Thursday, October 31, 2019
Conflict, Decision Making, and Organizational Design Essay
Conflict, Decision Making, and Organizational Design - Essay Example On the other hand, professional differences, which entail approach to assignments, skills and knowledge, also lead to conflicts, especially when an assignment is handled by a team. In the current world, various technological developments have led to more efficiency in the conduction of various assignments. As such, when two people conduct the same assignment using varying technologies, conflicts usually arise. Moreover, as businesses develop, there is usually the necessity of mergers or recruitment of new professionals, which may lead to the rise of conflicts. Despite the presence of such conflicts, many people usually find themselves in unhealthy conflicts, which usually poison the work environment. As such, it is necessary for employees, and management to understand the best way to solve such conflicts when they arise. This paper seeks to give an in-depth evaluation of the negotiation strategies used to address various workplace conflicts. Additionally, how evidence-based managemen t could be applied to the work environment, blocks, stages, and methods of creative decision making to determine the best approach T-Mobile should follow when making managerial decisions, and the environmental and strategic factors that affect the organizational design of T-Mobile will be evaluated. How I could apply negotiation strategies to address potential conflicts in the workplace. Negotiations are very essential in coming up with the best solution for different engagements in the workplace. In most cases, negotiations are unavoidable and thus being knowledgeable on the best negotiation strategies is essential. Negotiation involves various stages, which include preparation, dialogue, clarification of goals, negotiating towards a win-win situation, agreement and implementing the solution realized. Since conflicts also occur in my workplace as a customer service professional for T-Mobile, a clear understanding of how to handle conflicts as they arise and avoid poisoning of the w ork environment is necessary. Therefore, an understanding of factors such as technological developments, culture, age, personality, professional differences among others will help in taking the best approach in handling conflicts by making good negotiations. In this case, getting a clear overview of the underpinning factors leading to such differences is essential. In most cases, when conflicts arise, people usually make personal judgments, which in some cases do not solve the conflicts as anticipated. As such, having been well informed on how conflicts arise, I will always withhold judgment and use efficient problem solving techniques to ensure that the problem is solved completely, and that future occurrences of such conflicts are effectively handled. I will never ignore any conflict that arises as they usually arise out of something. In this regard, I will always utilize the structures implemented by T-Mobile to effectively handle the conflicts. Additionally, I will be very obser vant on how I handle every person or situations to avoid being at the centre of any conflicts. This is because, despite an act being minute, it can have adverse effects, which are beyond the expectations of many. Thus being extra cautious will help a great deal in avoiding occurrences of conflicts in future. Sharpening my negotiation skills and conflict management skills will be very effective in handling confl
Tuesday, October 29, 2019
Psychosocial stage of development Essay Example for Free
Psychosocial stage of development Essay According to Ericksonââ¬â¢s psychosocial stage of development my age lies under the fourth stage i. e. industry versus inferiority. This stage starts from age 6 to 12 and in this stage a child is shifting from dependent circumstances to more independent circumstances. Like in this stage he becomes more desired to achieve something or to finish his tasks completely. He came out of that age of fantasy and became more responsible because after entering this stage a child starts learning new things, he knows if heââ¬â¢ll do well in school heââ¬â¢ll b admired by his parents as well as other people. If a child experiences the fulfillment of his achievements basically anything positive or constructive will easily be through by this crisis stage. On other hand he also knows that if heââ¬â¢ll b failed to complete his task then he will face criticism from family and others as well. If a child faces failure at his school responsibilities or even worse than that he is ignored and no one wishes to accept or develop his capabilities and strengths or not given a chance to discover their potentials then itââ¬â¢s quite obvious that a child would feel inferior or low and inadequate to do anything (Myers, 2009). Psychosocial Stage of Development Influences Behavior and Relationships: As per Ericksonââ¬â¢s psychosocial stage of development my behavior and relationships are very much influenced by this theory of Erickson. Influences which can be seen according to Ericksonââ¬â¢s psychosocial stage development on me were like when i start going to school at the age of three i have no idea that what will the situations i will be going through. My mind was not big enough to understand these things but as i got into junior high school i came across certain things which I have to handle by myself whether good or bad. Next thing was my relationship to my peers or companions which is based on some rules like if I am going to play some game like baseball i need a team to play with. This shows that I have developed a strong relationship through teamwork (Myers, 2009). Than if looking to my studies I have a certain group that studies along with me, if we have a homework given we do it regularly by which my behavior patterns got controlled and i get disciplined every year after. I went through all these things and finally i got hold on how to handle psychosocial crisis because having good relationship with your peer group and develop a good behavior can lead any person to the path of success. And if one person has made good decision at this level then he can easily be cautious about taking decisions on next levels or can say that heââ¬â¢ll easily be industrious (Cash, 2002). Positive Influence of Psychosocial Stage of Development: Positive influences which come out of my psychosocial stage development were that i have strong bond made between me and my peer group because we use to play and study and study together. By doing this we came across many victories which made us proud and give a sense of satisfaction that we can do something that can be appreciated by our families and other people as well. As this is the middle age in which a child wants to do things by his will without interfering of others. At my academic level things have been very positive for me as there is full support of my parents by which i have developed certain skill at my own. Like if you talk about behaviour i have made a timetable and put things which are suitable for me to do at certain time frame. My behaviour towards my studies would also be considered positive because i got support from my parents and also from my teachers which helped me in many ways(Cash,2002). Negative Influence of Psychosocial Stage of Development: Talking about negative influence of my psychosocial stage of development there are certain things which made me feel inferior when i was in the middle childhood stage were that when in school teacher used to say that you have to finish your lunch even if I am not that much hungry which made me feels awful many times. Regarding this food stuff which at my home also has been an issue for me was that in that middle childhood stage i use to see my mom cooking different cuisines for our family. Sometimes i also feel like to cook something for my family but my mother always use to lower my enthusiasm by telling me that I am too small to cook. This have been left a very negative impact on me and thatââ¬â¢s why i still donââ¬â¢t know how to cook food properly because somewhere in my mind I have this complex that if I will cook something it would not be worth it(Cash,2002). Other Developmental Issues Influenced My Personality: Other development issues influenced my personality in such a way that when i was born i. e. when I am in the stage of trust versus mistrust, although i was too small to know that what happened with me at that time but looking to myself i can say that my family or my parents have taken very good care of me, because i donââ¬â¢t see any many negative points in my personality and itââ¬â¢s all because of my parents. The example of trust can be given that how much I am close to my parents. Next stage would be autonomy versus shame and doubt in which a child develops a sense of being a separate human being and wants attention that everyone knows him individually. Regarding this stage there are some negative aspects of my personality that after reaching to an age of three i still was not able to go to toilet by myself because i was not properly trained. So at that time this bring me shame that kids of my age are toilet trained but I am not. But on the other hand i was very much trained to do mess while I am having my food which helps me a lot handle spoon in my hand on my own. After that another stage come which is initiative versus guilt in which a child starts taking decision of his own that whether he wants to eat or not or what things he should do. This is the age which is also known as play age, when a child starts going to pre-school or nursery. In this age a child wants to start doing things on its own or wants to take risks. Like in this stage a child starts going to school and there he learns different things and skills. Like I have said my academic time has helped me a lot to develop my personality (Cash, 2002). If I have to experiment something which help me further then my teacher encourages me to excel my abilities and this helped me a lot in taking decisions in my afterlife. Regarding the stage which I have picked i. e. industry versus inferiority these above developments have influenced my personality till my middle childhood stage (Cash, 2002). Conclusion: If i have to say that how much influenced ericksonââ¬â¢s psychosocial stage of development has made then to me its 90% correct that whatever he gives the theory can help people to understand their children if they are facing difficulties regarding their mood, behavior or actions. Through his theory people should know that a child cannot be treated forcefully he should get full time to develop himself. Itââ¬â¢s been seen that people who went through the crisis of their early adulthood and resolved them successfully, they who are also successful in their adolescence. REFERENCES Myers, D. G. (2009). Psychology. Worth Publishers Cash, A. (2002). Psychology for Dummies. Hungry Minds Books
Sunday, October 27, 2019
Differentiate Fat Fat32 And Ntfs Information Technology Essay
Differentiate Fat Fat32 And Ntfs Information Technology Essay In this term paper I have introduced the FAT, FAT32 and NTFS different file system . It includes features of FAT 32 and NTFS. At last there is comparison between FAT32 and NTFS. INTRODUCTION:- FAT:- FAT means file allocation table used by the operating system for locating files on a disk, a file can be divided into many parts due to fragmentation that is scattered around the disk. The File Allocation Table keeps track of group of all these pieces. File Allocation Table is a group of addresses that reach in the form of a table to see which cluster is coming next, when a file is accessed or a directory is scanned. In DOS, FAT is stored after the boot sector. The older versions of FAT for Windows 95 and earlier is called FAT16, and for new versions of Windows 98 and 95 is called FAT32. Terminology:- FAT: stands for File Allocation Tables, a data structure that is found in all FAT volumes. FAT1: It is the first thing to see in FAT. FAT2: The 1st copy that is used by the FAT. FAT12: File Allocation Table file systems uses 12-bits clustered addresses. FAT16: File Allocation Table file systems uses 16-bit clustered address. FAT32: File Allocation Table file systems uses 32-bit clustered address.. FATxx: File system that use File Allocation Table and all that is used by FAT. VFAT: It is the 32-bit code used for operation the file system in Win9x Graphical User Interface mode. Cluster: It is the Single unit for storage of data on the FATxx file systems. Sector: It is the unit of storage devices at the physical level of disk. Physical sector address: It refers to Sector addresses at absolute physical hardware terms. CHS sector address mode: As above, expressed in Cylinder, Head etc Logical sector address: It is a Sector address which is relative to the FATxx volume. Folder: It is a collection of items named as seen with the help of Windows Explorer. File Folder: It resembles the same as windows call it directory. Directory: It is a data structure that lists file and directory. Directory entry: It generally points to a file or directory, and contains the information about it. Attributes: It refers to the collection of bits in a directory entries that mention it. File Allocation Table is the entries list which is mapped to each and every cluster at the time of partition. The partition is further divided up into identically sized clusters, small block of space. The size of cluster varies depending on the type of FAT file Each entry contains records of one of five things: the cluster numbering of the coming cluster in a sequence a special end of chain cluster (EOC) entry that points to the end of a chain a special entry for marking a bad clustering a special entry for marking a reserved cluster a zero to note that the cluster on which we are working is unused FAT entry values: FAT12 FAT16 FAT32 Description 0x000 0x0000 0x0000000 Free Cluster 0x001 0x0001 0x0000001 Reserved value; do not use 0x002-0xFEF 0x0002-0xFFEF 0x0000002-0x0FFFFEF Used cluster; value points to next cluster 0xFF0-0xFF6 0xFFF0-0xFFF6 0x0FFFFF0-0x0FFFFF6 Reserved values; do not use. 0xFF7 0xFFF7 0x0FFFFF7 Bad sector in cluster or reserved cluster 0xFF8-0xFFF 0xFFF8-0xFFFF 0x0FFFFF8-0x0FFFFFF Last cluster in file (EOC) File System Structure:- The File Allocation Table volume has been divided into different four areas: The boot record:- It is the first and the starting sector of a FAT12 or FAT16 volume. It gives us the definition of the volume that we are using, as well as for the other remaining three areas. If the volume is made bootable, then the very first record will also contains the code required to enter the file system and for the purpose to boot the Operating System. The File Allocation Tables:- It is a address that can be reached as a lookup table to check which cluster comes next, when a file is load or scanning a directory. Because the File Allocation Table is such a important data structure, there are typically two copies (i.e. FAT1 and FAT2) so that corruption of the File Allocation Table i.e. FAT can be detected and intelligently repaired. The root directory:- It fixed in length and is always located at the starting of the volume (after the FAT) in FAT12 and FAT16 volumes, but FAT32 treats the root directory as just another cluster chain in the data area. However, even in FAT32 volume, the root directory will automatically follow immediately after the two FATs. The data area:- It fills the remaining part of the volume, and is divided into many clusters; it is only here that the file data is stored. Subdirectories are the very special files with a structure that can be easily understood by the file system, and is marked as directories rather than files by setting the directory attribute bit on the directory entry that always points to it. FAT32:- The FAT32 file system is that one which was originally introduced in Windows 95 Service Pack 2, which is really just an extension of the original FAT16 file system that provides a much larger number of clusters per partition as compared to others. As such, it helps greatly in improving the overall disk utilization when it compared to a FAT16 file system. However, FAT32 shares all of the other limitations of FAT16, and adds an vital additional limitation-many operating systems that recognize FAT16 will not work with FAT32-most probably Windows NT, but also Linux, UNIX etc as well. Now this is not the problem if we running FAT32 on a Windows XP computer and sharing our drive out to other computers on our network-we dont need to know (and generally dont really care) what our underlying file system is. Features:- FAT32 supports drives up to 2 terabytes in size. FAT32 uses space more efficiently as compared to others. FAT32 is more robust. FAT32 can be used to relocate the root folder and use the backup copy of the file allocation table instead of default copy. FAT32 is more flexible as compared to others. The root folder on a FAT32 drive is a cluster chain, so it can be used to locate anywhere on the drive. The previous flaws on the number of root folder entries no longer exist. Further, file allocation table monitoring can be disabled, allowing a copy of the file allocation table other than the first one to be active. NTFS:- NTFS is define as New Technology File System .it is a file system that was introduced by Microsoft in 1993 with Windows NT. It supports hard drive sizes up to 256TB. It is the primary file system used in Microsoft Windows 7, Windows Vista, Windows XP, Windows 2000 and Windows NT operating systems. The Windows Server also primarily uses NTFS. NTFS has several advantages over FAT and HPFS (High Performance File System) such as improved support for metadata and the use of advanced data structures to improve performance, reliability, and disk space utilization. The File Allocation Table (FAT) file system was the primary file system in Microsoft older operating systems but it is still supported today along with NTFS. It is more powerful and offers security advantages not found in the other file systems. There are normally three different file systems available in Windows XP: FAT16 i.e.short for File Allocation Table, FAT32, and NTFS, short for NT File System. The NTFS file system is generally not supportable with other OS installed on the same computer, nor is it available when we have booted a computer from a floppy disk. Advantages of NTFS:- It introduced the first version of Windows NT, which is totally different file system from FAT. It provides for highly increased security. If we have already upgraded to Windows XP and did not do the conversion then, it is not a problem. You can convert FAT16 or FAT32 volumes to NTFS at any point. NTFS Security Features:- . File compression Encrypting File System (EFS) NTFS Security and Permissions Hard links and short filenames COMPARISON :- In FAT 32 operating system that are used is Windows 98 XP whereas operating system used in NTFS is Windows XP. These are much file system for hard drives.Ã Each has its own pros and cons. But FAT32 is preferred because it is easy to read and write to with a boot floppy.Ã Windows XP comes with a conversion utility for FAT32 to NTFS called convert.exe.Ã Only the operating system decide whether a partitions file system can be read or not . There are no security features in built-in FAT which was designed in single user era whereas NTFS has many security features built into it making it the a file system for multi user operating system. BibliographY:-. Operating system concepts by Gill n Smith A fundamental aaproach to Operating System by Jain and Iyer
Friday, October 25, 2019
F. Scott Fitzgeraldââ¬â¢s The Great Gatsby - The Up-Roaring Twenties :: free essay writer
The Great Gatsby: The Up-Roaring Twenties à The 1920s in America were a decade of great social change.à From fashion to politics, forces clashed to produce a very ^Roaring^ decade.à Jazz sounds dominated the music industry.à It was the age of prohibition, the age of prosperity, and the age of downfall.à It was the age of everything, and this can be witnessed through the novel by F. Scott Fitzgerald, The Great Gatsby.à The Roaring Twenties help create Gatsby's character.à Gatsby's participation in the bootlegging business, the extravagant parties he throws, and the wealthy, careless lifestyle the Buchanans represent are all vivid pictures of that time frame.à It turns out, although he was used and abused by all the people whom he thought of as friends, Jay Gatsby ^turned out alright in the end.^à (Fitzgerald 6)à It almost seems as if he is better off dead, according to the narrator, because all his so-called ^friends^ either deserted him or used him for their own personal gain.à There are signs of this all!à throughout the novel, but it is especially evident in the final chapters.à In chapter seven, when Myrtle Wilson is killed, Daisy accepts no responsibility for Myrtle^s death.à She just sits back and lets Gatsby take all the blame for her actions.à Gatsby is very willing to do so, because of the love he has for Daisy.à All Gatsby can think about after the accident is what Daisy went through, it was as if ^Daisy^s reaction was the only thing that mattered.^ (Fitzgerald 151) Gatsby stands outside of Daisy and Tom^s house for hours, waiting for a sign from Daisy that things were alright.à ^I want to wait here till Daisy goes to bed.^ (Fitzgerald 153)à Inside, as she talks with Tom, Daisy shows no remorse, she just continues with her life as if it never happened.à In chapter eight, Gatsby recounts for Nick all the memories he has of Daisy and him together.à ^She was the first ^nice^ girl he had ever known.^à (Fitzgerald 155)à ^...Daisy, gleaming like silver...^ (Fitzgerald 157) This makes it especially hard for Nick to see Gatsby still in love with Daisy.à While around Gatsby, Daisy either pretends to be, or is in love with Gatsby.à This is evidenced when Daisy ^pulled his (Gatsby^s) face down kissing him in the mouth.^à (Fitzgerald 122) Then when she is in her kitchen with Tom after Myrtle^s death, ^there was an unmistakable air of natural intimacy...they were conspiring together.^à (Fitzgerald 152) In the final chapter, Gatsby^s funeral takes place; however, no ^friends^ that had frequented his parties, with the exception of owl-eyes, bother to come to his funeral.
Thursday, October 24, 2019
Liquidity Ratio Essay
In this case study, our main purpose is to analyze the company financial statements and investigate the effects of financial analysis announcements on the stock price from 2000 to 2004. Besides that, we concerned about the financial management or strategy in the company and how are they sustaining their company growth and expected earnings in the stock market. We also discuss about the company financial analysis and competition in the industry. 2. 0Case Study Summary Krispy Kreme Doughnut operation was started in 1937 when the founder of Kripsy Kreme, Vernon Rudolph began making doughnuts from a special recipe he bought from a French chef. Then, Krispy Kreme was so well-known and it expanded from a wholesale enterprise to an addition of Krispy Kremeââ¬â¢s retail operations and franchising. Rudolph focused on excellent quality of doughnuts and customer service. The result was always good when it was under the control of Rudolph. After Rudolphââ¬â¢s death, Krispy Kreme was acquired by Beatrice Foods and its priority was to earn profit. Beatrice encouraged additions to the menu and changed the original recipe and logo of Krispy Kreme to cut cost. Unfortunately, the business went down Beatrice decided to sell it. In 1982, the new owner of Krispy Kreme, Joseph McAleer bought Krispy Kreme by using leverage. Joseph maintained back the original logo and recipe of Krispy Kreme. One of the priorities of Joseph and Krispy Kreme focused on hot and fresh doughnut. In 1989, Kripsy Kreme was free from debt and began to expand. In 1996, doughnuts and added branded coffee were their main focus. In year 2000, Kripsy Kreme went public and the initial share price reached $40. 63. After going public, the corporation was planning aggressively to increase the number of stores and enter international markets. The revenues of Krispy Kreme Doughnuts were generated from n-premises sales, off-premises sales, manufacturing and distribution of product mix and machinery and franchise royalties and fees. In May 2004, Krispy Kreme announced three major adverse results for the first time as a public company. Firstly, the company suffered loss due to the trend of low-carbohydrate diet. Secondly, it planned to divest Montan a Mills and would be charged. Thirdly, the company planned to close three of its new Hot Doughnut and Coffee Shops. These announcements made the shares closed down by 30%. In year 2003, SEC announced that Kripsy Kreme was too aggressive in acquiring franchise. The practice of Krispy Kreme acquiring Michigan franchise was so wrong. The company recorded the interest income on past-due loan from Michigan as immediate profit and the purchase cost on Michigan as intangible asset and did not pay off. In the same time, the company was being charged due to the quitting of the Michiganââ¬â¢s top executive. The shares of Krispy Kreme fell for another 15% due to the announcement from SEC. SEC published another report stated that Krispy Kreme was facing the problem of growing too fast and the company was too rely on the profits made from manufacturing and distribution of franchise equipment. Strengths Krispy Kreme is a well-established and long running company. It has a strong and consistent consumer base in United State and abroad. Krispy Kreme is a nationally well known consumer brand because the company offers product that is second to none regarding on the taste, freshness and the finest ingredients. The company has consistent expansion and growth. Currently, the corporation has 395 stores with the presence in 40 states in United State and in 16 foreign countries. Krispy Kreme gains the most popularity in grocery, convenience stores and retail outlets due to easy accessibility to the product. The corporation offers more than 20 different types of doughnuts and other menu items including of coffee and bakery items. They are also selling those collectable memorabilia such as mugs, hats and toys. Besides that, Krispy Kreme introduced the neon sign of ââ¬Å"Hot Doughnuts Nowâ⬠because it offers variety of freshly made doughnuts with high quality everyday. Krispy Kreme is also the first corporation that cut a hole in its factoryââ¬â¢s wall to sell its fresh doughnuts directly to the customers. Krispy Kreme is a vertically intergrated company with three business units which are company store operations, franchise operations and supply chain operation. They produce doughnuts in a cost effective manner because of the using of an accelerated approach. Thus, Krispy Kreme has a high capacity of production because each factory stores could produce 4000 dozen to 10000 dozen of doughnuts in a single day. In addition, Kripsy Kreme also differentiated itself with the others by offering customers an experience to see the production of doughnuts. 3. 1. 2Weaknesses Krispy Kreme has the following weaknesses which is the low inventory turnover ratio. If not attended to quickly the firms supply line will continue to cost more money and reduce future profits. Next, the financial condition of Krispy Kreme is better compared to its competitors but does have some areas that need improvement. Krispy Kremeââ¬â¢s young management is showing that they want to be alert and have employed an almost zero tolerance policy regarding debt. Poor management or financial practices hurt reputation and stock prices of this company. Limited amount of ââ¬Å"healthyâ⬠menu selections, limited ââ¬Å"non-breakfastâ⬠menu items 3. 1. 3Opportunities International expansion gives better returns to company. Krispy Kreme can grab the chance to expand its business and enter into new markets like Asia countries because Asians love sweet goods and they are open to trying foreign foods. The popularity of Western brands in these markets is quiet high.
Tuesday, October 22, 2019
Letter of Recommendation Essay
Very rarely people in teaching profession like me come across a student like gulshan Ramesh. This has been penned down by me to make it very concrete that Mr. Gulshan Ramesh is a very unique and exceptional character in the student community. My relationship with this particular student started when I handled a course on machine drawing for his batch of students. Moreover, Mr. Gulshan was under my guidance for a year fro improving his overall personality. All of this has given me enough opportunity to observe him very closely. My observations have been listed below for your reference. Attitude: Mr. Gulshan is blessed with the positive attitude due to which he has always excelled in academic activity and otherwise Character: This student is highly disciplined, sincere and has pleasing manners. Academic: Constantly Mr. Gulshan has maintained a high grades in academic. Iââ¬â¢ll rate him in the top 5% amongst approximately 70 students in the class. Intellectual independence: Mr. Gulshan has the capability to complete assigned tasks with minimum guidance that makes him intellectually independent. Communication: This student is good both in oral and written communication. He has the capability to put across ideas very clearly both orally and in written form. Leadership: In team tasks, this student has always emerged as a team leader because of his sincerity and overall multifaceted personality. Computer literacy: Mr. Gulshan is well versed with the following auto cad, pro e Others: Creativity, individuality and hard work have been the style of this student that has always made him to shine. Mr. Gulshan will be an apt student to undergo a graduate program. I enthusiastically recommend Mr. Gulshan for the graduate program he has applied for in your university with full financial aid.
Mozart 1756-1791 essays
Mozart 1756-1791 essays Johannes Chrysostomus Wolfgangus Theophilus Mozart was born January 27, 1756 in Salzburg Austria to Leopold Mozart and Anna Maria Pertl. Leopold was the son of a bookbinder while Anna Maria was the daughter of a county official and amateur musician. Leopold himself was a violinist and worked as the Vice Kapllmeister for Archbishop Schrattenbach of Salzburg. He at the age of twenty-eight married Anna Maria then twenty-seven after a long courtship. The couple had seven children, two of which lived, the second, Maria Anna (Nannerl) and the Seventh Wolfgang. Johannes Chrysostomus Wolfgangus Theophilus Mozart is his full baptismal name; he went by Wolfgang Amadeus Mozart. I take it that his first name is attributed to the fact that his mother grew up near Lake Wolfgang. Amadeus is Latin for Theophilus, which is Greek and in all languages means: Beloved of God. One wonders whether he ever heard of the ancient Greek king Menander's saying: Whom the gods love dies young.?1 At age three Wolfgang began imitating his sister as she played the clavier. When he played and the music sounded good, he was happy, but if it sounded bad he would start to cry. By age four he composed his first piece, minuet in G and attempted to write a clavier concerto. Wolfgang could write music before he was able to write most words. The same year he also began playing the violin. When Wolfgang turned six he began touring Munich and Vienna with his sister to gain recognition. The empress Maria Theresa invited them to perform, when the performance was over, Wolfgang ran up to the empress and kissed her, something that was very inappropriate, but she didn't seem to mind. Wolfgang Amadeus is such a charming and gifted child,? she said. Such great talent in such a small boy!? And her husband Francis I called him a little magician.?1 After the performance Wolfgang slipped and fell while playing hide and seek. One of the Maria Theresa's daughters helped him...
Sunday, October 20, 2019
Scientific Definition of a Laser
Scientific Definition of a Laser A laser is a device which is built on the principles of quantum mechanics to create a beam of light where all of the photons are in a coherent state - usually with the same frequency and phase. (Most light sources emit incoherent light, where the phase varies randomly.) Among the other effects, this means that the light from a laser is often tightly focused and does not diverge much, resulting in the traditional laser beam. How a Laser Works In simplest terms, a laser uses light to stimulate the electrons in a gain medium into an excited state (called optical pumping). When the electrons collapse into the lower-energy unexcited state, they emit photons. These photons pass between two mirrors, so there are more and more photons exciting the gain medium, amplifying the intensity of the beam. A narrow hole in one of the mirrors allows a small amount of the light to escape (i.e. the laser beam itself). Who Developed the Laser This process is based on work by Albert Einstein in 1917 and many others. Physicists Charles H. Townes, Nicolay Basov, and Aleksandr Prokhorov received the 1964 Nobel Prize in Physics for their development of the earliest laser prototypes. Alfred Kastler received the 1966 Nobel Prize in Physics for his 1950 description of optical pumping. On May 16, 1960, Theodore Maiman demonstrated the first working laser. Other Types of Laser The light of a laser does not need to be in the visible spectrum but can be any sort of electromagnetic radiation. A maser, for example, is a type of laser that emits microwave radiation instead of visible light. (The maser was actually developed before the more general laser. For a while, the visible laser was actually called an optical maser, but that usage has fallen well out of common usage.) Similar methods have been used to create devices, such as an atomic laser, which emit other types of particles in coherent states. To Lase? There is also a verb form of laser, to lase, which means to produce laser light or to apply laser light to. Also Known As: Light Amplification by Stimulated Emission of Radiation, maser, optical maser
Saturday, October 19, 2019
Social Causes of Drug Abuse Essay Example | Topics and Well Written Essays - 750 words
Social Causes of Drug Abuse - Essay Example In childhood, one's family is the model for social norms and acceptable behavior. Thus it stands to reason that a child's family has the most significant sway over the lifestyle choices that the child will make in the future. Studies have shown that parents' perceived positive or neutral attitudes towards drug use tends to increase their child's likelihood of engaging in drug use (McDonald, Towberman). Parents' direct involvement in some form of substance abuse also increases their child's likelihood of developing a substance abuse problem. In a 1988 study conducted on drug use and familial attitude toward substance use, 25.4% of teenagers who admitted to having used drugs had at least one parent who was a heavy drinker (McDonald, Towberman). Furthermore, the child's relationship with his or her parents also affects his/her likelihood of drug experimentation. Studies have shown that children with strong and healthy relationships with their parents are less likely to use drugs (McDona ld, Towberman). ... On the other hand, though, studies have found that teenage drug users are likely to have either authoritarian or uninvolved parents (Jenkins). The most consistent risk factor in studies on teenage drug use is peer influence. A study was conducted which analyzed significant risk factors in teenagers in grades 8, 10, and 12. In all three grades, the most significant predictors of drug use, ranked from most to least significant, were (1) number of drug-using friends, (2) average grade in school, and (3) involvement in an enjoyable extracurricular activity (Jenkins). In grades 8 and 10, average grade and involvement in extracurricular activities pose a substantial variance, but in grade 12, they have little to no significant determination on the likelihood of the teenager's use of drugs. The study ultimately found that, overall, involvement in extracurricular activities or after-school employment have little to no bearing on the prediction of future drug abuse. One study found that the number of drug-abusing friends a teenager had and a positive attitude towards drug-use accounted for 55% of the variance in drug use, with the n umber of drug-using peers accounting for twice as much variance as a favorable attitude towards drug-use (Jenkins). While these studies clarify the definite link between the likelihood of drug use and the number of drug-using friends a teenager has, they do not tell us whether drug use results from these relationships or whether teens with a proclivity for substance abuse tend to gravitate together. R. Michael McDonald and Donna B. Towberman suggest that the most effective deterrent to future drug abuse is to encourage children to bond with their parents and other children
Friday, October 18, 2019
Finance and Investment Essay Example | Topics and Well Written Essays - 1500 words
Finance and Investment - Essay Example Based on the given information, it appears that all projects are viable because of the positive NPV. In selecting the best project, the highest NPV has to be considered. In this situation, Project B is expected to provide more gains. Its NVP is more than double compared to the NPV of Project A. This means that benefits generated by Project B are twice greater than Project A. In practice, there are several aspects that can affect the determination of the coefficients. First, the inflation rate is one of the indicators used to identify the coefficient. Basically, considering the inflation rate changes the value of the principal as time progresses. Usually, the interest rate changes the amount that is expected to be gained from an investment when the benefits of the venture are realized in an installment basis. Second, the interest rates are also valuable aspects in determining of the coefficient. This happens when the project is financed by debt. It is imperative that the interest rate will serve as factor. A. Usually, senior executives view the different valuation methods to be similar. The most extensively used among the schemes is the Discounted Cash Flow (DCF) because of its inclination to be flexible and accurate. Some instances, however, suggests that several aspects affect the precision of the forecasts. Benchmarking the methods used by the company to its competitors is a viable scheme to arrive at more accurate predictions. The process when correctly manifested enables the company to determine mismatches in performance and strategically determine its position in the industry. Using multiples analysis provides insights that contribute in creating value in the industry. Multiples analysis is often miscomprehended and misused. Several analysts have failed to consider minor details that have great impact on the end result. Given this limitation, the companies can address the deficiency through meticulous designing of the multiples analysis. A prominent design was developed by Credit Suisse First Boston (CSFB) which tracks the stock movements among US firms. Another important problem observed in multiples analysis is that the method results to several varying conclusions. Overall, multiples analysis remains as an important component of DCF which accurately determines the future gains of investments. B. One of the main uses of multiples analysis is on predicting the price of stock markets. It assumes that the same prospects apply to the firm being studied. This appears to be limited because such has never been the situation for some firms. Using the same prospect makes the forecasting limited. In effect, it will difficult to arrive at an accurate result. In addition, it has been detected that the method tends to provide unexpected difference. In forecasting, the analyst draws conclusions that will like be observed. Multiples analysis becomes problematic because analysts fail to recognize the important differences after the results have been obtained. Amidst the use of multiples in DCF, its
Types of Inflation, Causes and how Inflation is Measured Essay
Types of Inflation, Causes and how Inflation is Measured - Essay Example It is important to note that, the higher demand will in turn pull up prices of commodities thus resulting to too much money circulating in an economy. This can be attributed in times of war, or rather political crisis in a country's economy. Pricing Power Inflation This also referred to as profit-push inflation. This is a type of inflation, which result from a situation whereby, individuals in business intentionally and administratively decide to increase the prices of commodities and services. This intentional move aims at increasing the profit margins. The makers exercise their market influence by increasing the prices of product and services to suit their expectations. It occurs in monopolies and oligopolies market. They do this due to their concentration in the market. Cost- Push Inflation This occurs when the price of goods or service increase due to the rising cost of its production or when the maintenance cost rises. It is apparent that the resultant excess demand created by t he rising cost of production causes prices to increase. An example is whereby price of an agricultural product such as maize rises due to an increase in the cost of fertilizer production. Wage-push inflation This normally occurs when wages or labor costs rises due the influence from the labor unionââ¬â¢s demand for the increase in wages. In addition, as it happens, the productivity remains constant. The resultant cost and effect will drift to the consumers. The increase in the cost of labor will cause the business to cut down the number of laborers hence consequently resulting to the low productivity. On the other hand, the fall in productivity level, which is low supply, will cause prices to rise due to the constant consistency of the demand. This inflation causes unemployment since higher price level means that, no more laborers are needed. In this scenario, most institutions lay off some of the employees. Unless demand for the wage stops, there will be continuous, high price l evel coupled with higher unemployment and low output. Sectoral Inflation This kind of inflation occurs on the relationship between related or unrelated product and or services. This occurs when change in the price of a product influences the price of another. For example, a stationery user, a case, or a situation whereby the price of timber price rises, the stationery dealer will in turn increase the price of stationery items such as books to suit their profit margin thus causing a general increase in prices occurring in every unit of product or service. Supply shock inflation This arises under unpredictable circumstances in an economy, for example, when there is unpredictable drought occurrence, the price of the agricultural products will rise rapidly and especially when there is no enough stock to curb and fix the situation. Hyper inflation It is a form of inflation that occurs when country involved is in economic backdrop thus in dire need of monetary valuables and funding. It is where prices rise at a higher rate, and when the rate of inflation exceeds four digits. Creeping inflation It occurs where price level rises normally between 1 and 7%. Imported inflation It deals with international trade. The prices of imported goods normally have an effect in domestic prices. Causes of inflation It is worth noting that inflation occurs under various circumstances for instance when there are changes in the price of foreign goods. This will have an impact on the overall payment made to the outsiders.
Wal-Marts approach to Purchasing and Supply-Chain Management Essay
Wal-Marts approach to Purchasing and Supply-Chain Management - Essay Example This report stresses that Wal-Mart is a retailer of consumer goods. Its ultimate strategy is to offer products at low prices thus becoming a common primary area of interest among various business experts in terms of costs. This low pricing strategy is the core competitive strategy for the retail store. However, besides this, its purchasing and supply-chain management have great contribution too; the actual business world William. The Wal-Mart failed in Germany because the management wanted to implement the United States model to the Germany market. The Wal-Mart management pressured the executives in Germany to enforce management styles of American in the workplace. For instance, workers were forbidden dating colleagues in the organizationââ¬â¢s influential positions or flirt with colleagues Huff Post Business This paper shows that the presented activities, Wal-Mart are trying to employ in order to create there competitive advantage primarily using itââ¬â¢s purchasing and supply-chain management for this reason have proved effective. It was found that these activities with information technology have helped Wal-Mart create a competitive advantage over other players in the retail chain store industry. Therefore, to gain competitive advantage in an industry an organization will need to choose the right business models and adopt the right technology to develop a competitive advantage in the industry.
Thursday, October 17, 2019
Historical origins of sociology Essay Example | Topics and Well Written Essays - 1000 words
Historical origins of sociology - Essay Example Auguste Comte responded to the aftermath of the French Revolution and could see changes to society occurring with the coming of the Industrial Revolution. He is often credited as being the ââ¬Å"fatherâ⬠of sociology. Comte sought to apply the scientific method and concepts of rationality which he defined as positivism to study human social forms. The field of sociology was formalized in the modern period by such thinkers as Emile Durkheim, Max Weber, and Karl Marx. East of these thinkers presented different theories that first sought to describe the way social and civic units were organized. These theories explained the importance of certain habits such as religion, aggression, or the way work was organized. In the West, Durkheim, Weber, and Marx are seen as the 'founders' of sociology as their theories, methods, and insights can still be used to understand and develop new concepts dealing with social phenomena today (Bilton et al, p. 5). But what is interesting is to raise th e question did sociology exist even before these thinkers arrived on the scene. Or if it didn't, what did it mean in other periods of history. Certainly there were thinkers who studied their societies at other periods of history, possibly in the same way that current thinkers study their societies. One can imagine an advisor to an Egyptian pharaoh saying to the king that the poor community should be organized in such and such a way. He may say that they should be next to bodies of water and arid land and as well to a military community. He would explain to the kind that the people who are currently paying the most taxes are the middle class and that they even recognize their responsibilities more to this one god than this other god. The king would ask why and the ancient Egyptian sociologist would then describe the history of the forefathers of that group of middle class people, to make it appear that their religion served certain needs which should be provided for. Durkheim, Weber, and Marx each studied the social organizations and the religions of various ancient societies. Also each of these thinkers eventually wrote works that were specialties and represented individual concentrations of each writer. For example, Durkheim wrote books on religion and also on suicide. Marx, of course is the most known of the thinkers. His work was more or less in economics and social theory that dealt with classes (Bilton et al, p. 100). Marx's partner, Engels wrote a books on the English working class. Weber's most famous book was The Protestant Ethnic and the Spirit of Capitalism", but he had also written on Roman medieval societies. Weber ventured outside his comfort themes to write about religion and Asian societies. He wrote about ancient Confucianism and Taoism. He also wrote on Hinduism and Buddhism. Durkheim and Marx also had studied different religions. Durkheim demonstrated the importance of religion in forming early societies and how some of its standard activitie s merged into civic activities. Durkheimââ¬â¢s theory of anomie, social deviance, today forms the basis for which many sociologists and criminologists build theories of social deviance and subcultures (Bilton et al, p. 386). His theories concerning the division of labor among growing societies help provide good understanding of Marx (who wrote before him) and other theorists. The early thinkers of western sociology were also familiar with economics. It was the changes which the Industrial Revolution had placed
Understanding Of Market-Based Management Term Paper
Understanding Of Market-Based Management - Term Paper Example b). The Vantage Point of Dispersed Knowledge Dispersed knowledge possessed by the isolated individuals is better than centrally planned expert knowledge in coordinating human economic activities. It is argued that ââ¬Å"historical experience shows that market economies, which rely on the dispersed knowledge and independent judgment of numerous consumers and producers, consistently provide a dramatically higher quality of life than centrally planned economies" (Gabble and Ellig, 1993, p. 5). It is important to note that the logic of market functioning is not only applicable to inter-businesses relations but also to the governing of specific business organizations. Simply speaking, the idea of dispersed knowledge possessed by the customers at the vantage positions of the market is equally applied to the ââ¬Ëwithin' of the corporations too. III. Koch Industries and Market-Based Management At Koch Industries, the application of market-based management saw a 2000 fold increase in the book value after the policy was initiated in the early 1990s. For them, it is a "philosophy that enables organizations to succeed long term by applying the principles that allow free societies to prosper" (Koch, 2007, p. vii). Importantly, at Koch industries, "vision, virtue and talents, knowledge processes, decision rights and incentives" are the five dimensions of market-based management (Koch, 2007, p. vii). All these five dimensions were applied in a holistic manner at the Koch Industries so that the effect was always transformative.
Wednesday, October 16, 2019
Wal-Marts approach to Purchasing and Supply-Chain Management Essay
Wal-Marts approach to Purchasing and Supply-Chain Management - Essay Example This report stresses that Wal-Mart is a retailer of consumer goods. Its ultimate strategy is to offer products at low prices thus becoming a common primary area of interest among various business experts in terms of costs. This low pricing strategy is the core competitive strategy for the retail store. However, besides this, its purchasing and supply-chain management have great contribution too; the actual business world William. The Wal-Mart failed in Germany because the management wanted to implement the United States model to the Germany market. The Wal-Mart management pressured the executives in Germany to enforce management styles of American in the workplace. For instance, workers were forbidden dating colleagues in the organizationââ¬â¢s influential positions or flirt with colleagues Huff Post Business This paper shows that the presented activities, Wal-Mart are trying to employ in order to create there competitive advantage primarily using itââ¬â¢s purchasing and supply-chain management for this reason have proved effective. It was found that these activities with information technology have helped Wal-Mart create a competitive advantage over other players in the retail chain store industry. Therefore, to gain competitive advantage in an industry an organization will need to choose the right business models and adopt the right technology to develop a competitive advantage in the industry.
Tuesday, October 15, 2019
Understanding Of Market-Based Management Term Paper
Understanding Of Market-Based Management - Term Paper Example b). The Vantage Point of Dispersed Knowledge Dispersed knowledge possessed by the isolated individuals is better than centrally planned expert knowledge in coordinating human economic activities. It is argued that ââ¬Å"historical experience shows that market economies, which rely on the dispersed knowledge and independent judgment of numerous consumers and producers, consistently provide a dramatically higher quality of life than centrally planned economies" (Gabble and Ellig, 1993, p. 5). It is important to note that the logic of market functioning is not only applicable to inter-businesses relations but also to the governing of specific business organizations. Simply speaking, the idea of dispersed knowledge possessed by the customers at the vantage positions of the market is equally applied to the ââ¬Ëwithin' of the corporations too. III. Koch Industries and Market-Based Management At Koch Industries, the application of market-based management saw a 2000 fold increase in the book value after the policy was initiated in the early 1990s. For them, it is a "philosophy that enables organizations to succeed long term by applying the principles that allow free societies to prosper" (Koch, 2007, p. vii). Importantly, at Koch industries, "vision, virtue and talents, knowledge processes, decision rights and incentives" are the five dimensions of market-based management (Koch, 2007, p. vii). All these five dimensions were applied in a holistic manner at the Koch Industries so that the effect was always transformative.
Professional Responsibilities Legislation Essay Example for Free
Professional Responsibilities Legislation Essay ââ¬Å"Teachers must meet their professional responsibilities consistent with the instituteââ¬â¢s (IFLââ¬â¢s) professional values.â⬠(IFL) One of the IFLââ¬â¢s many codes of professional practice. Upholding the code of conduct and relevant legislation is the basis for you as a teacher. Among the legislature you need to understand is the importance of the health and safety act (1974) ââ¬â it says all workers are entitled to work in a safe environment where risks are properly controlled. The HSWA act is also the umbrella under which more specific regulations such as the Manual handling act 1992 (amended 2002) are made. Another fundamental element of workplace health and safety management ââ¬â and also a legal requirement is RIDDOR; the reporting of injuries, diseases and dangerous occurrences regulations 1995. Also of great importance the childcare act 2006, it stipulates every child should get the support they need to be healthy, safe, and enjoy and achieve economic wellbeing. As a teacher you also need to have your own professional values ââ¬â views, beliefs that will underpin your profession. ââ¬Å"A good teacher is more than a lecturer.â⬠(AMEE 2000) You are no longer a dispenser of information or a walking tape recorder but instead you are a facilitator or manager of the students learning. You are there to ensure all learners have access to the same resources, the same support and you donââ¬â¢t differentiate instead embrace and respect peopleââ¬â¢s differences and their choices. You are there to guide them, provide information and offer suggestions. But it has to be a 2 way process, by helping them you will also develop your skills because ââ¬Å"teaching is itself a learning process for the teacherâ⬠(Joyce, Showers 2002). Everyone is different and you need to be prepared and have contingency plans for all levels of knowledge and skill ââ¬â you will find bored students make bad students. They donââ¬â¢t just have a variety of levels but also different learning styles, be sure to have a mix of kinaesthetic, visual and audio resources. You can use handouts with the camera instructions on, a video showing how it works, and then let them try themselves. It is your responsibility to ensure all students no matter how diverse are given equal learning opportunities ââ¬â that means assuming different roles. So for Learner X (names are confidential) you need to be firm, authoritative, Learner Y asks a lot of questions ââ¬â be prepared to listen and summarise, Learner Z needs more encouragement.
Monday, October 14, 2019
Development of Project Management Plan
Development of Project Management Plan LITERATURE REVIEW Having seen in the previous chapter about the Project management is a carefully planned and organized effort to accomplish a specific (and usually) one-time effort, for example, implementing a new computer system. Project management includes developing a project plan, which includes defining project goals and objectives, specifying tasks or how goals will be achieved, what resources are need, and associating budgets and timelines for completion. It also includes implementing the project plan, along with careful controls to stay on the critical path, that is, to ensure the plan is being managed according to plan. Project management usually follows major phases (with various titles for these phases), including feasibility study, project planning, implementation, evaluation and support/maintenance. Comninos and Frigenti (2002 p.72) defines Project management as ââ¬Å" The application of knowledge, skills, tools and techniques to project activities to meet project requirements. Further Haynes (1995 pp. 623) defines project management as ââ¬Å" Project management concentrates on the project . A project is an undertaking that has a beginning and an end and is carried out to meet established goals within cost , schedule and quality objectives . Project management brings together and optimizes the resources necessary to complete the project successfully . These resources include the skills , talents and co-operative effort of a team of people , facilities , tools and equipment ; information systems and techniques and moneyââ¬Å" Duncan (1995 pp. 742) has a similar view ââ¬Å"Project management is the application of knowledge, skills, tools and techniques to a broad range of activities in order to meet the requirements ââ¬Å" Harrison ((1988 pp.62) states these definition as ââ¬Å"The application of modern management techniques and systems to the execution of a project from start to finish, to achieve predetermined objectives of scope, quality, time and cost, to the equal satisfaction of those involvedâ⬠Cleland and Gareis (1993 pp.58) states that ââ¬Å"Project management is the ability to define, schedule and assign project activities; record project issues; monitor progress and report changes in activity accomplishment and issue resolution; and maintain and control changes to designs, plans and issue listsâ⬠Similarly Morris (1997 pp. 221) defines as ââ¬Å"Planning, monitoring and control of all aspects of a project and the motivation of all those involved in it to achieve the project objectives on time and to the specified cost, quality and performanceâ⬠Ciborra (2002 pp. 525) defines Information System (IS) as ââ¬Å"â⬠¦the system of persons, data records and activities that process the data and information in a given organization, including manual processes or automated processes. Usually the term is used erroneously as a synonym for computer-based information systems, which is only the Information technologies component of an Information System. The computer-based information systems are the field of study for Information technologies (IT)â⬠Project management is concerned with managing the entity called ââ¬ËPeople. There is no single universal definition of a software project , although some definitions do have similar structure. ââ¬Å" Projects consume a variety of resources , Projects have a specific start and end point (or life cycle), Projects have a owner (i.e. consumer ), Projects have a specific budget , Project have a clear method , Projects have finite objectives. ââ¬Å"A unique undertaking with a concise life cycle , start and end dates , a finite budget , resource allocation and defined outcome or objective â⬠(Gary 2001 p.25) 2.1 Preview of software industry in India The software industry is one of the fastest growing industries and highest earners of foreign exchange in the Indian economy. With help from the Indian Government including tax benefits and the development of infrastructure links, the software sector has grown over 56% annually since 1995. Software exports currently reach about 95 countries and account for 10.5% of Indias total exports.There is, therefore, significant interaction on the global level between IT companies and other countries and companies, which might account for the lead Infosys has taken amongst its peers in the field of CSR (Narayana Murthy CEO Infosys , 2006 15/02/07) The India Software Industry has brought about a tremendous success for the emerging economy. The software industry is the main component of the Information technology in India. Indias pool of young aged manpower is the key behind this success story. Presently there are more than 500 software firms in the country which shows the monumental advancement that the India Software Industry has experienced (IIT,2002 p.4) 2.2 Infosys and its relation to software project management Founded in 1981 in Bangalore by Narayana Murthy and six colleagues, Infosys is positioned to integrate the needs of vendors and service providers, using existing solutions or relying on new product development. The company does the necessary integration, software development, feature enhancements testing, release and third level support. It provides solutions to the financial sector the biggest chunk of its business- as well as to 460 other clients across a broad spectrum of other industries. (www.infosys.com 14/02/08) In terms of project management, software project work is split into two components: onsite and offshore, according to where it can be best done, at the lowest cost, and with the lowest level of acceptable risk, thereby de-coupling capability development and delivery. Although Infosys was not spared by the dotcom crash in 2001, thanks in part to the loyalty built up among employees the business bounced back, and by 2006 its market capitalization was US$18 billion. For Murthy, leading by example is what counts. This translates into three core values: respect for the individual, data-based decision making, and embracing constant change by forcing people to share their innovations. Infosys has established a systematic pattern of succession planning whereby board members remain in the vanguard but are underpinned by a three-tier leadership structure for high-potential managers. Younger employees are viewed as the eyes and the ears of the company, bringing to the forefront contemporary issues that might otherwise be overlooked (Manfred , Vries, Agrawal and Florent-Treacy 2006 p.121) Since incorporation, Infosys annual revenue has rapidly increased and it reached 1 trillion in 2006. Unlike many other Indian IT companies Infosys has concentrated on building software applications and this has contributed to its global success Infosys Technologies employs nearly 17,000 people worldwide, almost 10,000 of whom are software professionals. 116 new clients in the financial year (FY) 2002 added to the already prestigious list that includes Airbus, Cisco, Nordstrom and Boeing. Retail banking services account for around 4% of total revenue. The company vision is to be the best globally, commercially and ethically. As such, Infosys has developed a C-Life principle of core values that it aims to honour in all aspects of its business conduct . C LIFE represents Customer delight , Lead by example , Integrity and transparency , Fairness and Excellence (www.infy.com 15/06/07) 2.3 Project Management Processes (Infosys based approach) Turner J and Rodney (2005 p..43) states that ââ¬Ë A project management process is the management process of planning and controlling the performance or execution of a project ââ¬Ë Although all projects are different and have unique features m there are elements which are common to most . A process model needs a set of features which Are adaptable to a wide range of applications Provide a complete and adequate definition of any project to which they are applied Are easy to assimilate , with the key tasks and points of interest highlighted Are suitable to act as a memorandum and checklist to ensure that everything is covered Do not impose any unnecessary constraints on the use of tools , techniques and methods during the projects A process model can be helpful to a project manager in planning the project but obviously cannot be followed blindly and must be tailored to meet the requirements of the project . Not all the elements of the process model will be appropriate , but the model can be used as a checklist to ensure that nothing important is missed from the project . The process model is also used to help define what is required of the project manager at each stage in the project and to define the inputs and outputs of each stage . (Van Vliet , 2004 p.52) Infosys executes hundreds of projects each year. Full responsibility for executing a project rests with the project manager, who must make sure that the project team delivers high-quality software to the customer on time and within cost. To help the project manager fulfill this responsibility, support from the organization is necessary. (Mahajan and Ives , 2006 p.231) This section provides a brief background Infosys support for managing software projects. For a project team to successfully execute a project, it must perform hundreds of tasks, many of them interdependent. Effectively managing this process is extremely important for success. (Harvey 2003 p.52)At Infosys, the set of activities executed by a project manager is specified in the project management process. It is fairly standard, having three main stages: Software project planning Software project execution Software project closure 2.3.1 Software Project Planning The key to a successful software project is in the planning. Creating a project plan is the first thing one should do when undertaking any kind of project. Often project planning is ignored in favor of getting on with the work. However, many people fail to realize the value of a project plan in saving time, money and many problems. A project is successful when the needs of the stakeholders have been met. A stakeholder is anybody directly or indirectly impacted by the project. (Lackman 1987 p.57) As a first step it is important to identify the stakeholders of software project. It is not always easy to identify the stakeholders of a project, particularly those impacted indirectly. (Lewis J 1995) Examples of stakeholders are: The project sponsor The customer who receives the deliverables The users of the project outputs The project manager and project team Once understanding who the stakeholders are, the next step is to establish their needs. The best way to do this is by conducting stakeholder interviews. Considerable time can be utilized during the interviews to draw out the true needs that create real benefits. Often stakeholders will talk about needs that arent relevant and dont deliver benefits. These can be recorded and set as a low priority. ( Berlick 1992 p.72) The next step once after all the interviews done and have a comprehensive list of needs it is now to prioritize them. From the prioritized list its important to create a set of goals that can be easily measured. A technique for doing this is to review them against the SMART (specific, measurable, agreed upon, realistic and time-based ) principle. This way it will be easy to know when a goal has been achieved. Once having established a clear set of goals they should be recorded in the project plan. It can be useful to also include the needs and expectations of the end users- stakeholders. (Thomsett 1989 p.51) At Infosys , in the project planning stage, as revealed by Marsh (1998 p.17) , the project manager reviews contractual commitments and creates a plan to meet them. Creating a project plan involves defining a life-cycle process to be followed, estimating the effort and schedule, preparing a detailed schedule of tasks, and so on. It also includes planning for quality and configuration management as well as risk management. In this phase, the major activities of the project manager are as follows: According to McManus (1997 p.69) , the project manager performs startup and administrative tasks and creates the project plan and schedule. He is also responsible for defining the objectives of the project . The suitable standard process for the project execution is identified . Also the standard process to meet project requirements are tailer . Also a process for managing changes in requirements is designed . The estimation of effort involved is undertaken . Also the plan for human resources and team organization is determined . The project milestones are defined and schedules created accordingly. Also the quality of objectives and a quality plan to achieve them are determined . A defect prevention plan in designed. The risks are identified and plans are made to mitigate them. A measurement plan for the project is defined .A training plan for the project is designed . The project-tracking procedures are analyzed for effective execution . Also a review of the project plan and schedul e are performed . Authorization from senior management is obtained . The configuration management plan and defined and reviewed . Also orientation of the project team to the project management plan is executed In addition to the project manager, this phase involves the customer, an SEPG representative, and the business manager for the project. The entry criterion is that the contract or project authorization is available. The exit criterion is that the project plan has been documented and group reviewed (Morgon 1986 p.19) 2.3.2 Software Project Execution According to ,Harvey ( 2003 p.167) ,the purpose of Project Execution and Control is to develop the product or service that the project was commissioned to deliver. Typically, this is the longest phase of the project management lifecycle, where most resources are applied. Project Execution and Control utilizes all the plans, schedules, procedures and templates that were prepared and anticipated during prior phases. Unanticipated events and situations will inevitably be encountered, and the Project Manager and Project Team will be taxed to capacity to deal with them while minimizing impact on the projects CSSQ. Project Execution and Control Kick-off is where the project manager conducts a meeting to formally begin the project execution and control phase, orient new project team members, and review the documentation and current status of the project. The purpose of Project Execution and Control Kickoff is to formally acknowledge the beginning of project execution and control and facilitate the transition from project planning. Similar to project planning kick-off, project execution and control kickoff ensures that the project is still on track and focused on the original business need. Many new team members will be introduced to the project at this point, and must be thoroughly oriented and prepared to begin work. Most importantly, current project status is reviewed and all prior deliverables are re-examined, giving all new team members a common reference point. (Rodney 1999 p.123) Manage CSSQ is where the project manager must manage changes to the project scope and project schedule, implement quality assurance and quality control processes according to the quality standards, and control and manage costs as established in the project budget. (SEI 1996 p.4)The purpose of Manage CSSQ is to manage changes to project scope , control the project schedule and manage schedule changes , implement quality assurance and quality control , processes according to the quality standards revised during project planning control and manage costs established in the project Monitor and Control Risks, where the project manager and project team utilize the risk management plan prepared in previous phases, and develop and apply new response and resolution strategies to unexpected eventualities.Risks are potential future events that can adversely affect a projects Cost, Schedule, Scope or Quality (CSSQ). In prior phases, the project manager defined these events as accurately as possible, determined when they would impact the project, and developed a risk management plan. As the impact dates draw closer, it is important to continue re-evaluating probability, impact, and timing of risks, as well as to identify additional risk factors and events. When the risk event actually occurs, the risk (which is by definition a future, potential event) becomes an issue (which is by definition a current, definite condition) and issue monitoring and control takes over. The purpose of monitor and control risks is to deploy the risk management plans prepared in prior phases to anticipate project challenges, and to develop and apply new response and resolution strategies to unexpected eventualities. (Humphrey 1989 p.92) Manage Project Execution, where the Project Manager must manage every aspect of the Project Plan to ensure that all the work of the project is being performed correctly and on time.Project Execution is typically the part of the lifecycle of a project when the majority of the actual work to produce the product is performed and the majority of the project budget is expended. The purpose of manage project execution is to manage every aspect of the project plan as work is being done to make certain the project is a success. This process is performed concurrently with the manage CSSQ and monitor and control risks processes. The tasks in this process are performed concurrently and repeatedly as various aspects of the product of the project are constructed, tested, and accepted. (Dion 1994 p.172) Gain Project Acceptance, where the Project Manager, customer decision-makers and project sponsor acknowledge that all deliverables produced during project execution and control have been completed, tested, accepted and approved, and that the product or service of the project has been successfully transitioned to the performing organization.The purpose of Gain Project Acceptance is to formally acknowledge that all deliverables produced during project execution and control have been completed, tested, accepted, and approved by the projects Customers and the Project Sponsor, and that the product or service the project developed was successfully transitioned from the Project Team to the Performing Organization. Formal acceptance and approval also signify that the project is essentially over, and is ready for Project Closeout. (Duran 1988 p.49) At Infosys , the second phase, as in the words of Finney ( 1999 p.193) , project execution, involves executing the project plan, tracking the status of the project, and making corrections whenever project performance strays from the path laid down in the project plan. In other words, it involves tracking and controlling the implementation of the project process. This phase is the longest in the project management process, incorporating periodic tasks such as monitoring project status and quality and taking any needed corrective steps. In this phase, as said by ( Harvey 2003 p.62) , the project manager executes the project as per the project plan. , tracks the project status., reviews the project status with senior management. , monitor compliance with the defined project process. , analyze defects and perform defect prevention activities, monitor performance at the program level and conduct milestone reviews and replan if necessary. Other members of the team also participate in this stage. The entry criterion is that the project plan is complete and approved, and the exit criterion is that all work products delivered are accepted by the customer 2.3.3 Software Project Closure The Project closure report is produced at the end of the Project, and provides the Project Board with a review of the overall Project and an assessment of how successfully the Project has met its objectives. This report will be presented at the final Project Board meeting, and must be signed off by the Project Board as part of the process of formally closing the Project. (Watts 1987 p.122) As said by Sanders and Curran (1994 p.623) , a carefully structured project closure phase should ensure that the project is brought to a controlled end. The project manager should prepare the end project report, which details the main findings and outcome of the project and represents a formal review of the projects degree of success. The project manager should organize the project closure meeting and draw up a list of who should attend. This meeting is concerned with reviewing the project and ensuring the completeness of all of the major project deliverables. It is the final formal control point apart from the post implementation review; and should be attended by the project owner and the overall project manager. The basic question facing the attendees is: Did the project deliver its intended end-product within the time and budgetary limits set? According to Thomsett (1989 p.62) , The last stage of the project management process, project closure, involves a systematic wind-up of the project after customer acceptance. The main goal here is to learn from the experience so that the process can be improved. Post-project data analysis constitutes the main activity; metrics are analyzed, process assets (materials, such as templates and guidelines, used to aid in managing the process itself) are collected for future use, and lessons are recorded. Because learning from the project is the main goal, this is a group activity that involves the project manager, the SEPG, and other members of the team. The entry criterion is that the customer has accepted the work products. The exit criterion is that a post project meeting has been conducted. The main outputs of this phase are the project closure report and the collected process assets. 2.4 Capability Maturity Model CMM is a development methodology thats designed to help projects make use of reusable processes . There are some pain involved in making the switch , but the benefits to development staff and the organization make it worthwhile The CMM describes a continuum of characteristics based on how well your company or organization follows common and repeatable processes to get your work done. CMMs have been developed for software acquisition, people, and software (Paulk 1993 p.342) Although the SEI continues to enhance and expand the scope and breadth of various CMM models, the primary focus for most companies continues to be software development. Perhaps the biggest reason for looking at software development is that the process uses a fair amount of creativity, which can lead to unpredictable results. However, much (but not all) of the software development process can be standardized using a common set of processes. Common processes can be set up for the project management side Moving up the CMM levels allows an organization to standardize its software development processes in areas that can be successfully repeated from project to project Organizations that use the CMM for software development describe their level of standardization against CMM benchmarks using a scale of 1 to 5. The low end of the scale describes companies that arent using repeatable processes; much of their work is chaotic and ad hoc. The high end describes companies that use defined and re peatable processes, collect metrics to help them continuously improve their processes, and look for creative ways to do things better on an ongoing basis.(Watts 1987 p.79) Many companies are seeing that they can drive business value by implementing good, reusable processes throughout their organizations. The CMM provides a framework that companies can use to measure themselves on a standard 1 to 5 scale. Most companies today are at level 1 and would love to get as high as level 2. Most managers and organizations realise that they should have common and repeatable processes. However, pain will definitely be involved (Gilb 1998 p.122) Infosys has been assessed at level 5 (the highest level) of the Capability Maturity Model (CMM). By extracting project management processes from the set of processes at Infosys, this book also illustrates how projects are managed in a high-maturity organization. Through this illustration, I hope to bring the benefits of the CMM to project managers who have not studied it because of lack of time, because they regard it as being for process folks or because they have found it difficult to relate the CMM to project management practices. (www.infosys.com 02.07.07) 2.5 KPAs and its importance in Project Management Each KPA specifies goals that the processes of the organization must meet to satisfy that KPA. In addition, each KPA specifies a group of activities, called key practices, that collectively satisfy the goals of that KPA. In many senses, the goals for each KPA capture its essence. They specify the objectives that the CMM has set for the processes relating to the KPA. To illustrate the KPAs associated with project management, we briefly discuss here the goals of these KPAs. These goals are taken from the CMM,with some minor changes in the wording of some goals. ( Cooper and Woolgar , 1994 p.589) 2.5.1 Goals of KPAs at Level 2 2.5.1.1 Requirement Management RM Requirements management is all about balance, communication, and adjustment along the way. To prevent one class of requirements from over-riding another, constant communication among members of the development team is critical. For example, in software development for internal applications, the business has such strong needs that it may ignore user requirements, or believe that in creating use cases, the user requirements are being taken care of. (Bevan 1992 p.165) 2.5.1.2 Software Project Planning SPP The purpose of Software Project Planning is to establish reasonable plans for performing the software engineering and for managing the software project. Software Project Planning involves developing estimates for the work to be performed, establishing the necessary commitments, and defining the plan to perform the work (Barker 1992 p.522) 2.5.1.3 Software Project Tracking and Oversight SPTO The purpose of Software Project Tracking and Oversight is to provide adequate visibility into actual progress so that management can take effective actions when the software projects performance deviates significantly from the software plans. Software Project Tracking and Oversight involves tracking and reviewing the software accomplishments and results against documented estimates, commitments, and plans, and adjusting these plans based on the actual accomplishments and results (Budlong and Peterson 1996 p.523) 2.5.1.4 Software Subcontract Management SSM The purpose of Software Subcontract Management is to select qualified software subcontractors and manage them effectively. Software Subcontract Management involves selecting a software subcontractor, establishing commitments with the subcontractor, and tracking and reviewing the subcontractors performance and results. These practices cover the management of a software (only) subcontract, as well as the management of the software component of a subcontract that includes software, hardware, and possibly other system components (ISO 9000-3 p.5) 2.5.1.5 Software Quality Assurance SQA Software Quality Assurance (SQA) is defined as a planned and systematic approach to the evaluation of the quality of and adherence to software product standards, processes, and procedures. SQA includes the process of assuring that standards and procedures are established and are followed throughout the software acquisition life cycle. Compliance with agreed-upon standards and procedures is evaluated through process monitoring, product evaluation, and audits. Software development and control processes should include quality assurance approval points, where an SQA evaluation of the product may be done in relation to the applicable standards. (Kontonya and Sommerville , 1998 p.212) 2.5.1.6 Software Configuration Management SCM In software engineering, software configuration management (SCM) is the task of tracking and controlling changes in the software. Configuration management practices include revision control and the establishment of baselines (Keller et al 1990 p.521 ) 2.5.2 Goals of KPAs at Level 3 2.5.2.1 Integrated Software Management ISM The purpose of Integrated Software Management is to integrate the software engineering and management activities into a coherent, defined software process that is tailored from the organizations standard software process and related process assets, which are described in Organization Process Definition. Integrated Software Management involves developing the projects defined software process and managing the software project using this defined software process. The projects defined software process is tailored from the organizations standard software process to address the specific characteristics of the project (Saiedian Hossein and Kuzara 1995 p.321) 2.5.2.2 Intergroup Coordination IC Intergroup Coordination involves the software engineering groups participation with other project engineering groups to address system-level requirements, objectives, and issues. Representatives of the projects engineering groups participate in establishing the system-level requirements, objectives, and plans by working with the customer and end users, as appropriate. These requirements, objectives, and plans become the basis for all engineering activities (TickIT Guide p.21) 2.5.2.3 Peer Reviews PR In software development, peer review refers to a type of software review in which a work product (normally some form of document) is examined by its author and one or more colleagues, in order to evaluate its technical content and quality When performed as part of each Software development process activity, peer reviews identify problems and fix them early in the lifecycle. That is to say, a peer review that identifies a requirements problem during the Requirements analysis activity is cheaper and easier to fix than during the Software architecture or Software testing activities ( Gentleman 1996 p.92) 2.5.3 Goals for KPAs at Level 4 2.5.3.1 Quantitative Process Management QPM Quantitative Process Management involves establishing goals for the performance of the projects defined software process, which is described in the Integrated Software Management key process area, taking measurements of the process performance, analyzing these measurements, and making adjustments to maintain process performance within acceptable limits. When the process performance is stabilized within acceptable limits, the projects defined software process, the associated measurements, and the acceptable limits for the measurements are established as a baseline and used to control process performance quantitatively (Daly-jones and Thomas 1997 p.142) 2.5.3.2 Software Quality Management SQM Its here were the projects software quality management activities are planned . Measurable goals for software product quality and their priorities are defined . Actual progress toward achieving the quality goals for the software products is quantified and managed (Broad
Sunday, October 13, 2019
Effects of Organizational Culture on Police Decision Making Essay
This essay discusses the effects of the police organizational culture on a Police officerââ¬â¢s ability to make independent decisions. Every culture is composed of four elements: ââ¬Å"values, norms, beliefs, and expressive symbolsâ⬠(Peterson, 1979, p. 137). Each police officer is influenced by the police organizational culture during training. After graduation fro the police academy, the officer is influenced by the more experienced officers of the department. Research conducted by several authors has found that peer influence never ceases even after years of experience in the field. Throughout life, people change their point of views by the impact of the people they encounter and the structure of society. Although people initially joining the organization have the ability to use common sense and encompass a variety of values, cultural and religious beliefs, this soon changes after joining. Throughout history, unorthodox behavior has become an acceptable norm within society due to peer pressure, fear, and longing to become part of the police culture. Adolf Hitler became a famous man who ruled Germany by fear, which led to be one of the worldââ¬â¢s prevalent tragedies (Wistricht, 1995). The police societies retain both negative and positive qualities in their social norms, principles and attitude. ââ¬Å"In the field of police, the standard of the performance are based on occupational cultureâ⬠(Manning, 1978). The negative characteristics of police cultures assumed by Jermier et al. (1991) are ââ¬Å"militaristic, uniformed dress, rigid rank hierarchy of authority, unbending rules and authoritative command system,â⬠(p. 173). The police culture teaches false, misleading ideas and norms to alter officerââ¬â¢s judgment, thoughts, associati... ... Frost, R. (1999). Mountain Interval. New York: Henry Holt and Company. Retrieved from http://www.bartleby.com/119/1.html Jermier, J. M., John, W. S., Fry, J. L., & Gaines, J. (1991, May 1991). Organizational Subcultures in a Soft Bureaucracy: Resistance Behind the Myth and Facade of an Official Culture. Organization Science, 2(2), 170-191. Manning, P. K. (1978). The police: Mandate strategies and appearances. (In P.K. Maning & J.V. Maanen ed.). Santa Monica, CA: Goodyear. Peterson, R. A. (1979). Revitalizing the Culture Concept. Annual Review of Sociology, 137-166. Sever, M. (2008, Feb ). Effects of Organizational Culture on Police Decision Making. Telemasp Bulletin, 15(1), p. 12. Retrieved from http://www.lemitonline.org/publications/telemasp/Pdf/volume%2015/vol15no1.pdf Wistricht, R. (1995). Who's Who In Nazi Germany (2 ed.). Routledge: Routledge.
Saturday, October 12, 2019
Government Surveillance in the Digital Age Essay -- Privacy in the Dig
Government Surveillance in the Digital Age Imagine walking along a busy street in the middle of a sunny day. Also imagine that someone is following you around, videotaping everything you do. Disturbing thought? Even more disturbing is the fact that the United States government is already doing this, and it's perfectly legal. According to Robert Trigaux, a reporter for the St. Petersburg times, until August of 2014, in Ybor City, Florida, the Tampa Police Department used fourty-six surveillance cameras that scanned faces of all people walking around the entertainment district. These surveillance cameras captured facial images and then compared them to a police database of known felons. This same surveillance system was also used during the Tampa Bay Super Bowl at the Raymond James Stadium, and other cities are attempting to install such a system. However, even though the cameras are used in public places, they still represent a large violation of privacy. Also a violation of our privacy is the government's usage of the Carnivore Internet surveillance system that can track all of a person's online activity. The FBI not only has the capability to do so, but in many cases it can lawfully enter a person's home and alter or even steal information form his or her computer, all without the knowledge of the owner of the computer. The government's ability to gather personal information on its citizens is similar to methods of surveillance in the novels The Handmaid's Tale, by Margaret Atwood, and 1984, by George Orwell. In order to prevent the extreme cases of surveillance presented in these novels, it is the public's responsibility to remain alert to new developments in law enforcement so as to prevent an unreasonable s... ...ore/000724fbi.shmtl>. Herdy, Amy. Tampabay: They made me feel like a criminal. 8 Aug. 2001. St. Petersburg Times. 2 Nov. 2013. . Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. July 2012. Computer Crime and Intellectual Property Section. 26 Oct. 2013. . The Nature and Scope of Governmental Electronic Surveillance Activity. Sep. 2001. Center for Democracy and Technology. 27 Oct. 2013. . Trigaux, Robert. Tampabay: Cameras scanned fans for criminals. 31 Jan. 2001. St. Petersburg Times. 2 Nov. 2003. . Orwell, George. 1984. New York: Signet Classic Printing, 1950.
Friday, October 11, 2019
Art Criticism
Art Criticism Research Paper Gustav Klimt, The Kiss, Oil and gold leaf on canvas, 1907-1908 The Kiss, painted by Gustav Klimt, is probably his most recognized work. He began working on the painting in 1907. In The Kiss, there is a couple embracing each other. The man is covered in neutral colored rectangles, and the woman is wearing brightly colored circles and flowers in her hair. There are many lines in the image considering all of the rectangles the man is wearing. They are colored in various shades of gold and symbols, while embracing each other with a kiss against a bronze background.The texture seems rough and varied throughout the piece. The couple is the focal point of the piece, while the rest of the painting shatters into colorful patterns. This hints the idea that Klimt was inspired by Art Nouveau and the Arts and Crafts Movement. There is not much negative space in the piece. The couple and their patterns dominate the image because it is right in the center of the page. T here is not much negative space in the piece, but the man has black rectangles all over his body. This is significant because it depicts the sharpness and boldness of a man in contrast to the woman who wears circular patterns all over her body.This is where the biggest contrast is. The emphasis is on the couple because of the bold bronze color that the couple is painted in. The contrast to the background helps it pop. The elements communicate a very content mood. The couple seems very passionate and sexual towards one another. The artwork is balanced very well. Every inch of the painting is painted in, and the top and bottom are filled in. There is a sense of depth because of all the contrasting colors. The picture looks very three-dimensional.The artwork has a rhythm that feels as if the viewer could feel the coupleââ¬â¢s passionate movement. Klimt created this piece of art to convey the passionate love a man and woman can share. The picture is very sexual, yet full of heart. Th e couple seems to be so in effectuated with each other that the real world is no longer present. If I were the woman in the picture I would be thinking about how loved I am. The theme is that women and men share a kind of love that no one else can comprehend. The title for this piece is very appropriate, and I would not change it even if I could.The kiss is an extremely simple title that does a good job explaining the artwork, yet leaving room for the viewer to imagine for themselves. When I first looked at the artwork, I thought that it was just a couple kissing, but as I kept examining it I realized how much more it is. I enjoyed examining this piece of work a lot. I felt that it was very much worth my time because the artist used a very sophisticated kind of technique to portray his message. I think it is a very respectable piece because of its simplicity yet the complex message it portrays.
Thursday, October 10, 2019
Computerisation in a business like Craven Plc Essay
Plotters: A device designed to produce charts, drawings, maps and other forms of graphical information on paper. The images can be produced by pens, electro-statically, or ink jets. Storage Methods There are two different forms of storage available these are main storage and backing storage. Main Storage: This consists of the Hard disk drive (HDD) and the floppy disk drive. These are storage facilities present within the computer. Information can be saved onto the HDD ready to be opened at some future date. Application software packages and programmes are also stored on the hard disk. The average PC will have an internal HDD of at least 6Gb. The floppy disk drive is another type of main storage. It uses floppy disks to store information in a similar way to a hard drive. Backing Storage: The performance of a computer system can be improved by the addition of more memory. If there is too little memory then more frequent access to the hard disk is required and this will slow down the overall system performance. Therefore many computer applications require quick, direct access to individual records within a file. For this reason, we need backing storage. Backing storage comes in various forms for example compact disks and floppy disks. Backing storage is a portable and convenient way of saving information. To reduce the risk of data loss it is wise to save information on the computers hard drive and make a copy onto a disk or another type of backing storage for insurance purposes. Types of backing storage: à Floppy disks: The most common storage device available, these provide extremely cheap storage and have a capacity of 1. 5 Mb. à Compact Disk (CD-ROM): These have been used for some years as storage devices for computer software. It only accesses information which is already stored on it and is able to store 650 Mb of information. à Zip Drives: A storage device that has become popular over the last few years because it offers the convenience and portability of a floppy disk, combined with a 100 Mb capacity. CD-R and CD-RW:The difference being that CD-R disks can only have data saved to them once, While CD-RW can be used in the same manner as other storage devices having data saved to them on a re-usable basis. à DVD (digital versatile disc) using the same basic principles as the CD, DVD packs the data more densely and can store 4. 7Gb compared with the CDââ¬â¢s 650Mg, can hold 133 minutes of video, with Dolby surround sound. Data pens: A new storage device that plugs into the computers USP drive. These are small and compact and have a capacity of 80Mb. Magnetic Tape: Convenient and cheap medium for backing up hard disks onto computers. Mostly used for mainframe computers for storing information for a long duration. Magnetic tapes will not be suitable for a small company like Craven Plc. Data Protection: Craven Plc must comply with the data protection act in order to hold personal information of customers. The data protection act works in two ways. It gives you certain rights. It also says those who record and use personal information must be open about how the information is used and must follow the eight principles for good handling. The eight principles were put in place to make sure that your information is handled properly. They say that data must be: 1. Fairly and lawfully processed. 2. Processed for limited purposes. 3. Adequate, relevant and not excessive. 4. Accurate. 5. Not kept for longer than is necessary. 6. Processed in line with your rights. 7. Secure, and 8. Not transferred to countries without adequate protection. Micro computers: Micro computers include personal computers and laptop computers, they are usually equipped with hard disk, floppy disk drive, between 1 and 32 megabytes of memory, a keyboard and a VDU unit. Microcomputers will be suitable to fulfil the needs of Craven Plc. Mainframe Computers: These are large systems that can hold vast amounts of data. Mainframe computers occupy a whole floor of a fair sized building. These powerful mainframe computers are present in very large companies storing huge amounts of data on to disk. Mainframe computers cost tens of thousands of pounds, therefore they are not suitable for a small business like Craven Plc. File Server: This is a specially configured microcomputer to control the exchange of files between network users. A file server also has more memory and disk storage than normal microcomputers. These classifications of computers are usually based on physical size, speed, processing capabilities, memory size, disc storage, capacities and cost. Direct and Sequential Access: Direct access devices can go directly to the file or record. For example a CD can go directly to track number 10. Sequential access devices have to run through the file sequentially, for instance, if we want track 10 on a cassette, The cassette moves from the beginning from track 1 to 9 until it comes to track 10. 4) Proposed purchases and prices of equipment 2x Sony Intel 2. 6GHZ DVD CDRW Laptop à 256Mb RAM, 40Gb Hard Drive à DVD/CDRW Drive à 15 inch TPT screen i 899 each = i 1798 4x Packard Bell 6111 Intel Pentium 42. 8GHZ processor and 15â⬠TFT monitor à Intel P4 2. 8 GHz processor 512 Mb RAM à 160 GHb Hard Drive i 1199 each =i 4796 4x PacKard Bell 5050 and Xp2600+ PC and 17â⬠CRT monitor à Athlon Xp 2600 & processor à 256Mb RAM. 60 Gb hard Drive i 549 each =i 2196 4x Hewlet Packard DJ 9300 A3 Desktop printer i 279 each =i 1116 3x Hewlet Packard scanner i 99 each =i 396 Network- Windows 2000 professional i 3449 Web Designer Approx 3000to4000 Training costs i 2000 Specialist soft ware ââ¬â Sage Accounts i 2000 Web Train Video Conferencing i 1000 Total cost i 22751 5) Proposed method of change over from manual to the new computerised systems Before the change over can take place an extensive training programme needs to take place. This may take several months to train the current workforce in the correct operating procedures of the new system. To ensure information will not be lost in transition the old manual method needs to be in place for the first 2 months along side the new computerised system. In the unlikely case of system collapse information and data will still be on hand. This change over will inevitably endure a small cost of training and staff development. 6) Procedure to transfer the payroll from the old to the new system Payroll is something Craven Plc cannot afford to get wrong. Therefore manual systems need to be in place for 3-4 months along side the new computerised sage accounts system. This will again ensure against loss of data.
Subscribe to:
Posts (Atom)