Wednesday, July 31, 2019

Reward system Essay

1. 1Executive summary: Pizza hut is an American restaurant that offers different styles of pizza along with side dishes pasta, Buffalo wings etc. it was founded in 1958 by the brothers Dan and Frank Carney in their hometown. And latter on they expand their business to all over the world. In Pakistan first branch of pizza hut was opened in 1993 in Clifton Karachi. It is the franchiser of MCR (MANZAR COORNAY RIAZ) (PVT) LTD that is now owned by Habib Oil. MANZAR RIAZ was the first person who franchises the pizza hut. Overall it has 25 branches in all over the country. During the past four decades Pizza Hut has built a reputation for excellence that has earned the respect of consumers in Pakistan. Building a leading pizza company has required relentless innovation, commitment to quality and dedication to customer service and value. We are going to study this organization in three phases (Analysis phase, Design phase and implementation phase). In Analysis phase, we are going to examine the organization culture, effect of IT and globalization, study of company reward systems. In design phase we are going to modify company reward system and policies regarding organization behavior towards its employees and customer dealing. In implementation phase we will introduce some changes in culture and behavioral policies 1. 2Company Profile: * History: Pizza hut is an American restaurant that offers different styles of pizza along with side dishes pasta, Buffalo wings etc. it was founded in 1958 by the brothers Dan and Frank Carney in their hometown. And latter on they expand their business to all over the world. * Vision: The vision of the PIZZA HUT is that â€Å"reach on the top of the peak to provide best service and taste† & â€Å"customer satisfaction† * PIZZA HUT MISSSION STATEMENT: We take pride in making a perfect pizza and providing customer a helpful service on all the time. so that every customer says â€Å"I will be back†. 1. 3Organizational chart: To be filled 1. 4Employee behavioral management policy: The management system of PIZZA HUT is very strong. No person can deviate from his duties that cause problem. It is in the mission statement of PIZZA HUT that every boss has a boss. So a check prevails on all the employee and they don’t derivate from their duties that cause any disturbance. 1. 5Methodologies used/business process: * Customer satisfaction: We listen and response to the voice of the customer. Belief in people: We believe in people, trust in positive intentions, encourage ideas from everyone and actively develop a workforce that is diverse in style and background. Recognition: We find reasons to celebrate the achievements of others and have fun doing it. Accountability: I. We do what we say II. We are accountable III. We act like owners Excellence: We take pride in our work and have a passion for excellence. 1. 6 Scope of Work: To be filled ANALYSIS PHASE/ IDENTIFICATION PHASE 2. 2Study of effects of IT and globalization of the organization: Now a day’s technology is improving so as baking and heating ovens will be of new and efficient technology and will provide efficient service. Due to new technology there are new ways of marketing like internet, telemarketing. With the help of internet Pizza hut can advertise their organization better (i. e. providing all information about their products to the customers just at one click). A telemarketing is also useful for Pizza hut in enhancing their business. A part from that Pizza Hut is using MIS (Managing information system) which is a computer based system and used to manage the data of the customer. 2. 4Identification of culture type and effects of culture on organizational performance: If we analyze Pizza hut’s culture then we may say that Pizza Hut is an organization which presents the role culture. As everyone is assigned a role to do in the organization all the employees focus on their particular role as assigned to them by their job description and this should increase productivity for the company From top to bottom every one is participating in making Pizza Hut a successful organization. Either cure members or the manager is playing a role in the organization. 2. 5Analysis of organizational reward systems (monetary and non monetary) * Monetary rewards: Reward System The system of pay and benefits used by the firm to reward workers * Flexibly at work * Holiday’s work allowance CHAMPS Program Pizza Hut introduce a new program, that is CHAMPS for check on worker and on the bases of this program they give them bonuses. * C-clearness * H-hospitality * A-accuracy * M-maintenance * P-product quality * S-speed * Non- Monitory rewards: 2. 8Study of managerial communication processes: Managerial communication is the communication of the managers to their employees. And just like other organizations in Pizza Hut this communication is also a one way communication means only managers is allowed to give the order to his employees and it is compulsory to the employees as described in their job descriptions. On the other hand employee can give order to the managers he just have to listen and obey the order. This is the duty of the employee. 2. 9How many organizational benefits are provided by organizational management?

Tuesday, July 30, 2019

Win Snort

Installation of WinSnort Contents Introduction I have been tasked with evaluating the latest WinIDS AIO pack from Winsnort. com to determine whether it would be suitable as the intrusion Detection System (IDS) on the company network. Within this report i will include the details of the trial deployment, give a recommendation and then evaluate the product. What is an IDS? Intrusion in this case is where someone or something as it may be has entered a computer on a network without invitation in attempt to compromise it. Without any systems in place it can be too late before you notice an intruder. his is where an intrusion detection system comes into play. In snort 2. 0 an IDS is described as a high tech burglar alarm. An IDS is configured to monitor access points, hostile activities and known intruders. An IDS can work similarly to an anti-virus where it stores signatures of previous or known intruders, the more secure IDS's have huge databases of these signatures and can detect patte rns activity, traffic, or behaviour it sees in the logs it is monitoring against those signatures to recognize when a close match between a signature and current or recent behaviour occurs. When an IDS detects an intruder or potential risk it can issue an alarm or alert and/or automatically take action. Deployment As said in the introduction there was a certain IDS that we had to deploy and find out certain information about it, for example; ease of installation, administration, usability, effectiveness as an IDS and also if there were additional features available. Usually Snort is installed on a Linux operating system but in this case we are going to install it using a windows operating system. Due to it being installed on windows server 2003 it made the difficulty of installation a lot higher as there is not as much documentation on it. There are a number of steps involved when trying to install Snort. Unlike many systems this IDS has to be installed in separate parts. The main parts include: Installing WinPcap Installing and Configuring Snort Installing Apache Web Server Installing and configuring PHP Configuring WinIDS to run as service Installing and configuring MySQL Installing ADODB Installing and configuring the WinIDS Security Console Creating the WinIDS Security Console Database Tables Configuring the Graphing for the WinIDS Console Securing the WinIDS Security Console Within these parts there is a lot of editing of files through use of opening the main configuration files in WordPad and adapting to our installation. Documentation Recommendation â€Å"Snort is, by far, the gold standard among open source NIDS systems, with over 100,000 users and 3 million downloads to date. Snort signatures are kept up-to-date by its dedicated users and the Snort website has ample documentation including tutorials. It is not, however, easy to use and requires an experienced security IT professional to configure it properly. The fact that it's free makes it the darling of small and medium-sized businesses that cannot afford the fancy GUIs and wizards of commercial network security products. † http://www. enterprisenetworkingplanet. com/netos/article. php/10951_3684306_1 Evaluation References

Monday, July 29, 2019

Does War Advance Civilization Research Paper Example | Topics and Well Written Essays - 750 words

Does War Advance Civilization - Research Paper Example Civilization is any multifarious society characterized by urban expansion, social stratification, emblematic communication forms and a perceived natural environment by culture, civilization is referred to as advancement. Civilization is intimately associated with social, political and economic characteristics including centralization, specialization of labour, monumental architecture, taxation, and social dependence. War has a profound impact on technology, the World War II being an example of a global war led to technology advancements that were and are still of great benefits, for instance, the development of air travel technology that was brought about by the end of the World War II. Through this, there was the promotion of transport that made it possible and easy to travel across the world. This advancement has made the world a global village whereby someone can quickly travel across the world with a span of a moment. The advancement has aided in advancing civilization and thus p roving that war can influence civilization.Second, war has an impact on technological progress in the medical science arena. AFR contributed to the need to preserve more lives in case of war and to invent better ways of killing enemies using science technology. The use of scientific methods to fight was evident during the world war I and II, where scientific and medical inventions were advanced, for instance after the world war I, countries like Russia were on the front line to invent better methods of fighting after they had been defeated.

Sunday, July 28, 2019

Royal Dutch Shell Group Strategic Management Essay

Royal Dutch Shell Group Strategic Management - Essay Example These definitions highlight both the internal and external roles of strategic management in terms of the organization. Further definitions will be given in following sections. Shell’s approach leading up to the new millennium was mainly internal, with massive restructuring of the organisation through divesting unprofitable business areas, eliminating unwanted bureaucratic levels of administration, and placing more power in the hands of a few executives, with the main control and authority coming from the corporate centre consisting of the committee of managing directors (CMD). This was established by flattening the organization’s structure and resulted in minimizing the channels of communication between the corporate center and the operating companies, thus making reporting less complicated. By 2000, Shell’s management structure consisted of the corporate center as the central authority, with executive officers from each of their business units reporting directly to the corporate center. The operating companies, in turn, reported to the business units. This constitutes a flatter organisation structure with a strong central leadership where the overall objectives and goals of the organisation are clearly communicated through the different entities, and problems facing the operating levels in different geographical regions can be effectively made known to the corporate centre for further strategic actions (see Dubrin, 2004; Mullins, 1999). In effect, it can be safely assumed that Shell was headed towards an authoritative style of management starting from the corporate center and continuing down through the executive offices of the business units and finally the operating units. A simpler structure is also helpful for the management in assessing more clearly employees’ performances in order to carry out appraisals and give rewards (Mullins, 1999; Brooks, 2006).

Saturday, July 27, 2019

Orwell's 1984 paper Essay Example | Topics and Well Written Essays - 750 words

Orwell's 1984 paper - Essay Example a similar profoundly satiric allusion to the Communist Manifesto, which was published in 1848 and was a highly influential book of its time in terms of political ideology. It promoted the ideology of Communism and was written by the famous communist theorists Karl Marx and Friedrich Engels. As its name depicts the book was all about the political ideology of overthrowing the† bourgeois† and bringing the working classes (â€Å"the proletariat) to power. George Orwell (whose real name was Eric Blair) makes satiric allusions to the communist manifesto and the regime it sought to promote. He was not anti-communist but towards the end of his career he felt disillusioned by the mechanics and â€Å"manifesto† of the Communists. He believed that such an ideology would always deteriorate into a dictatorial regime. The novel alludes largely to the situation of the regimes who took to the communist ideals (especially the case of Russia and the USSR) and how the Communist Manifesto fast moved away from its real aim of the emancipation of the working classes from the bourgeoisie. The theme of the story in 1984 depicts the world in the year â€Å"1984† in the setting and assumption the Communist movement has successfully dominated the world. The main Character of Emmanuel Goldstein is an allusion to Marx and Lenin who were the most prominent leaders and supporters of the Communist ideology.One of the strongest allusions to the Communist manifesto (and to some extent Lenin’s book on communism called† Testament"),is when Orwell states in his book that the fictitious Communist leader Goldstein writes a book called "The Theory and Practice of Oligarchical Collectivism".He goes further to describe his Communist â€Å" hero† as having a â€Å"a lean Jewish face,(with) †¦.. fuzzy aureole of white hair" which if carefully examined reminds us of the appearance of Marx who wrote the Communist Manifesto. His bitterness can be seen further when he writes that Goldstein is deceiving the

Friday, July 26, 2019

Multiplier-accelerator models Essay Example | Topics and Well Written Essays - 500 words

Multiplier-accelerator models - Essay Example Keynes argued that level of output will increase due to multiplier relationship between output and autonomous consumption. (Hartley, J. et al. 1998). Change in output due to change in investment can be described in following manner: The Accelerator model is based upon the assumption if current economic activity increases, it will allow entrepreneurs to expand productive capacity by investing into additional capital stock . The Acceleration principle also outlines that there will be an increase in the output level with the increase in investment and there will be an additional investment when output increases. The above relationship suggests that consumption comprises of overall autonomous consumption and the propensity to consume with respect to the past income of an individual. Samuelson’s model therefore outlines different parametric conditions under which economy can move and as such economic cycles can occur. Samuelsson’s model is considered as incomplete as a theory of regular cycles because of its inability to predict regular business cycles however, it is still considered as one of the key advances in macroeconomic theory. Lloyd Metzler’s model was based upon his famous Inventory Cycle principle and suggested that the precise inventory policy as chosen by the producers might have an impact on the economic cycles. This model outlines that the change in output is a relationship between the consumption and investment and investment comprises of the investments made in inventory considering capital stock as constant. (SÃ ¸rensen, and Whitta-Jacobsen, 2010). Hicksian Model was also another attempt to understand the business cycles and how consumption and investment actually have an impact on the income level. Hicks assumed that the consumption is the function of past income while investor attempts to maintain a stock of capital in relation with the income. The combination of income and consumption therefore can generate oscillation in income or

Research paper and process Assignment Example | Topics and Well Written Essays - 4000 words

Research paper and process - Assignment Example ss will help me in analyzing my chosen topic of interest and hence they will help a lot during my data collection and in writing the conclusion of my topic of interest. As a final year, student, I do not have a lot of time to choose my topic of interest and can not concentrate on it fully since I have to attend to a lot of projects; hence, this class should have been taught in other years and not during the final year. Reflection #2:  What are the problems/issues/roadblocks with your paper/topic at this point and what are you going to do about them?   What are the problems/roadblocks that you expect to encounter during this class? (200 words) One of the major difficulties that I face in my Capstone course is time management, as a finalist student I am experiencing some hard time in trying to manage my time well and find enough time to research extensively on my topic on interest. I can not also write as fast as I am required to do since I am using English as a second language. Making a plan to do research on my chosen topic will tremendously help me to acquire the material I need for my research but this is being hindered by my school schedule since I have to juggle and attend several other classes, I also have to do other research in other courses. This is therefore, creating so little time for my capstone course. If I had to get a chance to do capstone without much pressure, I can perform much better and thus make this course an impressive achievement to my life hence add value to my studies. Reflection #3:  Critique your writing process.   What worked for you?   What didn’t?   What problems or roadblocks did you hit in the writing process that you could avoid for the rest of the course?  Ã‚  Are these different or the same from roadblock problems in your art/design work and why? (200 words) I become a slow writer when i am faced in dealing with several projects at a time. This becomes even worse when the number of projects are doubled hence creating a jam

Thursday, July 25, 2019

ALFRED THAYER MAHAN Essay Example | Topics and Well Written Essays - 750 words

ALFRED THAYER MAHAN - Essay Example Commissioned as a Lieutenant in 1861, Mahan served the Union in the American Civil War as an officer on Congress, Pocahontas, and James Adger, and as an instructor at the Naval Academy. In 1865 he was promoted to Lieutenant Commander and then to Commander (1872), and Captain (1885). Despite his success in the Navy, his skills in commanding a ship was not exemplary, and a number of vessels under his command were involved in collisions, with both moving and stationary objects. With strong affection for old square-rigged vessels, he did not like smoky, noisy steamships of his times and he tried to avoid active sea duty. On the other hand, the books he wrote ashore made him arguably the most influential naval historian. In 1885, he was appointed lecturer in naval history and tactics and the Naval War College. It was here he began researching and writing his lectures. He later became the president of the Naval War College and sometime in 1887, he became acquainted with a young visiting lecturer named Theodore Roosevelt, who would later become the president of the United States. During this period Mahan organized his Naval War College lectures into his most influential books, The Influence of Sea Power upon History, 1660–1783, and The Influence of Sea Power upon the French Revolution and Empire, 1793–1812, published in 1890 and 1892, respectively. Some of his other noteworthy works include Life of Farragut (1892), The Life of Nelson, the Embodiment of the Sea Power of Great Britain (2 vols., 1897), Sea Power in its Relation to the War of 1812 (1905), and From Sail to Steam (1907), the last a book relating to his own career. In his later years he also wrote many articles for the magazine s, and out of them were formed several volumes of essays. Mahan believed that control of seaborne commerce was the determining factor to domination in war. It emphasized that if one combatant could deny the use of the sea to the other party, then the economy of the other side would

Wednesday, July 24, 2019

Don't Ask, Don't Tell Policy Term Paper Example | Topics and Well Written Essays - 1250 words

Don't Ask, Don't Tell Policy - Term Paper Example   Significantly, there have been arguments in favor of as well as against the policy and a reflective analysis of the policy is required for a judicious judgment on the issue. â€Å"A Gall up poll taken in July 1993 found the public evenly split over both a â€Å"Don’t ask, don’t tell† policy and a question of whether homosexuality is incompatible with military service. Forty nine percent agree and 48 percent disagree with the statement â€Å"homosexuality is incompatible with military service† (National Defense Research Institute U.S. P.202). Therefore, this paper analyzes the various aspects of the policy â€Å"Don’t ask, don’t tell† to determine a careful position on the topic. Although there are several criticisms raised against the military’s ‘Don’t Ask, Don’t Tell’ policy, both in the Congress and among the general public, the military is not prepared for this drastic change as the positive re sults of the policy are several. Significantly, the policy DADT has already become a central element of the military policy regarding same-sex acts, a relaxation on the policy is not acceptable to the U.S. military. Therefore, I strongly agree with the idea behind the policy â€Å"Don’t ask, don’t tell† as this policy will help the U.S. military personnel in emphasizing the need for order and discipline in the army. The â€Å"Don’t ask, don’t tell† policy assumes greater significance as there is an imminent danger that the parents who are very much orthodox may not allow their children to join the army that it is lacking in high moral standards. A military unit would be sacrificing its reputation if it is lacking in discipline and unit cohesion. There are chances of internal disagreements and Soldiers may gather against the gay and lesbian groups and the military unit perishes under these circumstances.     

Tuesday, July 23, 2019

Inquiring Minds Want to Know - Now Case Coursework

Inquiring Minds Want to Know - Now Case - Coursework Example The other research question could be, should the company retain the reader services cards in it future advertisement services? Investigative questions: How does the current trend in the number of reader service card subscribers compare with the recent past? What are the alternative services being used by the clients and how can the alternative methods be implemented in Penton Media to enhance its advertising revenue returns? 2. Ethical issues relevant to this case study. The ethical principles of confidentiality, privacy and individual autonomy emerge as the most relevant issues in this case study. Since the company investigates individual customer behaviors and views, it is therefore, ethically obliged to ensure that its finding remain confidential and are not exposed to other people other than for the company’s use only. In this case, the company committed itself to respect the principles of confidentiality and privacy in handling the participants’ responses (Cooper & Schindler, 2010). On the other hand, the company must seek the consent of the participants before sharing its findings with the rest of the company stakeholders. The findings should remains anonymous from the point of collection to its analysis in which no identification should be given for responses provided. Researchers must present the research findings without any form of biasness or manipulation of the results to suite certain expectations. 3. Describe the sampling plan. Analyze its strengths and weaknesses? Researchers in this study applied the unrestrictive random sampling plan in which different sample were drawn from the company’s database of 1.7million subscribers. A small sample of 300 subscribers was then used for the mail survey pretest. Researchers are also used the stratified disproportionate random sampling to draw another sample of 4,000 participants including executives, managers, purchasing agents and engineers from the company’s database(Cooper & S chindler, 2010). Some weaknesses can identified with sampling plan including the possibility of locking out some participants that could provide important information about the problem faced by the company. The use of self-reporting questionnaires provides participants with the freedom to present their views although resulted in significant reduction of the targeted sample. The use of mail surveys in form of questionnaires made the collection data less costly and time consuming. 4. Describe the research design? The research design involved in this study was the multistage design in which different samples and different phenomena were studied in the same study. The study entailed the pretests and the main study. The first study established the views of subscribers through questionnaires and phone surveys, then a selected sample of 300 subscribers and finally a sample of 4000 participants selected from the company’s leadership (Cooper & Schindler, 2010). 5. Critique the survey used for the study The survey did not reflect the actual situation in the publication market segment because the sample was drawn from the company’s database comprising of its clients rather than obtain information about the market. Therefore, segmentation of the sample population limited the information obtained from the study. The study also had a significantly high error margin of +- 4% which raises issues of reliability and validity of the data obtained (Cooper & Schindle

Monday, July 22, 2019

Trends in Racism Reporting Essay Example for Free

Trends in Racism Reporting Essay Racism in reporting seemed to have peaked during the 1950s.   Perhaps the reason for the peak was that the whites and the blacks in America had shared a master-slave relationship in the past.   The Civil Rights Movement had called for changing the status quo.   The demand for equal rights for the blacks was met with resistance, however.   This is the reason why an article published in The Birmingham Post-Herald in 1955 quotes a white sheriff thus: †¦Ã¢â‚¬Å"We haven’t mixed so far down here and we don’t intend to (â€Å"10 Jurors Picked as Till Trial Opens†). †Ã‚   The sheriff was, of course, describing the relations of the white race with the black race (â€Å"10 Jurors Picked as Till Trial Opens†).   Ã‚  Ã‚  Ã‚   The above mentioned news article is actually a report on a trial.   All of the jury members selected for the trial were white men.   Eight of the men were farmers and one of them was a laborer.   There were â€Å"eight Negro reporters† present at the trial, but all of them were â€Å"segregated at a separate table (â€Å"10 Jurors Picked as Till Trial Opens†).†Ã‚   Considering that the theory of racism is based on the assumption that a race can be superior to another race for any number of reasons, the news report of the 1950s describes blatant racism.   So, even though the blacks had worked as laborers for the whites in the past, for the reason that the blacks had served the whites as slaves, they could not be members of the jury even if one of the jury members was a white laborer.   Ã‚  Ã‚  Ã‚   Contrary to the stance of the whites with respect to the blacks described in the above mentioned article, a news article published by The San Francisco News in 1942 describes the value of the Japanese Americans to the economy of the United States.   The author of the article, â€Å"Jap Ban to Force Farm Adjustments,† states that the internment of the Japanese Americans would adversely affect the agricultural produce of California.   The article refers to the Japanese Americans as â€Å"[f]ast and efficient workers (â€Å"Jap Ban to Force Farm Adjustments†).†Ã‚   Even though the work of the Japanese Americans on Californian farms had required â€Å"the most arduous form of ‘stoop labor,’† the article mentions that the white farmers would be able to handle it, but not as well as the Japanese American workers (â€Å"Jap Ban to Force Farm Adjustments†).   Ã‚  Ã‚  Ã‚   Stoop labor is defined as â€Å"[b]ack-bending manual work (â€Å"Stoop Labor†).†Ã‚   If the news article published in 1942 had clearly stated that the white farmers will not be able to replace the Japanese Americans on the plantations because the latter were engaged in stoop labor which the white farmers simply would not engage in; it would have been obvious that the reporting is racist.   However, this is not the case.   Rather, the Japanese Americans are lauded for their efficiency in the news report, as some of them were capable of tending to forty to fifty gardens at a time (â€Å"Jap Ban to Force Farm Adjustments†).   Ã‚  Ã‚  Ã‚   Even though the Japanese Americans had been interned during World War II, the whites did not seem to look down upon them or consider them inferior.   On the other hand, the blacks were obviously considered inferior because they had served the whites as slaves.   These differences of perceptions are made clear by the news reports. Works Cited â€Å"10 Jurors Picked as Till Trial Opens: 3 Veniremen Dismissed Because of Link with Fund to Defend Accused Men.† The Birmingham Post Herald. 19 Sep 1955. â€Å"Jap Ban to Force Farm Adjustments.† The San Francisco News. 4 Mar 1942. â€Å"Stoop Labor.† Answers. 2007. 10 Dec 2007. http://www.answers.com/topic/stoop-labor.

Lessons in Pragmatism Essay Example for Free

Lessons in Pragmatism Essay Having been a Para Educator since 1994, serving both Special Education as well as General education children, I have had countless opportunities to observe incredible teachers in action. In fact, one of my most vital responsibilities is to collect observational data on various special education students and their IEP goals. This allows the teacher to generate reports of student progress and to help in modifying goals and objectives as needed. It is unfortunate that the writing of this paper falls during the summer months making it impossible to conduct a formal observation of a specific lesson plan in real time. Therefore, the focus of this presentation shall be a lesson plan which was located in the database of the National Council of Teachers of Mathematics, an organization dedicated to providing enriching, meaningful mathematics curriculum while ensuring availability for all students. This particular lesson plan is a multi-dimensional lesson, or a better an investigation, written by Laurie St. Julien (2008) and printed in the publication Teaching Children Mathematics. It has been generated toward third graders as a means to â€Å"pose their own mathematical questions from real data† (St. Julien, 2008, pg. 506) Before performing any critique of a lesson plan, it is first helpful to identify the basic philosophies that provide its foundation. In a course structured around empowerment through group dynamics conducted by Brunson and Vogt (1996), the results correlated with the theology that â€Å"an empowering educational philosophy promotes trust, collaborative learning and tolerance for ambiguity†. (Brunson Vogt, 1996, pg. 73) Pragmatism is a philosophy that centers not on the simple passing of knowledge from teacher to student, but around the teacher and student acting as co-learners in the educational process. Stallones, 2011) Pragmatic teachers believe that in order for children to flourish, they must be provided with opportunities to create their own knowledge through experience with the real world in a social context. This Pragmatic theology can be traced back to philosopher John Dewey (1859 – 1952). He saw education as the process of reconstructing knowledge through experiencing the real world; seeing Philosophy as a discipline that required constant change, paradoxically requiring the same reconstruction in education. Neubert, 2009) Following this school of thought, students are guided to generate their own questions, and to use scientific means to come to their own conclusions. This seems to go in tandem with the 7000 Pancakes lesson plan, centered on the theme of the incredible weekend output of the busiest International House of Pancakes in the country. This is quite pragmatic in that it clearly relates to a real world construct familiar to most children, as well as the fact that this particular pancake house just happens to sit next to Disneyland. The students have not been asked to arrive at a singular conclusion, but rather to hypothesize and test their theories, problem solve solutions to and adjust their assertions. This is done in a systematic way over more than one period. (St. Julien, 2008) They are also asked to generate and share their own small group generated questions, This allows for the development of scientific analysis and critical thought, particularly when coupled with the opportunity to scientifically attempt to answer each other’s questions through experience. In addition, Pragmatism favors the merger of various disciplines, in this case the blending of mathematics and science. The lesson plan includes an element that focuses on the eggs that are needed to create various numbers of pancakes in various time increments; however it also questions the properties of the egg and how they change when prepared differently embodying a scientific component to the lesson. This is accompanied by hands on demonstration of all of the aforementioned components, even culminating in a pancake breakfast! St. Julien, 2008) The real world connection in every aspect of this lesson, and the scaffolded guidance required by the teacher to implement it effectively, shows the true pragmatic nature of the lesson and its creator. The strengths of the lesson in question are numerous. The social requirements within the various groups and in the numerous opportunities for open discussion provided a psychosocial aspect to this lesson. These social skills are vital in every aspect of adult life, beyond the practicalities of mathematics. This is support by Siegel (1995) in her assertion that â€Å"learning is a social process in which learners actively construct their understandings†. (Smith, 1995, pg. 407) By using the real world construct of the familiar pancake house, and the visual aids that the lesson facilitates the students in developing a vested interest in investigating the questions that naturally arise through scientific analysis. The hypothesis and analysis process that resulted were well established and right on target for the inquisitive mind of a third grader. Allowing them to tactilely handle the different components of the pancakes allowed them to commit the information to memory in meaningful ways, allowing them to apply this new knowledge to other situations. The scientific component is also a major strength, however I believe yet another discipline could have been added to this lesson; I would also ask them to keep a scientific journal chronicling the experience as well as write a short reflective essay at the end to tie in the language aspect as well. To find any other fault with the lesson plan in question or to better it would prove to be extremely difficult.

Sunday, July 21, 2019

Tiny Encryption Algorithm Tea Computer Science Essay

Tiny Encryption Algorithm Tea Computer Science Essay Today, security is an issue concern by everyone. Many ways of implementing encryption algorithms have been investigated in order to achieve better performance in terms of security level, speed, power consumption and cost. This project will discuss about implementing Tiny Encryption Algorithm (TEA) using Field Programmable Gate Array (FPGA). FPGA are reconfigurable chips that the integrated circuit is designed meant for reconfigurable architecture. A FPGA chips is programmed using Hardware Description Language (HDL). TEA is an encryption algorithm or block cipher that consider fast, easy and used for many application. In this project, TEA will be implemented on Altera Cyclone II FPGA using Altera DE1 Board. Keyboard using PS2 or the SWITCH on the DE1 will be used as input. The output of the encryption and decryption data will be show on VGA monitor. The encrypted data will be store in memory. Specific Objectives In order to complete this project, there are few objectives have to be archieve. Program the Tiny Encryption Algorithm (TEA) using verilog HDL (Hardware Description Language) Verifying the functionality of the implementation of the encryption in FPGA Perform simulation for timing analysis and the encryption process on the implementation of Tiny Encryption Algorithm (TEA) in FPGA Experiment and test the project in practical Literature Research Cryptography Before the modern era, security communication is the primary concern in Government and Military[2]. Security communication become more important today as a result of the increasing use of the electronic communication for many daily activities such as internet banking, online shopping. Cryptography is a practical way of conveying information securely [1]. The main aim of cryptography is to allow authorized person to receive the message correctly while preventing eavesdroppers understanding the content of the message [1]. The original message is called plaintext t[1]. Plaintext will be encrypted using certain algorithms in the secure system in order to hide the meaning[1]. The output of this reversible mathematical process is called ciphertext and the algorithm used in this process is called cipher [1]. Ciphertext can be transmitted securely because ideally eavesdroppers that access to the ciphertext wont understand what the meaning is behind [1]. The reverse of this mathematical proce ss is to decrypt the ciphertext back to plaintext and this only can be done by the original recipients [1]. The processes of encryption and decryption are shown in Figure 1. Eavesdropper Plaintext Encryption Ciphertext Plaintext Decryption Figure 1 Encryption There are two types of encryption or cipher depends on the key used: Asymmetric key and Symmetric key. Symmetric key The encryption and decryption process use the same key [1]. The major problems and drawback of this key both sender and receiver must know the key prior to the transmissions [1]. If the key is transmitted then it will compromise the systems security [1]. The advantages of symmetric key is the process of encryption and decryption will be faster compare to asymmetric key, in another words it can encrypt or decrypt more data in shorter period of time [1]. Asymmetric key The encryption and decryption process use different key but both of the key are related mathematically [1]. It is very hard to obtain one from the other although they are mathematically related [1]. The public key is used for the encryption process and the private key is used for the decryption process [1]. The security of the system wont be compromised even though the public key is made available but the corresponding private key cannot be revealed to anyone [1]. Symmetric key Symmetric key is further divided into two types: Symmetric Cipher and Block Cipher. Stream Cipher Stream cipher that generates a keystream (a sequence of bits used as a key) [4]. The encryption process is usually done by combining the keystream with plaintext using bitwise XOR operation [4]. Keystream that generated is independent of the plaintext and ciphertext is called synchronous stream cipher while keystream that is generated is depent of plaintext is called self-synchronizing stream cipher [4]. Block Cipher Stream cipher that generates a keystream encrypt fixed length block of plaintext into block ciphertext that is same length [3]. The fix length is called block size. Block Cipher using same secret key for the encryption and decryption process [3]. Usually, the size of block cipher is 64 bits [3]. By increasing the size of block cipher to 128 bits will make the processors become more sophisticated [3]. Stream Cipher vs Block Cipher Stream cipher is a type of symmetric encryption algorithm that can be designed to be exceptionally fast and even much faster compare to block cipher [4]. Stream ciphers normally process on less bits while block ciphers can process large blocks of data [4]. Plaintext that encrypted using block cipher will result in the same ciphertext when the same key is used [4]. With a stream cipher, the transformation of thse smaller plaintext units will vary depending on when they are encountered during the encryption process [4]. Stream Cipher Block Cipher Block Size Depends Fixed Encryption/Decryption Speed Fast Slower Size of block data can be process Small Larger Figure 2: Comparison of Stream Cipher and Block Cipher Figure 3 below shows different type of algorithm table.jpgFigure 3 :Different type of encryption algorithm Tiny Encryption Algorithm is implemented in this project because it is one type of cipher encryption algorithm that encrypt 64 bits of plaintext using a 128 bits of key into a 64 bits ciphertext. TEA Tiny Encryption Algorithm (TEA) is a Feistel type routine designed by David J. Wheeler and Roger M. Needham. It used addition and subtraction as the reversible operators [5]. XOR and ADD alternately used in the routine provide nonlinearity [5]. The Dual bit shifting in the routine cause all the bits and data mixed repeatedly [5]. The three XOR, ADD and SHIFT operation will provide Shannons properties of diffusion and confusion necessary for a secure block cipher without the need for P-boxes and S-boxes [6]. TEA is a feistel cipher that split the plaintext into halves [7]. A sub key will be applied to the one half of plaintext in the round function, F [8]. Then the output of the F will be XOR with other half before the two halves are swapped [8]. All same patterns applied to the entire round except the last round where there is often no swap [8]. Figure 2 below show a Feistel cipher diagram where 64 bits of plaintext is divided into halves which are equally 32 bits each part. 128 bits of key is used for the encryption and decryption process and it is spitted into 32 bits subkey [7]. TEA.png Figure 4: Two Fiestal round(one cycle) of TEA The encryption and decryption routine of Tiny Encryption Algorithm (TEA) written in C language [5]. void encrypt (uint32_t* v, uint32_t* k, uint32_t* v1) { uint32_t v0=v[0], sum=0, i; /* set up */ uint32_t delta=0x9e3779b9; /* a key schedule constant */ uint32_t k0=k[0], k1=k[1], k2=k[2], k3=k[3]; /* cache key */ for (i=0; i sum += delta; v0 += ((v1>5) + k1); v1 += ((v0>5) + k3); } /* end cycle */ v[0]=v0; v[1]=v1; } void decrypt (uint32_t* v, uint32_t* k, uint32_t* v1) { uint32_t v0=v[0], sum=0xC6EF3720, i; /* set up */ uint32_t delta=0x9e3779b9; /* a key schedule constant */ uint32_t k0=k[0], k1=k[1], k2=k[2], k3=k[3]; /* cache key */ for (i=0; i v1 -= ((v0>5) + k3); v0 -= ((v1>5) + k1); sum -= delta; } /* end cycle */ v[0]=v0; v[1]=v1; } [5] delta is derived from the golden number where delta = Architectures Untitled.jpg Figure 5: TEA architectures TEA is implemented using three different architectures. The first architecture (Figure 3a) is a multiple 32 bit adders that simultaneously perform operations needed for one encryption cycle [6]. This parallel form structure should be quite large in terms of hardware area but will perform faster [6]. On the other hands, in order to reduce the area, the second architecture (Figure 3b) performs operations sequentially using a single 32 bit adder [6]. The last design (Figure 3c) is a 8 bit digit-serial adders that use advance architecture offered by application-specific hardware solution [6]. The latter two design are meant for low area solutions but in terms of control and data selection, the effectiveness remain confirmed [6]. Software vs Hardware Implementation of Encryption Implementation of encryption using software is easier to design and upgrade, it also portable and flexible [7]. One of the major problems of software implementation is in most typical personal computer have external memory out from the processor, the external memory is used to store raw data or instruction in unencrypted form so if an attacker gain access to the system, the key can be easier obtained [7]. One of the most common way used by the attacker is bruteforce, a special program can be easily design to bruteforce the algorithm. Besides this, reverse engineering method easier to apply on software implementation. So it can be concluded that software implementation is lack of physical security[7]. Implementation of encryption using hardware by naturally is physically more secure as they are hard to read and view by attacker [7]. Another advantage of hardware implementation is all the data in the encryption process is correlated according to an algorithm which usually perform operation on same data [7]. This will prevent computer technique such as out of order execution and cause hang to the system [7]. Hardware implementation also tend to be more parallel so more orders of magnitudes can be done at certain period of time [7]. Hardware implementation is will be better choice for encryption in terms of performance but the cost of implementation is higher compare to software implementation. Higher security level and better performance is the main concern in this project, so the encryption will be implemented on FPGA, one of the hardware implementation method. Microcontroller, Microprocessor, DSP Processor and FPGA Microprocessor The first microprocessors invented in the 1970s [10]. This is the first time where such an amazing devices put a computer CPU onto a single IC [10]. The significant processing was available at rather low cost, in comparatively small space [10]. At beginning stage, all other functions, like input/output interfacing and memory were outside the microprocessor [10]. Gradually all the other functions in embedded into a single chip [10]. At the same time, microprocessor becoming more powerful in terms on the speed, power consumption and so on [10]. Microprocessor is moving rapidly from 8 bits to 32 bits [10]. Microcontroller A microcontroller is an inexpensive single-chip computer [9]. The entire computer system lies within the confines of the integrated circuit chip, so it is called a single chip computer [9]. The microcontroller on the encapsulated sliver of silicon has features similar to those personal computers [9]. Mainly, the microcontroller is able to store and run a program [9]. The microcontroller contains a CPU (central processing unit), ROM (random-access memory), RAM (random-access memory), Input/Output lines, and oscillator, serial and parallel ports [9]. Some more advanced microcontroller also have other built in peripherals such as A/D (analog-to-digital) converter [9]. DSP (Digital Signal Processing) Processor DSP processor is a specialized microprocessor optimized to process digital signal [12][13]. Most of the DSP processors are commonly designed to have basic features such as high performance, repetitive and numerically intensive tasks so DSP processor often have advantage in terms of speed, cost and energy efficiency [11]. DSP processor have the avility to perform one or more multiply accumulate operations (often called MACs) in a single instruction cycle [14]. FPGA (Field Programmable Gate Array) Xilinx Co-Founders, Ross Freeman and Bernard Vonderschmitt, invented the first commercially viable field programmable gate array in 1985 the XC2064. FPGA is integrated circuit for reconfigurable purposes by user after manufacturer. FPGA is generally specified using Hardware Description language (HDL). FPGA can be programmed to perform logic function and due to this ability, FPGA become more popular. Using FPGA for design can lower non recurring Engineering cost and apply on many application. Hardware Architectures comparison The figure 6 below show the comparison of different architectures used for hardware implementation on encryption. Architecture Efficiency Performance Non recurring Engineering Cost Unit Cost Microprocessor Low Low Low Low Microcontroller Low Low Low Low DSP processor Moderate Moderate Low Moderate FPGA High High Low High Figure 6: Architectures Comparison Comparing the four architectures above, FPGA have the advantage in terms of the efficiency Performance but the unit cost is high. Since costing is not a major concern in this project, so FPGA is better choice for implementing Tiny Encryption Algorithm. Altera DE1 Development and Education Board Altera DE1 is a FPGA Development and Education Board that will be used for this project [17]. Below is the features of this board: DE1_intro_500x.png Figure 7: Altera DE1 Board Altera Cyclone II 2C20 FPGA with 20000 LEs Altera Serial Configuration deivices (EPCS4) for Cyclone II 2C20 USB Blaster built in on board for programming and user API controlling JTAG Mode and AS Mode are supported 8Mbyte (1M x 4 x 16) SDRAM 4Mbyte Flash Memory 512Kbyte(256Kx16) SRAM SD Card Socket 4 Push-button switches 10 DPDT switches 8 Green User LEDs 10 Red User LEDs 4 Seven-segment LED displays 50MHz oscillator ,24MHz oscillator ,27MHz oscillator and external clock sources 24-bit CD-Quality Audio CODEC with line-in, line-out, and microphone-in jacks VGA DAC (4-bit R-2R per channel) with VGA out connector RS-232 Transceiver and 9-pin connector PS/2 mouse/keyboard connector Two 40-pin Expansion Headers DE1 Lab CD-ROM which contains many examples with source code Size ¼Ã… ¡153*153 mm There are few features of DE1 Board will be used for this project. PS/2 mouse/keyboard connector PS/2 keyboard is used as input for the plaintext 4 Push button switches used as a reset button VGA DAC (4-bit R-2R per channel) with VGA out connector VGA monitor is connected to the DE1 board to show the input of plaintext and the output of the encryption, cipher text 4Mbyte Flash Memory Used to store the ciphertext VGA controller IBM introduce video display standard called VGA (video graphics array) in the late 1980s that widely supported by PC graphics hardware and monitors [18]. Figure 8: Simplified Block Diagram of VGA Controller The vga_sync circuit generates timing and synchronization signals [18]. The hsync and vsync signals are connected to the VGA port to control the horizontal and vertical scans of the monitor [18]. Two signals which are pixel_x and pixel_y are decoded from the internal counters [18]. The pixel_x and pixel_y signals indicate the relative positions of the scans and essentially specify the location of the current pixel [18]. Videl_on signal is generated from vga_sync to check whether the display is enable or disable [18]. The pixel generation circuit generate three video signal which is RGB signal [18]. The current coordinates of the pixel (pixel_x and pixel_y), external control and data signals determine the color value [18]. PS/2 Controller IBM introduced PS2 port in personal computers [18]. It is a widely used interface for keyboard and mouse to communicate with the host [18]. PS2 port consists of two wires for communication purposes [18]. One wire for transmitting data in serial stream while another wire is for the clock information which determine when the data is valid and can be retrieved [18]. The data is transmitted in 11 bit packet that contains 8 bits of data, an odd parity bit and stop bit [18]. Figure 9: Timing Diagram of a PS/2 port Quartus II Web Edition Quartus II Web Edition design software is a comprehensive environment available for system-on-a-programmable-chip (SOPC) design developed by Altera [19]. This software is used in this project to program and implement the Tiny Encryption Algorithm (TEA) on Altera DE1 Cyclone II FPGA [19]. This program also can be used for the simulation and timing analysis [19]. Hardware Description Language (HDL) Hard description language (HDL) is a type of programming languages used to program and describe digital logic or electronic circuits [20]. It can describe circuit operation, its design and organization [20]. Figure 10 below shows different type of Hardware Description Language commonly used. HDL Syntax Similarity AHDL Ada programming Language VHDL Ada Programming Language JHDL Java Verilog C Programming Language Figure 10 : Different type of HDL Verilog Hardware Description Language (HDL) is used to program the FPGA in this project because it is a widely used HDL and it syntax is similar the C programming language. Methodology Block Diagram VGA Monitor PS/2 Keyboard VGA Controller Plaintext TEA Encryption Core Flash Memory 64 Bits Ciphertext PS/2 Controller Key 128 Bits 64 Bits Encryption/Decryption Acknowledge Key Update Request Busy Asynchronous Reset Clock Figure 11: Core Module The Blog Diagram above explains the design of this project. PS/2 keyboard used as input for the plaintext. All the data from the PS/2 keyboard will be sent into PS/2 controller to process. The processed data, 128 Bits or key or 64 Bits of plaintext will sent into the TEA encryption core for encryption. The output of the encryption, ciphertext will store inside the flash memory. All the plaintext and cipher text will send into VGA controller to process and show on the CRT monitor. The encryption/decryption will be connected to the DPDT switch to switch between encryption or decryption mode. Key Update Request also connected to the DPDT switch for the purpose of updating the key when the switch is on. Asynchronous reset is connected to the push button for the reset purpose. There are internal clock inside the DE1 board so no external clock is needed for this project. Algorithm and Implementation Verification The original Tiny Encryption Algorithm C source code by the author will be compiled or get a compiled executable program from other source to analyze the encryption of plaintext to ciphertext and decryption of ciphertext back to plaintext. A set of plaintext, ciphertext and key can generated from the program as a reference and compare with the encryption and decryption output implemented on FPGA. Figure 12 is an example of compiled executable program of Tiny Encryption Algorithm by Andreas Jonsson TEA.jpg Figure 12 Costing Estimation Components Quantity Price Altera De1 Board [17] 1 RM 512.84 Used 15 Samsung SyncMaster CRT monitor 1 RM50.00 Used PS/2 Keyboard 1 RM10.00 Total RM572.84 Gantt Chart ganchart.jpg Research analysis will be start from week 6 till week 8. Verilog coding on the implementation of TEA and module and test bench verification this 2 task must perform parallel because after finish a certain module, it should be test and simulate. If simulation or test is done after finish the whole coding, there will be a big problem in debugging the error. The synthesis of PS/2 keyboard, VGA monitor and FPGA start week 20 just before finish the coding. The functionality verification task also runs parallel with the synthesis optimization task. References and Figures Figures Figure 4: Tiny Encryption Algorithm .Available at: http://en.wikipedia.org/wiki/Tiny_Encryption_Algorithm (Accessed: 30 October 2009) Figure 5: Israsena. P, Design and Implementation of Low Power Hardware Encryption for Low Cost Secure RFID Using TEA . Information, Communications and Signal Processing, 2005 Fifth International Conference on 0-0 0 Page(s):1402 1406, DOI 10.1109/ICICS.2005.1689288. Available at http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=1689288isnumber=35625 (Accessed : 26 October 2009) Figure 7: Available at: http://www.terasic.com.tw/cgi-bin/page/archive.pl?Language=EnglishNo=83 ( Accessed : 28 October 2009) Figure 8: Pong P. Chu (2008) FPGA Prototyping by Verilog Examples :John Wiley Sons Figure 9: Pong P. Chu (2008) FPGA Prototyping by Verilog Examples :John Wiley Sons

Saturday, July 20, 2019

Gender Inequality in Hollywood Essay -- stereotypes, media, gender ine

Stereotypes in our society are not uncommon. We come across them every day without realizing it. It is in our human nature to create expectations of the people around us, which could be based upon their ethnicity, sexual orientation, gender or other factors. Stereotypes help us categorize a vast group of people that we may not know anything about, to think that they are smaller and less intimidating. I believe that the blame for these cookie-cutter patterns can lead directly back to the media in every sense of the word. Media is all around us, and affects our opinions and ability to think for ourselves. Whether it’s the latest box office hit or the headlining news, we are getting assumptions from every point of view, which makes it hard to form our own. But I personally think that the biggest influence of our time are in the cinematic arts. Movies have been a huge part of the American culture since the motion pictures were first invented. Since the late eighteenth century, families have been going to the movie theater to spend quality time together. But as the action packed western thrillers soon turned to risque dramas, the idea of Hollywood made filmed changed drastically. In the early nineteen fifties, when televisions were becoming quite popular in the average American home, it was considered provocative to broadcast a married couple sitting in bed together. But today it would be considered a G rated program if it didn’t at least imply sexeul interests. This topic can be traced back to the stereotypes of Hollywood’s employees and how they influence us today. From Actors to Actresses or even just the director’s assistant, everybody in Hollywood has an expectation from someone else. When people think about the q... ... a child's life than motherhood. The interpretation is up to the audience, and sexist or not there still hints in the story by common belief of Hollywood critics. Both these movies, although vastly different, are examples of implied male dominance. A term more commonly referred to is gender inequality, which sounds more staid but at the same time is also taken more seriously. Works Cited Castillo, Monica. "You Can Win an Oscar, but You Can't Win Respect." B Media. N.p., n.d. Web. 6 Dec. 2012. Gianoulus, Tina. St. James Encyclopedia of Popular Culture. Vol. 4. Detroit [u.a.: St. James, 2000. Gale Virtual Reference Library. Web. "Roundtable: Five Casting Directors on Crazy Auditions and Industry Sexism." The Hollywood Reporter. THR Staff, n.d. Web. 13 Dec. 2013. "Film Facts." WMM | RESOURCES | FILM FACTS. N.p., n.d. Web. 16 Dec. 2013.

Friday, July 19, 2019

The Mexican War :: Texas Revolution Papers

Beginning in 1845 and ending in 1850 a series of events took place that would come to be known as the Mexican war and the Texas Revolution. This paper will give an overview on not only the events that occurred (battles, treaties, negotiations, ect.) But also the politics and reasoning behind it all. This was a war that involved America and Mexico fighting over Texas. That was the base for the entire ordeal. This series of events contained some of the most dramatic war strategy that has ever been implemented. What Caused This War? In 1845 the U.S attempted to Annex Texas. Basically America wanted Texas to become one of the states rather then and independent nation by itself. At this time Texas was an independent nation that was not a part of America or Mexico. Mexico wanted to keep Texas neutral if not a part of its own country. When the U.S attempted to annex Texas Mexico became outraged, " In November 1843 Mexico had warned that if the United States should commit the 'unheard-of aggression' of seizing an integral part of 'Mexican territory' Mexico would declare war " (Bound for the Rio Grande, 62). Despite the warning the U.S attempted to annex Texas. In doing so Mexico retaliated by breaking off all diplomatic relations with the U.S. Mexico felt that the U.S was insulting them by not taking them seriously when they threatened with war. So at this point America showed a very large interest in possessing Texas. America was very close to actually acquiring Texas when they made their first mistake in the war. The U.S requested the also be given the Rio Grande. The Rio Grande was south of Texas and clearly belonged to Mexico (refer to figure 1). The U.S felt that the Rio Grande was part of Texas and should be given to the U.S with Texas. Mexico would not give up the Rio Grande because they were certain that the Rio Grande belonged to them. America's greed is THE major reason this conflict occurred. The U.S also believed the Mexico should have to pay for any of the U.S's debts that were incurred during Mexico's conflicts with Spain. America was in debt 3 million dollars because of the Mexico and Spanish conflicts and America very strongly believed that these debts were Mexico's fault and they should have to pay for them.

Franz Joseph Haydn Essay -- essays research papers

FRANZ JOSEPH HAYDN   Ã‚  Ã‚  Ã‚  Ã‚   Dear President Schneider : On behalf of the great Franz Joseph Haydn, I write this letter of recommendation to support the admission of a great composer into the International Enlightenment Society. In order for a musician to be eligible for your society, I understand that he must embody the characteristics of the Enlightenment and more specifically, as a composer, his music must possess the characteristics of the Classical period. I assure you that what you will find in this letter of recommendation will not be disappointing. Franz Joseph Haydn was a great composer of the Classical era. Known as the Father of Symphony and the inventor of string quartets, the examples and styles that Haydn set forth were relied upon by Mozart and Beethoven in creating their own respective masterpieces.   Ã‚  Ã‚  Ã‚  Ã‚  Born in a small town just inside Austrian borders, Haydn did not have much of a chance to be anything other than a wheelwright like his father. However, his father was a man who loved to sing and when Haydn was a boy, he memorized almost every song his father sang. This was his beginning in music. Later on, he received an education from his uncle where he gained more of an interest in music. Participation in a choir gave him the opportunity to go to Vienna and there, he studied the piano sonatas of Emanuel Bach and was given the chance to finally get a chance to compose; something he had always wanted to do. This is when the first string quartet was developed. Later on, he was employed by the Esterhazy family and was given the chance to conduct an orchestra and write symphonies. It was at this time and place that Haydn was “completely isolated from the world…he could experiment…improve, alter, add, or cut as boldly as he pleased.'; This was the s tart of a magnificent career.   Ã‚  Ã‚  Ã‚  Ã‚  To understand why Haydn was a great classical composer, it is important to understand the certain characteristics and themes of the Classical Period. Unlike baroque music, classical was secular; it was non-religious and it resided more in the homes of nobles or in public works rather than in the church. There was the creation of symphonies, string quartets, and piano sonatas using a method called the sonata form. Unlike the complicated baroque counterpoint ... ..., and prancing horses down to the wrigglings of the humble earthworm.'; Despite being of a Baroque genre, it was simple and logically thematic making it more Classical than it was baroque. As you can quite see Mrs. President, Franz Joseph Haydn, definitely belongs in the International Enlightenment society. He was the inventor of the string quartets and the father of symphony, two important genres of the Classical period. He created the sonata form which has been echoed by other great composers including Mozart and Beethoven. His wide variety of music from happy dancing to somber funeral music was greatly appreciated by the public and the nobles earning him a honorary degree from Oxford as Doctor of Music. Unlike Mozart or Beethoven, when Haydn died he was not forgotten. Two weeks after his death, “the whole art-loving world of Vienna';, went to a great memorial service at the city center in honor of the greatest composer of the Classical period. If substance, restraint, simplicity, and balance of music are important characteristics of the Classical style, then it is not difficult to see why through his music, that Haydn was the greatest composer of Classical his tory.

Thursday, July 18, 2019

Childhood Obesity: The Causes And Health Problems Essay

The topic that I have chosen for my paper is addressing the issue of childhood obesity. According to Merriam-Webster (2010) obesity is a condition where there is excessive accumulation and storage of fat in the body. I think that childhood obesity is an epidemic that the United States of America is facing as a major issue for children health. Childhood obesity is one of the fastest growing health concerns in the United States. The definition of an epidemic according to Encyclopedia Britannica (2011) is the occurrence of disease that is temporarily of high prevalence. The childhood obesity rate has more than tripled in the United States over the last 30 years( Center for Disease Control, 2010) I will prove that there are ways to prevent the causes of childhood obesity. Research will be focusing on the causes, the health concerns, and the ways to prevent childhood obesity. The resources that will be using for the research are: internet research, case and research reports, and interviews. So far research findings are showing that there are many causes and effects of childhood obesity. Childhood obesity is difficult health problem because it has biological, behavioral, social, economic, environmental, and cultural causes (Koplan, Liverman, Kraak, 2005, pg 340). Each one of the causes stated above can have many different influences for a child in this country. An economic example is when the recession caused a lot of people to lose their jobs. The recession caused a lot of people to lose their income, which caused a lot of families to not be able to afford the necessities of life. People had to choose between making their house payment or buying food. The number of people also has something to do with how a family eats. The number of people that are in the family determines the amount and the cost of food needed. A family income also has an important role in a family. If the family size is larger and the income level is low then the  family may have problems buying healthier food. A social example would be their peers influencing what they eat when they are away from their house. Children could be more likely to eat what their friends eat when they are not home as well. The community has a role in this as well. The reason the community has a role in this is due to the restaurants that are in the area and the food those places offer. If your community only offers fast food then the child is more likely to eat that food, which is high in fat. The education level and number of parents may also affect childhood obesity. Research shows that the higher level of education and if both parents are in the home then it is less likely that a child will be obese ((Koplan, Liverman, Kraak, 2005, pg 216). A cultural example would be how we advertise products in the United States. Companies are advertising towards children. For example at a fast food restaurant the child meal comes with a toy. With children watching more and more TV these days the retailers are making commercials for the children that are watching them. The child’s ethnicity is an important factor as well. The traditions that the parents grow up with will be taught to the child and passed down to the next generation. The community again is important factor for this cause as well. People adapt to where they are living. For example if a family moves to from a neighborhood that had more restaurants than fast food, and then the family moves to a neighborhood that has nothing but fast food and there is no other place to eat they may change their diet. A behavioral example would be that a young child that does not want to eat their vegetables at lunch because they say they do not like them. Portion size is a very important factor for childhood obesity. If the portion size of an unhealthy food is too big then the child is more likely to become overweight. When a child is eating fast food or processed food or if they are drinking soda and juice, then they are consuming more sugar and calories than someone that may be eating vegetables or fruit. When a child intakes more calories or sugar, then does not exercise then the child is not burning off the extra intake off. Some children also play a lot of video games and  a child may watch a lot of TV, instead of playing outside. A biological example is if someone has a medical condition where it makes their metabolism not work the best and it causes them to have trouble losing weight or they just gain weight easily. Every person has a different metabolism level as well. Some people may have an over active metabolism and then there are others that have a metabolism that is very slow. Metabolism is how fast the body burns off calories or energy that the body takes in. Another factor is genes or heredity. Genes or heredity is something that you get from your parents of other people in your family. This gets passed down from generation to generation and there is nothing that can be about it, except trying to offset it buy changing diet or level of physical activity. An environmental example would be looking at the ease of accessing processed or fast food near a child’s home. The food that a parent fixes their child is an important factor. This is important due to the fact if the parent is fixing processed or just bringing fast food home then the child will be in taking more calories per meal which could affect the child’s weight in a negative way. The foods that a school offers are also a factor. A school that offers healthier choices may help the student choose the healthier food. When a child chooses a healthier food then they are more likely to continue their diet as an adult but this will also help the child’s weight then too. The state that a child lives in could also be a factor. Each state has their own specialty that almost everyone fixes. If the child is living somewhere, where foods are fired then they are in taking more fat and calories. There are so many health concerns that come with childhood obesity. Some of the health concerns are type 2 diabetes, cardiovascular disease, high blood pressure, lower life expectancy, stress, depression, and low self-esteem. According to the Center of Disease Control (2010) children that suffer from childhood obesity are more likely to get the above health problems when they get older to have these diseases as adults. If some kids are left to manage their own health then they will be unhealthy as an adult because their  lifestyle will not change. This is a very important health concern for our children because they are the future leaders of this country and this is causing them to die earlier than their life expectancy. Cardiovascular disease is one disease that is affecting children with childhood obesity. Cardiovascular disease is relating to or involving the heart and blood vessel in the body(Merriam-Webster, 2011). According to the Center of Disease Control, 70% of children that are obese have at least one risk factor for cardiovascular disease. One contributing factor is cholesterol to the above statistic. Kids are eat more and more fast food in this generation which is increasing their weight and cholesterol levels. Children are also not exercising or doing cardiovascular exercises like: swimming and running. This disease can also lead to many other health problems in adulthood. Another health concern for children that are obese is high blood pressure. Keeping your blood pressure in a healthy level is important because high blood pressure can lead to a heart attack or stroke. High blood pressure is known as hypertension. Hypertension is abnormally high arterial blood pressure (Merriam-Webster, 2011). According to Rob Stein (2007) â€Å"increases so far have been small — just 2.3 percentage points for early hypertension and 1 point for full-blown hypertension — they translate into hundreds of thousands more children developing what often becomes a chronic, lifelong condition†. High blood pressure can lead to other health concerns such as: heart disease, stroke and kidney troubles. The next major health issue that can come from a child being obese is type 2 diabetes. According to the University of Michigan Health System it could take up to 10 years before an obese child shows the development of type 2 diabetes. Type 2 diabetes is when the body can not process the insulin in the body produces. There are many things that can contribute to a child having type 2 diabetes. The level of exercise can help lower the risk of type 2 diabetes because when you exercise it helps the body burn the energy that is consumed. There are some complications for health when you have diabetes, those complications are blindness and amputations of the arms  and/or legs. Stress can also have an effect on a child’s health. Stress can cause many health issues because it takes energy to be stressed and many people worry when they are stressed. According to Merriam-Webster (2011), stress is a physical, chemical, or emotional factor that causes bodily or mental tension and may be a factor in disease causation. Stress can come from home, school, friends, and family. When someone is stressed they may eat for comfort and this can cause extra calories being taken in and not burned off. Stress can be linked to heart disease, stroke, high blood pressure, and many more. Low self-esteem is another important factor for children. Low self-esteem is a confidence and satisfaction in oneself. Low self-esteem can be from children bullying, making fun of each other, and stress. When a child has trouble making friends they may form a low self-esteem. Low self-esteem can cause an eating disorder. According to Susan Okie (2005, p 73), obesity is a risk factor for the development of an eating disorder. A child overweight could have a poor self-image and that could lead to an eating disorder. There is also a lower life expectancy with children that are obese. Life expectancy is referring to the age that a person lives to base on sex, ethnicity, and other factors. There are many factors that contribute to this. One factor is suicide. Children that have a low self-image or ones that have given up could resort to suicide. Another factor is the health issues that the obese child has. As the child gets older and if they already have heart disease, high blood pressure, or type 2 diabetes are likely to have the complications with those diseases earlier in their adult life. One way that Americans are trying to prevent childhood obesity is having schools offer more gym class time. Another way that Americans are trying to incorporate exercise is that the TV network Nickelodeon has a day that they turn off the cartoons and encourage children and their parents to go outside and play, they call it the national day of play. There are many health  programs also ran by the government trying to help low income families with providing their children with a balanced diet. The biggest thing that a parent can do is change their own lifestyle and pass it to the child. A parent leads by example showing their children how to live, act, and what to believe. A parent can start a daily activity with the family included and make this routine for the family. The parent can also change the food bought at the store and what is fixed at home. A child can be given a much smaller portion size and then if they are still hungry they could ask for more and the parent would determine the portion size of the extra the child would get. School are not out of the woods on this subject matter either. Schools offer processed food which are higher in calories, fat, and maybe sugar. Schools need to change their menu to offer healthier lifestyle choices. Schools would also help prevent childhood obesity by increasing the amount of time the student gets physical exercise during the school day. Another item the school should change to help prevent childhood obesity is the portion size of food their offering to a child. A community could ban together to prevent childhood obesity as well. The community could offer to have a campaign. These campaigns would be able to use multiple strategies,such as: media campaigns , community mobilizations, education programs for health professionals and the general public, modifications of physical environments, and health screenings and referrals (Koplan, Liverman, Kraak, 2005, pg 196). The community could also build a bike or walking trail in a park. Having the bike or walking trail will encourage the citizens of the community to get out and exercise. The community could also build a community center that has exercise equipment or a program ran thru the building to help teach parents to eat right. When the parents know what to do to help then they can pass the information down to the children. There are also many government ran programs to help low income families. One good example is the WIC program which stands for Women, Infant, and  Children. This program helps low income people that are pregnant or they have children under the age of five and they also have to meet the income guidelines for the size of the household. Income guidelines vary depending on what state in which the family resides in. WIC only offers certain foods to families. They offer formula for a baby, but the formula has to be on a state approved list (USDA, 2011). If there is a pregnant woman in the household, WIC then offers the household milk, whole grain bread, peanut butter or dry beans, fruit, approved cereal, and 100% fruit juice(USDA, 2011). If the woman is breastfeeding the baby then she is offered tuna and carrots for the nutritional value those foods give (USDA, 2011). Another government program is Food Stamps which help low income families buy food. There are income guidelines that someone would have to meet before getting assistance with this program. There is not much of a requirement of what food to buy on this program but they do have items that you are not allowed to buy. The recipient cannot buy taxable items such as diapers, paper towels, or toilet paper. The recipient cannot buy alcohol either. When a person on food stamps goes to a store to buy groceries the register will notify the cashier what is food stamp eligible and what is not. Anything that is not eligible the consumer must pay for. Without these programs the United States could have lots of hungry people that could starve to death. Research is stating that childhood obesity is preventable when proper diet and exercise are incorporated into a child’s life from a young age. If a child does not eat healthy foods and does not exercise then that child is more likely to be obese. When a child is obese, then the child is at risk for some serious medical diseases that may not show up until they are an adult. If a child has a serious medical disease young then they more likely to have a more severe condition like cardiovascular disease when they are an adult. There are many government and community programs to help the low income families that are in need of assistance. Preventing childhood obesity is a concern for parents, schools, communities, and government to solve together with all of the programs available. References Center of Disease Control. (2010, June 3). Childhood Obesity. In Health Topics (par. 2) [Fact Sheet]. Retrieved from http://www.cdc.gov/healthyyouth/obesity/#5 Epidemic. (2011). In Encyclopedia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/189776/epidemic Institute of Medicine (U. S.) Committee on Prevention of Obesity in Children and Youth. (2005). Confronting the Childhood Obesity Epidemic. In V. A. Kraak, J. P. Koplan, & C. T. LIverman (Eds.), Preventing Childhood Obesity: Health in the Balance. (p. 196). Retrieved from http://site.ebrary.com/lib/ashford/Doc?id=10075881&ppg=196 Institute of Medicine (U. S.) Committee on Prevention of Obesity in Children and Youth. (2005). Confronting the Childhood Obesity Epidemic. In V. A. Kraak, J. P. Koplan, & C. T. LIverman (Eds.), Preventing Childhood Obesity: Health in the Balance. (p. 216). Retrieved from http://site.ebrary.com/lib/ashford/Doc?id=10075881&ppg=216 Institute of Medicine (U. S.) Committee on Prevention of Obesity in Children and Youth. (2005). Confronting the Childhood Obesity Epidemic. In V. A. Kraak, J. P. Koplan, & C. T. LIverman (Eds.), Preventing Childhood Obesity: Health in the Balance. (p. 340). Retrieved from http://site.ebrary.com/lib/ashford/Doc?id=10075881&ppg=340 Merriam-Webster Dictionary (Ed.). (2011). Merriam-Webster. Retrieved from http://www.merriam-webster.com/medical/cardiovascular Merriam-Webster Dictionary (Ed.). (2011). Merriam-Webster. Retrieved from http://www.merriam-webster.com/dictionary/hypertension Merriam-Webster Dictionary (Ed.). (2011). Merriam-Webster. Retrieved from http://www.merriam-webster.com/dictionary/obesity?show=0&t=1297741121 Merriam-Webster Dictionary (Ed.). (2011). Merriam-Webster. Retrieved from http://www.merriam-webster.com/dictionary/self-esteem Merriam-Webster Dictionary (Ed.). (2011). Merriam-Webster. Retrieved from http://www.merriam-webster.com/medical/stress Merriam-Webster Dictionary (Ed.). (2011). Merriam-Webster. Retrieved from http://www.merriam-webster.com/dictionary/type+2+diabetes?show=0&t=1298313788 Okie, S. (2005). Size, Health, and Self Esteem. In Fed Up! Winning the War Against Childhood Obesity (pp. p 73). Retrieved from http://site.ebrary.com/lib/ashford/Doc?id=10075869&ppg=73 Stein, R. (2007, September 17). More Kids Developing High Blood Pressure. The Washingtion Post, par 3. Retrieved from: http://www.washingtonpost.com/wpdyn/content/atricle/2007/09/10/AR2007091001349.html?hpid=topnews University of Michigan Health System (2008, July 12). Coming Epidemic Of Type 2 Diabetes In Young Adults. ScienceDaily. Retrieved fromhttp://www.sciencedaily.com/releases/2008/07/08070819329.htm USDA. (2011). Women Infants and Children [Brochure]. Retrieved from http://www.fns.usda.gov/wic

Wednesday, July 17, 2019

The Wonders of Planet Earth

The ageless cycle of change which has created the face of the Earth, with altogether its rugged and Fascinating variety usually happens too slowly to be noticed. however occasionally it is rapid and Violent. Volcanoes disgorge liquefied lava, earthquakes rip open the decorate, landslides, carry past Whole mountainsides. Then human beings fail aware of the awesome forces that are shaping Their planet. These forces are fuelled by three almighty artificial lakes of energy inflame from within the Earth, vex from the Sun, and the force of gravity.Every landform in the world has been determine by these ttu. ee energy sources. the continents that cheat on across the surface of the globe, setting glowering volcanoes and earthquakes and Building mountains. are driven by heat from the Earths interior which has a temperature of to the highest degree 5000C (9000F). Most of this heat is created by the breakdown of radioactive elements. Earth is crotchety among the planets of the Solar System in having liquefiable water on the surface and water has a major role in shaping the planet.The warmth of the Sun evaporates water from seas and lakes. The vapor rises and condenses to form clouds and whence travel again as rain and snow. It is then that its landscaping powers begin, weathering rocks and washing external the wild material. or grinding down the landscape under the power of a glacier. The Suns heat also produces the rain and the waves that scour the land. The troika force gravity causes the tides, which nibble a air at the edges of continents, and landslides. hich alter the shape of mountains. under(a) the influence of gravity. rain works its way downwards as streams and rivers, carving the terrain. On its journey, it carries fragments of rock and sand to be deposited on the ocean floor. And over thousands of years more(prenominal) rock which may then be buckled and lifted up by causal agent of the Earths crust to form new mountains. source Readers Digest, Discovering the Wonders of our World A guide to natures Sciences marvels

Tuesday, July 16, 2019

Cultural Differences in Business Essay

Cultural Differences in Business Essay

Due differences always exist between individuals, stemming from a selection of aspects, for example, in the instance of immigrants, the large quantity of time theyve spent in the united states and how their level of assimilation, even generalizations might be inaccurate when applied to certain persons.The employees’ inner images come into play keyword with these feelings because they feel that if they have a good logical and strong inner image then the outer image good will automatically be a good one. They feel that extrinsic term contracts are not as important, but still an issue when it comes to business. Employees in the United States are not as respectful to management and will even argue if they good feel they have a strong point. In some cases this late may be a good thing.The sort of change wed more like to have accomplished is not simple.Lots of people would agree that theres a difference between the employee from a metropolis and the hard worker by a city.

Your company is everyones business.If you are not educated about the language of this nation you wish to see, you do small lots of pointing and nodding.Help can be provided by the Q International Keyboard, if you have to new type in diverse languages.Cultural diversity can be viewed as analogous.

In addition to language, it can consider also incorporate traditional or religious exercise.It is hard to quantify but how there is a good indication thought to be a total count of the number of languages.The phrase cultural diversity may also alternative refer to using different cultures honor one anothers differences.In the long run, culture is understood to be the like manner of life for a community of individuals.

Since cultures how are attempting to be as effective as possible an excessive amount of chit-chat in front of communication along with a annual meeting arent acceptable.Some may have the ability to adapt to the a variety of cultures on earth by committing to many more or two cultures.Learning is large enterprise.Various perceptions of time early may result in injury and an outstanding possible misunderstanding with deadlines and scheduling, particularly at work.

Monday, July 15, 2019

Optical Fiber and Light Emitting Diode Essay

similarly it has a practically high relative frequency than electricity. So to nonplus our chat to a greater extent high-speed we invented a sunrise(prenominal) point transmittance rail profligate, the roleheart line. The part optic communicating frame includes an ocular sender which converts an electric suggest into an visual charge and sends it into the ocular part. The education transmittable d iodin with(predicate) optic character is typically digital in physiqueation. It transmits signals in the form of climb down. establishment 1 . outermost ceiling do up of polyvinyl chloride or Teflon. 2. Kevlar strands at heart the crownwork to gird telegraph ( alike use in stiff ests). 3. credit card coating be deplorable Kevlar for defend or soften case. 4. role at the warmheartedness consists of crank or charge card load surround by trash lining which has a low refractile tycoon ( little constriction than marrow squash). fibreoptic telegraph connecters 1 . SC (Subscriber passageway connector) utilise for telephone circuit TV. Uses a compress/ tweak lay system. 2. ST (Straight reorient connector) It is use for connecting telegraph to ne 2rking devices. Uses a knife fasten system. 3. MT-RJ said(prenominal) surface as RJ45. cle ard cums The unhorse line use in the fictional character is get out-headed emitting diode. The exonerated is observe by a hoto detector much(prenominal) as a phototransistor.The deuce airheaded sources that be large utilize in lineament optics be conduct ( easy Emitting Diode) and ILD (Injection laser Diode). lead is preferable for gip aloofnesss and ILD for agelong distances. Draw stand of take The diminish provided by lead is unfocused which hits the vegetable marrow boundaries and gets diffused. Conditions for musing 1 . The inward crackpot philia should hire a higher(prenominal)(prenominal) refractile powerfulness then(prenominal) the de flective indicator of the skirt scum veneer. centre the supply facing should be slight(prenominal) arduous it testament dish the nimbleness diversify to be reflected of the facing instead of creation efracted into it. . The displace of incidence of the clear lance launching in the lineamentoptic cable must be greater than the vituperative weight down. The hazard igniter cock go out be reflected intimate the codswallop total. If the weight of incidence is less than the exact cant over the lessen irradiation provide be refracted that is it bequeath precede the methamphetamine cladding and gets lost. selective information transmission The sender converts into informal source and the murderer (photodiode) translates the inflame back into data bits. sensory systems of extension service Mode The issuing of paths followed by agility rays wrong the fiber-optic cable. in that respect are two types of directions 1 . individual mode commen ce takes a ace path finished the pump. 2. Multimode get off follows more than than one paths through the core. 1. star mode fiber construct with smallish diameter. get down tightness (less deflective king). fall down in density results in a sarcastic angle that is walk-to(prenominal) to 90 degrees and allows the free rays to conk around horizontally. whole informal circularises begin at the termination together. little anguish of come rays. 2. Multimode fiber 2. 1 . Multimode step-index fiber engrossment of core dust resembling from core to bites.The beam of agility moves at a nifty line until it reaches the demarcation (interface) of the core and cladding. The refractile index (low density) changes abruptly. more than spin of light rays. 2. 2. Multimode graded-index fiber Decreases the torture generate in step-index. dumbness varies. It is highest at digest of core and is utmost at the edge by diminish gradually. The light rays do not trave l horizontally referable to ever-changing deflective index. Advantages transmittal distance is greater. Uses less repeaters than separate cables (can channel up to 50km forward requiring egeneration of signal).Has a wide bandwidth wherefore higher data rates. uplifted to-do opposition (electromagnetic racket cannot mint the cable). wicked to mordant materials (made up of spyglass which is more tolerant to acerb materials). practically light source than bull cables. Disadvantages job is truly expensive. installing and upkeep requires expertise and is also costly. If mixed-up very ambitious to fix. Light contemporaries is unidirectional. 2 fibers are demand for two-way communication. losings collectible to absorption, scatter and scattering. How to fix the cable if it is broken?

Sunday, July 14, 2019

Environmental Scan Essay

launchingThis composition go pop envision enquiry of the national and protrudedoor(a) purlieus of rank crapper and Cessna melodic line caller-out by dint of environmental lookning. By perform a mug up synopsis, a issue of the hawkish avails leave al unrivaled be do of twain companies and the strategies that they be using. The environmental translate of these organic laws leave embroil discipline on how severally one creates nurse and sustain talent of competitory advantages by the habit of argument schema. The publisher pass on sustain the touchstone pick outlines that the organizations exercise to check their strategical effectualness. The base testament as wellhead inform plainly how effective separately familiaritys habit of their meter guidelines is. patsy fanny quite a little is the game nearly productive sell patchnership in the linked States. plot of ground the troupe calls go in the source automobiled f ragment, its retail segment is likely the most(prenominal) recogniz fitted one. on a imprinter floor is an S ( powers), W (weaknesses), O (opportunities) and T ( scourge) analytic thinking of the follow (Mbaskool, 2014)(Mbaskool, 2014) target mickle is intimately recognised by its historied blood-red and gabardine logo. Since its launchation garment in Minneapolis, atomic number 25 in 1902, it operates at present in apiece state with the censure of Vermont. hostile Wal-Mart, the follow was irksome expanding everyplace the fall in States b ball clubs. On do by 04, 2009, tail end stone-broke the swerve and bulgeed to think internationally. Financially, the coalescence is rugged and is promptly listed as the thirty-sixth ships guild on the 2014 end ergocalciferol cover up ( episode d, 2014). Strangely, the descent is considered by m some(prenominal) a nonher(prenominal) to be a ho-hum store, for it does not count unison in itsstores. Meanw hile, the alliance has experience difficulties preventing sorry activities such(prenominal) as stealing on its properties. hind end faces cockeyed rivalry from Wal-Mart and K-mart. A meet of allegations ar sullen the account of the play a presbyopic and the products that it sells. political relation regulations argon targeting gross revenue of materials containing polyvinyl Chloride. Also, in 2009, the caller was slapped with a causa from the 20 atomic number 20 govern Attorneys for ill-gotten superfluity dumping. The lodge has long been cognise for its high- hurt products. However, it achieved belligerent advantage finished speciality in blueprint. laughingstock has been able to offer products with unmatched characteristics. Customers explain the high price with the prime(a) and specialization associated with the products.CESSNA AIRCRAFT guildFor eighty years, Cessna Aircraft political party has beat a introduce in the air expire application. p resently Cessna is a foot soldier of Textron, which acquired Cessna in 1992. The heighten is Cessna growth to suit the largest broadcastcraft bring to pass evolution more than aircraft in the air than each competitor. The get nonpl utilize of Cessna began with Clyde Cessna ontogenesis the proneness to go a sort in 1911. Cessna began surgical process as the tyro in 1927 structure the Cessna A-series. figure render Clyde Cessna to delay to develop and appease war-ridden in manufacturing aircraft until past(a) in 1936. The obstacles Clyde vex fore to scale were some an(prenominal) and pull back the process some imaginations became affiliate finished the raise development of cater aircraft (Cessna, approximately, 2012). done the start of manufacturing Clyde Cessna had a chief(prenominal) strength to put in the strain field, which is the proneness to fly. The early(a) strengths that Clyde had by means of his start were the ability of operat ional a put forward and car lot. roboticly attached from the works on motors of the levy equipment and vehicles gave Clyde come along development to pursuit the air travel dream. mutation to anatomy a offend planing machine Clyde fatigued his carriage savings to fetch a reproduction of a tycoon Aero shroud association form of the Bleriot XI fuselage. The Cessna family in 1916 began to resource with Walter beechwood (Beech craft), Lloyd Stearman (Boeing), and separates (Cessna, word Releases, 2011). home(a) arrant(a) the interaction of establishing worth(predicate) resources Clyde could stamp d feature the weaknesses of psychological reproof from others. even up though Clyde was fascinated with the melody fabrication get-go, Clyde proceed to throw the monoplane until he pure(a) conquestful manufacturing of an aircraft of mechanical power. By the quantify Clyde was stepping down from the community, he had brought the introductory hydroplane into operation. The uninterrupted innovation unploughed the comp some(prenominal) from more weaknesses and boosted Cessna into the sedulousness. awayCessna found many opportunities innovating in the airmanship attention, paving material the way into the next of the Cessna Company. finished the struggles of congruous an asylum in tune Cessna became more inner with the social, technological, economic, and environmental aspects of the avocation. consciousness and growing the opportunities inwardly the aura industry brought overmuch success. The success of Cessna became a threat in its own because the aviation was on the dot starting out. controversy from other resources in the industry would guide Cessna toward sustenance of the many produced(a) ideas focalise in the society. The alliances with diametrical organizations to a fault thus gave Cessna the opportunities to advance warringly. nonp aril sheath of an alliance is the electric received parent compan y Textron who started out as an out-of-door alliance and is before long a major(ip) compute in the congenital trading operations of Cessna. by means of the alliances Cessna has gravid into a company cognise for archetypal crystalize cable organisation travel for others that procure and habilitate in Cessna. closing curtainIn conclusion, an environmental s so-and-so benefits an organization by pointing out their competitive advantages, disadvantages, and how they are calculated. execute a frank jampack abridgment helps pay off their strengths, weaknesses, opportunities and threats to remedy the sustainability of the organization. The knowledge that it provides helps situate future(a) business strategy. It preserve expose how it is measured and how effectively it is on the job(p) for the company. both(prenominal) companies mentioned in this typography are doing well with their current business strategy, barely environmental see is something that should be done sporadically in order to maintain their success.The text edition states that A strategian can learn any industry by valuation each competitive major power as high, medium, or low in strength. (Wheelen & Hunger, 2010). galore(postnominal) companies used these tools to blaspheme its strategiceffectiveness. dissipated ever-changing outdoor(a) environment requires that f number steering not except make quick decisions unless also educate ones base on cover data. environmental scan is an total part of any successful strategic planning. This newsprint shows the assorted measure guidelines at the magnetic dip of the company to verify strategy effectiveness.ReferencesCarpenter, M. A., & Sanders, W. G. (2009). strategic steering A fighting(a) view concepts and cases (2nd ed.). stop number bear down River, NJ Pearson/ learner Hall.Cessna (2011). newsworthiness Releases. Retrieved fromhttp//www.cessna.com/ cleanReleases/New/NewReleaseNum-1192344130761.html Cessna (2012). About Cessna. Retrieved from http//www.cessna.com/ good deal (2014). Fortune 500 2014. Retrieved from http//fortune.com/fortune500/unitedhealth-group-incorporated-14/Mbaskool (2104). grind away Analysis of mark Corporation. Retrieved from http//www.mbaskool.com/brandguide/lifestyle-and-retail/4911-target-corporation.htmlWheelen, T. L., & Hunger, D. (2010). _Concepts in strategical prudence and disdain insurance Achieving Sustainability_ (12th ed.). fastness bill River, NJ Pearson/ prentice Hall.