Monday, December 30, 2019

Understanding the Pros and Cons of Protectionism

Protectionism is a type of trade policy by which governments attempt to prevent or limit competition from other countries. While it may provide some short-term benefit, particularly in poor or developing nations, unlimited protectionism eventually harms the country’s ability to compete in international trade. This article examines the tools of protectionism, how they are applied in the real world, and the advantages and disadvantages of limiting free trade. Key Takeaways: Protectionism Protectionism is a government-imposed trade policy by which countries attempt to protect their industries and workers from foreign competition. Protectionism is commonly implemented by the imposition of tariffs, quotas on import and exports, product standard, and government subsidies. While it may be of temporary benefit in developing countries, total protectionism typically harms the country’s economy, industries, workers, and consumers. Protectionism Definition Protectionism is a defensive, often politically-motivated, policy intended to shield a country’s businesses, industries, and workers from foreign competition through the imposition of trade barriers such as tariffs and quotas on imported goods and services, along with other government regulations. Protectionism is considered to be the opposite of free trade, which is the total absence of government restrictions on trade.   Historically, strict protectionism has been used mainly by newly developing countries as they build the industries necessary to compete internationally. While this so-called â€Å"infant industry† argument may promise brief, limited protection to the businesses and workers involved, it ultimately harms consumers by increasing the costs of imported essential goods, and workers by reducing trade overall.  Ã‚   Protectionism Methods Traditionally, governments employ four main methods of implementing protectionist policies: import tariffs, import quotas, product standards, and subsidies. Tariffs The most commonly applied protectionist practices, tariffs, also called â€Å"duties,† are taxes charged on specific imported goods. Since tariffs are paid by the importers, the price of imported goods in local markets is increased. The idea of tariffs is to make the imported product less attractive to consumers than the same locally produced product, thus protecting the local business and its workers. One of the most famous tariffs is the Smoot-Hawley Tariff of 1930. Initially intended to protect American farmers from the post-World War II influx of European agricultural imports, the bill eventually approved by Congress added high tariffs on many other imports. When European countries retaliated, the resulting trade war restricted global trade, harming the economies of all countries involved. In the United States, the Smoot-Hawley Tariff was considered an overly-protectionist measure that worsened the severity of the Great Depression. Import Quotas Trade quotas are â€Å"non-tariff† trade barriers that limit the number of a specific product that can be imported over a set period of time. Limiting the supply of a certain imported product, while increasing prices paid by consumers, allows local producers a chance to improve their position in the market by filling the unmet demand. Historically, industries like autos, steel, and consumer electronics have used trade quotas to protect domestic producers from foreign competition. For example, since the early 1980s, the United States has imposed a quota on imported raw sugar and sugar-containing products. Since then, the world price of sugar has averaged from 5 to 13 cents per pound, while the price within the U.S. has ranged from 20 to 24 cents. In contrast to import quotas, â€Å"production quotas† occur when governments limit the supply of a certain product in order to maintain a certain price point for that product. For example, the nations of the Organization of Petroleum Exporting Countries (OPEC) imposes a production quota on crude oil in order to maintain a favorable price for oil in the world market. When the OPEC nations reduce production, U.S. consumers see higher gasoline prices. The most drastic and potentially inflammatory form of import quota, the â€Å"embargo† is a total prohibition against importing a certain product into a country. Historically, embargoes have had drastic impacts on consumers. For example, when OPEC proclaimed an oil embargo against nations it perceived as supporting Israel, the resulting 1973 oil crisis saw the average price of gasoline in the U.S. jump from 38.5 cents per gallon in May 1973 to 55.1 cents in June 1974. Some lawmakers called for nationwide gas rationing and President Richard Nixon asked gasoline stations not to sell gas on Saturday nights or Sundays.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Product Standards Product standards limit imports by imposing minimum safety and quality requirements for certain products. Product standards are typically based on concerns over product safety, material quality, environmental dangers, or improper labeling. For example, French cheese products made with raw, non-pasteurized milk, cannot be imported into the United States until they have been aged at least 60 days. While based on a concern for public health, the delay prevents some specialty French cheeses from being imported, thus providing local producers a better market for their own pasteurized versions. Some product standards apply to both imported and domestically-produced products. For example, the U.S. Food and Drug Administration (FDA) limits the content of mercury in imported and domestically harvested fish sold for human consumption to one part per million. Government Subsidies Subsidies are direct payments or low-interest loans given by governments to local producers to help them compete in the global market. In general, subsidies lower production costs enabling producers to make a profit at lower price levels. For example, U.S. agricultural subsidies help American farmers supplement their income, while helping the government manage the supply of agricultural commodities, and control the cost of American farm products internationally. Additionally, carefully applied subsidies can protect local jobs and help local companies adjust to global market demands and pricing. Protectionism vs. Free Trade Free trade—the opposite of protectionism—is a policy of completely unrestricted trade between countries. Devoid of protectionist restrictions like tariffs or quotas, free trade allows goods to move freely across borders. While both total protectionism and free trade have been tried in the past, the results were usually harmful. As a result, multilateral â€Å"free trade agreements,† or FTAs, such as the North American Free Trade Agreement (NAFTA) and the 160-nation World Trade Organization (WTO) have become common. In FTAs, the participating nations mutually agree on limited protectionist practices tariffs and quotas. Today, economists agree that FTAs has averted many potentially disastrous trade wars. Protectionism Pros and Cons In poor or emerging countries, strict protectionist policies like high tariffs and embargoes on imports can help their new industries grow by protecting them from foreign competition. Protectionist policies also help create new jobs for local workers. Protected by tariffs and quotas, and bolstered by government subsidies, domestic industries are able to hire locally.  However, the effect is typically temporary, actually reducing employment as other countries retaliate by imposing their own protectionist trade barriers. On the negative side, the reality that protectionism hurts the economies of countries that employ it dates back to Adam Smith’s The Wealth of Nations, published in 1776. Eventually, protectionism weakens domestic industries. With no foreign competition, industries see no need for innovation. Their products soon decline in quality, while becoming more expensive than higher quality foreign alternatives. In order to succeed, strict protectionism demands the unrealistic expectation that the protectionist country will be able to produce everything its people need or want. In this sense, protectionism is in direct opposition to the reality that a country’s economy will prosper only when its workers are free to specialize at what they do best rather than trying to make the country self-sufficient. Sources and Further Reading Irwin, Douglas (2017), Peddling Protectionism: Smoot-Hawley and the Great Depression, Princeton University Press.Irwin, Douglas A., Tariffs and Growth in Late Nineteenth-Century America. World Economy. (2001-01-01). ISSN 1467-9701.Hufbauer, Gary C., and Kimberly A. Elliott. Measuring the Costs of Protectionism in the United States. Institute for International Economics, 1994.C. Feenstra, Robert; M. Taylor, Alan. Globalization in an Age of Crisis: Multilateral Economic Cooperation in the Twenty-First Century. National Bureau of Economic Research. ISBN: 978-0-226-03075-3Irwin, Douglas A., Free Trade Under Fire, Princeton University Press, 2005.

Sunday, December 22, 2019

The Education and Healthcare Gap - 1686 Words

In the worlds of politics, sociology and economics, debates have raged concerning the relative equality or inequality in America. Over the past one hundred years, we have seen a sizable shift toward equality in the legal rights of minorities. However, this legal equality is undermined by a pervasive and broadening socioeconomic inequality, especially in regards to healthcare and education. These issues disproportionately affect minorities. This paper will first touch on two other types of inequality: civic and income. Then it will move into how healthcare and education play an important role in this growing inequality, and finally address the broader implication of socioeconomic inequality and ultimately why these†¦show more content†¦Others argue that inequality is acceptable and, indeed, beneficial. Martin Feldstein argues that, according to the Pareto principle, the gain of some over others is not injurious as long as others are not made worse-off. Instead, he argues that policies should simply focus on reducing poverty. However, in his assessment of how to remedy this issue, he discusses inadequate schooling and work training for those with lower incomes (39). These issues are directly related to problems of inequality in America . specifically, the inequality of opportunity. Income inequality can only be justified if people are given a chance to alter their socioeconomic status. If this shift is inhibited, then inequality rather than creating opportunity destroys it. Although income inequality is an extensive issue that needs to be addressed, education and healthcare provide a more immediate and disquieting problem within America. Here, in the land of opportunity, we have an undeniable and pervasive inequality of opportunity. In an America moving consistently from a manufacturing to a service economy, an education is becoming increasingly pertinent in job attainment and mobility (Waters l.3 s.30). In addition, low-income families cannot afford to place their children in schools that have more resources and are more competitive for colleges. Instead, they are forced to rely on public schools, whichShow MoreRelatedWhat Intervention Activities Would Be The Most Help For Addressing Haiti s Health Problem1432 Words   |  6 Pagesincluded in the Appendix. However, the critical factors targeted in this intervention come down to four focus areas. These priorities are: 1) provision of safe water and sanitation infrastructure, 2) carry out health education among community members, 3) fill critical healthcare gap, and 4) improve and increase epidemiological surveillance In a blog post written by Sokari Ekine, the Nigerian social justice activist explains that cholera is an illness â€Å"exacerbated by heavy rains; poor sanitation;Read MoreGender Inequality Of The Work Force1305 Words   |  6 Pagesoccurs every day. Inequality in the work force is a type of discrimination that is prevalent globally. Females, who are as equally educated, trained and experienced as their male colleagues, are not receiving equal pay — resulting in a gender wage gap. According to a study conducted by Christianne Corbett, M.A. and Catherine Hill, Ph.D. (2012), women, around the age of 23, who graduated from the same post-secondary school as men in 2008 and who were employed full-time in 2009 earned 82 cents forRead MoreThe Importance Of Health Education In Texas874 Words   |  4 Pagescommunities including Bexar county. Some of the accomplishments of this council include increasing patient education opportunities in Texas through funding for community based d iabetes education programs; development of a diabetes â€Å"Center of Excellence† for patient treatment and professional training in the state, publication and promotion of treatment guidelines for healthcare professionals and health plans, and development of state policy that ensures insurance coverage and services for TexansRead MoreWhat Can We Do Better? Current / Preferred State1147 Words   |  5 Pagesnature and the fact that these issues still plague the field of healthcare in the 21st century is quite perplexing. Therefore, it is the goal of this charter to identify means and ways in which hand-off discrepancies may be minimized and further eliminated, by implementing a tool that will drastically decrease the percentage of handoff errors resulting from a breakdown of communication. Gaps Between Current and Preferred State Some gaps that have been identified in the transition of care include lackRead MoreRemote Areas Of Australia When Accessing Maternal Health Services1694 Words   |  7 Pagesprovision of health care services in the country is among the best in the world. Barclay et al. (2014) note that Australia features in the top ten best countries to give birth in. However, despite the impressive health statistics, there remains a wide gap between the indigenous and non-indigenous community. Report by Australian Institute of Health and Welfare (AIHW) reveals the rate of childbirth complications among the Aboriginal is twice that of the non-indigenous women (SBS, 2015). This essay seeksRead MoreThe Health And Affordable Care Act ( Ppaca )942 Words   |  4 PagesThe healthcare sector in the United States is a unique and complex when compared to other industrial countries. The government had spent $ 1 trillion on health programs; $600 billion for Medicare, $400 billion for Medicaid, and had a bu dget deficit of $486 billion in 2014. In an attempt to reform healthcare, there have been several initiatives throughout its history to improve care delivery, quality, and outcomes. A significant reform was enacted in 2010, the Patient Protection and Affordable CareRead MoreSocial Inequalities Within New Zealand Essay1322 Words   |  6 PagesThis essay will be discussing the social inequalities within New Zealand. These inequalities can include unequal income, education and healthcare. Through extensive research of academic resources, I will be discussing how educational, family, social and political factors contribute to the development of these inequalities. I will also be providing a line graph that shows the unequal income between classes and a second line graph that demonstrates the difference in student success between high decileRead MoreThe Curriculum : Education Courses That Promote Professional Nursing Knowledge And Practice1121 Words   |  5 PagesCriterion 4.4: The c urriculum includes general education courses that enhance professional nursing knowledge and practice. †¨ Prerequisite general education courses to complete the nursing program consist of anatomy and physiology I II, microbiology, composition I II, sociology speech communications, mathematics for nursing, nursing technology, growth and development, general psychology, and workshop for hybrid students. Starting Fall 2015 semester the school of nursing will no longer requireRead MoreGap Between Nursing Programs And Textbooks885 Words   |  4 PagesThe first case scenario presented in this project reflect the significance of gaps between nursing programs and textbooks, organizations’ policies and procedures, published literature, and the actual practice. Some of the gaps refer to nursing programs and textbooks based on an ideal nursing profession, the autonomy of healthcare organizations to establish their specific policies and procedures, traditional policies and procedures unsupported by evidence-based practice (EBP), and the individualRead MoreRacial Disparities And Gender D isparities900 Words   |  4 Pages When it comes to healthcare racial disparities continue to be an ongoing issue. In fact racial disparities have been a topic of discussion since desegregation. The US Department of Health and Human Services, in 1984 published a report that called attention to the healthcare disparities. The report was called Heath, United States 1983(Dougher, 2015). Within the context of the report there lies a passage that describes the major disparities that are within the burden of illness and death that is experienced

Saturday, December 14, 2019

Dumping of oil, liquid wastes Free Essays

Of course getting rid of the waste is easy but there are several environmental and human health concerns that are raised as a result of it. Incineration of waste material exhibits different types of toxic air pollutants such as, cadmium, sulfur dioxide, lead, nitrogen oxide, and mercury that are very harmful and contaminate the air (oppapers. com, 2010). We will write a custom essay sample on Dumping of oil, liquid wastes or any similar topic only for you Order Now Acid rains and smog are the by-products of incineration that don’t only pollute the atmosphere but also the lands that are used for agricultural purposes. It’s of no wonder that if the wastes – either solid or liquid – are dumped improperly to any place results in the growth of mosquitoes that carry dengue fever virus, which has a domino effect of malaria and headache. Dengue fever has around 23 strains that worsen the health of the victim for several weeks or even months. On the other hand, sewage contamination worsens the water quality of the rivers or other reservoirs from where the water is supplied to the citizens. Over drinking such water, people became the victims of Diarrhea and other stomach problems; moreover, these diseases further deteriorate the skin of a person and causes skin cancer. Droughts or famines come when the landfills and acid rains make the soil infertile and incapable for the use of agricultural purposes. Not only this, along with human beings, the marine life and other animal species are vulnerable to our reckless waste disposal. Dumping of oil, liquid wastes, and throwing off of several other materials and wastes into the rivers and sea causes the marine life to extinct. As in the case of Chevron, previously known as Texaco, where the company dumped off huge amounts of solid and liquid wastes into the Amazon River which later resulted in the proliferation of several diseases for human beings along with other marine species. Considerable number of people and animals died as a result of it. Answer – 2 Children are more vulnerable to air pollutants due to several reasons. First, there organic and immune system is quite sensitive and vulnerable as compared to that of others; therefore, children have greater tendency of catching the diseases. Secondly, children often spend more time outside there home; for instance, six to seven hours in school and 2 to three hours playing outside with friends. Hence the probability of indulging and interacting with pollution increases, so is with the diseases. Answer – 3 As a Health Educator in this multi-disciplinary team, I would assist the nurse to develop and implement a program for the reduction of exposure of air pollution to the community in the following way. I would provide her with the necessary precautionary equipments such as, masks sun-screen lotions that must be there for the children if air pollution is quite dense. Secondly, I would recommend her not to let the children go out to play or do any other activity in case of bad weather or polluted air conditions. Third, I would assist her in planting as much plants and trees as possible so that they take away carbon dioxide from the atmosphere and release fresh oxygen. Fourth, forbid people to use the gas that burns more and emits toxic and dark black smoke that further worsens the environment. Fifth, minimizing smoking at home or workplace that can otherwise harm children; and finally, making use of air filters to get fresh air and not the polluted one. How to cite Dumping of oil, liquid wastes, Papers

Friday, December 6, 2019

Led Zeppelin The British Rock Band free essay sample

This was just the beginning of their rocks lives. During the early asss this band was at the peak of their success. They became very rich and did crazy things like trash the hotels they stayed in while on tour(dilemma Led Zeppelin: The real monsters of rock). Led Zeppelins fourth album was released in 1971 and had no name to it, but is one the best selling albums ever. It sold over 23 million copies in just the US, even though the band is also very popular and originated in the LIKE (Rockwell. Com Led Zeppelin Biography). In 1 980, something horrible happened to the band and its fans.Their rammer John Bonham was found dead by their tour manager and John Paul Jones. He died from asphyxiation from vomit. The band broke up after his death because they agreed it would not be the same without him(ultraconservative. Com Quote after Paragraph three). We will write a custom essay sample on Led Zeppelin: The British Rock Band or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Unfortunately, he lived the rock star life a little bit too hard. In the dads the band sold their music online like the modern day bands and music artists. In 2007 the band reunited for a concert in London with Bonham son Jason taking his place on the drums. (Rockwell. Com Paragraph eleven). I guess Led Zeppelin will always love the rock star life even at an old ages.

Friday, November 29, 2019

Live in free essay sample

22 August 2008 In January 2008, the Supreme Court validated long-term live-in relationships as marriages. A Supreme Court bench headed by Justice Arijit Pasayat with P Satasivan declared that children born out of such a relationship will no longer be called illegitimate. Law inclines in the interest of legitimacy and thumbs down whoreson or fruit of adultery, the court added. The apex court judgment was followed by similar suggestions from the National Commission for Women (NCW). In June this year, in response to recommendations made by the Ministry of Women and Child Development, the NCW sought a change in the definition of wife as described in Section 125 of the Criminal Procedure Code (CrPC), which deals with maintenance. The NCW recommended that women in live-in relationships should be entitled to maintenance if the man deserts her. Emphasising the need for broadening the definition of wife in the CrPC section, NCW officials said there had been cases where the man led the woman to believe that he was unmarried or was divorced or widowed and went ahead with the formalities required by marriage laws or the custom governing him. We will write a custom essay sample on Live in or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As a way of countering this, NCW chairperson Girija Vyas suggested that even if a marriage was not registered, a womans claim would stand if she provided enough proof of a long-term relationship. This underscored the Supreme Courts stand that a man and woman, having lived together for long, would be presumed to have been married, unless it was rebutted by convincing evidence. Equal rights The recent ruling is only the latest in a series of recommendations by various bodies seeking equal rights for the married woman and live-in female partner. A recommendation by the Justice Malinath Committee to the Law Commission of India (2003) stated that if a woman has been in a live-in relationship for a reasonable time, she should enjoy the legal rights of a wife. The Protection of Women from Domestic Violence Act (2005) provides protection to women at the hands of their husbands as well as live-in partners, and his relatives. When the law came into force in October 2006, it did not distinguish between the woman who is married and the woman who is in a live-in relationship. The SC ruling in itself has its precedent in a 1927 judgment made by the Privy Council, the Supreme Courts predecessor in pre-independent India. In A Dinohamy v. WL Blahamy, the Council laid down a general principle: Where a man and a woman are proved to have lived together as a man and wife, the law will presume, unless the contrary be clearly proved, that they were living together in consequence of a valid marriage and not in a state of concubinage. The Council made significant additions to the 1927 ruling in 1929 in Mohabhat Ali Vs Mohammad Ibrahim Khan. It said: The law presumes in favour of marriage and against concubinage when a man and woman have cohabited continuously for a number of years. For a live-in couple to be considered validly married, the court wanted evidence of cohabitation for a number of years, without specifying the minimum number of years. In Gokal Chand and Pravin Kumari (1952), the Supreme Court reiterated the 1929 principle. However, it added that though the presumption for a valid marriage between a live-in couple could be drawn from their long cohabitation, it wasnt enough to earn them legitimacy if the evidence of their living together was rebuttable. In this judgment, the apex court refused to recognise a live-in relationship, though the couple had lived together for some years before the pregnant woman decided to live alone with her child born out of a live-in relationship with the man. The rebuttal of a presumption in favour of a valid marriage, in this case, came from the child, who said she did not remember her father ever visiting her or her mother. In Badri Prasad (1978), the Supreme Court recognised a live-in relationship as a valid marriage, accusing the authorities of questioning a relationship 50 years after the couple had begun living together, and were treated as a married couple even by their relatives. The view from the courts A Madhya Pradesh High Court judgment in 1985 dealt with the case of Loli, who had lived for several years with Radhika Singh. Together they had five daughters and a son. The trial court dismissed the case made by Singhs sister-in-law that Loli should not have property rights as she was just a mistress. The sister-in-law had sought her rights over the property, and contended that Loli had started living with Singh even when her first husband was alive, and therefore, there could not be a presumption of valid marriage. But the appellate court set aside the trial courts order, a stand the Madhya Pradesh High Court also agreed with. This brings us to Payal Sharma Vs Superintendent, Nari Niketan, and others, in which a court stated in 2001 that a live-in relationship was not illegal. Sharma had moved the Allahabad High Court to be left to do her own bidding after being forced to live in a Nari Niketan at Agra, following her arrest, along with Ramendra Singh, with whom she had a live-in relationship. The Agra police arrested her and Singh on the basis of an FIR lodged by her father, accusing Singh, an already married man, of kidnapping Sharma. A resident of Kannauj district in Uttar Pradesh, Sharma produced documentary evidence, including her high school certificate, to prove that she was 21 years old. On the basis of this evidence, the court directed the authorities to set her free. Justice M Katju and Justice RB Mishra stated, Petitioner Smt. Payal Sharma appeared before us and stated that she is above 21 years of age, which is borne out from the high school certificate which shows that her date of birth is 10. 7. 1980. Hence she is a major and has the right to go anywhere and live with anyone. In our opinion, a man and a woman, even without getting married, can live together if they wish to. This may be regarded as immoral by society, but is not illegal. There is a difference between law and morality. Thus, a uniform view appears to emerge from the courts, when one looks at the history of cases on the question of live-in relationships. It appears that, by and large, legal sanction for live-in relationships is based on the assumption that they are not between equals, and therefore women must be protected by the courts from the patriarchal power that defines marriage, which covers these relationships too. Shades of grey But such protective sanction raises other questions, notably about the institution of marriage itself, for which there are no easy answers. Supposing a live-in relationship is between a man who is already married with children, and a single woman? In Payal Sharma, Ramendra Singh was a married man with children. Which womans interest should the courts and law protect, and in doing so, can the apparent equality between married and unmarried couples be maintained? Live-in relationships also raise questions about legal stance towards bigamy. In spirit and essence, the Allahabad High Court judgement contradicts the law against bigamy for Hindus, both for men and women, which make it mandatory for a husband or wife to get a divorce before they can marry again. When bigamy is illegal except for Muslims in what sense can a live-in relationship be equal to a marriage, if either the man or the woman is already married? And how is it that a division bench of a High Court is able to pronounce a judgement that openly violates the social, legal and filial implications that bind the husband in a Hindu marriage, which includes living with the wife and children under the same roof? Theres also the question of marriage-like protection for a woman who enters a relationship with someone she isnt married to, by choice or circumstance. Does a female partner need the protection of legal standing equivalent to that of a wife, in a non-married relationship she entered into by choice or circumstance? To marry, or not to marry? Live-in relationships among urban, educated, upper-middle class young people began as a declaration of independence, as a way of keeping away from the shackles of institutionalised marriages. In fact, its a willful rejection of the institution of marriage, of the stereotypes it engenders, and of the restrictions and inequalities it has come to stand for. But, legal sanction granted to a live-in relationship may put it back in the trap that live-in partners sought to evade in the first place. This legal sanction implies that live-in relationships are bound by the same rules of fidelity, commitment and economic stability that marriage is structured in. Social geographer Soma Das says that people who opt for live-in relationships do so because they do not believe in marriage. If live-in relationships are treated on par with marriage, many young men and women may not really like to get into such open relationships. At the other end, ensuring maintenance and giving legal sanction to live-in relationships will not make the position of the female partner equal to that of the wife because social acceptance in Indian society will take a very long time. It still does not have a mindset that accepts the estranged female partner of a live-in relationship. Psychologist Shenaz B Ilavia believes that live-in relationships are still confined to a marginal segment of society which she calls the elite, upper middle class. Theoretically, it may sound like a better proposition than marriage, but very few people actually opt for it. A live-in relationship is not a substitute for marriage, she says.

Monday, November 25, 2019

Comparative Advantage

Comparative Advantage Comparative advantage can be defined as the efficiency of a country or a state to produce a certain commodity at a lower opportunity cost compared to another another country. This applies to international trade where a country can produce a certain good or service at a cheaper cost than another nation. Therefore, it only makes sense for the other country to buy from the producing country as it will be cost effective. International trade refers to the exchange of goods and service between two countries at a price, which is accepted by both countries. A theory can be defined as a discipline of critical thinking and shared ideology on a given topic in science. Thus, the comparative advantage trade theory refers to a clear understanding of the trade that exists between countries that depend on each other for goods and services. In this case, one country can find a market for its goods. On the other hand, the other country can purchase goods at a cheaper price than it would use to produce the same goods. One country is more efficient than the other in producing certain products. Therefore, it makes sense when both countries get involved in the business. In this case, the country that purchases the goods will shift some of the manufacturing attention to other goods that it can produce at an efficient cost.Advertising We will write a custom essay sample on Comparative Advantage specifically for you for only $16.05 $11/page Learn More Comparative advantage compares the efficiency of the country to produce a product at a cheaper cost than another country given the same economic conditions. There exists a relationship of co-existence between two countries. In this regard, each country can produce a commodity that it can produce cheaply and purchase the ones it cannot produce efficiently (Leamer, 46). Economics refers to the discipline that focuses on the production, distribution, and consumption of products. It helps to understand the forces of demand and supply that exists in the market. Market forces dictate how certain goods are produced and offered in the market in an effort to satisfy the needs of customers. Thus, in a given economy, it is very hard to produce all goods and service that the economy may require. Therefore, international trade should be introduced to cater for any commodity that a country may not be able to produce efficiently. A comparative advantage exists if two states differ in technological abilities and resource availability. Therefore, one country can engage in the production of certain goods or services at a lower cost than the other country. This comparative advantage may be as a result of a country having cheap labor or due to availability of capital to produce the given product. A country may be strategically located in a place where there are raw materials and thus being able to save on transport cost and purchase of the raw materials. Economies of scale favor international trade as producti on cost fall due to the scale of production. For example, it becomes cheaper to produce larger quantities of goods than producing a small quantity of goods under the same production process. Comparative advantage has been the backbone of international trade and its development. It has also led to increased efficiency in the country’s industrial production. International trade helps to promote world peace through efficient co-existence between trading partners. Good relations are enhanced through international trade as the countries depend on each other for the production and distribution of goods and services. International trade helps countries to earn foreign exchange, which is vital to facilitate stability of their currency (Maneschi, 12-15). Comparative advantage allows a country to specialize in the production of a given commodity. Therefore, this country can purchase other commodities that are available in other countries at a much cheaper price compared to the cost of producing such goods under the current economic status.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More A country can make good use of the available resources like human skills, education, and talent combined with enhanced machinery to produce goods and services. The country should then establish a better way to acquire the goods and service that it is not able to produce within its economy. Therefore, the best way is to acquire such goods and services from other countries that can produce them at a low production cost. International trade facilitates the use of the factors of production in an effective and efficient manner. However, this can be costly due to taxes and tariffs imposed on the importation of the goods. Nonetheless, it helps to eradicate delays and low supply of goods. International trade helps to promote relations between trading partners through the exchange of tec hnology and production skills that increase production scale. Sharing of information and skills is enhanced through international trade where the citizens of these countries share culture. Transport and other infrastructure are improved through international trade as the exchange of goods and service promote the need to have developed transport system (Maneschi, 18-21). Conclusion Comparative advantage is brought about by one country having a better opportunity cost in the production of a commodity than the other. Comparative advantage has been instrumental in promoting international trade where countries or states exchange goods and service at an agreed price and terms. International trade helps to promote world peace and stabilizes the economies of different countries through the exchange of information and technology. Leamer, Edward. Sources of International Comparative Advantage: Theory and Evidence. Cambridge, Mass. u.a: MIT Pr, 1984. Print. Maneschi, Andrea. Comparative Advan tage in International Trade: A Historical Perspective. Cheltenham u.a.: Elgar, 1998. Print.

Thursday, November 21, 2019

Research proposal (add payment) Assignment Example | Topics and Well Written Essays - 500 words

Research proposal (add payment) - Assignment Example The main benefits of this topic and research is that it allows the managers of the 21st centaury understand how to motivate their employees based on the various theories that have been developed in the past. The main aim of this research is to use the knowledge gained from the past theories and to provide a clearer view to managers to help them be able to incorporate these theories into the current time in the corporate world. The research will also contain recommendations based on the various theories however will be a newer approach to fit into the current corporate world. Managing people at work is an essential element of any business. Human Resources Management is a specialised function by itself and requires to be managed with special care and attention. Employees are an asset to any company. Human resource management deals with managing these assets. Human resource management deals with ensuring that all the needs of employees are met and that the company receives the best from the employees. It is very important for the business to ensure that the employees that have been recruited are able to perform the duties both effectively and efficiently. The key ideas for managing people revolve around Psychology, Sociology, Unitarism, Pluralism, Contingency theory and Ethics (Buchanan and Huczynski, 2004). There are a number of different strands of thoughts in the field of motivation of employees. There have been several scholars who have developed a number of theories about the optimum ways to manage people at work. The dissertation will include the theories of many that will be discussed further. The management theories to a great extent provide a clear ground work of this provides a steady base for this study. This is majorly because it is essential to understand the theories of management before moving into the motivational theories. Management theories are in a number if ways the first and most essential elements of business which every

Wednesday, November 20, 2019

Website Analysis Essay Example | Topics and Well Written Essays - 500 words - 2

Website Analysis - Essay Example It is through downloading or liking of the posts that earn the owner of the posts a specified amount of money. Artists prefer using this website as it is reliable and commonly used by a majority of people worldwide. After the news broadcast on any channel in the world, it is possible to obtain the news at youtube at any time for example KBC news from Kenya is obtainable in this website at any time. However, entertainment items cover a major section of the site. Music and movies from all over the world are available at the website. Youtube contains parental control application that helps in blocking any information that is not necessary for view in underage individuals. It encourages the flow of information to relevant individuals without leaking any information to unnecessary viewers. There are various goals in association with youtube the main purpose being simplifying share of videos from all over the world quickly. The video materials may be movies, music, pranks or motivational speeches from different regions of the globe. In addition, it serves as a medium of interaction among the members of the website that mainly contain various cultural values beliefs and norms. Just like another interaction sites like Facebook, Youtube provides the chance to it members to create more friends along the globe. All the above goals are in achievement as the site has offered the opportunity to make the goals come true. The writings on the website give directions to the users on how to maximize the use of the site. However, the writings simplify the search of items for the users to avoid wastage of time and complications in using it. The textual designs in this website give the viewers a center of attraction as the designs serve the purpose of making the website beautiful and attractive. It provides different colors and images that attract personnel encouraging more users to join the site. The primary visual

Monday, November 18, 2019

Martin Luther King as a Leader Essay Example | Topics and Well Written Essays - 750 words

Martin Luther King as a Leader - Essay Example It was through bold and inspirational speeches that King established a reputation as a great orator. However, this also painted him a radical and subject to federal surveillance for the rest of his life. In addition, King is recognized for his phlegmatic way of approaching crisis as he advocated for the rights of all. Martin Luther King Jr represented the African-American community, but in essence, this translates to all minority communities who lived an oppressed life. This oppression came about following colonization and the slave trade where the rights of those perceived to a weak community were subjected to a wide range of discrimination. Segregation and discrimination with regard to race, gender and education were outlawed following advocacy for civil rights. This marks a critical step towards generating independence among communities. This clearly illustrates that even as King fought for the rights of African-Americans, the benefits would be felt across different communities both regionally and nationally. King mounted a challenge to oppression by defying the status quo, which eventually got support from other members of the community other than African-Americans. However, there still exist a wide disparity based on ethnicity, race, religion and gender in modern America. This creates the need for more activism and effective leadership to bridge the gap, eliminating existing disparities. In order to take up leadership and advocate for change, one must consider every possible angle relevant to the vision he has. This way, his vision should illustrates the benefits of the intended changes and how best to effect it. In this regard, one should develop a vision in which he firmly believes in before making it a mission. Consequently, a leader seeking to transform the beliefs held by many must establish a vivid vision of

Saturday, November 16, 2019

ISP Network Potential Threats

ISP Network Potential Threats Threat Identification A danger is an event which could take benefit of the vulnerability and make a terrible effect at the ISP network. potential threats to the ISP network need to be diagnosed, and the associated vulnerabilities need to be addressed to reduce the danger of the threat. Trends Driving Network Security As in any rapid-growing enterprise, modifications are to be predicted. The varieties of capability threats to network protection are usually evolving. If the security of the network is compromised, there may be extreme effects, like lack of privateness, stealing of information, and even legal potential.      Ã‚   Figure () illustrates several threats and their potential consequences. Figure () Introduction to Vulnerabilities, Threats, and Attacks: Although studying network security, the three usual terms used are as follows: Vulnerability-A weak point that is essential in every network and device. This contains routers, switches, desktops, servers, and similar security gadgets themselves. Threats-The people keen, prepared, and eligible to take advantage of each security flaw, and they frequently examine for new exploits and weaknesses. Attacks-The threats use a selection of kits, scripts, and software to release attacks towards networks and network devices. Normally, the network devices beneath attack are the endpoints, such as servers and PC. The sections that comply with talk vulnerabilities, threats, and attacks in more detail. First aspect: lets talk about vulnerabilities in ISP Vulnerabilities within ISP network security can be summed up as the soft spots which can be found in each network. The vulnerabilities are be found in the network and separate devices that build up the network. Networks are classically troubled by unique or all of three main vulnerabilities or weaknesses: Technology weaknesses Configuration weaknesses Security policy weaknesses The sections that follow inspect separately of those weaknesses in further detail. Technological Weaknesses: Computer and network technologies have intrinsic security weaknesses. These include TCP/IP protocol weaknesses, operating system weaknesses, and network equipment weaknesses. Table () describes these three weaknesses. Table ( ) Network Security Weaknesses Weakness Description TCP/IP protocol weaknesses FTP, HTTP, and ICMP are naturally insecure. (SNMP), (SMTP), and SYN floods are linked to the naturally insecure building upon which TCP was created. Network equipment weaknesses Many types of network tools, such as switches, routers, IDS, and firewalls have security flaws that should be known and shielded against. Example of These flaws are as follows Protocols Firewall Holes Password Protection Absence of authentication Routing Configuration Weaknesses Network administrators or network engineers must  ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­discover what the configuration flaws are and perfectly setup their computing and network devices to balance. Table () includes usual setup weaknesses. Table ( ) Configuration Weaknesses Security Policy Weaknesses Security policy flaws can generate unexpected security risks. The network can pose security threats to the LAN if workers do not follow the security policy. Table () lists selected usual security policy weaknesses and how those flaws are misused. Table () security policy weaknesses Threats There are four main classes of risks to network security, as Figure (-) depicts. The list that follows defines all class of risk in additional detail. Figure () Variety of Threats Unstructured threats these types of threat happen when users with little experience try to be hackers by using some ready hacking software like shell scripts and knowing password. Even these types of threats which only comes hackers can form a significant harm to companies. Structured threats the source of these threats are hackers who have more technical knowledge and with stronger drive. Such hackers are equipped with knowledge about the weaknesses in the system and are willing to misuse codes and programs. They study, make and use advanced hacking methods to enter business systems without their awareness of the hacking. External threats these threats come from persons or groups outside the business without having an official and legal access to businesss system. Internal threats these threats come from people with official access to the system by having an online account or physical access to the system. Attacks: There are four main types of attacks: Reconnaissance Access Denial of service Worms, viruses, and Trojan horses each of the above-mentioned attacks will be explained in the next paragraphs. Reconnaissance It is the unapproved revelation or the systems vulnerabilities, planning, or services (see Fig à ¢Ã¢â€š ¬Ã‚ ¦) There are some elements of similarities between reconnaissance and a robber who watches areas to notice any easy target to enter like empty houses, unlocked doors and windows. Figure () Reconnaissance Access This attack can take place when an unapproved interloper gets an access to the system without an account or a password. Denial of Service (DoS) This attack is the most worrying type of attacks. It means that hackers make the intended users no longer able to access services, systems or networks. Dos attacks make the systems useless by damaging it or making it too slow. Mostly attacks happen by a hack or a script. Worms, viruses, and Trojan horses This type of attack is widespread online through an internet. Attack Examples The next section is dedicated to representing examples of attacks to elaborate and explain it more. Access Attacks Access attacks take advantage of recognized vulnerabilities in authentication services, FTP services, and internet services to benefit access to internet accounts, private databases, and different private info get entry to attacks can include the following: Password attacks Port redirection man-in-the-middle attacks Social engineering Password attacks Password attacks may be applied using multiple techniques, such as brute-force attacks, malicious program applications, IP spoofing, and packet sniffers. (see figure - for an example of a try to attack the use of the administrators profile) brute-force attacks. Figure () Password Attack Example  ¨ Port Redirection This type of attack (please see Fig) happens when there a trust is taken advantage of through cooperated host to penetrate a firewall which originally is hard to penetrate. For example, when a firewall has a host for each of its three interfaces. External host can contact the public services segment host but not the internal host. The public service segment is also known as a demilitarized zone (DMZ). Figure () Protocol Analyser Port redirection may be mitigated typically via using right trust models, that are network (as referred to in advance). Assuming a system underneath attack, a host-based IDS can assist discover a hacker and save you set up of such utilities on a host. Man-in-the-middle attacks a person-in-the-middle attack calls for that the hacker has get admission to to net packets that come upon a net. A sample might be operating for (ISP) and has access to all net packets transferred among the ISP net and some other net. man-in-the-centre attack mitigation is performed by encrypting traffic in an IPsec tunnel, which might permit the hacker to look only ciphertext. Social Engineering simplest hack (social engineering) If an outsider can trick a member of an corporation into giving over valued data, which includes places of documents, and servers, and passwords, the technique of hacking is made immeasurably simpler. 90 percent of workplace workers gave away their password in trade for a cheap pen. Denial-of-Service (DoS) Attacks This is definitely the most common method of attack. DoS are also one of the hardest attacks to remove entirely. Even amongst hackers, DoS hackers are seen unimportant due to the fact that this method is easy to perform. In spite of that, this form of threat requires high security attention because it can cause a possible huge harm using easy steps (also clarified in Figà ¢Ã¢â€š ¬Ã‚ ¦..). Figure (). Denial of Service The next example of a some common type of DoS threats: Ping of death-This attack changes the IP part of the header to deceive others into thinking that there is extra data in the packet than the reality, as a result the system which plays the recipient part will fall apart, as explained in Figure (à ¢Ã¢â€š ¬Ã‚ ¦..). Figure (). Ping of Death Distributed Denial-of-Service Attacks Distributed denial-of-service attacks (DDoS) these attacks take place by filling the network links with false data. This data can crush the internet link, which means that consequently the genuine traffic will be denied. DDoS attacks use similar techniques to those used by DoS attacks but the former is performed on a wider scale. They usually use thousands of attack centers to overpower a target (see an example in figure à ¢Ã¢â€š ¬Ã‚ ¦..) Figure () DDos Attack Malicious Code The main vulnerabilities for end-consumer workstations are next: Trojan horse-A software created to seem like something else that in reality is an attack app Worm-A software that performs random program code and installs duplicates of itself within the RAM of the infected PC, which then infects different hosts Virus-Malicious program is connected to some other software to perform a specific undesirable function on the user computing device Worms The types of a worm attack is : The enabling vulnerability-A computer virus installs itself the usage of an take advantage of the vector on a susceptible system. Propagation mechanism-After having access to PC, a worm repeats and selects new devices. Payload-After the PC or device is hit with a worm, the attacker has to get entry to the host- frequently as a privileged user. Attackers may want to use a local exploit to increase their privilege degree to the admin. Vulnerability Analysis It is vital to analyse and study the present state of network and the administrative practice to know their present amenability with the security needs. This step is needed before working on the addition of new security solutions to an established network. This study will create a chance to find potential enhancements and the possible requirement to reshape part of the system or reconstruct it entirely to meet the requirement. The study/analysis can take place through these steps identifying the policy, analysing the network and analysing the host. The previous sections attempted to present different types of attacks and suggested some solutions. However, the next table summarises different attacks and presents more solutions to these attacks Threats Good practices Assets, assets covered Gaps (assets not covered) Routing threats AS hijacking Internet protocol addressing, Routing protocols, Administrators Administrators Make use of useful resource certification (RPKI) to offer AS authentic validation. The reader needs to be conscious that on the time of writing, its far impossible to discover AS hijacking mechanically. Internet protocol addressing, Routing protocols Administrators Address space hijacking (IP prefixes) Routing, Internet protocol addressing, System configurations, Network topology Make use of resource certification (RPKI) to offer AS authentic authentication. Routing, Internet protocol addressing, System configurations, Network topology set up the best Use policy (AUP), which promotes guidelines to safe peering. Routing, Internet protocol addressing, System configurations, Network topology set up access filtering from the edge router site to the net. Routing, Internet protocol addressing System configurations, Network topology set up Unicast opposite direction path Forwarding to conform the legitimacy of the main sources IP address. Routing, System configurations, Network topology Internet protocol addressing set up egress filtering on the boundary router to proactively clear out all traffic going to the client that has a source address of any of the addresses which have been assigned to that client. Routing, Internet protocol addressing System configurations, Network topology filter out the routing announcements and apply methods that decrease the danger of placing an extreme load on routing created via illegitimate path updates/announcements. for example, Route Flap Damping (RFD) with a properly-described threshold might also make a contribution to lowering router processing time Routing, Network topology Internet protocol addressing, System configurations filter out the routing announcements and apply methods that decrease the danger of placing an extreme load on routing created via illegitimate path updates/announcements. for example, Route Flap Damping (RFD) with a properly-described threshold might also contribute to lowering router processing time Routing, Internet protocol addressing, System configurations Network topology Setup updates for the routing organization infrastructure may simply be accomplished via a described authority the usage of solid authentication. Routing, System configurations, Network topology Internet protocol addressing Manage the status of BGP to discover uncommon activities like path modifications or uncommon announcement. Routing, Internet protocol addressing, System configurations, Network topology Route leaks Routing, Network topology Configure BGP Max-prefix to make sure the legitimacy of routes broadcast. If extra prefixes are received, its miles a signal of a wrong behaviour and the BGP session stopped. Routing, Network topology Utilize useful resource certification (RPKI) to offer AS source authentication. Routing, Network topology BGP session hijacking Routing, Internet protocol addressing, System configurations, Network topology set up prefix filtering and computerisation of prefix filters. Routing, Internet protocol addressing, System configurations, Network topology Use AS route filtering. Routing, Internet protocol addressing, System configurations, Network topology Employ (TCP-Authentication option) to safe secure BGP Validation so that you can update TCP- MD5.TCP-Authentication option to make it simple to a trade of keys. Routing, Internet protocol addressing, System configurations, Network topology DNS registrar hijacking Domain name system, Addressing units, Applications, Credentials, Administrators Registrants need to defend account credentials and outline authorized customers, at the same time as registrars need to offer a secure and safe authentication technique. Addressing units, Credentials, Administrators Domain name system, Applications Registrants need to defend account credentials and outline authorized customers, at the same time as registrars need to offer a secure and safe authentication technique. Addressing units, Applications Domain name system, Credentials, Administrators Registrants need to keep documentation to show registration. Addressing units, Applications Domain name system, Credentials, Administrators Registrants should usage isolated identities for the registrant, admin, technical, invoicing contacts. therefore, registrars should permit an extra complicated user rights control. Credentials, Administrators Domain name system, Addressing units, Applications Registrars have to set up an effective sector information control. Domain name system, Addressing units, Applications Credentials, Administrators Registrars must keep in mind assisting DNSSEC. Domain name system, Addressing units, Applications Credentials, Administrators Registrars can also manage DNS exchange events. Addressing units, Applications, Administrators Domain name system, Credentials DNS spoofing Domain name system, Addressing units, Applications, System configurations, Essential addressing protocols DNS, Administrators Administrators Deploying DNSSEC ambitions to extra secure DNS customers (resolvers) source authentication of DNS information, authentic denial of existence, and info or data integrity. Domain name system, addressing units, Applications, System Configurations, Essential addressing protocols DNS Administrators DNS poisoning Domain name system, Addressing units, Applications, System configurations, Executable programs, Essential addressing protocols DNS, Administrators, Operators Administrators, Operators Deploying DNSSEC ambitions to extra secure DNS customers (resolvers) source authentication of DNS information, authentic denial of existence, and info or data integrity. Domain name system, Addressing units, Applications, System configurations, Executable programs, Essential addressing protocols DNS Administrators, Operators Restrict zone transmissions to decrease load on network system Applications, Executable programs Domain name system, Addressing units, System configurations, Essential addressing protocols DNS, Administrators, Operators Limited active updates to only official sources to keep away abuse. Such abuse include the misuse of a DNS server as an amplifier, DNS cache poisoning Addressing units, applications, System configurations, Executable programs Domain name system, Essential addressing protocols DNS, Administrators, Operators configure the trusty name server as non-recursive. Discrete recursive name servers from the trusty name server. Domain name system, Addressing units, Applications, Executable programs System configurations, Essential addressing protocols DNS, Administrators, Operators Permit DNS transference over TCP to provision non-standard demands. Furthermore, TCP could be essential for DNSSEC. Addressing units, Applications, System configurations, Executable programs Domain name system, Essential addressing protocols DNS, Administrators, Operators Domain name collision Domain name system, Applications Dont use any domain names which you dont own for your inner infrastructure. For instance, do not take into account non-public domain name area as top-level domains. Domain name system, Applications Stopping DNS demand for inside namespaces to leakage into the net via making use of firewall policies. Applications Domain name system Usage booked TLDs such as. invalid, test, localhost, or. example. Domain name system, Applications Denial of Service Amplification / reflection Applications, security, Generic Internet provider, Hardware, Executable programs, System configuration, Application protocols, Administrators, Operators System configuration, Essential addressing protocols, Administrators, Operators Undertake source IP address deal with authentication at the edge of net organisation to avoid network address spoofing via egress ingress filtering. Applications, Security, Generic Internet provider, Hardware, Executable programs, Application protocols System configuration, Administrators, Operators Workers of official name server operative must apply (Response Rate Limiting). Applications, Security, Generic Internet provider, Hardware, Executable programs System configuration, Application protocols, Administrators, Operators ISPs and DNS name server operatives must to deactivate exposed recursion on name servers and may just allow DNS requests from reliable sources. Applications, Security, Generic Internet provider, Hardware, Executable programs System configuration, Application protocols, Administrators, Operators Flooding Applications, Security, Generic Internet providers, Hardware, Executable programs, System configuration, Essential addressing protocols, Administrators, Operators System configuration, Essential addressing protocols, Administrators, Operators Industrialists and configurators of net tools must take footsteps to protected and secure all equipment . One option is to have them update by patching mistakes. Applications, Security, Generic Internet providers, Hardware, Executable programs System configuration, Essential addressing protocols, Administrators, Operators Protocol exploitation Applications, Security, Generic Internet providers, Hardware, Executable programs, System configuration, Essential addressing protocols, Administrators, Operators Malformed packet attack Applications, Security, Generic Internet providers, Hardware, Executable programs, System configuration, Essential addressing protocols, Administrators, Operators Application Applications, Security, Generic Internet provider, Hardware, Executable programs, System configuration, Application protocols, Administrators, Operators

Wednesday, November 13, 2019

Libertarians Unethical in Respect to Poverty Essay -- Libertarian Polit

Poverty in the United States has long been a social, political, and human rights issue. Few people would say that it is not our moral duty, as social human beings to take care of those less fortunate than ourselves, to the best of our ability. I say "few" because there are some people out there who believe that we have no moral obligation to do anything outside of ourselves. These types of people have what is called a "libertarian" viewpoint. There is really no specific definition of "libertarian", but it is associates "justice with liberty and†¦liberty itself with the absence of interference by other persons." In relation to the matter at hand, specifically poverty in America, libertarians are against taxing the affluent or forcing people to aid the starving and poor. One of the most influential libertarians of our time is Professor Robert Nozik. His theory of justice begins with the premise that all people have "Lockean rights", which require that we refrain from interfering with others. Other than this we have no obligation to do anything positive for anyone else, and likewise, they have no obligation towards us. These rights are natural or inalienable because all humans have them and they do not come from any social or political institutions. These rights forbid us from interfering with a person's liberty even if it would promote some general good, or prevent another's rights from being violated. Overall, the general idea is that people have the liberty to live a life free from intervention of others, and can lead their life however they so choose. In addition, he says that if a person acquired their fortune or possessions without harming, defrauding, or violating the rights of any others, then it is morally perm... ...down to it, we are all the same. Some people have been fortunate enough to grow up in an environment that is financially, emotionally, and spiritually stable. Some people have not been so fortunate. Does this mean that they should not be given the opportunity to try to make something of themselves so that they can change their respective situation? A society that employs a libertarian point of view is one that is regressing, not progressing. In India, the system of social classes is still in effect. Whichever class a person is born into is the class that they remain a part of†¦forever. Such a system offers no opportunity for advancement, and essentially is an example of a belief in the predestination of all people. It is sad to think that in a society as advanced as the United States, there are still those among us who would employ such systems, if possible.

Monday, November 11, 2019

The Vietnamese culture, a rich heritage on many different levels

Vietnamese Culture Thesis Statement: The Vietnamese culture, a rich heritage on many different levels. Through exploring its religion, population, language, education, government, art and economics, an appreciation can be developed for the important contributions Vietnamese people make in American society. The early inhabitants of the area were Negritos. Some 4,000 years ago Austronesian (Indonesian) migrants from the north were moving into the area that is now North Vietnam. Later, Austro-Asiatic (Mon-Klimer and Maylayo-Polynesian) peoples arrived. Then, about 2500 years ago Viet (Yueh) and Tai peoples moved down from southern China. Out of this mixture of genes, languages, and cultures arose Van Lang, considered to have been the first Vietnamese Kingdom. In mid-third century B. C Van Lang was over run by and incorporated into another state to the north, forming the kingdom of Au Lac. Then Au Lac was incorporated into an even larger and more powerful state: Nam Viet. (Levison 284) Historically speaking, Vietnam (officially the Socialist Republic of Vietnam as of 1992) has struggled for independence for at least two thousand years, primarily from China. There have been brief periods when the country has itself p In spite of its long relationship and physical closeness to China, Vietnam has for most of historical time â€Å"defined itself as China†tms enemy, a fact memorialized in folk song and legend† (301). The Communist party enlists neighborhood committees and uses these along with its own organizations to monitor behavior and punish what it perceives to be deviance from the norm. About 20 percent of all Vietnamese people live in cities, the majority of these in two or three room apartments. The punishment for exceeding the two child limit was most easily enforced† (295). Once a tattoo artist, Tan experiments with subjects such as men masturbating and variations on the phallic symbol. But number one, there is very little money to be made in Vietnam, so there are few places to spend it. In writing, these tones are marked diametrically, giving the language a great musicality. In 1994 the population of Vietnam was roughly 69 millions. Respecting its economy, Vietnam is and always has been a very poor country, â€Å"with an annual per capita income of less than U. Although the party has eased up on the economy a bit regarding control, it still wields absolute political power. In Vietnam, â€Å"gossip and ridicule have been important weapons for social control because of a concern for face† (296). Was Communism to be practiced, as it should be in Vietnam There would be a middle and upper class which there are not except at the level of government, meaning it†tms the same old story of corruption, hunger for power and the odd need to keep the people as submissive and as under-privileged as possible. The children are taught that â€Å"water from Vietnam†tms many rivers and from the annual monsoons is basic to the rice agriculture† (26), which is so vital to the country†tms existence in terms of both substance and economy. Music plays a central role in daily life just as it does in America; its fine arts and architecture, however, reflect Chinese as well as Western influence. Most households have altars for their ancestors and â€Å"small shrines built in honor of various spirits (the earth god, Shakyamuni, the goddess of mercy, the god of wealth, etc. In spite of its long relationship and physical closeness to China, Vietnam has for most of historical time â€Å"defined itself as China†tms enemy, a fact memorialized in folk song and legend† (301). The Communist party enlists neighborhood committees and uses these along with its own organizations to monitor behavior and punish what it perceives to be deviance from the norm. About 20 percent of all Vietnamese people live in cities, the majority of these in two or three room apartments. The punishment for exceeding the two child limit was most easily enforced† (295). Once a tattoo artist, Tan experiments with subjects such as men masturbating and variations on the phallic symbol. But number one, there is very little money to be made in Vietnam, so there are few places to spend it. In writing, these tones are marked diametrically, giving the language a great musicality. In 1994 the population of Vietnam was roughly 69 millions. Respecting its economy, Vietnam is and always has been a very poor country, â€Å"with an annual per capita income of less than U. Although the party has eased up on the economy a bit regarding control, it still wields absolute political power. In Vietnam, â€Å"gossip and ridicule have been important weapons for social control because of a concern for face† (296). Was Communism to be practiced, as it should be in Vietnam There would be a middle and upper class which there are not except at the level of government, meaning it†tms the same old story of corruption, hunger for power and the odd need to keep the people as submissive and as under-privileged as possible. The children are taught that â€Å"water from Vietnam†tms many rivers and from the annual monsoons is basic to the rice agriculture† (26), which is so vital to the country†tms existence in terms of both substance and economy. Music plays a central role in daily life just as it does in America; its fine arts and architecture, however, reflect Chinese as well as Western influence. Most households have altars for their ancestors and â€Å"small shrines built in honor of various spirits (the earth god, Shakyamuni, the goddess of mercy, the god of wealth, etc.

Friday, November 8, 2019

Childrens Testimonies essays

Children's Testimonies essays Every year some hundreds of thousands of children may be involved in the legal system. Most encounters have been with sexual assault cases. Although some children may be capable of giving an accurate testimony most are vulnerable to having their testimony and their memories distorted to the point where the truth may never be known. Children have problems distinguishing reality from fantasy, making them susceptible to the coaching of an authority figure. Award winning development psychologist Stephen J. Ceci, Ph.D., of Cornell University has conducted a laboratory research, studying some factors that can affect a childs testimony. These conclude: Interviewer bias-When the interviewer (parent, therapist, investigator) believes he or she knows what happened and attempts to get the child to confirm it, ignoring anything the child says that does not conform with the interviewers bias and encouraging anything that does. Repeated Questions-Children, especially younger children are more likely to change their answers when asked the same yes or no question repeated during a single interview. Answers from children to yes or no questions repeated over several interviews are likely to become more firm and confident, regardless of whether they are correct. Stereotype induction-Childrens reports can be influenced by stereotypes suggested by the interviewer (or by others before the interview takes place). An interviewer telling a child that the [suspect] is a bad man who does bad things is an example of stereotype induction. Similarly, children can come to assume and report bad things about someone they had previously heard described in negative terms. Encouragement to imagine and visualize-When asked to think real hard about or to visualize events they dont remember, children can come to remember and then present a detailed, coherent narrative o...

Wednesday, November 6, 2019

Environmental Perils

Environmental Perils Thomas Friedman, Al Gore, and Mindy Lubber offer analyses of the environmental perils we face at the beginning of the twenty-first century and propose some solutions. In this paper there is going to be comparing and contrasting each of these analyses and solutions that are offered by the three analysts.Advertising We will write a custom essay sample on Environmental Perils specifically for you for only $16.05 $11/page Learn More Considering what is presented by Thomas Friedman, he promises that we should go green. He points out that thinking about how to live and work in a greener fashion – with cleaner electrons, greater energy and resource productivity, and an ethic of conservation, is being popularized and democratized (Friedman 290). According to him, at the present, this is â€Å"no longer an elite issue for those people who live in the West and East coasts or in the backyards of Vermont or Colorado† (Friedman 290). Friedman points out tha t â€Å"it is all about being green and every one is a winner† (Friedman 291). The farmers in the U.S are winners because they are going â€Å"green†. They get to grow ethanol and garner immense government subsidies for doing so even if it makes no real sense as a CO2 reduction strategy. More so, coal companies are going green and they are doing this through renaming themselves â€Å"energy companies† and stressing how sequestration of carbon dioxide will offer us â€Å"clean coal† (Friedman 291). He states that â€Å"in the green revolution we’re having in America today, everybody gets to play, everybody is a winner, nobody gets hurt, and no body has to do anything hard† (Friedman 291). It is pointed out that the most difficult facts are these â€Å"if we sum up the easy, cost-efficiency measures we should all embrace, the best we get is a slowing of the growth of environmental damage †¦ obsessing over recycling and installing a few s pecial light bulbs wont cant it† (Friedman 293).Advertising Looking for essay on environmental studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More We are supposed to be considering the basic change in our energy, transportation as well as agricultural systems instead of looking at the technological tweaking on the margins, and this implies changes and costs the present and future leaders tend to be afraid to discuss (Friedman 293). Another analyst who talks about the environmental perils is Al Gore. Al Gore who was the 45th Vice President of the United States of American as well as an environmental activist, was the winner of the 2007 Nobel Peace price and this was in recognition of his work â€Å"to build and disseminate greater knowledge about man-made climate change, and to lay the foundations for the measures that are needed to counteract such† (Gore 301). In his speech that he presented in the Month of July 20 08, Al Gore called upon people to take the necessary measures to overcome the climate crisis and pointed out that electing President Obama in to office presented a hope of dealing with this problem effectively. According to Al Gore, the world authority on climate crisis, â€Å"the Intergovernmental Panel on Climate Change, after two decades of detailed research and 4 unanimous reports, currently indicates that the evidence is â€Å"unequivocal†. To those people who are still tempted to engage in dismissing the increasingly urgent alarms from scientists all over the world, do not seriously consider the melting of the north polar ice cap and all of the other apocalyptic warning from the earth itself, and â€Å"who role their eyes at the very mention of this existential danger to the future of the human kind are supposed to wake up† (Gore 301). Al Gore, in the speech, raised awareness among people that they should care about the future generations by taking the appropria te measures to protect the future generations against the effects of the climate crisis. Al Gore mentioned that the bold steps that are supposed to be taken in order to deal with the climate crisis are similar steps that are supposed to be taken to deal with the problem of the economic crisis as well as the energy security crisis.Advertising We will write a custom essay sample on Environmental Perils specifically for you for only $16.05 $11/page Learn More There is agreement among the economists that huge and quick investments in a job-intensive infrastructure initiative are the best way to revive the economy in a rapid and sustainable way. A large number of people as well agree that the American economy will fall behind in case the country goes on spending billions of dollars on foreign oil every year. In addition, national security experts in the two parties have come to agree that America faces a dangerous strategic vulnerability in case the world sudden ly loses access to the oil from the Middle East. Al Gore points out that the America’s Automobile industry should be helped to convert quickly to plug-in hybrids which can run on the renewable electricity which will be there as the rest of this plan comes to maturity. He points out that â€Å"in combination with the unified grid, a nationwide fleet of plug-in hybrids would also help to solve the problem of electricity storage†¦..with this sort of grid, cars could be charged during off-peak energy use hours; during peak hours, when fewer cars are on the road, they could contribute their electricity back in to the national grid† (Gore 303). Another measure that is proposed by Al Gore is that there should be embarking on nationwide attempts to retrofit buildings with improved insulation and energy efficient windows and lighting. About 40 percent of the CO2 emissions in the U.S originate from buildings and trying to prevent such pollution saves a lot of money for thos e who own homes and businesses. This measure is supposed to go hand in hand with the proposal in Congress to assist the American people who are overburdened by mortgages that are more than the value of their homes. Al Gore, in his speech, also proposes that the U.S has to be in the lead in regard to putting a price on carbon within the country, and should also take the lead in the global efforts to substitute the Kyoto treaty with a treaty that is more effective which caps global CO2 emissions and gives encouragement to countries to invest together in efficient ways to reduce global warming and pollution rapidly, through such ways as greatly reducing deforestation.Advertising Looking for essay on environmental studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More Indeed, as pointed out, â€Å"the best way, and possibly the only way, to secure a global agreement to safeguard the future is by re-establishing the U.S as the country with the moral and political authority to lead the world toward a solution† (Gore, 303). In his forecast, Al Gore points out that he has great hopes that Americans will have the courage to embrace the changes that are vital in saving the country’s economy, the earth, and eventually people themselves. Considering Mindy Lubber, she is a former Regional administrator of the United States Environmental Protection Agency. He has won international awards for her work on combating climate change. She delivered a speech in the month of October 2008 at a Deutsche Bank conference during the financial downturn that followed the subprime lending crisis. In the speech, she started by point the fact that we are about to leave behind an environment that is imperiled to the future generation. She pointed out that the m ajor problem that is facing the world is global climate change. She blames the society for presenting the claims that it is taking action to deal with the situation but in the actual sense, it is not doing something close to this. The dangers that climate change poses to the profitability of companies are very immense and â€Å"even if we weren’t the â€Å"good guys† who want to save the planet for the planet’s sake our children’s, we had better pay attention as business leaders whose enterprises are at risk† (Lubber 316). She went ahead to point out that people are aware that ignoring the subprime lending disaster led to a stunning financial collapse on Main Street and wall Street. If a similar mistake is made in regard to the climate, the very human survival is put in danger in addition to the capital markets. She draws a conclusion in this regard that it is now time to be attentive and cease to think of climate change as an â€Å"off-trade† balance sheet risk. This is a risk which is supposed to appear on the balance sheet. Since the unchecked carbon emissions will bring about great damage to this world, we have to commit now to â€Å"building long-term shareholder value and creating new high paying jobs that do not revolve around oil and coal† (Lubber 317). She further points out that the near collapse of the America’s economy has got people’s attention and therefore, as one pays attention, there is need to talk about people’s exposure to climate risk, as well as the opportunities which await those that lead on this critical issue. There is need to put in place policies concerning climate change. As an initial step, the government action is required. In order to limit the climate change impacts, there is need to reduce global warming pollution by a minimum of 25 percent by the year 2020 and by 80 percent by the year 2050. The only way through which this can be realized is by putting in p lace strong government policies that set the compulsory limits of CO2 emissions, which implies placing a price on carbon emissions. Thomas Friedman, Al Gore, and Mindy Lubber give comprehensive analyses of the environmental perils that the world is currently facing and well as the possible solutions to these. In their analyses, all of them talk about the issue of reducing the carbon emissions. However, as on one hand Friedman man puts emphasis on going green, Gore and Lubber concentrate on the issue of giving a relationship between economic development and climate change. They point out that climate change can bring in a great negative impact on a country’s economy or the financial position of a company. In general, there is need to take the necessary measures to protect the environment in order for the future generations to also benefit from it. Friedman, Thomas. â€Å"205 easy ways to save the earth†. Writing and reading across the curriculum. Eds. Laurence Behrens and Leonard J. Rosen. London: Longman Publishing, 2009. Gore, Al. â€Å"Climate for Change†. Writing and reading across the curriculum. Eds. Laurence Behrens and Leonard J. Rosen. London: Longman Publishing, 2009. Lubber, Mindy. â€Å"Balance sheets and the climate crisis†. Writing and reading across the curriculum. Eds. Laurence Behrens and Leonard J. Rosen. London: Longman Publishing, 2009.

Monday, November 4, 2019

Electronic communication Essay Example | Topics and Well Written Essays - 1500 words

Electronic communication - Essay Example This paper outlines categorically some examples that will help highlight the latter issue for ease of understanding. Basically, there are three types of electronic communications. These include: This is basically the simplest type of electronic communication and whereby transfer of messages is towards one direction at a time. In other words, the communication is one-way. Examples of such communication are: personal receiver (beeper), TV broadcasting and radio. A policy is typically described as a principle or rule to guide decisions and achieve rational outcomes. A policy can be considered as a "Statement of Intent" or a "Commitment." For that reason at least, the decision-makers can be held accountable for their "Policy", (Paquette 200). Policies are therefore normally meant to ensure conformance with set objectives and in the case of electronic communication, one of the major issue of concern is privacy and security of communication. Electronic communication, unlike other forms of communication, poses great challenges to both the communicators and the communication service providers on how to ensure security of the messages. Another issue concerning use of electronic communication is its ability to bear legal value in that there have been issues on whether or not agreement reached using electronic communication can have evidential value (Madeline 198). There are, therefore, several policies governing use of electronic communication. One of the international policies on electronic communication is the New World Information Communication Order (NWICO). This is a UNESCO agency formed in the mid 1970s with the aim of bringing balance in world information flow (communication). NWICO was out to facilitate economic growth in the developing or third world countries by improving the communication system. According to it, free information flow encouraged economic development but was lacking in

Saturday, November 2, 2019

Cabaret Film (1972) Film Essay Example | Topics and Well Written Essays - 1000 words

Cabaret Film (1972) Film - Essay Example Let us now look into film by segmenting it, so as to understand the film better. The film begins with a cabaret song performed by Joel Grey and other cast that actually welcomes the audience. Here Bob Fosse blends the introduction of Michael York, the scene takes a transition from the cabaret to the Berlin railway station and this transition happens abruptly with no effects of fade or wipe. The first scene completely focuses on the advent of an English man who enters Berlin with a hope to find a career as an English tutor. Soon after the completion of the first scene, there is actually a continuity of the English man finding himself a place to live in. Here Bob Fosse brings in the character around which the story actually revolves, Sally Bowles (Liza Minnelli). The English man meets the singer Sally Bowles and finds accommodation in her place. In this particular scene the director introduces Sally Bowles as atypical woman with a strong desire to become an actress. This also gives us an impression about the girl who has a quite different attitude where she convinces the English man about the rent and persuades him to stay. The following scene shows Sally Bowles performing at the cabaret and this indeed is a perfect continuation of the previous scene letting the audience know about Sally and her profession. In this performance of Sally Bowles one has to definitely appreciate the work done by John Kander where his tunes leave the audience foot tapping. The third scene begins with a fade and this shows Sally Bowles talking over the phone to the English man Brian Roberts and here comes in the character of a Jewish man, who Sally introduces to Brian and suggests him taking English lessons from Brian. In the following scenes Sally discloses her strong desire to become an actress to Brian and in the same scene Sally screams under a railway bridge and asks Brian to do the same. This scene particularly tells us about the typical behavior of Sally. The following scenes al so have a good sense of continuity where Sally seduces Brian and Brian refuses romancing her. At the end of the scene doubts entail us about the sexuality of Brian for he has a different outlook for women. All the scenes so far have a cause to happen and their effect felt in the progressive sequences. The upcoming scenes find us in little sense of ambiguity of as to why the parallel story of the Jewish man and his love interest, Natalia happen to take place in this track of the movie revolving around the cabaret singer Sally. But little would we know at the beginning, of why this parallel track runs and at the end of the film this would find a meaningful integration with the main track of the movie. The scene, in which the Jewish woman, Natalia seeking to learn English from Brian pronounces â€Å"phlegm† amusingly, is certainly a hilarious scene with Sally’s sarcastic comments. Though some scenes merely appear as fillers their sense of appearance are found at the end. The Jewish man trying to please his love interest is one among them. The romance between Sally and Brian finds great sense as it is placed in the right time and the director’s art in making the scene a non deliberate one is impeccable. A song (â€Å"may be this time†) placed at this point is a mere justification of the emotions of a cabaret singer. The scene in which Sally speaks to the Natalia about physical relationships actually makes little sense as this has got

Thursday, October 31, 2019

HRD Essay Example | Topics and Well Written Essays - 750 words - 3

HRD - Essay Example tation, staff training and development, performance management of employees, compensation arrangement and benefits and career development of the organization’s staff (Sims, 2007). Human resource planning is an organizational design that ensures that the future personnel of the organization needs will be met in the most appropriate and in a consistent manner. Through human resource planning, managers of the organization ensure that they acquire the right number of employees for the organization, and the most appropriate persons to fill the various positions in the organization at the right time. Kumar (2011) points out that this process seeks to acquire the most capable staff who can in an effective and most efficient manner handle the tasks assigned to them. An analysis of the internal factors of the organization reveals the current and expected skills requirements, vacancies and departmental expansions and reductions. Environmental factors survey shows the labour markets and use of information systems to build and maintain employee information. Human resource planning is incorporated within the strategic plan of the organization. Recruitment aims at acquiring the most appropriate applicants who match the criteria of the certain job. Employee recruitment is the process in which an organization locates, identifies, and attracts the most capable applicants for an advertised job position. It is involved in the development of a pool of successful candidates in accordance to the human resource plan of the organization (Gitman & McDaniel, 2009). Employee decruitment is however the technique for reducing the labour supply within the organization in cases of over staffing through firing, employee layoffs, transfers and retirements of both aged and yet to be aged employees. â€Å"Business Services Support† (2006)  advises that when recruiting employees for any position, certain considerations have to be put into place. Job description, which is part of the

Tuesday, October 29, 2019

Reading and Comprehension Essay Example for Free

Reading and Comprehension Essay Read 8 Secrets to a Knockout Business Presentation using the SQ3R method. Answer the following questions to assess how well you followed the SQ3R method, and whether it helped. Note: Your grade for the assignment will depend on the quality and honesty of your responses and not on how successful you felt you were. ? What was the main point of the written piece? ? What did each section deal with? ? What questions did you ask yourself as you were reading? ? How can you change your note taking skills for the future? ? What would you do to retain this information for later use? ? How might the SQ3R method help you improve your reading comprehension and retention skills? Gen/105 Week 7: Reading and Comprehension Project 1. The main point of this written piece was to tell the reader what the eight most successful secrets were to delivering a knockout presentation in your business affairs. A lot of people at companies just make boring PowerPoint slides and it has so much irrelevant information that the point of the meeting is masked by a weak presentation. This article shows what to do and how to make a great presentation. 2. Each section of this paper dealt with a new and exciting way to capture the attention of a viewer of your business slides. The writer states to â€Å"dig deep† by adding new information and giving more to the viewer. â€Å"Avoid Info overload† shows that too much information can be detrimental to a project, people can bored and wander off. In the section â€Å"Practice Delivery†, it talks about how to memorized your speech and practice what you are saying. This will avoid mistakes, mishaps and fumbling with words. Also, the writer says to â€Å"forget comedy†, by leaving the humor out the project is more professional and shows that you are serious. By â€Å"pick powerful props† shows your audience that memorable ideas and notions can be obtained by using props, so the audience can remember ideas and thoughts associated with the presentation. Another secret is to â€Å"minimize you†, this means take out information relating to you or the business, because people already know what this information is. It waste space and time, and people can get sidetracked. â€Å"Speak the Language† notes that speaking as you always do will help minimize confusions with acronyms and abbreviated words. Be professional but make sure everyone can understand what is been said. Last but not least, â€Å"simple slides† states that you should use slides in your presentation to highlight important information and key words, don’t let the slides overrun the presentation. 3. The questions that came to mind when I was reading was significant. They dealt with how to maximize information during presentations and how do I apply material that are useful in my projects. I don’t want to use unnecessary information that is irrelevant. I also asked myself if using pictures and props were a good idea. I found out that these two tools are necessary to keep the audience engaged in what you’re talking about. 4. I feel like that I have great note taking skills. I always note key words and phrases. If I have a long or difficult reading I always break it down in paragraphs and take notes on key sentences. I also use an outline format which helps greatly. It is almost like the article written in my own language so I can understand it better. I always use my notes to go over information instead of trying to re-read an entire article to find important facts. 5. I will use notes to retain this information for later use. My notes can be very well written as well as the reading, with the same information available. I always keep notes to look over for extra information and key points. 6. I think the SQ3R method does help my reading and comprehension skills improve. By skimming the article I mentally note key words and phrases. I can see how each paragraphs ends and if there are any vocabulary words noted. Noting questions is helpful as well. Keeping in mind question I would ask about the article will help me find an answer to it within the paper. I believe the method does help a lot especially when it comes to larger papers or article that I need to comprehend.

Saturday, October 26, 2019

Implementing an Attendance System in 3AAA

Implementing an Attendance System in 3AAA Henry Brown Carry out a systems investigation on implementing an attendance system in 3AAA: Brief: Pyus Pyxidis have taken on a project to investigate the possible attendance systems to be used by 3AAA academy staff. The investigation should allow myself as an employee of PP, to research possible service providers, programs and ways of implementing a new attendance system for 3AAA. What is currently used?      Ã‚   Before starting my research into different products and services I needed to first find out what current media/service is used by 3AAA to conduct their attendance checks for pupils in their colleges across the country. The use of a hard copy may also limit the speed of passing the information along to the next representative in the company which you may not get with an online based system. When researching the new alternative I shall keep in mind the simplicity factor as well as the effective layout used. End User Investigation: The first stage to my investigation was to interview Andrew Maddison, the Leading Member in I.T. at 3AAA. I approached the interview in an organised way by using a question sheet which was prepared earlier. I highlighted important questions to ask Andrew so that I could make the most of my time with him. Fig.1. shows an image of the first page of the completed question paper. Below is a manuscript of the interview paper. Q: What would be your most valued feature in your current of documenting attendances? A:Needs to be simple and easy to understand. Keep the current format. Q: How much time is required to input your data into the document? A: Around 20 minutes. However, data has to sit around for up to 4 days before it is sent away to head office. Due to this no immediate action can be taken if there is a problem. Q: Does the time taken need to be addressed and or shortened? A: This could be dealt with by bringing in an online system. Possibly cloud based. This could be used with many different administrative rights to allow the right people to view the data. This could be achieved by using an independent online service. Conclusion: There was a lot of useful information gathered from the interview. Some of the main points drawn suggested that a cloud based service may be the best way to go with the project. This would also aid product function and efficiency in communication as well as speed and ease of implementation across the whole of 3AAA. Investigation of Services: This section of the investigation focuses on the service that would best suit the project. I will take into consideration price, ease of use and reliability of the service. In this section I looked at 5 of the top cloud based services which all had their positives and negatives. I worked the 5 down into the two best services to further compare which will aid in choosing the best option. The two options which I narrowed down where Microsofts Azure service and Amazons AWS. Microsoft Azure: Positives: Negatives: -Control: MA allows you to have access and Active Directory on the service. This allows more freedom and control. The service also allows for multiple administrative users who can all create amendments and have an input into the system. -The long-term trajectory is not very clear. There are possibilities of Microsoft not fully committing to the service down the road. -Platforms: Rival platforms and operating systems are supported on this system. -Microsoft are not innovators in the industry for this service. -Lifespan: Annual upgrades are in effect and will allow the service to work and run for a prolonged amount of time. The system should be supported for the next 10 years if not longer. -Open source applications do not have the same amount of support as Microsoft applications which can make it difficult in fault finding. Pricing: Microsoft Azure has been the cheapest option with both quoted prices being lower than AWS. The drop in prices over a two-year period shows how Microsoft are finding more efficient and cost effect ways to run their service. Amazon AWS: Positives Negatives -Features: The service offers very similar things to Microsoft Azure. -Outages: This service has a history of outages and can be unreliable. -Scalable: The service will allow for expansion very easily as it is like paying for water or gas. The Service can expand with the businesss needs. Speed: The download speeds from the service can sometimes be slow unless extra amounts are paid. -Costs: Can eliminate large IT overheads and be more cost effective by using this service. Transactions: These can become expensive and the user may even need to pay for activity as well as additional storage. Pricing: Conclusion: After an in-depth comparison of the two services I have decided to choose Microsoft Azure as my service provider for this investigation. I have based my choice on both features of Azure, the cost and the prospect of prolonged support. Azure offers a more competitive pricing package as well as offering better support for the site. The uptime and SLA packages are far superior to AWS making MS AZURE the right choice for the Register platform. MoSCoW Method: The MoSCoW method is a prioritisation technique used in business, project, web, analysis and a much larger array of management. The Method is very effective at helping the project leaders/managers in prioritising the most important factors. The work of prioritising the most important sections will help in the success of the project. For example if the priority of a project is to create a simple and effective design of a website that chooses function over aesthetic, then this can be easily highlighted in the MoSCoW method to make it easier to follow. So the project would show Must have: A well-functioning engine on the website to insure that the system functions to a high standard. Should have: A budget of  £200,000 or less. Could have: Offline features. Wont have: An instant messaging service. E.g. This method is good for working with time constraints as it allows the project manage to pick the most important aspects which MUST be completed. This then allows for other important but not as pivotal factors to be added to the other sections such as SHOULD and COULD. Many projects will say that they would like to have at least 60% effort put into the project as a minimum. (Even if time and resources are short the effort cannot drop below 60%) As the scale moves down to lesser priorities then 100% effort would be needed to achieve the lower options. Fig.7 (2017). 4.bp.blogspot.com. Retrieved 17 January 2017 (M) Must Have: These will be the fundamental requirements needed to ensure that the project can be a success. These areas have been highlighted by the client as important and integral functions. Priority Requirements Specification 1 Simple and easy to use Keep design simple yet still stylish as well as keep the tools/buttons as clear as possible. 2 Permissions for different staff This is to prevent unauthorised access to certain files, settings and other areas which can be effected. 3 Encryption and Security SSL level encryption will be used to protect the students data and the system will be locked down to prevent an unauthorised access or hacking. 4 Homepage and Dashboard This will be used to make it easier to navigate the website and improve the function (S) Should Have: These requirements are not as important or as critical as the ones previous. They are still an important part of the project however they are not critical. Due to tight time frames Should specifications can be held back till another time or fit in after the Must have been completed. Priority Requirements Specification 1 The budget of the project should be  £200,000 Keep costs down where possible and meet deadlines to ensure no further costs are added due to delays. (Client specified to keep below  £200,000 if possible) 2 The project will have a 6 month timeline The client needs the system to be up and running by the end of August 2017. 3 The system will use both off the shelf products and custom made services The blend of custom and off the shelf will ensure that the system will suit the specific needs of the client as well as help to keep the cost down at the same time. 4 Colour coding system will be used for present, Absent and Late etc. This will show an easy to understand visual representation as well as written e.g. P,A and L will be used to represent the different options as well as the colours. (C) Could Have: Requirements in this section are to be done if the right resources are available and if the client decides for more options. These are not as important as the other two sections above and are only to be attempted once the two previous sections have been completed. Priority Requirements Specification 1 Vibrant colour scheme Colour scheme will make it easier to navigate and add a more aesthetic feel to the site. 2 Colour coding Colour coding within the register itself will make it easier to read and understand. 3 Dropdown menus This would make it easier to navigate the site and reach the different areas faster. 4 Flag inactive users The administrator can be informed of inactivity of users. (W) Wont Have: This requirement is something that is not necessarily needed for this project and will ultimately be decided by the client stakeholders in the future to see if it is needed in an extension of the same project. Priority Requirements Specification 1 Instant messaging service This is an expensive and time consuming service to create and set up. 3AAA already have ways of communicating so this wont be needed. Lifecycle: I have chosen to use the Agile Lifecycle model for this investigation as it has many useful features which would insure a successful implementation of the service to 3AAA. This project would need a tailored plan to correctly implement successfully, the iteration feature in this lifecycle model would allow for safe checks and various demo releases to be tested before the system in launched. Fig.6. shows a detailed diagram of the Agile Lifecycle Model with the relevant sections and detailed iterations. The Agile development cycle would work extremely well to meet the needs of the project. The multiple iterations of the cycle will allow the development process to be as effective as possible. The cycle will be very effective for the projects timescale of 6 months as it allows the developers plenty of time and iterations to get the system working as effectively as possible. The agile cycle allows the project managers to break the project down itself into smaller and more manageable areas. This works hand in hand with the MoSCoW project and will make the project more scalable to the team creating it. The different sections of the MoSCoW theory will work very well with the cycles iterations to ensure each stage Must, Should, Could etc. are completed in the correct order and to a level which will meet the clients expectations. Design Function: I have designed the website to run on an array of Internet Browsers however I have used screenshots from Google Chrome as the service works best on the specific browser. Below are a series of screenshots from the Beta copy of the proposed Attendance System. Login Prompt: This would be the primary interface for the users to gain access to the service. The 3AAA member of staff would simply need to search for https://www.3aaa.co.uk/login/attendance-register in their browser to reach this page. The member of staff would use a unique login name such as J_Smith for example to login. The password would be customisable by the user to best insure security for that users online profile. (The password change feature can be found in the settings tab on the drop down menu at the top of the page.) Particular members of staff would have Admin rights to the service to allow for editing, new menus and features to be added. This means that the webpage can be maintained correctly and work as it should. Staff with Administrative rights will have a slightly different colour scheme to indicate the users rights on the page so that it would be easily to identify the different users. For example, an Administrative user would have a red band at the top of the page just above the drop down menu. Overview: Once the user has successfully gained access to the service they would usually navigate from the home page to the Register area via the drop down menu. Once in the Register area the page will default to the Overview section. The Overview section shows a detailed overview of the students in the staff members selected class. The data provided is the students ID number, Name, Days present as well as a chart to the far right showing how many days absent, present and if they were present in the Am and or PM sessions. Register: This section allows the staff member to input the data to the online system. It is easy to follow and use as the user can simply place a Y to present a tick and an N to show a cross in the wanted box. This service allows a real time update to 3AAAs records which will be stored on Microsoft Azure protected servers. The live update allows 3AAA staff members to receive updates from all of the colleges across the UK at the same time to keep their records up to date. Report: The Report section shows a detailed report of a specifically chosen learner from the academy/college. A full term for the learner can be viewed and displayed with further options to edit from certain staff members. This section shows a column with how many days have been missed by the pupil as well as days present. Different students can be selected easily and various information can be seen about the learner such as guardians, student ID numbers and DOB. Student List: This section shows the current pupils of the staff member. Much like the report section, details and information about students are displayed. Information about students can be altered in the Edit tab as well as new students can be added through this feature. Other sections are available such as Download, Comments and Edit, however they are relevant to this investigation and a normal feature which is seen on many different sites. Conclusion: The Beta is still a work in progress however I believe I have achieved the desired design, functional and usability features requested by 3AAA. I have followed a 3AAA colour scheme to fit in with other websites and products promoted by the company. The prototype/demo of the online system can be seen above. Below is a further update to the online system after the Agile cycle was followed again. The project was cycled another three times to refine the sites functionality and aesthetics. The site has maintained many of the positive aspects of the beta and prototype however the site has been created to appear more user friendly and more professional. See shots of the site below. Mobile Access: The site can also be accessed via mobile devices. This is to make the function and use as simple as possible for the users and students. The teachers can use this feature too however it is primarily created so that the students can access it whilst in break out rooms or when they are first entering the college so that the register times are as accurate as physically possible. This will allow for reports to be sent back to head office as soon as possible so that there are no delays.   The mobile site uses a very similar layout to the browser version however it is slightly adapted to best fit the mobile browsers and thus make the function and design more accessible to the users and students. Below is screenshots from a mobile device showing the site loaded into a browser. Implementation: In this section I will look at the ways I can implement this service across the company. I must investigate the ways 3AAA currently distribute data and follow a similar path. Due to fact I have based the attendance system on a cloud based service there will be no need for software packs to distributed around which many attendance systems are based on. This process can be fairly expensive and the problem of 3AAAs hardware in their sites could cause a problem. The auditing process would also be very lengthy. This confirms that the cloud based platform may be the best way to go for the system. The service is well looked after by Microsoft as it is part of package. Another added perk in the service is that more server space can be purchased easily if the site ever needed expanding. Conclusion: This concludes this investigation into a new attendance system for 3AAA. I have covered the customers requirements, researched a service provider, developed a function able webpage to use as an attendance system and described the implementation procedure I plan to follow. The system has been designed to make the day to day function of signing in/marking the register easier for both the teachers and students. The website can be reached by both computer and mobile devices to make it as simple as possible for the students to access the site to sign in and use it. The register will be implemented gradually by using both Medias at the same time to ensure that it is working correctly before finishing with the paper and pen copies. This will ensure that accurate registers are still sent to head office and the users and students can be integrated into the system effectively. 3aaa have over 50+ academy sites around the UK with thousands of learners who attend on a frequent basis. This means that the system must be as full proof as possible to ensure an effective transition in the academies. The ease of use of having the system on the students mobile devices will ensure that the sign in process is as accurate as possible due to the speed in which the students can access the site through a mobile web page and log on. This process will allow for an accurate time stamp as the learners arrive to site as opposed to waiting until they were behind their desks to log on to the desktop site which would not be until after college had started at around 9:15 and would give a false reading. The system would also have all the information needed for students to contact the academy and individuals inside the academy. The students can use options on the site to report illness or and general absences. This can also be done through their mobile devices as well as a desktop browser. This will allow for staff at the college to know if a learner will be attending or not as soon as possible and will avoid any delays for 3aaa. Reference Screenshots: References: http://www.businessnewsdaily.com/6730-best-time-and-attendance-systems.html https://azure.microsoft.com/en-gb/services/sql-database/ https://www.syntaxismyui.com/taking-attendance-with-xamarin-beacons-and-microsoft-azure/ https://xamarin.com/ http://www.slideshare.net/kcsq8/kuwait-computer-servicesibatimeattendancebrochureen https://xamarin.com/download http://npifinancial.com/blog/pros-and-cons-digging-into-amazon-web-services/ http://geekswithblogs.net/hroggero/archive/2015/08/12/sample-pricing-comparison-2-amazon-aws-and-microsoft-azure.aspx Www.Google.com www.3aaa.co.uk  Ã‚