Wednesday, November 27, 2019

Adventures In E-Commerce Essays - E-commerce, Business, Economy

Adventures In E-Commerce Adventures in E-Commerce Unless youve been living under a rock for the last two years, you have heard about e-commerce, and I bet youve heard about it from several different angles. Im sure youve heard about all the companies that offer e-commerce because youve been bombarded by their TV and radio ads. Youve read all of the news stories about the shift to e-commerce and the hype that has developed around e-commerce companies. You may have even purchased something off the web, so you have direct personal experience with e-commerce. In 1996 while surfing the web, I stumbled on an online auction site. While I found it interesting and mysterious, I didnt have any light bulbs or bells go off in my head. I didnt experience any sudden or miraculous visions, I just thought it was kind of neat site, and in fact I told a few of my friends about what I had seen. One of my friends who was just getting his own Civil War artifacts business off the ground asked me if I had seen any Civil War period items up for auction on that site. I told him that I had and he inquired if I thought he might be able to auction off certain items that he had for sale. To make a long story short, we Valdivia 2 tried it and couldnt believe the results and the success. The site that I had stumbled onto was called Ebay and today along with a multitude of other online companies like Amazon.com its one of the most talked about, highly successful e-commerce success stories around. And little did I know that when I started buying and selling items online through this auction site, I was actually taking part of a new revolution in commerce, I was actively participating in what millions of internet users are doing everyday, I was participating in the now popular term; Electronic Commerce. Electronic commerce involves a wide range of activities. In its simplest form, the goal of electronic commerce is to improve the way in which business is conducted, through technology. This could be as simple as establishing a computer-mediated relationship between consumer and business, between business and supplier, or between supplier and manufacturer. It could involve automation of existing business systems, such as transaction or manufacturing processes. On the web, electronic commerce often means marketing, and online sales. Typically there are three types of e-commerce transactions: business to business, business to consumer and consumer to consumer. It took radio 34 years to reach 50 million listeners. It took TV 13 years to reach 50 million viewers, but it only took the internet 4 years to reach 50 million users. (qtd. on E-Marketer.Com) 200 million people use the worldwide web today; 500 million will use it in less than 3 years. (qtd. In Future Magazine) Valdivia 3 Consumers are shifting their buying power in favor of the internet. Online shopping was up 330% in 1998. (qtd. In USA Today) As much as the Ice age changed the face of the earth, e-commerce is doing the same for business today. In todays business world were seeing new departments and new positions being created where ten years ago, there was no need for an Internet Technology dept. or a Chief Information Officer. Today, theyre an integral part of every successful business. Even gigantic organizations see the internet as a threat. It took Wal-Mart 12 years and 78 land stores to break $150 million in sales. AMAZON.COM did it in three years with a web site and a warehouse. (qtd. Business 2.0) In 1996 I entered the online banking world, as my nearest bank branch was on the opposite coast some 3600 miles away from me. It was intriguing and risky; people thought I was foolish trusting that my bills would be paid via computer. In 1997 I wanted a new car. After test driving the make and model I wanted but not finding the exact car I wanted, I turned to the internet rather than to drive around town checking out all the Chevrolet dealerships in the Hampton Roads area. I found what I was looking for at the Chevy.com web site. It was so simple, I chose the

Sunday, November 24, 2019

E-Token Essays

E-Token Essays E-Token Essay E-Token Essay ‘E-TOKEN SYSTEM’ FOR SUBMITTING VISA APPLICATIONS TO TRAVEL TO INDIA BY BANGLADESH NATIONALS To ease the process of submission of visa applications by citizens of Bangladesh, digital ‘Etoken’ system has been introduced for Bangladeshi Passport holders, applying for visa at Indian Visa Application Centres (IVAC) at Gulshan, Dhaka and Motijheel, Dhaka with effect from November 15, 2009. 2. Procedure for visa application is as given below: Bangladesh Passport holders wishing to apply for visa to travel to India must visit website www. ivacbd. com and log on to ‘E-Token system’. Applicant must fill up all mandatory fields as indicated therein. Applicant is required to choose a date for submission of visa application from available dates shown in the field, and the place of submission i. e. IVAC, Gulshan or IVAC, Motijheel. Only one registration will be allowed for available dates. Applicant need to take a printout of ‘E- token’ in A4 size paper. Applicant should go to IVAC Gulshan or IVAC Motijheel, as indicated in E- token, on the date for which the token has been issued along with (i) the print out of ‘E-token’ (ii) duly filled in visa application, and (iii) all necessary documents. Visa applications are accepted at IVAC Gulshan from 0800 hrs to 1200 hrs, and at IVAC Motijheel from 0800 hrs to 1100 hrs. ‘E- Token’ is not valid beyond the date for which it has been issued. One member of a family is permitted to submit visa applications on behalf of other family members, subject to a maximum of five visa applications per day and subject to production of proof of relationship. For this purpose, family constitutes spouse, children and parents. 3. Emergency medical cases require valid ‘E-token’ but may seek priority at medical emergency counter at IVAC, Gulshan. Contact person: Manager (Adm), IVAC, Gulshan. Tel 02-8833632 / 9893006) 4. Visa applications of Hon’ble Members of Parliament and Judiciary; Chairman/ CEO/ Managing Director of established companies and members of their families; and persons above 70 years of age can be submitted through authorised representative carrying valid ‘E-token’. 5. In the event of th e date for which an e-token has been issued becomes a non-working day for any reasons, the e-token will be accepted on the next working day. 6. For queries, kindly contact: Manager (Administration), Indian Visa Application Centre, Road No. 37, House No 12, Gulshan-1, Dhaka. Tel : 02-8833632 / 9893006; Fax: 02- 9863229; email: [emailprotected] com. FREQUENTLY ASKED QUESTIONS Q 1. As per your notification, one member of family can submit 5 visa applications on behalf of his/her family. Can all five applications be submitted with one E- token or separate token is mandatory for each application? Ans. Separate e-token is mandatory for each application. Q 2. I have got E-token for Indian Visa Application Centre (IVAC), Gulshan. Can I submit the application at IVAC, Motijheel ? Ans. No, You must submit visa application at the place indicated in e-token. Interchangeability of place of deposit is not allowed. Q 3. I have generated an e-token for a particular date. Can I submit the visa application before or after that date? Ans. E- token is valid only for the date for which it has been generated. Therefore, you have to submit the application on the specified date itself. The only exception is that on medical and other extreme personal emergencies, you are allowed to submit the application with an E-token , even if the token generated is for a future date. For the purpose, you should approach â€Å"Help Desk† at Indian Visa Application Centre, Gulshan (please click here) Q 4. Can I submit visa application any time on the date of date of registration or do I have to come during the service timings indicated in E-token? Ans: You must submit your visa application within the service timings indicated in the e-token. Q 5. I am a Bangladeshi national holding dual nationality. I wish to apply for visa on my Passport other than the Bangladeshi Passport. Do I need to generate an E- token for applying for visa? Ans. No, E- token system is applicable only for Bangladeshi Passport holders. Q 6. Is the presence of the patient essential for submission of visa application on medical cases? Ans. Presence of the patient for submission of application is not required in serious medical cases. Persons accompanying the patient are allowed to submit visa application of the patient on the basis of authority letter along with all necessary documents. Q 7. I made a mistake while filling in the columns in E-token field. Do I have the option to modify the entries already made? Ans. No, presently there is no system of modification of entries already made. Extreme care should be taken while filling in information. All particulars filled in should match with those entered in your passport. Making incorrect entries will result in rejection of you application. Q 8. I have got e-token for a particular date. I want to cancel it and book another date? Is that possible? Ans. Yes, you may send an e-mail to [emailprotected] com intimating your e-token no. date along with your mobile number before 5 pm on any working day prior to the date of your registration. Normally the working days are from Sunday to Thursday in the week (please click here for list of holidays). Cancellation will be notified to you by sms or e-mail. After that you may try for another date available in the system. However cancellation does not guarantee confirmed bookings on another date. It all depends upon availability of slots on the date of your registration. Q 9. I lost the print out of my e-token. How can I get a reprint? Ans. Please click in the field for reprint. Fill in your Passport number and take another print out. Q 10. Can any person submit visa application on behalf of another person? Ans. No, however certain categories of persons are exempted from physical presence for submitting visa applications as notified in State Bank of India, Dhaka Press advertisement of November 6,2009 (E token system). Q 11. When I enter the e-token field, it shows ‘Sorry no tokens are available†. What’s the reason? Ans. It is possible that all E- tokens for that particular date could have already been issued. As a large number of persons are applying for Indian visa every day it is advisable that you register in the early hours of the day so that your chances of getting a confirmed slot are brighter, if not certain.

Thursday, November 21, 2019

Do Media Cause Individuals to Develop Negative Body Images Assignment

Do Media Cause Individuals to Develop Negative Body Images - Assignment Example Both the sides presented a very astounding debate and quite well defended their side not only with theories; they even used appropriate facts to defend their side. Before deciding whether the â€Å"for† side or the â€Å"against† side performed a better job it is necessary to know that I personally believe that it is the peer pressure as suggested by the against side that makes me feel bad about my own image and the way I look (Alexander 80). But I still believe that those in the favor of the issue that media is making people feel bad about themselves presented a better debate this is because they used several examples of advertisements that simply show a perfectly crafted figure and make individuals feel bad about them. The recommendations those are later provided to the audience even back the thought that media makes human being feel negative about themselves as the recommendations mostly focus on loosing fat instead of focusing on the importance of exercise and healt hy

Wednesday, November 20, 2019

Reaction paper about Blackfish documentary Essay

Reaction paper about Blackfish documentary - Essay Example As such, the theory postulates that crime and deviance occur because of the lack of adequate constraints. The lack of clear laws that govern the handling and use of wild animals is a fundamental factor that could have led to the criminal behavior of the management of SeaWorld. Orcas are dangerous animals belonging to the oceanic dolphin family. While dolphins are always friendly to humans, the animals are temperamental and their behaviors are always unpredictable. Killer whale is among the largest of the family. They have teeth and are always aggressive especially when agitated. Additionally, the animals are large and travel for up to 160 kilometers in a day. The animals therefore require adequate space and depth to move and live freely. The management of SeaWorld has made a number of decisions some of which may have led to the death of the three individuals killed by the killer whales. The need for increased profitability compelled the management to overlook the safety of the employees and freedom of the animals. Additionally, the pressure to deliver is a fundamental determinant that could have compelled the trainer, Dawn Brancheau, to stress the animal thereby causing his death. Ever since the release of the Blackfish film, SeaWorld has promised to make a number of changes. On 13 May 2014, The Dodo ran a story that explained the spotting of a 103-year-old whale moving around the West Coast of Canada with her children and grandchildren. The spotting of the whale would cause problems for SeaWorld. The company had claimed that the life span of orca to be around 20 years. SeaWorld made such claims to justify the fact that most of their orcas die before reaching the age of 20 owing to the deplorable treatment and the environment in captivity. The company has since promised to increase the capacity of its tanks in order to provide the animals with more space Despite the changes, the company promises

Sunday, November 17, 2019

Case studies about Sara Lee & APPLE Study Example | Topics and Well Written Essays - 3500 words

Studies about Sara Lee & APPLE - Case Study Example The company retains its customers by coming up with innovative products frequently with features that customers are looking for. A prime example of this can be seen when Apple launched its iPhone (Smartphone) in 2007. iPhone has been considered as the â€Å"invention of 2007† by time magazine. It was unique mobile communication device with most innovative features. The success of first generation of iPhone did not stop Apple to strive for the best. Therefore in 2009, the company came up with iPhone 3GS with more new and innovative features to gain attraction of iPhone lovers and other consumers. Then after a year in 2010, Apple launched iPhone 4, and the latest iPhone 5 in Sep 2012. Moreover, Apple has launched iPad which is a Tablet Computer in 2010. Apple also launched the first Graphical User Interface Computer (GUI) computer called Macintosh (Mac) computers but it was unsuccessful in comparison to PCs made by IBM. However, in spite of the failure, Apple kept bringing innov ative products and re-launched its Macintosh computers. This time it proved vital and greatly accepted by people. Apple Wants Result One of the most important aspects of the company is that Apple wants result oriented people. When the first Macintosh computer that Apple launched became unsuccessful, the company hired new CEO and President, John Sculley. But after some time due to his weak performance, company fired him and hired another CEO, Micheal Spindler. After three years company asked Spindler to resign and then Gil Amelio was given this position. But in 1997, when company recorded additional losses, Apple’s board of directors named the founder of the company, Steve Jobs as CEO. Steve Job turned fortune of Apple and improved its performance significantly. Extensive Research Apple always conducted research carefully to find out what consumers want. The company relies a lot on conducting research in order to find the current and future need of consumers and then come up w ith products to meet these needs. All this process plays a crucial role in satisfying more customers. All these elements help to bring competitive strategy. Apple does not compromise result and always want result oriented people. This is the reason which makes the company able to provide innovative products. Question #2 Apple’s strategy in computers When the competitors of Apple increase their market shares, the company introduced its first notebook computer called iMac in 1999. After launching iMac, the Apple increased its profits and the share price increased considerably.. However Apple was unable to capture sufficient market share after iMac. Therefore the company started focusing on other product lines. This was a great strategy for Apple. Apple launched iPod which successfully captured the demand of consumers. The consumer interest in iPod helped in increasing personal computer’s market share. The level of trust of people increased on the products of Apple and se veral consumers also purchased to Apple computers. Eventually Apple personal computer’s market share increased to 4 percent. When customer started showing interest in Apple computers, they started producing more innovative computer notebook such as MacBook Pro. This notebook was targeted to education users. The company also introduced MacBook Air and this product was designed for the users who want portability and power. However Apple

Friday, November 15, 2019

Zero-Day Vulnerability Attack

Zero-Day Vulnerability Attack As Forensics Expert discuss the process involve in investigating Zero-Day Vulnerability attack Introduction The Internet became essential in this 21st generation and people can’t live without Internet. As the growth of the use of Internet, new technologies are also invented to support our life. However this new technologies may also exploit to the vulnerability attack. One of the vulnerability attack is zero-day attack (0day). A zero-day attack is an attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch.( Wikipedia, (2014)) The zero-day threat can be undetectable and unknown for most of the antivirus software and it is keep increasing in new form which try to hide itself. The incident handlers have to fight against this threat which may include both corporate and home users and security vendors. Once they found or discovered the new threat, they have to respond to it. In order to investigate and have better understanding to zero-day attack, research and pratices are carrying out. Different security researchers have different opinion and ways to handle the zero-day threat. Most of the incident response program will usually implemented using a aphased methodology. This is because by using phased methodology will allow the lifecycle of incident response to be break down into seperate managable components. However, there are two popular methodology which one is from SANS Institute and one from the National Institute of Standards and Technology (NIST). Both the phased methodology are useful for handling incidents when zero-day exploits. The benefits of both the phased incident response plan and corresponding measures are they can detect and identify zero-day threat efficiently. 1. Phased Methodology 1.1 SANS Institute phased methodology SANS Institute phased methodology consist of six phases which include 1) Preparation 2) Identification 3) Containment 4) Eradication 5) Recovery 6) Lessons Learned (Murray,2007) 1.2 NIST phased methodology NIST version phased methodology consist of four phases which include 1) Preparation 2) Detection and Analysis 3) Containment, Eradication and Recovery 4) Post-Incident Activity (Scarfone, Grance, Masone, 2008) Both of the phased methodology have the similarity. However, the incident response team (IRT) may need to modify the methodology so that it can specifically to handle zero-day attack. From IRT, the phases that have most impact to zero-day incident response will be preparation, identification or analysis and containment. This three important phases is essential when handling incident response to zero-day attack. 1.3 Incident Response Team Methodology In order to deal with the zero-day threats, IRT have a methodology to perform proactively and reactively. The proactive will be focus to external threat when zero-day is known but haven’t any impacted to the organization. The reactive will be focus on how to response to the actual zero-day incident. This methodology consist of a cycle of three phases which are : 1) Monitor 2) Analyze 3) Mitigate The monitor phase refer to monitor the public resources which is still ongoing. This is to identify the zero-day threats. The analyze phase refer to analyze of the threats exploited which conduct in a lab environment. This purpose is to identify the potential threat that may impact to the organization. In mitigate phase, the information that gathered from analysis will be build and implement inside the mitigation mechanisms. 2. Three important phases 2.1 Preparation The two primary objective of preparation is to ensure incident response team (IRT) and sufficient controls to mitigate security incidents. (Scarfone,Grance,Masone,2008) First of all, IRT need to monitor on the Internet at all times to ensure the security. IRT should be able to react immediately to ensure the risk is mitigated. IRT need adequate controls to prevent and detect any possible attack. Besides that, this can be divided into two types of response which is external response and internal response. 2.1.1 External Response External response can include analyzing external advisories. This can help to gather the information about zero-day attack through 5W1H (what,where,when,why,who,how). How does zero-day works and exploits? What is the target is? When is the exploitation? Where zero-day exploited? Who get impacted by zero-day? Why zero-day attack such platform? The following methodology is for external response. 2.1.1.1 Build an Incident Response Lab IRT can have a lab environment which consist of system that can simulate the role of attacker and victim. The lab should also include machine that have tools, interpreters and compilers in order to provide different types of source code files that related with zero-day. However, the victim machines should in exactly the same condition within that organization include operating system used. 2.1.1.2 Monitoring to Public Resources Monitoring what happen to the Internet is one of the essential component in our daily life. IRT needs to be constantly monitoring and keeping an eye on new trends of attacks, public internet resources and any other security vulnerabilities. One of the well-known resources for notification is the SANS Internet Storm Center (ISC) (http://isc.sans.org). The ISC monitors different types of public resources which included the logs from devices that used by businness and home users. 2.1.1.3 Analyze the Threat Once a zero-day is found, IRT should able to reproduce it in lab environment to find out the impact level of it. This consist of few steps need to carry out. The first step is to review the targeted software or application, operating system or version of it. After that, all the settings and platform are set up so that it is applicable to the environment. The last step is to monitor the system and it should run a sniffer to capture all the packets. Once completed, the exploit is launched to attack the target. After the attack succesful, IRT can start to investigate and identify the threats include the ports use, payload size and others. 2.1.1.4 Mitigation Once the threat is been analyzed, IRT should gather all the information and start to mitigate. All the ports that was used, can be checked and filtered through firewall to ensure that it is blocked. 2.1.2 Internal Response For the internal response, the following methodology is used. 2.1.2.1 Monitoring Internal Log The log monitoring is an essential factors in secure network. All the information should recorded in log in order to trace back and secure the network. On eo f an open source platform is Alien Vault’s Open Source Security Information Management (OSSIM) (http://www.ossim.net). 2.1.2.2 Monitoring Suspicious Network Activity As most of the malicious are try to hide itself and traverse through the network, network activity logs is crucial. The network analyser should look for the malware propagation, command of communication and the network traffic. There are different types of tools that can be used to improve netowrk security systems such as Ourmon (http://ourmon.sourceforge.net/), Bothunter (http://www.bothunter.net/), Honeynet (http://www.honeynet.org/) and others. 2.1.2.3 Monitoring Host Activity In order to improve the monitoring, monitoring an individual systems can be also crucial to identify zero-day. This is because it attacks can be unnoticed, so host monitoring is important for indentification and detection. Some of the tools can used to identify anomalous activity such as Tripwire (http://www.tripwire.com), OSSEC (http://www.ossec.net) and others. 2.1.2.4 Malware Analysis and Collection In order to collect the malware and respond to it, some of the tools is needed to capture it. The IRT should ensure that they have the ability to capture and analyze malware. One of the best way to capture malware is using honeypots. Honeypots are used to identify new types of attack, track hackers and collect the malware. There are some tools that can be used as honeypots such as Honeyd (http://www.honeyd.org/). 2.1.2.5 Application Whitelisting Application whitelisting is popular used recently. It permits all known and safe production applications to run and install, but block all unkown applications. This will prevent any remote code execution. One of the benefit by using application whitelisting is it only allowed known trusted applications to run. On the other hand, the limitation could be malware injected itself into the whitelisting process memory. 2.2 Detection and Analaysis In order to detect and analyse, the following methodology is used. 2.2.1 Identify The IRT needs to identify the potential signs of compromise, gather events and investigate it. After gathered the information, it should analyzed and mitigated. The potential signs oof compromise may include strange log entries or network activities or any others anomalous activity. Besides that, end users are also can be indicators of suspicious activity. They may click suspect links, surf social netowrking sites and respond to phishing emails. 2.2.2 Correlate After all the information is identified and gathered, correlate events to investigate the source of the suspicious activity. All the connections should be identified in the netowrk logs and determine where is the source come from. One of the tools is Sysinternals (http://technet.microsoft.com/en-us/sysinternals/bb545021) used to gather system information which included incident response tools (Helix). 2.2.3 Analyze After the process is identified, it is going to analyze it. IRT should analyse all the suspicious process include the processes that hidden in Explorer.exe. As most of the times malicious are try to hide itself, IRT needs some trusted tools to identify and analysis all the processes. One of the tools that is useful to dump a process without killing it is Microsoft’s User Mode Process Dumper.( http://www.microsoft.com/en-us/download/details.aspx?id=4060) 2.2.4 Mitigate Once the processes is identified, in order to protect the mechanism, IRT should prevent it from executing. IRT should identified the child process launched, DLLs, and any related user information. One of the tools is CurrProcess by NirSoft (http://www.nirsoft.net/utils/cprocess.html). This useful tools will show all the process information which include name, priority level, process id and memory usage. 2.3 Containment The purpose of the containment phase is to prevent any further spread of the threats or incident. Once the incident is been detected and analyzed, action should be taken in order to prevent any further damaging make by the threats. 2.3.1 Network Level Containment In network level, the best way is to block on network devices. While IRT identified the particular was zero-day, other systems may get infected too. It is important that to implement containment across the network. This is to prevent any incident from propagation from one system to another. 2.3.2 Host Level Containment In host level containment, the information gathered previously in detection and analysis phase can be used. First of all, IRT should kill all the running processes which related to the incident analyzed. After that, firewalls should be configured to disallow any incident traffic. In addition, anti-virus programs need to allow for custom anti-virus signatures to be created. This helps to detect and eliminate the new form of malicious. 3. Conclusion Zero-day threats are a big challenge to all the incident response teams (IRT). As long as there is a software vulnerability been exploited, IRT need to fix it immediately for secure purpose. IRT need to approach different types of methodology in order to prevent, analysis and mitigate the zero-day threat. However, by having all these of methodology, IRT can conduct the incident response to zero-day threat much more easier. References : Wikipedia, (2014). Zero-day attack. [online] Available at: http://en.wikipedia.org/wiki/Zero-day_attack Scarfone,K.,Grance,T.,Masone,K. (2008,March). Computer Securit Incident Handling Guide. Retrieved March 1,2011, from NIST Special Publications (800 Series): http//csrc.nist.gov/publications/nistpubs/800-61-rev1/SP800-61rev1.pdf Kliarsky, A. (2011,June). Responding to Zero Day Threats. [online] Available at : http://www.sans.org/reading-room/whitepapers/incident/responding-zero-day-threats-33709

Tuesday, November 12, 2019

The Character of Enorbarbus in William Shakespeares Antony and Cleopat

The Character of Enorbarbus in William Shakespeare's Antony and Cleopatra Enobarbus’s character can be seen as the most striking invention of Shakespeare. As the lieutenant of Antony, he contributes to the drama in a number of ways. He is sympathetic to Antony from the start, loyal and fellow feeling. Instead of agreeing with Antony at the beginning where he says he wishes he had never met Cleopatra, Enobarbus replies that, had that been the case, Antony would have missed â€Å"a wonderful piece of work†. (I.2.154-5). He does not share the perspective of his fellow Roman soldiers Philo and Demetrius in the opening scene, in fact he seems to enjoy life in Egypt contributing with appreciative comments on Cleopatra. â€Å"Age cannot wither her, nor custom stale her infinite variety. (149 II.2.245) When Antony says of Cleopatra, â€Å"She is cunning past man’s thought†, Enobarbus disagrees, â€Å"Alack, sir, no: her passions are made of/ nothing but the finest part of pure love† (I.2.146-8). In their conversations at the beginning and in his role throughout, Enobarbus seems to represent an ordinary reflection of something in Antony himself, as in a mirror. His humour in response to the announcement of Fulvia’s death, anticipate the jovial side of Antony that will manifest itself in the galley scene. Before the triumvirs meet, the diplomatic Lepidus tries to persuade Enobarbus to keep Antony calm. Enobarbus however refuses saying that he much prefers that Antony should speak his mind. He reminds Antony and Caesar that there will be time enough to quarrel after they have disposed of Pompey. To Antony’s criticize, â€Å"Thou art a soldier onl... ...ssenger. In a soliloquy â€Å"Now he’ll outstare the lightning† (III.13.194-200) he sees through Antony’s bombastic rhetoric and comes to his decision to leave Antony. As Antony addresses his servants as if for the last time, Enobarbus protests that he is â€Å"onion-eyed (IV.2.35). Antony’s reaction to his desertion, â€Å"O, my fortunes have Corrupted honest men!† (IV.2.35) and his decision to send his treasure to him confirm all that is said of Antony’s â€Å"bounty†. The guilt felt by Enobarbus and his subsequent depression and loss of will are clearly shown. â€Å"No honourable trust. I have done ill, of which I do accuse myself† (239.IV.35) But his death in mental torment and the consciousness of disgrace are proof of the fact that Antony’s â€Å"fortunes have/ Corrupted honest men† give a wider dimension to the tragedy of the protagonists.

Sunday, November 10, 2019

Global Financial Corporation Essay

Global Financial Corporation (GF) a subsidiary of Global Equipment Company (GEC) is tasked with handling financing for those customers who wish to purchase GEC heavy equipment. Currently GF only processes 51% of the leases within the â€Å"10 days or less† time frame, with some loans taking up above 41 days. Ms. Rodriguez, the Vice President of GF has been directed to decrease loan processing time to 10 days or less with the current staff she has. The current structure of the analysis and evaluation stage does not maximize staff time effectively and as a consequence creates a bottleneck in the process. We recommend switching to a case manager structure. lLan applications can be processed and completed in approximately 3 days. This would allow for an increase in volume to 255 without adding staff (assuming 60% are remain new applications), which is a 16.9% increase, exceeding the 10% anticipated application increase. Background Global Financial Corporation (GF) a subsidiary of Global Equipment Company (GEC) is tasked with handling financing for those customers who wish to purchase GEC heavy equipment. Due to the expense of the equipment many customers chose to finance the purchase with a lease agreement. Currently these loans are processed at GF Bakersfield location, which employs 14 people. A competitor of GEC has promised processing of financing in â€Å"10 days or less†. Currently GF only processes 51% of the leases within the â€Å"10 days or less† time frame, with some loans taking up above 41 days. Ms. Rodriguez, the Vice President of GF has been directed to decrease loan processing time with the current staff she has. Problems The Bakersfield office is operating at only 86% of capacity utilizing 2990.5 hours of processing time (full capacity 3485 hours). In October they processed 218 applications, 89 were standards and 129 were News. The analysis by region shows that Region 1 is handling the most applications at 78 (52 new, highest number among the different regions), averaging 126.7 hours which, equates to 20.1 days. Region 2 is only handling a total of 66 applications (35 new) with an average processing time of 5.7 days, and Region 3 handling 74 applications (42 new), averaging 8.7 days. The Northeast office handles about 35% more applications with essentially the same staff. Only 51% of the applications are processed within the 10 day or less requirement. Analysis of the Current Processing Steps 1. Analysis and evaluation stage is a single channel, interest rate multi channel, loan terms single channel, and final issuing a multichannel. (Exhibit A)The current structure of the analysis and evaluation stage does not maximize staff time effectively and as a consequence creates a bottleneck in the process. With the single channel structure loan applications are unevenly distributed among teams and create higher idle time for teams with less volume of loan applications to process. Utilization among regions varies greatly between 73% – 95%. The following observation of the current structure was achieved using the MMK model (See exhibit B): * Expected wait time in the system for an application in Region 1 is approximately 37 days, with actual processing time of 14.10 hours. This is where the bottleneck occurs as it takes the evaluation team over 16 days out of the 37 to perform the review of 78 applications. * Expected wait time in the system for an application in Region 2 is approximately 11 days, with an actual processing time of 13.40 hours. Of the three Regions, Region 2 processed the least applications of 66 during the quarter being reviewed. With a utilization rate of 73%, Region 2 experienced the most idle time in the evaluation process. * Expected wait time in the system for an application in Region 3 was approximately 15 days, with an actual processing time of 13.56 hours. With utilization rate of 84%, this Region has the ability to handle an increase in applications. * Each region utilized over ten days of average time in system and showed bottlenecks. 2.  Interest rate stage is a multi channel process and is working effectively. Applications are processed quickly and are usually turned over to the next step within 30 minutes. The utilization rate is consistent at 64%, which means that this staff member can continue to devote only half of his time to this task. 3.  Loan terms stage is a single channel and has similar issues as the analysis and evaluation department. It creates bottleneck and work is unevenly distributed. 4. Final issuing stage is an effective multichannel process with a consistently high utilization percentage. Each application takes less than 4 hours to process and utilizes time consistently at 93% of capacity. Alternatives Redistribute the staff to eliminate the bottlenecks in the process. Automate the input of information into a computer database at the sales level eliminating duplicate entry. * Generic queue would decrease processing time to 9 days. Evaluation will drastically reduce to 2 days of processing, increasing utilization and reducing idle time. Active time in the system will be reduced to 13.72 hours. Change all stages to a multiple, multiphase channel (Exhibit C &D). There would still bottleneck from the evaluation stage. * Case manager would increase active time of application to 18.5 hours; however, significantly reduce queuing time to approximately 3 days. This is assuming there are no teams during the evaluation stage and that the average time would double to 9.5 hours, which may not be the case. Change to multiple channel – assignment – multiphase. (Exhibit E &F) Eliminate bottleneck, service rate of 22.2 per FTE, per quarter. Recommendation We recommend switching to a case manager structure. This would mean that one person will be responsible for the completion of a loan application (Exhibit E). This will provide for most efficient way to minimize idle time and maximize utilization rate. Loan applications can be processed and completed in approximately 3 days. This would allow for an increase in volume to 255 without adding staff (assuming 60% are remain new applications), which is a 16.9% increase, exceeding the 10% anticipated application increase.

Friday, November 8, 2019

How does Shakespeare present the character of Prospero in The Tempest Essay Example

How does Shakespeare present the character of Prospero in The Tempest Essay Example How does Shakespeare present the character of Prospero in The Tempest Paper How does Shakespeare present the character of Prospero in The Tempest Paper but also deals with evil in, Antonio Prosperos brother. Who in my opinion is the meanest character in the play? The Tempest is a comedy, but not like we would think of comedy today, like My Family, but the audiences would have found it funny. The play is about Prosperos revenge and his desire to get his Dukedom back from his brother. Twelve years since, Miranda, twelve years since, thy father was the Duke of Milan and a prince of Power. Antonio had always been trusted by his brother like a good parent, did beget of him a falsehood in its contrary as great as my trust was, which had, indeed, no limit. But Antonios greed for power took control. So much so, he decided to cast his brother and Prosperos daughter, Miranda, adrift in a rotten carcass of a boat and he hoped to their death. Prospero is a powerful man with strong magical skills, a wizard he had held a superior position The Duke of Milan before his brother had planned with King Alonso of Naples to take over this position as permanent one. In the play we see a lot of changes in Prosperos Character. He has a lot of anger and revenge inside of him and as the play goes on we see a more forgiving side to his character. Prospero was the rightful Duke of Milan when he chose to study magic more extensively, so he temporarily gave his powers to his brother Antonio to govern the country. In Act one Scene two Prospero tells Miranda how they came to the island and how they managed to survive due to the kindness of Gonzalo, (An old lord) who gave them food clothes, and Prosperos magic books. By providence and divine some food we had, and some fresh water, that a noble Neapolitan, Gonzalo, out of his charity, When she becomes distressed at the story of his bothers betrayal and how Prospero has made the storm, The Tempest to bring his enemies to him,- he makes Miranda go to sleep. Was this due to the fact that she was distressed and he wanted to comfort her or was it a form of control? thou art inclined to sleep; tis a good dullness, and give it way: I know thou canst not choose . Prospero had not been unpopular as a Duke and that was probably why Antonio didnt want to kill him, as it would have caused problems with the Milanese people. I feel that Prospero was selfish to put his desire to study magic above looking after the needs of his people. The Government I cast upon my brother, And to my state grew stranger, being transported And rapt in secret studies. However I dont feel that Prospero deserved the fate of being abandoned on a desert island. It also shows he was too trusting of his brother Antonio and this was a weakness in his character. I think this is one reason why he is so tough on Ferdinand because he wants to be sure that he really loves Miranda. Prospero, still desperate to have control threatens him that their relationship will not be happy if, Thou dost break her virgin knot before all sanctimonious ceremonies may with full and holy rite be minstistered Prospero uses his magic for mostly selfish reasons. It is through his magic that he plans his revenge on his enemies. He could almost be a cruel sorcerer from the way in which he treats his enemies ,But his magic gives him Power which is the only thing he has if he is to get his Dukedom back. The wronged Duke of Milan, Prospero: For more assurance that a living prince Does now speak to thee, I embrace thy body; And to thee and thy company I bid A hearty welcome. It shows that Prospero wants, justice and reconciliation rather than just power. The use of supernatural powers is widely used throughout the play. Prospero uses magic to free Ariel from the magical prison which Sycorax imprisoned him in. When I arrived and heard thee, that made gape the pine and let thee out. This shows that Prospero felt sorry for Ariel, although he may also have had another reason, knowing that he could be useful to him, as Ariel too had magical powers. Prospero promises to free him once he has helped him to get what he wants. .. for which after two days I will discharge thee. Prospero appreciates Ariel, as he too knows what it is like to be a prisoner. But he still keeps power over him. If thou more murmurst, I will rend an oak and peg thee in his knotty entrails till thou hast howld away twelve winters. Prospero owes a lot to Ariel for without his help he wouldnt have been able to make the storm and caused the shipwreck. He wouldnt have been aware of Caliban , Stephano and Trinculoss plan to kill him. Ariel also makes the music which hypnotises many of the characters into doing things they wouldnt otherwise have done. Prospero releases Ariel as he promised, showing he is true to his word. I shall miss thee but yet thou shall have freedom. Prospero however has no similar feelings for Caliban, he calls him, Thou poisonous slave. A dull thing. Caliban hates Prospero as before he arrived on the island the island had been his, This island is mine by Sycorax my mother which thou takst from me But Prospero hates him most because he tried to rape his precious daughter Miranda. Thou didst seek to violate the honour of my child. He keeps Caliban as his slave and threatens him that he will torture him if he disobeys him. Ill rack thee with old cramps,Fill all thy bones with aches and make thee roar. His main enemies are Antonio and Sebastian but even for them he refuses to turn them into traitors by telling everyone of their scheming plans But you, my brace of lords, were I so minded, I here could pluck his highness frown upon you and justify you traitors at this time I will tell no tales. He knows he has to forgive them for order to be restored to their country. However his brother Antonio doesnt appear to have a conscience for all the bad things he did to his brother. He is a very dangerous and ambitious man. Sebastian is Alonsos brother he too is like Antonio and doesnt feel sorry for what he did. When Prospero meets up with Gonzalo he greats him warmly. Holy Gonzalo, honourable man and thanks him for providing him and his daughter with food and water O good Gonzalo my true preserver. He knows that Gonzalo is a loyal and Noble friend. Alonso has a conscience and he feels remorse over the wrongs he did and asks for forgiveness from Prospero The Dukedom I resign and entreat thou pardon me my wrongs. Prospero forgives Alonso welcome my friends all Its Prosperos desire for magic that gets him into this problem, but it also helps him to restore the situation. It shows how people can become obsessed by desires, but in the end Prosperos appreciates that his obsession was destructive. Ill break my staff, Bury it certain fathoms in the earth, And deeper than did ever plummet sound Ill drown my book. I think that Prosperos is a Mixture of both victim and Villain. As he tells the story of past events it is easier to believe him than too look at the other side of the story. By the end of the play I think that most of the people get what they deserve with most of the characters learning from the mistakes they made.

Wednesday, November 6, 2019

Friedrich Nietzsche essays

Friedrich Nietzsche essays Friedrich Nietzsche was a 19th century German philosopher who challenged the basis of Christianity and traditional morality. In contrast to his works, Nietzsche was raised by a pious Lutheran family, and often labeled the little pastor. After Nietzsche attended a boarding school, he went to study philosophy at the University of Bonn. Four years later, he transferred to the University of Leipzig, where he met Professor Friedrich Ritschl and found his niche for philosophy, philology, and literature. At the young age of 24, under the direction of Friedrich Ritschl, he earned a professorship at Basel. His beliefs were founded on the works and lives of great philosophers and men such as Arthur Schopenhaur and Charles Darwin. At the age of 21, Nietzsche lost his faith in traditional religion and found philosophy when he was introduced to Arthur Schopenhaur. Schopenhaurs philosophy was based on the premise that people did not have individual wills, rather we are the pawns of a life force. This was in direct contrast with Nietzsches traditional religion which teaches that we, in contrast, do have individual wills. Charles Darwins influence can also be seen in Nietzsches work. Nietzsche is notorious for his will to power, in which he asserts assumptions similar to Darwins survival of the fittest. Simply put will to power is a process of expansion that he believed was the basic driving force in nature. Nietzsches beliefs centered around his will to power and led to other theories of our existence like the slave morality theory. The slave morality theory maintains that the weaker groups virtues (slave) are viewed as positive attributes, like passivity. While on the other hand, the dominating groups virtues (master) are viewed as negative attributes such as evil. Both the will to power and ...

Sunday, November 3, 2019

Siegfried Kracauer and Visual Culture Essay Example | Topics and Well Written Essays - 1500 words

Siegfried Kracauer and Visual Culture - Essay Example Distraction in the forms of flickering images on an enormous silver screen during Kracauer's time presented an ephemeral discharge from the mind-numbing dehumanisation at the factories where most of the moviegoing audience worked. One of the reflections on modernity is that it exists as a complex experience that typically is made up of several individualised constituents that serve to empower the prevailing status quo. As the underclass grows to depend more on leisure and entertainment for the fulfillment that is absent from their alienation from the product they create during work, consumer products become an increasingly more essential ingredient in maintaining economic dominance. This process creates the aura of consumerism on a mass scale. For many, this mixture of state with rising power of production has only one destination: fascism. The still images flickering on a large wall appear to have motion in the minds of the viewers, when in fact they do not. This is a perfect encaps ulation of how cinema infiltrates authentic reality to create a false consciousness and, in turn, that can be metaphor for how distraction works to create false socio-economic consciousness (Aitken, 1998, p. 125). Kracauer's scrutiny of capitalism takes this idea as starting poi... This is an essential element of modernity, reflecting the disjointed sense of reality. Therefore, cinema must be engaged as a means of exposing the attributes of modern life that can be understood frame by frame within static images that are just as disjointed as the society in which they are joined. Kracauer apprehends the static images given movement and meaning by the workings of the human eye and brain as an agent of distraction from society. There is a palpable ideological need to serve up a distraction to the masses in order to keep them from seeing through the consciousness of domination by naturalizing the concept. That distraction results in mass audience eventually becoming more than mere spectators; they become actual accomplices. Kracauer's views on capitalism are such that feels that under the capitalist idea film production becomes a mirror of the existing society and serves to maintain its structures of domination, insisting that the capitalism was not just a means, but an end in getting the proletariat to first apprehend the structures and then embrace them. The capitalism mentality lay at the heart of the disenfranchisement of the masses and fragmented quality of society (Mlder-Bach, 1997, p. 44) . The "Tiller Girls" presents itself as an excellent illustration of the crowds in a modern metropolis, and the upper class saw them as a distraction for the common masses but the masses are like clockwork and could be controlled. Kracauer believed deeply and sincerely that the cinematic techniques that expose aspects of modern life could best be seen frame by frame and in those choppy and fragmented images were much like our modern world (Ward, 2001, p. 34). An example of the extremes of this process becomes apparent in

Friday, November 1, 2019

Team Working Assignment Example | Topics and Well Written Essays - 2500 words

Team Working - Assignment Example The theories of Belbins, Tuckman, and time management only solidified our project. A team binds itself in a chain only to be stronger. The success of a team is directly proportional to the overall work of the team. There is no "I" in "TEAMWORK". Teamwork is working together - even when apart. The Teamwork can be simply stated that it is less me and more we. In short, the Team can be best explained with this formula. When you complete the Belbin Self-Perception Inventory you will receive - among other reports - a 'fingerprint' of your Team Role preferences. Very few people display characteristics of just one Team Role. Most people have 3 or 4 preferred roles, which can be adopted or eschewed as the situation requires. Every division was made in accordance with the demands of the client. We collectively decided that all of us wanted to be a part of planning the project. While managing utility cost, studio equipment, and premise decision were assigned to one team member. None of us wanted to be left out of marketing campaign and presentation. Experts, Recruitment and Launch event were allotted to 2 members each. Thus subscribing to this theory we managed to fit in a number of roles. The fact that nobody in the team was indispensable made the project a lot easier. Each of us were a substitute for some body. In the absence of one of the team members during the marketing campaign we were prepared look after his work too. There... None of us wanted to be left out of marketing campaign and presentation. Experts, Recruitment and Launch event were allotted to 2 members each. Thus subscribing to this theory we managed to fit in a number of roles. The fact that nobody in the team was indispensable made the project a lot easier. Each of us were a substitute for some body. In the absence of one of the team members during the marketing campaign we were prepared look after his work too. In fact when we were assigning roles to reach we followed the Belbins theory of team roles. Team Roles Description (http://www.belbin.com/rte.aspid=3) Team Role Contribution Allowable weakness Plant Creative, imaginative, unorthodox. Solves difficult problems. Ignores incidentals. Too Preoccupied to communicate effectively. Resource investigator Extrovert, enthusiastic, communicative,. Explores. Develops contacts. Over optimistic. Loses interest once enthusiasm has passes. Co coordinator Mature, confident, a good chair person. Can be seen as manipulative. Offloads personal work. shaper Challenging, dynamic, thrives on pressure. Prone to provocation. Offends people feelings. Monitor evaluator Sober, strategic and discerning. Sees all options and judges accurately. Lacks drive and ability to inspire others. Team worker Cooperative, mild, perceptive and diplomatic. Indecisive in crunch situation. implementer Disciplined, reliable, conservative and efficient. Turns ideas into practical actions. Somewhat inflexible. Slow to respond to new possibilities. Completer finisher Painstaking, conscientious, anxious, searches out errors and omissions. Delivers on time. Inclined to worry unduly. Reluctant to delegate. specialist Single minded, self starting and