of substance and that the brain and the mind are just the same. There are, however, two separate views about this one substance. These are: materialism and idealism (Carruthers 6). Materialism is an idea that all that exists are material or physical, while idealism is an idea which states that all that exists are ultimately mental. These are the two ideas in the Monist concept and there are philosophers who believe on either one or another but not both. The materialist does not believe that there is such a thing as the mental state and so they are similar or identical to absolutely nothing, because

Most Effective Promotional Tools to Attract Customers Essay

Most Effective Promotional Tools to Attract Customers - Essay Example The systematic way of communicating marketing function to the target audience in order to influence their behavior towards a product and taking competitive advantage is known as promotion (Koekemoer 2004). The promotional tools are very important in industries where competition is tough and these tools helps the organizations to maintain their market share by increasing the sales volume (Perreault 2000). In leisure industry, it is very important to determine appropriate promotional tool that can help the organization to increase the customer satisfaction and increase its revenue therefore, this paper will evaluate the promotional tools that are most effective for Virgin holidays. Company Profile â€Å"Virgin holidays† is part of virgin group and this leisure company is one of the largest tour operator companies of UK, established since 1985 (Virgin 2012). Apart from USA and Caribbean, it offers holidays to different parts of the world including Middle East, South Africa, Canad a, Australia, Mauritius, and Far East. On average, the company runs 16 marketing campaigns per year in which different promotions are performed in summer, fall, and winter seasons (Virgin 2012). There are also monthly marketing campaigns in which the company, for increasing the overall revenue targets different segments (Virgin 2012). The promotional tools that Virgin Holidays is using to attract customers are Sales promotion, Advertising and Publicity. Research Objective The purpose of this research is to determine the promotional tool that is most effective to attract customers of Virgin Holiday. Research questions Q1. What types of promotional tools are most effective for attracting customers of Virgin Holidays? Q2. What is the importance of determining appropriate promotional tool for leisure industry? Significance of the Proposed Research Work The proposed research work is significantly important for the organizations of UK because this research will enable organizations to und erstand effectiveness of promotional tools in increasing their overall profitability. In this way, organizations will be able to implement appropriate promotional tools in their marketing strategy, which not only help to improve their profits, but increasing consumer loyalty for the product. In addition to the context of UK organizations, there is lack of research work for the effective of promotional tools in leisure industry. Therefore, this research will serve as important studies towards understanding the effectiveness of promotional tools. Scope of the Proposed Study The scope of this research will be limited to exploring the promotional tools used by Virgin Holidays for marketing, and their effectiveness for the company. No other factors will be explored or tested apart from these in the studies and it is important to mention here that the analysis and discussion in light of the proposed research aim will be limited to the skills and ability of the researcher. Structure of the Report This research report is divided into five chapters, which are as follows: Chapter – 01: Introduction The starting chapter of this report will discuss the background related to the topic and problems that are responsible for conducting this research. Apart from this, the chapter presents the aim, objectives and questions that will be addressed in this

Sunday, August 25, 2019

Research paper Example | Topics and Well Written Essays - 2250 words - 11

Research Paper Example s time wasters, with some educational experts regarding computer games to corrupt the brains of the teenagers playing it, however some tend to understand that computer games have positive educational impacts and help in developing creative minds. People need to understand that computer games help people, both kids, adolescents and even the adults grow in different ways, the benefits of the computer range from health, to social. The benefits of playing video games fall into different categories, from benefits to children, adolescents and even to adults. Playing computer games has evolutionary benefits positively affecting the players regardless of their age. The main positive impact falling in all the categories is improvement in coordination and brain exercises, playing computer games requires Maximum Corporation; this improves the brain activities, as one has to intellectually think of the next move acting as a brain exercise. Some of the benefits include; Improvement in planning, l ogistics, and resource management- many computer games tend to have limited resources that the gamer has to learn to manage, these gamers transfer these skills to real life, they learn how to manage the resources they have effectively. In addition, some games such as the railway tycoons encourage players to undertake certain careers such as architecture and urban planning. Playing computer games improve spatial, the fine motor skills, and the hand-eye coordination-those games involving shooting, the player may be shooting and running at the same time. This is not an easy skill to memories; the skill requires coordination as the player need to know where he is heading and where to aim and shoot. Through this the players needs to coordinate his movements, reactions, and interpretations in the brain, recorded by the movements of the fingertips and the hands. Research shows that some of the fighter pilots gain skills from playing video games, especially the skills for quick reaction.

Saturday, August 24, 2019

Does diversity of opinion in the press matter any more, now we have Essay

Does diversity of opinion in the press matter any more, now we have access to participatory and social media - Essay Example As more users are turning towards opting new technologies and social media websites, and are showing reluctant behaviour towards reading newspapers. One possible reason for less circulation of newspaper today can be because of the ease that technology has provided. As with the innovations in the technology and the ease it provided for the masses in terms of using electronic gadgets, mobile phones and connecting online, the productivity of newspapers and print media have undergone decreases. More people are relying on internet and social media websites for the purpose of news, with it they are always connected to the internet and can read timely news, as this new medium (internet) is believe to be the fastest source of providing information or serving the purpose of communication. Furthermore, this medium also enhances the concept of diversification of opinion, as users around the world feel connected with each other and can share their views with the masses in no time. Moreover they can read or listen to the views posted by others, which at times gives them new perception to think about the same issue (Van Djick, 2009). Current Situation: Likewise in a recent past majority of newspapers from the United Kingdom and America were forced to follow the downsizing policy (2008). As a result significant numbers of employees who were working for the different newspapers were terminated, many prophesized the reasons behind these terminations were financial crisis, whereas others convicted internet and social media websites for these firings in the print media industry (Compton and Benedetti, 2010). However, there are many who have different perception in this regard, these individuals optimistically analyze these situations and believe that albeit social media websites and blogs have resulted in confining the role of newspapers and magazines but it has also resulted in providing more information and a variety of difference of opinions for the viewers (Compton and Benede tti, 2010). Meanwhile, it took a while in order to confine the long run and monopoly of newspapers and print media, as the relatively new medium (internet) is garnering more importance on the daily basis and conditions are ameliorating (Compton and Benedetti, 2010). At present print media is facing deteriorating conditions, majority of newspapers around the world are devising strategies in order to cope up with the financial turmoil and are also keen on enhancing or increasing their newspaper circulations. For instance, newspaper industry in the United Kingdom and North America reflect the situation of turmoil as many newspapers are facing bankruptcy, or are in a position where it is hard to manage their current expenses because of high cost involved in the system, there are some who ended their journey in this regard and some are knocking the doors or are in the verge of facing a serious collapse. Some prominent names of the newspaper industry of America, which were enlightening an d were sharing difference of opinions over the passage of time, are the best examples of this catastrophe. American newspaper Denver's Rocky Mountain News are history, on the other hand, The Philadelphia Inquirer, Chicago Tribune and The Los Angeles Times are amongst those newspapers which are facing serious financial catastrophe or in other words are

Friday, August 23, 2019

Employee Contribution and Wellbeing Dissertation

Employee Contribution and Wellbeing - Dissertation Example Many descriptions of â€Å"motivation† abound. One acceptable definition of motivation was postulated by Dr. Stephen Robbins. According to the Doctor, motivation is the process behind an individual’s direction, persistence, intensity, and effort towards the attainment of an objective or goal (Buford, Bedeian, & Lindner, 1995). Generally, though, motivation may be described as any factor that causes an increase in a person’s normal input with the hope and knowledge that a reward will follow (the input). One of the most important aspects of any organization is productivity. Motivation plays a big role in how people perform at their workplaces. Kreitner, 1995 defines motivation as the psychological process that gives behavior purpose and direction. Motivation may also be defined as the predisposition to behave in a purposive manner to achieve specific, unmet needs ((Buford, Bedeian, & Lindner, 1995) Motivation Theories According to Changing Minds.org (2009) motivated employees are vital for the success of rapidly changing organizations. Motivated employees help organizations survive. Motivated employees are more productive†. This means that to be effective, employers need to know what exactly motivates employees in their jobs. Content Theories of Motivation In an attempt to explain the various factors that motivate people, a number of researchers have postulated motivational theories. Content theories of motivation as some of these are commonly referred to include those associated with ERG, McGregor, McClelland, and Herzberg. Content theories explain fundamentally the reason humans keep changing in terms of their needs over time. Content theories, therefore, focus on the specific factors that lead to people’s motivation. The main idea or logic behind these theories is the fact that individuals need should be considered for them to be satisfied. This in effect means that if the individual’s specific needs are not satisfied or met, he/she will probably not be motivated enough to achieve objectives and goals. The following section describes the four main content theories.

Thursday, August 22, 2019

Types of Alcoholic Beverages Essay Example for Free

Types of Alcoholic Beverages Essay Beer is the worlds oldest and most widely consumed alcoholic beverage and the third most popular drink overall after water and tea. It is produced by the brewing and fermentation of starches which are mainly derived from cereal grains — most commonly malted barley although wheat, maize (corn), and rice are also used. Alcoholic beverages which are distilled after fermentation, fermented from non-cereal sources such as grapes or honey, or fermented from un-malted cereal grain, are not classified as beer. The two main types of beer are lager and ale. Ale is further classified into varieties such as pale ale, stout, and brown ale. Most beer is flavoured with hops, which add bitterness and act as a natural preservative. Other flavourings, such as fruits or herbs, may also be used. The alcoholic strength of beer is usually 4% to 6% alcohol by volume (ABV), but it may be less than 1% or more than 20%. Beer is part of the drinking culture of various nations and has acquired social traditions such as beer festivals, pub culture, pub games, and pub crawling. The basics of brewing beer are shared across national and cultural boundaries. The beer-brewing industry is global in scope, consisting of several dominant multinational companies and thousands of smaller producers, which range from regional breweries to microbreweries . Wine Wine is produced from grapes, and fruit wine is produced from fruits such as plums, cherries, or apples. Wine involves a longer (complete) fermentation process and a long aging process (months or years) that results in an alcohol content of 9%–16% ABV. Sparkling wine can be made by adding a small amount of sugar before bottling, which causes a secondary fermentation to occur in the bottle. Spirits Unsweetened, distilled, alcoholic beverages that have an alcohol content of at least 20% ABV are called spirits. Spirits are produced by the distillation of a fermented base product. Distilling concentrates the alcohol and eliminates some of the congeners. Spirits can be added to wines to create fortified wines, such as port and sherry.

Wednesday, August 21, 2019

Operational Logistics of Ikea Essay Example for Free

Operational Logistics of Ikea Essay 1. Introduction IKEA is a Swedish company which was founded in 1943 with its headquarter in Denmark. IKEA succeeded on its low cost strategy which is able to offer a wide range of stylish home furniture with good design and functional at competitive pricing. It carries a range of nearly 10,000 products and is well known across the world. IKEA is also recognized as a socially responsible and environmental friendly company. Currently, there are 287 IKEA stores in 26 countries. In year 2011, IKEA has gained the total sales of 25. 2 billion (in EUR). IKEA was also the first company in the world to realize the benefits of flat pack furniture in 1956. With this flat pack method its does not only help to save material, but is also saves the transportation costs with efficient distribution and warehouse storage space. Franchises are part of IKEA expansion plan. All the franchised are granted by Inter IKEA System B.V.The IKEA Group which has over 267 stores in 25 countries and franchisees outside IKEA Group in 16 other countries/territories. The Swedwood Group is part of IKEA Industry Group to manufacture and distributes wood and controls the entire value chain. Consisting of some 50 production units and offices in 10 countries across the continent. They are driven by their vision of achieving excellence in transforming wood into quality furniture and focused on continuous improvements in order to maintain competitiveness in the market. 2. IKEA Global Supply Chain IKEA is also recognized as a global strategic firm as most of the IKEA’s stores operations are under Ingka Holding BV which is located in the Netherlands. IKEA has an excellent supply chain management with the latest information technology system which is able to gather all the information across their worldwide retail stores, manufacturers, suppliers as well as the distribution centres. IKEA has adopted the integrated JDA software which has increased their overall supply chain visibility and efficiency. In this way, IKEA is able to have more forecasts planning for supplier, warehouse and transportation capacities. IKEA has a large number of suppliers of both furniture and furnishings across the world. IKEA plays an important part to build up good relationships with its suppliers as its helps to create a huge capacity for producing the product through the  worldwide suppliers. Today, IKEA operated more than 28 distribution centres and 11 customer distribution centres in 16 countries across the world. Its main function is to support stock replenishments program. As the location of production facilities focuses heavily on transportation costs, IKEA is able to efficiently distribute mass products with short lead times by concentrating manufacturing in large factories and in specific countries. 3. IKEA Franchising Franchises are part of the IKEA expansion plan. All the franchised are granted by Inter Ikea System B.V. The IKEA Group is the biggest group of franchisees which has over 267 stores in 25 countries. They also have some franchisees outside the IKEA Group in 16 countries. 3.1. IKEA United States IKEA store has one of its franchises in the United States. They own a total of 38 stores which are served by 10 distribution centres in North America. 3.2 E-Commerce on IKEA Atlanta IKEA is also adopting the Business-to-consumer (B2C) ebusiness model. It is an online retail store where customers can do the shopping at anywhere anytime. IKEA USA on-line shopping is also able to provide well-selected items which are similar to the promotional theme of â€Å"from living room to bedroom’ and etc. Customers are able to find suitably priced and stylish home furnishing solutions that suit their needs. This sales method mainly targets end-users. 4. NETWORK DESIGN IKEA has opened biggest logistics Distribution Centre (DC) in Shanghai for Asia-Pacific region, taking advantage on its geographical, government’s support and management. China is the biggest center of finance, economy, and business and shipping, therefore it is recognized as the most important hinge of logistics. In addition, the centre in Shanghai adopts Radio frequency identification (RFID) System that will greatly improve the responsive and quality service to the customer, providing logistics service platform that helps the expansion of the IKEA in Asia. As for Europe IKEA choose Dortmund in southern Germany to be a European distribution centre. It  is because it has geographical advantage at centre of the Europe where IKEA can use rail and road transport for transporting its goods. 4.1 IKEA Atlanta and the DC Savannah For the Distribution Centre in Port Wentworth, Georgia, located near the port Savannah, the products were processed where they should be stored based on the product specifications and demand. It is the primary inventory to IKEA stores in Alberta British Columbia, Utah, Oregon and Washington State. The facility can also supply to other stores across the country when needed. Location was chosen based on the fastest movers closest to the stores for replenishment. That not only improves service times, it also reduces transportation costs. The facility’s location allows it to quickly deliver fast-moving products to IKEA stores in local markets in the south-eastern United States, including North Carolina, Florida and Texas. In North America, DC was equipped with a 13-crane Automated storage and Retrieval (AS/RS) system (via store), featuring a 100 foot-tall high-bay in-house rack system. At full operation, the system can process 600 pallets an hour, or nearly one pallet per minute from each crane. IKEA Atlanta is one of the IKEA stores that are supported by IKEA’s Savannah Distribution Centre. Geographic area is the main reason that IKEA has the DC in Savannah. In terms of transportation, it only needs less than a 4 hours’ drive if goods are delivered by truck and it only takes about 1.3 days to reach Atlanta if delivered by rail. With this speedy transportation, IKEA Atlanta can achieve responsiveness in goods supply to customer for both in-store and online purchase. Unfortunately, there is limitation product from buying on line. Consumer may not able to get some of the needs product on line. 4.2 Savannah Transit time by rail truck 4.3 The Highway and Rail Network The Company is always constantly looked for ways to maximize in each transport. To achieve this goal, packaging was designed in such a manner as to fit the maximum possible products into containers. Plus all DC share similar objectives which is to have lower total cost and improve customer  service at the same time, using of advance technology to emphasis sorting and sequencing material processes, enhancing responsiveness to the customer. 5. OPERATIONS ANALYSIS IKEA’s company main concept is based on a three points: cheap, innovative and stylish. These three points are affecting the IKEA’s product design and development concept. Nowadays, IKEA’s in USA have launched with online retail or E-commerce. E-commerce has been become part of the IKEA’s digital strategy and should be the next big offering from IKEA. Every customer may easy online shopping without travel out, queue, purchases and collects their purchases from the stores. E-commerce or shopping online at IKEA is now become very convenient, enjoy and fun for every customer. Process or step to e-shop at IKEA as per following: 5.1 Operation logistics for E-commerce The whole process cycle take about 2 to 3 days depending on the customer order time. 1.The successful online order will transfer to IKEA Delivery Planning System. 2.Planning System will send the data to Savannah Distribution Center. 3.Savannah DC will do the order picking and packing. 4.Goods will be sending out to customer by Savannah DC team. 6. CUSTOMER RELATIONSHIP MANAGEMENT IKEA’s in USA has run the business with Customer Relationship Management (CRM) and provide the E-commerce applications. Customer Relationship Management (CRM) with E-commerce applications that enable IKEA’s easily to view the both interaction channel and profitable sales channel for consumers and business customers via internet. With CRM, IKEA’s can allow their customers with convenient self-services and a personalized Web experience. The E-commerce applications also helping IKEA’s in service operations and strengthens sales to reducing the customer service calls and transaction costs. Features and Functions of CRM of E-commerce processes: IKEA’s have use the latest technology to ensure all the personal information which customer submitted through the internet website such as credit card numbers, address and other information are under secure, stable and  reliable. IKEA’s have using the SSL technology which allows it to be transmitted securely over the internet without accessing to it by anyone else. Successful to secure the customer loyalty will achieve the company goal and target in the following: Increasing the customer online spending on IKEA product Can reducing marketing, advertising and communication cost Can reduces data and information maintenance cost by giving customers authorities to update personal details such as address details, contact number, email address and requirement on the IKEA website. To achieve the customer service and satisfaction, IKEA have set up the strategy in the following: Hire the right people Bring in the employees who have more experience on the customers’ skill and knowledge in order to develop the customer service focus such as to have better communication with customers, pleasant, motivated and cooperative. Also, can retain those customers that are desirable to keep. Provide orientation and training IKEA have provided the necessary training for each employee to maintain the customer services standards and also can improve on communication skills with the loyalty customers. Set the standard for customer service IKEA have set the clear standard for performance such as Enable Company to establish, monitor, and control quality. 7. Risk During development stage, thousands of tests were carried out on IKEA products each year. And more tests are conducted during production. Once a product is approved for production, IKEA will reviewed and decide whether additional risk assessment testing is required for any proposed changes to the product or to the production method. IKEA ensure that banned chemicals such as formaldehyde and phthalates don’t exceed their requirements. IKEA requires suppliers to order certified products testing by third party auditors. Likewise, IKEA has a third-party accredited test laboratory that  is certified each year by external auditors. Accused for Logging Ancient Trees in Russia Swedwood, whom IKEA’s fully owned production subsidiary which was founded in 1991, was found irresponsibly logging Russia’s ancient trees of over 300 years old. And as a whole, IKEA are under the heat internationally especially in the forestry industries. This has been a huge issue because natural grown trees take centuries to grow. And it’s these trees that has greater biodiversity and could stabilize the climate by locking carbon in the soil to reduce global warming. In their defence, IKEA forest manager, Anders Hildeman mentioned they have been working with the NGOs, and they have been working with the scientists to develop these inventory methods. Though there are old trees present, that do not mean that it’s high conservation value. Species, size of the area, exposition, position has to take into considerations to define them as High Conservation Value Forests (HCVF). Hildeman welcomes WWF’s (World Wide Fund of Nature) recommendations for a full certification control audit. And had invited FSC’s (Forest Stewardship Council) for a control audit from their accreditation body to avoid any doubts and that we are following the Russian FSC. 7.1 Sustainability Taking a leading role towards a low carbon society In support to reduce carbon dioxide emission, IKEA are working together with WWF to investigate on how to calculate climate-positive aspects from what they do together with their customers. Majority of carbon dioxide emissions related to IKEA come from material extraction, suppliers, customer transportation, and the use and disposal of products. And all these are areas that IKEA can only indirectly influence. In order to influence the society, IKEA has to put these into practice first. They are walking towards to installing photovoltaic (solar) panels to turn sunshine into electricity in around 150 stores and distribution centres over the next few years. The panels will provide these buildings with 10-25 percent of their electricity need. When they plan a new IKEA store, good public transport is an important consideration, and in many cities they offer free shuttle buses between the city centre and the store. IKEA Foundation contribution to UNICEF Since 2001, IKEA has taken part in basic social services to help children in underdeveloped and developing countries like India and Haiti. Contributing to UNICEF’s work through philanthropic donations, sales of UNICEF Greeting Cards and many more has been IKEA’s key of support for over 10 years. In addition to that, IKEA has committed more that $200 million both in cash and in-kind donations to UNICEF’s programs making them the largest corporate cash donor. What makes IKEA a true partner, is the company’s deep commitment to social responsibility and their direct engagement with issues affecting children. In addition to providing financial support for child protection, education and health programs, they work together to provide expertise and knowledge gained over the years on addressing labor issues in the supply chain. Forest Project with WWF for Nature WWF (World Wide Fund for Nature) collaborate with external organizations in a number of forestry projects in order to contribute to the development of responsible forestry practices and policies. To date, there are 13 forest projects by IKEA and WWF. These projects aim to increase forest areas with responsible management practices, combat illegal logging, support forest certification and promote responsible timber trade. 8. Conclusion From the research we found, we notice that IKEA has a good strategy in sourcing from the raw material from suppliers to the location of distribution centre and store. Their strategy is also to keep their product in low pricing. Overall IKEA is still very success in the business with the  concept of keeping low price policy. From customer point of view, they are able to enjoy the stylish furniture and functional with low and suitably price. IKEA also success in managing the product quality, prices with supplier by maintaining the good relationship with their worldwide suppliers. We also notice that IKEA vision is â€Å"to create a better everyday life for the many people† which is hang on every store. Till today, IKEA is still continuing finding the effective way to further reducing the cost. 9. Implementation IKEA Singapore should consider implementing E-commerce instead of focusing on their in-store shopping business. There are 2 stores here in Singapore, in Alexandra Road (West) and Tampines (East). Poh Tiong Choon Logistics (PTC) was hired as their 3rd Party Logistics (3PL); they are located within IKEA at Alexandra. Other than transportation, PTC also provides installation services on behalf of IKEA. All necessary information; from product measurements, product descriptions, product amount and product comparisons has already made available in their website. In term of online payment Singapore is considered as the most secure country as IDA (Infocomm Development Authority of Singapore) which helps businesses to leverage ecommerce’s benefit where both businesses and consumers confident with the mark of TrustSg. Why customers should purchase online †¢Most of the IKEA’s products are consider bulky †¢Save traveling time †¢Save time from long queues for payment †¢Save time from long queues for taxi †¢Product measurements information made available online †¢Check for stock availability online

Tuesday, August 20, 2019

Advantages And Disadvantages Of Encryption Security Types Computer Science Essay

Advantages And Disadvantages Of Encryption Security Types Computer Science Essay An Egyption scribe used non-standard hieroglyphs in an inscription about 1900 BC. Example of written cryptography is the first documented that lists by Kahn. A piece of flat stone carved into a collage of images and some writing to identify themselves in trading dealings in 1500 BC antique Assyrian merchants used in intaglio. The digital signature produced by this mechanism. This signature belongs to the trader, but they only have that intaglio to produce the signature. The reversed-alphabet simple replacement cipher known as ATBASH is used by Hebrew scribes writing down the book of Jeremiah in 500-600 BC. A small number of Hebrew ciphers of the time are only one that is ATBASH. Skytale a device used called by Greek which is a staff around that a long, thin strip of leather was wrapped and written on. The leather was taken off and worn as a belt. It would seem that a matching staff and the encrypting staff would be left home by the recipient. In the field of 100-44 BC in government communications used a simple substitution with the normal alphabet by Julius Caesar. This produce only in a little amount, but it is not stronger like ATBASH.When this read by few people it was good enough. Julius Caesar didnt trust the messengers but trusted his associates. Inspired the solution of a cryptogram in Greek for the Byzantine emperor by A.D Abu Abd al-Rahman al-Khalil ibn Ahmad ibn Amar ibn Tammam al Farahidi al-Zadi al Yahmadi wrote a book on cryptography in 725-790. Plaintext at the massages start was based on the result. It was a regular cryptanalytic technique and used still in WW-II in opposition to Enigma messages. Kahn has found the first model of the nomenclature. A grouping replacement alphabet and small code compiled by Clement VII at the appeal in 1379 Gabrieli di Lavinde. For the next 450 years this class of code was to stay in common use in the middle of diplomats and some civilians. There were stronger ciphers being imaginary in the interim in the face of the truth, probably because of its relative expediency. The manipulative a cipher disk to make things easier the process, its make-believe and available the first polyalphabetic cipher at 1466 Leon Battista Alberti. Until the 1800s, this type of cipher was actually not working. In addition his own creation, Alberti wrote expansively on the position the art in ciphers. He also used the disk for enciphered code. These systems were much stronger than the nomenclature. The first book wrote on cryptology at 1518 Johannes Trithemius. Each letter was represented as a word taken from a succession of columns that make-believe a steganographic cipher. The now-standard form of rectangular substitution tables is described as polyalphabetic ciphers. The notion of varying alphabets with each other introduced by Johannes Trithemius. The key for a repetitive polyalphabetic cipher is introduced at 1553 Giovan Batista Belaso the opinion of using a passphrase. Introducing the digraphic cipher wrote a text on ciphers at 1563 Giovanni Battista Porta. Transposition, substitution and symbol substitution are classified as ciphers. To confuse the cryptanalyst he uses the optional of synonyms and misspellings. The first authentic plaintext and cipher text auto key systems together with wrote a book on ciphers at 1585 Blaise de Vigenere. A biliteral cipher known today as 5-bit double encoding at 1623 Sir Francis Bacon described a cipher which now bears his name. Dr.Robert Patterson make-believe his wheel cipher perhaps aided at 1790 Thomas Jefferson. The father of US cryptanalysis was in a job as a civilian cryptanalyst at Riverbank Laboratories and performed cryptanalysis for the US Government is be honored at 1917 William Frederick Friedman. The Enigma machine was taken over and superior upon to become the cryptographic workhorse of Nazi Germany at 1933-1945. But the Enigma machine was not profitable success. U.S. Data Encryption Standard preferred with changes by the US NSA based on the Lucifer cipher a plan at 1976 by IBM. New Directions in Cryptography, introducing the suggestion of public key cryptography in print by Whitfield Diffie on 1976. The Diffie-Hellman was stimulated on 1977, paper and acting as complete novices in cryptography, Ronald L. Rivest, Adi Shamir and Leonard M. To make a useful public key system had been discussing by Adleman. The full scientific report to anyone submitting a self-addressed, stamped envelope offer was included in the Scientific American article. An application for a New Block Encryption Standard a planned International Data Encryption Algorithm (IDEA) was published on 1990 by Xuejia Lai and James Massey in Switzerland. The warning by the FBI to require access to the clear text of the interactions of citizens. PGP (Pretty Good Privacy) was the unrestricted first description on 1991 by Phil Zimmermann. The earlier RC2 and RC4 algorithms included in RSADSIs BSAFE cryptographic library the author was Professor Ron Rivest on 1994. The user can vary the block size, number of rounds and key length, if the algorithm uses data-dependent rotation as its non-linear operation and parameterized. Introduction to Encryption Systems Encryption is a process to encrypt the messages that can be readable by the person who knows how to decrypt the messages. This method has been used for over 2,000 years. The encryption is refers to the translation of a data into a secret code by using the algorithms. In the science of cryptography the process that involved is encryption. The messages must be securely sent. These messages could be numeric data, text or secret codes. For example, Missile Launch Codes. This encryption systems providing privacy for the authorized peoples communications. The receiver must have a key to decrypt the message to return to its original plain text form. The key that use to decrypt the message is trigger mechanism to the algorithm. Nowadays, encryption systems is the advent of the internet and public used it rarely. Moreover, these systems became largely military tool. There are used this systems in many field. Such as banking, online marketing, healthcare and other services. Even the average householder is aware of the encryption. When an address beginning with https that shows that web browsers is encrypt text automatically when connected to a secure server. When connected to a secure website, even the browsers automatically encrypt the information but many of them still choose the use of the encryption to do their email. The feature plug-ins or interfaces for the popular email clients will be easily accomplished with the help of encryption program. The most popular and longstanding is called PGP (Pretty Good Privacy), a name for very strong military-grade encryption program. It will be allowed to not only for the messages, but also may used for the personal files and folders as well. When the information tra vels between the computers, interception of the transmission that cannot be readable because it was in unreadable gibberish. Even there are many types of encryption but not all types of encryption are reliable. Other than that, there are same computer that yields strong encryption that can be used to break weak encryption schemes. Earlier years, they used 64-bit encryption and they taught that was quite strong but it was break by the 128-bit encryption. This is the standard encryption and this will not change in the future. It was undoubtful.The data makes private by the strong encryption. But, it is not compulsory will be secure. If the used data wants to be secure, the recipient must be positively identified as being the approved party. The digital signatures or certificates are usually accomplished online. Types of Encryption The encryption consists of 5 types of encryption systems. There are manual encryption, transparent encryption, symmetric encryption, asymmetric encryption and email encryption. Firstly, manual encryption. This type of encryption involves the use of the encryption software. This encryption encrypts the computer programs in various bits of information digitally. Users participation must completely involve in this encryption. If the wants to encrypt the file, the user have to choose the type of encryption from a list that provided by the security system. This may use in the personal computers. For the reason that is the user easy to encrypt the personal files in a way they like, and also it will be protecting the personal material on a computer. Secondly is the transparent encryption. This encryption can be downloaded onto a computer to encrypt everything automatically. This is the most protected type, since it doesnt leave out anything. The computer has an encrypt duplicate in every ex ecutable appliance and folder that formed endure authority surges and defends information in casing a computer is stolen. In addition symmetric encryption also defined as one of the type of encryption. By using this type of encryption can easily encrypt information by own self. For an example, a letter or number coincides with another letter or number in the encryption code. The code can make by ourselves. Such as a=1, b=2 and so on. Besides that, asymmetric encryption is a safe and easy way that can be used to encrypt data that will be receiving. This type will do by electronically. The public key can be seeing by whoever want or post somewhere. Others can encrypt the information and send it back. There is also another key even the public key decipher that is private key. This key has only one person have. This means the data will encrypt by public key but it can be read only by the whomever has the private key. Lastly the email encryption is typically same as asymmetrical encryption method. This method is the emails that in inbox cannot be read by others especially by the hackers. There are 2 types of email encryption. The result in who gets the private key to the email is the first an email supplier. The client of an email address is given by regularly. The second type is managed over who gets the key gives by the user. This way the encrypt emails can read by others who have the private key given. Types of Encryption Software There are two main encryption-software types: Disk-encryption software, which protects mutually programs and data Data-encryption software, which protects just data Disk Encryption Software This type of software also called as full-disk-encryption software that used to protects the complete hard drive. This including the operating system, all software programs and its folders and files except for the MBR (Master Boot Record). Disk encryption hardware will protect the whole hard drive as well as MBR. This software no needs to buy, it will be already contain in a new computer or upgrade to a new operating system. For instance, Microsoft Vista and Windows 7 Enterprise and Ultimate editions. This software will protect the computer when not using it only. The laptop must switch off when not using it. Data Encryption Software This type of software will protects the chosen folders and files in an implicit vault, volume Or safe. In the computer must be store all the sensitive data in a virtual vault. When the virtual vault is closed only the data encryption software will protects the data. Whereas not actually working on any data within it should always closed the virtual vault. Process of Encryption 1The Encryption Process Binary message is very simple process of encryption The binary message is simply xored with another binary sequence The second sequence must be random Example: Let the message be ECE 101 Using ASCII encoding, we get: 45x 43x 45x 20x 31x 30x 31x In binary form: 01000101 01000011 01000101 00100000 00110001 00110000 00110001 Now select a random sequence of equal length, example: 1010011 1000011 0101101 1101110 0110010 1010001 1101010 The encrypted message is then: E C E SPACE 1 0 1 45x 43x 45x 20x 31x 30x 31x 1000101 1000011 1000101 0100000 0110001 0110000 0110001 $oplus$ 1010011 1000011 0101101 1101110 0110010 1010001 1101010 = 0010110 0000000 1101000 1001110 0000011 1100001 1011011 16x 00x 68x 4Ex 03x 61x 5Bx SYN NULL h N ETX a [ 2The Decryption Process To decrypt the encrypted message it must be xored with the same random sequence that was used for encryption. SYN NULL h N ETX a [ 16x 00x 68x 4Ex 03x 61x 5Bx 0010110 0000000 1101000 1001110 0000011 1100001 1011011 $oplus$ 1010011 1000011 0101101 1101110 0110010 1010001 1101010 = 1000101 1000011 1000101 0100000 0110001 0110000 0110001 45x 43x 45x 20x 31x 30x 31x E C E SPACE 1 0 1 Fundamentally, this works because $0 oplus 0 = 0$and $1 oplus 1 = 0$ $x oplus 0 = x$, for x=0 or x=1. 3Comparison of secret key and public key cryptography Uses of Encryption There are five uses of encryption: Uses of encryption Details Confidentiality The person correspondent or the recipient can normally be implicit of encrypted data Error Detection The inside of the message have not unintentionally changed will be checking User Authentication The recipient that the correspondent is the real creator and not someone else by the verification Message Authentication The messages have not been lost or interfered with when do the verification Proof of Origin The message came from the declared correspondent is providing to the third party Types of Encryption Algorithms There are six types of encryption algorithms. They are RSA, DES/3DES, Blowfish, Idea, Seal and RC4. The key length is discerned by the strong encryption used the algorithms. RSA The idea of a public key system was proposed in 1977. After, this proposed the 3 mathematicians, Ron Rivest, Adi Shamir and Len Adleman give a concrete example of how the method can be implement. A private and public key was used by this system and this method refers to RSA Scheme. This system used the term n=p*q. DES/3DES U.S was developed and endorsed the Data encryption Standard (DES) in 1977 as official standard form. A block cipher with 64-bit block size that uses 56-bit keys by DES. Some of them not concern about the DES secure. The Triple-DES (3DES) has emerged with a strong method. With the help of DES/3DES giving it a cumulative key size of 112-168 bits. BLOWFISH This is like a symmetric block cipher same as DES or IDEA. The blowfish was created on 1993 by Bruce Schneier. Then it gets acceptances as a strong encryption. IDEA On early 1990s the International Data Encryption Algorithms (IDEA) by Dr.X.Lai and Prof.J.Massey in Switzerland replacing by the DES standard. This system uses encryption and decryption at 8 bytes in a time. SEAL In 1993 Software-optimized Encryption Algorithm (SEAL) was designed by Rogaway and Coppersmith. Block Ciphers is slower than Stream Ciphers. This SEAL is considered very safe because it has 160 bit key. RC4 Ron Rivest was invented RC4 cipher. Commercial systems like Lotus Notes and Netscape was used this cipher. This cipher used 2048 bits (256 bytes) key size. It relatively fast and strong ciphers. Advantages and Disadvantages Encryption is playing a most important role in day-to-day. Even it play role in important, there also have some negative points. Advantages Disadvantages The information that stored in the computer from not permitted access-even from people who not have access the computer system that can be defend An aggressor can cooperation the encryption series itself The transmission from one computer to another computer can protect the information An aggressor might find a earlier anonymous and comparatively simple way to translate messages encrypted with the algorithm that using The data can be used to deter and detect accidental or intentional alterations The deleting all the data cannot be prevent by attacker To know the author of the document can be verify Before it is encrypted or after it is decrypted could access the file by attacker Cryptography VS Encryption Cryptography Encryption The science and study of secret writing is defined as cryptography The desktop-computer insurgency has made it likely for cryptographic techniques to become widely used and accessible to no experts Cryptography is a part of the history, on the ancient years complex based codes and algorithms and machines was created By having some secure communications the Enigma machine was developed by Germans, throughout the World War I The secret Ultra project through World War II was Enigma codes that decrypted by the British Users suggestion is always encryption of the unbelievable on system, or the holder or the law of the enforcement This system changed a plaintext to the cipher text, which always has the look of casual The encrypted form called as cryptogram, the process of the encryption will be determined by the encryption algorithms The transformation will be truthfulness, genuineness and privacy provides by the encryption The information that send by the A is authentic and has not been tampered Algorithm Compression Loss Authenticity IEDS No No Yes SCAN Yes No No MIE No No No CIE No No No VQ Yes No No DRP No No No VC No Yes No 4Figure 2.1 Image Encryption Algorithm Property Comparison Table Importance of Encryption This is a very mysterious subject. The administration seems have no realistic application outer surface. The computer has distorted the age. In this world has do whole thing was recorded on computers that was connected to the Internet. There are many areas use encryption: The outsiders cannot snatch a copy of the transit that will assure by the encryption. The transit will be going between the commerce with many places of work locations needs to send computer data files among themselves. The encryption system allows them to hide the information among themselves when dissimilar people share the computer system. But nowadays almost they share similar in some form. The possible document only can read by the person who designed the encryption. Even others have the physical access to it. This issue modified encryption keys to the people. If everybody keeps their personal data in encryption form, this was worried by the law enforment authorities. Because of this, they tried a limit of using the strong encryption by the general public. The encryption software treats as military ammunition by the laws of the United States of America and it will be allowed export with case-by-case permission from the government. Examples of Encryption There are few examples of encryption. This example can easily break by the unauthorized people. By this examples, can understand more about the encryption. Reverser Decode EncodeThis type will be the reverse of whole message. If someone want to look the encrypted words, they can see the words by the backwards. Example: hello olleh hello Shifter Decode EncodeThe letters incremented by one so a becomes b, b becomes c and so on. The message will be more easier when incremented. By this type of encryption also others can see the letters. Example: hello ifmmp hello Flipper Decode EncodeThis is done by flipping every two characters. This is done by switched the 1st and 2nd letters, 3rd and 4th letters and so on. This also easy to encrypt the letters again. Example: hello ehllo hello Caesar Cipher Decode EncodeThis was made by Julius Caesar. This can be seen in the history. This also can be easily broken. The encrypted message is being used to replace the real message. Example: hello khoor hello Challenges and Technologies 5The encryption is very useful to the worldwide. Even it is useful, there are some challenges that faced by the encryption: GLBA compliance and emerging technologies by Paul Rohmeyer, Contributor The second decade of managing information risks under the regularly oversight of Section 501. RSA 2008: Financial industry security challenges The unique security challenges facing the financial industry its talks by the Executive Director Ed Zeitler. This can put strain on IT. Overcoming USA Patriot Act challenges This was contributors by Michael Rasmussen and Michael Landers. The authority to regulate various activities of financial institutions and they required them to maintain anti-money laundering programs. Regulatory and competitive forces The privacy laws are required to protect identity and personal financial information from unauthorized parties. Key management challenges and best practices This explains that to all procedures related to generation, exchange, storage, safeguarding, use and replacement of keys. BITS releases guide for implementing email authentication protocols 500s consumer-facing services brands adopted DKIM and Sender ID (SIDF), Microsofts version of SPF. The challenge is to locating all their sources of email. 6Other than that, there some technologies in the encryption. RSA encryption system was the top of the list, it developed by Ronald Rivest, Shamir, and Leonard Aldeman in the late of 1970 at the Massachusetts Institute of Technology. Security Sockets Layer (SSL) is a public-key encryption seems widely used in client-to-server applications. It was developed by Netscape and supported by Microsoft browsers. This SSL was suffered from its complex computation system, which prolongs the time it takes to perform the encryption and decryption processes. Besides that, Pretty Good Privacy (PGP), also a technology was developed by Phil Zimmermman. It was released on 1991. This was easy to use and strong encryption. After 1996, PGP was launched as commercialize the software. Then, Zimmerman man continued to develop more the PGP. There are some companies operating over a large network to protect the information on their hard drives, the program was Symantec Corps Norton Your Eyes Only. On 2000, Wi ndows 2000 was equipped with automatic encryption schemes. Alternatively, the programs could encrypt data onto a company server and allow with authorized access the files to decrypt them. 7Language that used to develop the encryption The application in programming language must be in order form to develop it. There are two popular and relevant high level programming languages that is Java and C#. The features in terms and portability were compares between Figueroa n.d. and Java and C#. By this comparison can be identify which has the better performance in processing images. The both languages are portable based on the study. The architectures and operating systems in different to run a program in flexibility is refers to portability. The term of the programming languages was only portable for C#. Java in the other hand is portable for in source code, hardware and OS. When manipulate the image is converted into matrix where elements of the matrix represent a pixel of the image. There are two types of size, they are vector size and matrix size. C# is faster when both sizes are greater than 4096. Java is faster when processing small sizes. 8Technique of encryption Younes Jantan, 2007 has proposed a simple and strong method for image security using a combination of blocks based image transformations and encryption techniques. The original message divided into blocks, which is rearranged into a transformed image using a transformation algorithms and then transformed image is encrypted using the Blowfish algorithm. Without the key, encryption and decryption process cannot take place. The following figure shows the model of the proposed technique: Original Image Key Transformation process Encryption process Ciphered Image   Figure 2.2 An Overview Diagram of the Proposed Technique Depending on the key supplied by the different cipher codes have the similar image. The confidentiality and security will provide when the image based data transferred with the help of suitable user-defined key. The resulting image will not be generated because of the result of hash embedded inside the image file. The below figure shows the architecture proposed: Image Encryption Model Image Cipher Code (An encrypted image) User Defined Key Decrypted (Original) Image Image Decryption Model User Defined Key Figure 2.3 The Architecture of the Image Encryption and Decryption Model Future Improvements The future of encryption is brighter than ever before. The protection of corporation information assets and third-party information is increasing spectacularly and it is demand for more control. Even five years ago, the amount of information being communicated and stored by electronic means is hugely great. The information security products are growing at a higher rate than any other aspect of IT technology must be more effective within the enterprise today. From the perimeters of communication, the Internet and the mobility of its users have removed it. For the modern day enterprise the last line of the defense is encryption. In future, the encryption systems will be more useful to the users. Moreover, this encryption is tough, complicated, jargon and it is not user friendly. Even, by the IT people also cannot know what is actually encryption. How about the the common people. Many of them said that encryption is so great, why Microsoft did not use this. Because it is very expansive, too advance for the unknowledgeable persons and is not simple to use it. In future, the encryption will improve the PIN security. The unique encryption key can be used only by the EFT networks members only. But this costs high implementations, since some of the ATM owners ignored it. The remote key distribution may improve the compliance rates. There are 6 critical market drivers that will be the shape the future encryption  [9]  : Email privacy and regulatory requirements The global enterprises provided easy way exchange information can conduct the business electronically by the Internet and adoption of Internet protocols. Increasing compromises and unauthorized access to critical business information To improve the quality and level of protection enterprise employ to guard their information assets and the assets of their customers and business partners. The expanding enterprise The increasing number of regulations are aimed in a part at ensuring enterprises maintain and fulfill their fiduciary responsibilities. User mobility Ensure that the information during travel safe and the electronic communication also remain safe as it is transmitted across the Internet. Communications appliances Credit card may need protected for much longer periods of time. The Art of Storing and Retrieving Corporate Information Assets There are emerging the solutions for how to communicate among the various enterprise members in a secure manner. Conclusions The future of the encryption will be using by electronically for the purpose of enterprise conduct business. In future the encryption and the innovation of the applications providers. At Backblaze is protecting the privacy of the users data is a top priority that means encryption system. This is easy to use as a key part of the vision and makes the product hard to use for the encryption. For the military grade encryption made easy by mix of the public/private and symmetric key algorithms. The encryption is refers to the translation of a data into a secret code by using the algorithms. In the science of cryptography the process that involved is encryption. The messages must be securely sent. These messages could be numeric data, text or secret codes. For example, Missile Launch Codes. This encryption systems providing privacy for the authorized peoples communications.

Monday, August 19, 2019

A Comparison of Vacations :: Compare Contrast Comparing

A Comparison of Vacations Summer and vacations are synonymous, especially with my family. Does Chevy Chase and summer vacation ring a bell? With a family of six, anything is possible. There are two types of excursions that we take every year. I refer to one as my family vacation and the other as my family trip. My family vacation to the beach is an annual event, but my family trip destination is always different. This past summer my family and I went to Wyoming. Both experiences were the highlights of my summer but for very different reasons. We begin packing for our beach trip shortly after my grandmother arrives from North Carolina. My dad's twenty-five-year-old surfboard is securely tied on top, and we are stuffed like sardines into the car with the week's groceries packed in every nook and cranny. My dad always insists that we take everything with us; it would be a sin to spend good beach time at the grocery store. The trip down is uneventful, and we make our traditional one and only stop at the Subway for lunch and gas. I was taught early on that there are limited drinks on travel day because bathroom breaks are unheard of. After an early start we arrive to find our three-bedroom, three-bath condo just as we remember it. We especially enjoy having a VCR in each bedroom, After unpacking the car, my family and I head for the beach. The familiar smell of the salty air, the rhythm of the ocean waves, and the gentle breeze across my face are like long-lost friends. The beach routine begins. Just as we do on the day we leave for the beach, my family and I wake up early to prepare to leave for Wyoming. My dad says that getting my family of six ready to go is like launching the space shuttle. For this trip, luggage is limited to what we can each carry. We all convince my dad that there will be grocery stores in Wyoming. After a quick trip to the airport, we board a jet to Atlanta and take a connecting flight to Denver. The highlight of our plane trip is the long-awaited lunch, which is a real disappointment. My mom and dad nap, while my sisters and I watch a movie.

Functional Genomic Analysis of C. elegans Using RNA Interference Essay

Introduction Before we talk about this important experiment, do you know what a nematode is? Specifically, this experiment used Caenorhabditis elegans, C. elegans for short. C. elegans is a little worm (just like the kind you find in the ground), but has a very special place in modern biochemistry: scientists have mapped its entire genomic sequence. This sequence lets scientists know the character and location of all C. elegans' genes. However, biochemists do not yet fully understand what each gene does and the goal of this experiment is to find the function of each gene within the worm. The connection between a worm's genotype and phenotype is important, because, believe it or not, human beings and worms share many of the same genes. Scientists can use information about nematode genes and their phenotypic expression (the worm's physical traits) to better understand how human genes function in the body. The researchers who performed this study "fed" the worms double stranded RNA that encodes for a particular gene. The cells of the nematode's body recognize the double stranded RNA as foreign genetic material and delete all proteins associated with that RNA. Therefore, the C. elegans will not express the targeted gene, and in its absence, scientists can identify the normal phenotypic expression of that gene. For example, if the inhibited gene was supposed to create raised eyes in the nematode, then the organism would not have raised eyebrows, because it cannot manufacture the proteins that make this trait physically possible. This experiment inhibits the majority of C. elegans' genes in an effort to find what each gene does in the organism. The C. elegans is an ideal species to use in this process because it grows and... ...nucleic acid interference. RNAi uses fragments of double-stranded RNA (dsRNA) which induces the degradation of mRNA. Hopefully, one is beginning to see the similarities of the functions of RNAi and antisense pharmaceuticals. I have mentioned before that antisense drugs work by temporarily inhibiting the mRNA from manufacturing specific proteins. Future RNAi technology could be used to permanently degrade the mRNA. This is not only an exciting possibility; it is a near-future reality. Isis Pharmaceuticals has already five antisense drugs in clinical trails! Who knows when they or another pharmaceutical company will begin to utilize RNAi! References Ahringer, J., Fraser, A.G., Kamath, R.S., Martinez-Campos, M., Sohrmann, Marc., Zipperlen, Peder. "Functional genomic analysis of C. elegans chromosome I by systematic RNA interference". Nature 2000; 408: 325-330.

Sunday, August 18, 2019

Measure for Measure Essay: Lord Angelos Hypocrisy -- Measure for Meas

Lord Angelo's Hypocrisy in Measure for Measure      Ã‚   Within ‘Measure for Measure’ Shakespeare presents the notion that mankind's corruption is not necessarily born by power, but rather already innate in humanity. Shakespeare argues that power is not a producer of corruption by presenting the Duke, who holds the most power, as a moral hero, and conversely revealing the corruption of the powerless class (through characters like, Pompey, Mistress Overdone, and Barnadine).   Shakespeare uses Lord Angelo in Measure for Measure to show that corruption is innate within mankind whilst Angelo is a symbolism for pharisaical fanaticism in the play.       It's interesting to note that Lord Angelo's name evokes an image of purity and holiness.   Names are given at birth, and the idea that he is called angelic from the start, would argue against this doctrine of innate depravity.   But, as Shakespeare argues, it's a name that can't be lived up to because of natural passions and lusts, which ultimately leads to Angelo's hypocrisy.   The play opens up not only dressing up Angelo with a pure name, but also as a puritanical deputy, who has been "elected" to enforce the laws while the Duke is away.   This idea of "election" not only signifies the political decree of Vienna, but also a Pauline doctrine that relates to men and angels.    Angelo has done an efficient job at fooling people into believing that he is incapable of natural vices. When the Duke announces the decision to give Angelo authority, Escalus, the good lord, applauds the choice: "If any in Vienna be of worth, To undergo such ample grace and honor, It is Lord Angelo". Angelo has done such an efficient job he has even fooled the lower class into thinking that he is pu... ...ne of Shakespeare's solution to this innate problem is not to run off and join a monastery (or a convent, as Isabella attempts to do); but rather to accept the inborn human vices and try to lead good lives in spite of them.    Works Cited and Consulted: Black, James. "The Unfolding of Measure for Measure." Shakespeare Survey 26 (1973): 119-28. Leech, Clifford. "The 'Meaning' of Measure for Measure." Shakespeare Survey 3 (1950): 69-71. New American Standard Bible. Reference ed. Chicago: Moody Press, 1975. Shakespeare, William. Measure for Measure. The Arden Shakespeare. Ed. J.W. Lever. London: Routledge, 1995. Thomas, Vivian.   The Moral Universe of Shakespeare's Problem Plays.   London: Croom Helm, 1987. Wilders, John.   "The Problem Comedies."   In Wells, Stanley, ed.   Shakespeare: Select Bibliographical Guides.   London: Oxford UP, 1973. Measure for Measure Essay: Lord Angelo's Hypocrisy -- Measure for Meas Lord Angelo's Hypocrisy in Measure for Measure      Ã‚   Within ‘Measure for Measure’ Shakespeare presents the notion that mankind's corruption is not necessarily born by power, but rather already innate in humanity. Shakespeare argues that power is not a producer of corruption by presenting the Duke, who holds the most power, as a moral hero, and conversely revealing the corruption of the powerless class (through characters like, Pompey, Mistress Overdone, and Barnadine).   Shakespeare uses Lord Angelo in Measure for Measure to show that corruption is innate within mankind whilst Angelo is a symbolism for pharisaical fanaticism in the play.       It's interesting to note that Lord Angelo's name evokes an image of purity and holiness.   Names are given at birth, and the idea that he is called angelic from the start, would argue against this doctrine of innate depravity.   But, as Shakespeare argues, it's a name that can't be lived up to because of natural passions and lusts, which ultimately leads to Angelo's hypocrisy.   The play opens up not only dressing up Angelo with a pure name, but also as a puritanical deputy, who has been "elected" to enforce the laws while the Duke is away.   This idea of "election" not only signifies the political decree of Vienna, but also a Pauline doctrine that relates to men and angels.    Angelo has done an efficient job at fooling people into believing that he is incapable of natural vices. When the Duke announces the decision to give Angelo authority, Escalus, the good lord, applauds the choice: "If any in Vienna be of worth, To undergo such ample grace and honor, It is Lord Angelo". Angelo has done such an efficient job he has even fooled the lower class into thinking that he is pu... ...ne of Shakespeare's solution to this innate problem is not to run off and join a monastery (or a convent, as Isabella attempts to do); but rather to accept the inborn human vices and try to lead good lives in spite of them.    Works Cited and Consulted: Black, James. "The Unfolding of Measure for Measure." Shakespeare Survey 26 (1973): 119-28. Leech, Clifford. "The 'Meaning' of Measure for Measure." Shakespeare Survey 3 (1950): 69-71. New American Standard Bible. Reference ed. Chicago: Moody Press, 1975. Shakespeare, William. Measure for Measure. The Arden Shakespeare. Ed. J.W. Lever. London: Routledge, 1995. Thomas, Vivian.   The Moral Universe of Shakespeare's Problem Plays.   London: Croom Helm, 1987. Wilders, John.   "The Problem Comedies."   In Wells, Stanley, ed.   Shakespeare: Select Bibliographical Guides.   London: Oxford UP, 1973.

Saturday, August 17, 2019

Automotive Dealer Business Plan Executive Summary

The executive summary for your Automotive Dealer Business should be written last. It should include the main people involvedin your Automotive Dealer Business and their experience related to the Automotive Dealer Business. There should be a brief description of what the Automotive Dealer Business entails. Your Automotive Dealer Business should include some brief financial statements such as loans you will require and profit/loss statements for the first 3 years. Objectives The should be your short term and long term objectives for your Automotive Dealer Business. Mission What is the main mission for your Automotive Dealer Business.Keys To Success A few bullet points to briefly describe why your Automotive Dealer Business will be a success. Company Summary Company Ownership Who owns your Automotive Dealer Business and what type of business will it be  ± will you be an LLC etc. Location(S) And Facilities Address of your business if possible or a rough idea of the surroundings and the benefits this location will be for yourAutomotive Dealer Business. Start-Up Summary For An Automotive Dealer Business Provide basic details of the capital you require for your Automotive Dealer Business and how you intend to acquire that capitalif you don ¶t have it already.Start-Up Expenses For An Automotive Dealer Business This should be a list of all your start up capital required before you start trading as well as the amount if any you will beneeding to loan. Products / Services Product Description Describe all the products you will sell and give an indication of future products you will sell and the reasons why these will besold in the future and not now. Service Descriptions Describe all the services you will provide and give an indication of future services you will provide and the reasons why thesewill be provided in the future and not now.Market Analysis Summary For An Automotive Dealer Business Market Segmentation G ive the details of who your target market will be for the Automotive Dealer Business. Target Market Segment Strategy Explain how your marketing will get new and existing clients to buy from you. Market Trends Explain how in general the direction the Automotive Dealer Business is taking. Is it up or down and what are the reasons forthis and can you cater for the existing and new trends. Service Business Analysis Explain how the Automotive Dealer Business is run in a nutshell.Main Competitors Who are the main competitors for your Automotive Dealer Business. Try to explain their strengths and weaknesses. Strategy And Implementation Summary For An Automotive DealerBusiness Marketing Strategy How will you market your Automotive Dealer Business. Pricing Strategy What are your prices and the reasons for your prices. Promotion Strategy Are you planning a grand opening with special discounts on your opening night? Do you need to give special offers to attractnew and existing customers to your Automotive Dealer Business once you are established .Competitive Edge Explain why customers will come to your Automotive Dealer Business as compared to someone elses. We b Strategy The web is becoming ever more important for any business. How exactly are you going to use this medium in your AutomotiveDealer Business strategy. Sales Strategy How are you going to generate more sales for your Automotive Dealer Business. Strategic Alliances What other companies can you work with to help your Automotive Dealer Business. Management Summary Management Team Who are the main people involved in your Automotive Dealer Business.O rganizational Structure Which people are in charge of which departments in your Automotive Dealer Business. Personnel Plan List all the people involved or you will require to run your business smoothly with salaries or share options. Strategic Direction SW O T Analysis This is a summary of the business's most important strengths, weaknesses, opportunities and threats. Strengths Of The Business Excellent quality productà ¢â‚¬ Which means that† Adds to reputation. G ood management skills. â€Å"Which means that† Well run business G ood ability to extract information. Which means that† Can control the business. – Weaknesses Of The Business New Player†Which means that† Credibility problem may affect initial salesLack of systems†Which means that† The company needs to develop systemised operational & sales techniques or sacrifice profits O pportunities In The Marketplace Add-on products such as **†Which means that† A potentially enormous market for the Automotive Dealer Business to tap into. G rowing market segments. â€Å"Which means that† our Automotive Dealer Business should target these segments. Threats In The Marketplace Increasing supplier prices. Which means that† Resulting in reduced profitability. Declining size of the ** segment. â€Å"Which means that† Need to focus on growing segments to spread the company's p ortfolio Ne w Products To evaluate and launch new products or services which will turn over $xxxxxx in the first year. O ther Obj ectives (Goals) To not exceed a marketing budget of $xxxxxxTo not exceed a payroll budget of $xxxxxTo not exceed a general overhead budget of $xxxxxx Marketing Plan For An Automotive Dealer Business Marketing Obj ectivesSales Obj ective To achieve sales by XX% to $XXX Sales Obj ectives By Market Segment 1 Segment: To achieve sales to $xxxxxx#2 Segment: To achieve sales to $xxxxxx#3 Segment: To achieve sales to $xxxxxxOther To achieve sales to $xxx Promotional Strategies Advertising Develop a corporate brochure. Month 20XXDevelop personalised business cards. Month 20XXCreate Basic Website as a tool to promote servicesMonth 20XXAdvertise in local publicationsMonth 20XXAdvertise monthly in magazines that are specifically targeted to the ** and ** segments. Month 20XXAdvertise monthly in magazines that are aimed at the general industry. Month 20XX Lead Genera tion Program Conduct monthly on-going lead generation program.Send out monthly direct mail leaflets with response coupons. Month 20XX†Centres Of Influence† ProgramPersonally contact at least ten potential partners each week. Produce a monthly newsletter that shows examples of (your products) and how customers have benefited from using them. Month 20XX PR Program PR release to be initiated each month to various trade journals and magazines. Month 20XX Sales Force Employ telemarketing staff. Month 20XXOrganise training program to be implemented. Month 20XX Lost Customers Contact monthly all past customers that have not re-ordered to ask why not and see whether we can win back their business.Month 20XX Follo w Up Enquiries Contact all enquirers monthly and determine if they have purchased from a competitor and, if so, why. Month 20XX Existing Customers Follow up all new customers two weeks after they purchase to ensure they are satisfied with the product. Month 20XXSend qua rterly newsletter to existing customers to keep them informed of our other products. Month 20XX Sales Promotion Develop an ongoing sales promotion to target existing customers. Month 20XX General Marketing Strategies For An Automotive Dealer Business Competitor Pro f ile Keep updated competitor profile. Month 20XX Marketing In f ormation SystemDocument on every enquiry â€Å"How did you hear about us? â€Å"Month 20XXDocument on every order â€Å"How did you hear about us? â€Å"Month 20XXProduce monthly sales reports by product, by market segment, and by territory. Month 20XX Financial Strategies For An Automotive Dealer Business Cash Flo w Eliminate cash shortage in the traditional tight periods of to Month 20XX Payment Days Maintain payment of bills, on average, to xx days. Month 20XX Expenses Develop and implement new policies on approval and signatories on expenses. Month 20XX Leases Pay off the existing lease on capital equipment, thus reducing the monthly financial burden .Month 20XX O verdra f t Reduce the overdraft from $xxxxxx to $xxxxxxxMonth 20XX Wages Pay all wages on a monthly basis instead of weekly. Month 20XX Ne w Equipment Organise funding for the $xxxxxxx expenditure on new equipment. Month 20XX Pay b ack Ensure a payback on new equipment through sales of one year. Month 20XX Inventory Improve the number of stock turns to xxxxx a year. Month 20XX Rent Negotiate new terms on the premises and reduce existing payments by xx%Month 20XX Bank Charges Renegotiate with the bank and consolidate some outstanding loans with lower interest rates. Month 20XX O ganisational Plan O rganisational And Management Next Year's ObjectivesBudget – To not exceed the payroll budget of $xxxxxxxStaff – To employ or re-deploy a total of xxxxx full-time and part-time staff over the next year. HUMAN RES O URCE STRATEGIES O rganisational Draw organisational chart. Month 20XXDevelop incentive scheme related to job requirements. Month 20XX Policies And Pro cedures Develop policies and procedures manual. Month 20XXEmploy or re-deploy staff Employ one specialist ** salesperson. Month 20XXEmploy one marketing assistant. Month 20XXEmploy one accounts receivable person. Month 20XX