Monday, September 30, 2019

Comparing and Contrasting Country Lovers and The Secret Life of Walter Mitty Essay

These elements contribute to the short story’s effectiveness as author uses different literary forms and styles to connect the reader to the story. Style has many characteristics that help the author engage the reader such as; punctuation, the use of connotations, and culture. This is what helps the reader’s imagination take over, paint the picture, and get emotionally connected to the author’s story. In comparing and contrasting the two short stories of â€Å"the Secret Life of Walter Mitty† by James Thurber and â€Å"Country Lovers† by Nadine Gordimer you see the differences and similarities in style between the two authors. The culture, which is the common characteristics of a group or a region (Clugston 2010), is very similar in both stories since they are close to real life with the setting in the 1900’s. Both stories revolve around relationships and love. Thurber style is more imaginative then Gordimer which is defined by his use of connotations and punctuation, although both stories are very detailed when it comes to the characters and settings within the stories. In the short story â€Å"Country Lovers† Gordimer does a great job illustrating the setting, which is the time or place in which the action occurs (Clugston 2010). Gordimer provides details about the South African culture that allow the reader to understand the separatism and segregation the characters are living. The reader gets to feel what it’s like to be black in South Africa through the detailed descriptions of the loving conditions and treatment of blacks. The main characters in the story are Paulus and Thebedi. Paulus is the son of a farmer who was raised with the children of the black families that worked on his father’s farm. He falls in love with a black childhood playmate as a teenager but he understands that a relationship with her is forbidden. Thebedi is Paulus black childhood playmate who becomes his lover. The two begin a sexual relationship which results in a child being born. The theme, which is a representation of the idea behind the story (Clu gston 2010), is interracial love or forbidden love. The laws and culture of South Africa forbid interracial couples. Thebedi & Paulus are aware of the dangers of being together but choose to get involved anyway. As the story unfolds, Gordimer brings out the imagination of the reader through the use of metaphors, which is an implied comparison between one object and another that is different from it (Clugston 2010). An example of this is when Goridmer writes, â€Å"hidden by the mesh of old, ant–eaten trees held in place by vigorous ones, wild asparagus bushing up between the trunks, and here and there prickly–pear cactus sunken–skinned and bristly, like an old man’s face† (Clugston 2010). This allows the reader to visually paint the picture of where Thebedi and Paulus are at and what the scenery is. A common symbolism, which is something that has a literal identity but also stands for something else (Clugston 2010), that is used in â€Å"Country Lovers† is a tree. A tree can be a symbol for life, death, or immortality. This is a good match with the theme and plot of the story. The plot, which is a dynamic element in fiction, a sequence of interrelated, conflicting actions and events that typically build to a climax and bring about a resolution (Clugston 2010), thickens as both Thebedi and Paulus continue their love affair. Thebedi goes on to marry Njabulo, who is also black, and fails to tell Paulus of her marriage. At the same time Thebedi  also finds out she is pregnant with Paulus baby. When Thebedi gives birth to her daughter it’s obvious the baby isn’t Njabulo’s but he accepts her as it was his own. When Paulus finds out about the marriage and the child he becomes upset, why does he get upset, I believe it’s a sign of his love for Thebedi which ties back to the theme of forbidden love. The story takes an interesting twist, although the author never clearly states that Paulus killed the baby, it’s evident he did by the flow of the story. It’s up to the reader to understand the â€Å"why†, why would Pau lus kill the baby? Again, I believe the â€Å"why† ties back to the theme of forbidden love. Paulus has accepted that Thebedi will never be his wife due to society and the racial customs of South Africa. Understanding this he doesn’t want anyone to find out about the baby because interracial relationships are forbidden so he takes the extreme measure of killing the baby. One could also argue that he killed the baby out of jealousy and not wanting another man to raise his child. The story ends with Thebedi refusing to testify against Paulus in the killing of her baby. This shows that Thebedi has accepted her role in society as a black woman giving up any hope if a relationship with Paulus. Throughout the whole story Thebedi character is submissive to Paulus but the ending shows that Thebedi is also submissive to society by giving into social traditions and discriminatory behavior of South Africa. The short story of â€Å"The Secret Life of Walter Mitty† by James Thurber is written in a third person point of view, which occurs when the speaker is not a participant in the story (Clugston 2010). The form is limited omniscient, which is when the thoughts and feelings of only one of the characters are related through the narrator (Clugston 2010) that character is Walter Mitty. The setting of this story occurs in a city called Waterbury but the state is never mentioned or disclosed, one can assume its Waterbury, Connecticut. The main characters are Walter Mitty and Mrs. Mitty. Walter Mitty is someone who gets bossed around by his wife so he creates a secret life for himself. In his secret life he see’s himself as a powerful man who is admired by all, something he is not in real life. Mrs. Mitty is the bossy, nagging, overbearing wife of Walter Mitty. Thurber does a great job illustrating the relationship between Walter and his wife which many people can relate too, I found it very humorous. That takes me to the theme of the  story, which I believe is marriage. Thurber portrays a marriage where the husband is submissive to his bossy, nagging, and overbearing wife. A second theme could be masculinity since all of Walter’s dreams portray him as a powerful man who’s admired by all. The story is about Walter taking his wife into town to visit her hair dresser. Along the way Walter begins to fantasize to escape the reality of his real like. Thurber does an excellent job of engaging the reader’s imagination through each of Walter’s fantasy’s allowing the reader to vividly picture what Walter is fantasizing about. An example of this is during Walter’s first fantasies where he is commanding a hydroplane through a storm, â€Å"Rev her up to 8500! We’re going through!† The pounding of the cylinders increased: ta-pocketa-pocketa-pocketa-pocketa-pocketa† (Clugston 2010). The sound of â€Å"ta-packeta-pocketa† is just the cylinders of the car Walter is driving. Each one of Walter’s fantasies is tied to something that is specific to what’s going on in the story. As Walter drives past the hospital he starts to fantasize about being a surgeon. As the newsboy shouts about the Waterbury trial Walters fantasi zes about being in a courtroom. The Liberty magazine leads Walter into a fantasy about military dugout. Thurber does a great job of interweaving Walter’s fantasies with the surroundings of the story. The uses of symbolisms in â€Å"The Secret Life of Walter Mitty† were not used in the traditional literary forms. Instead Thurber ties in the symbolism of control and power in each of Walter’s fantasies by Walter showing bravery, no fear, power, fame, and a man with high ranking titles. Thurber does a great job of connecting and supporting the symbolism with the theme of marriage and masculinity. The use of this symbolism is to show how Walter feels about marriage, since Walter feels powerless throughout the story as his wife talks down to him. There are many differences and similarities in â€Å"Country Lovers† and â€Å"The Secret Life of Walter Mitty†. The first and most recognizable difference is â€Å"Country Lovers† is a tragic story with a plot that builds up along with way with romance, physical relationship, racial discrimination, pregnancy,  arranged marriage, murder, deception, secrecy, and acceptance of normalcy. While â€Å"The Secret Life of Walter Mitty† is a comedy with not much of a plot. Where they are similar, both are written in a third person limited omniscient point of view. Both had themes of love and marriage but were very different in how each played out. â€Å"Country Lovers† was forbidden love and arranged marriage while â€Å"The Secret Life of Walter Mitty† was love and marriage between a husband and wife. These literary elements contribute to the short story’s effectiveness as author’s uses different literary forms and styles to connect the reader to the story. References: Clugston, R. W. (2010). Journey into literature. San Diego, California: Bridgepoint Education, Inc.

Sunday, September 29, 2019

Investment of starhub

This report intends to highlight the current issues Startup faces and its impact on their earnings and share valuations. Tells industry in Singapore only has three players – Startup, Singlet and MI, thus, we would also look at Singlet and MI to aid in our analysis. In our report, we first use the SOOT analysis and Michael Porter's five forces to address Startup current issues as the issues identified would affect Startup future earnings. The majority of the threats that Startup faced is brought up by Singlet.Example, Singlet won the PL rights which results in a drop of subscribers for Cable TV for Startup. However, there are still opportunities to grow, from an example of reaping the benefits from the existing market. By using Michael Porter's five forces, we analyzed that the level of competitive rivalry for the industry is strong. The historical calculations reflect the current issues that Startup faced hence deriving with various estimated valuation of Startup's stock. The DuPont ROE approach gauges Startup's recent financial performance, in comparison with the other two operators.By putting all figures together, we saw that Startup ROE has always been the highest throughout the past few years in 2008 to 2012. Thus, we forecasted that Startup ROE will remain higher than its competitors. With application of various valuation models, we can examine the intrinsic value of Startup's share price and make assumptions and estimation. Thereafter, this value was compared with the current market price to determine if the share is worth investing in. After much computation, the intrinsic share price of Startup is higher than the market share price, thus, it was undervalued.Therefore, our group has decided to go forth with a SELL decision at the time of ululation. Contents 1 . About Startup Ltd 1. 1 . Company Background Startup Ltd, which started in year 2000, is the second operator in the Singapore telecommunications market. It is an info-communications company, providing a wide range of information, communications and entertainment services. Startup is a component stock of the Straits Times Index and the MASC.' Singapore Free Index. Startup drives a HASP+ mobile network to support its nationwide GSM network, and an LET network with connection speeds of up to Mbps.They also implement an island-wide HOFF network that carries multi-channel Cable TV services (including Internet TV, HDTV, and on-demand services) and high speed residential broadband services. They operate a widespread fixed network business too that provides voice, date and wholesale services. In addition, Startup tapped on Next Generation Nationwide Broadband Network to host advanced media-rich value-added services (Startup AAA). 2. SOOT Analysts on startup Ltd The comprehensive SOOT profile of Startup will provide the reader a detailed analysis of the organization's business structure and operations. 2. 1 . Strengths 2. . 1. First Mover Advantage Startup has a competitive adv antage over Singlet and MI with their cable television u to their first mover advantage into the Cable Television market. Being the first in the market allowed them to lock-in popular programs on exclusive contracts such as English Premier League (PL). Furthermore, Startup is the only cable TV that broadcast tennis channels, where subscribers are able to catch the entire top tennis events all year round. As long as having a Hub ID, subscribers can watch it on TV, or on laptops, tablets, and smartness via TV anywhere at Startup's website (Startup Bibb). . 1. 2. Products and Services Mobile Market Although Startup's market share standing is second in the mobile industry with 27. % in June 2012, their product offerings are very strong and competitive. Asinine News (2013) reported that Startup launched its High Definition (HAD) Voice technology in 4th March 2013. They are setting themselves apart because of its value added service in the 36 mobile network whereby the sound quality for l ocal voice calls will be significantly improved. This will encourage new customers to switch over and customer loyalty among the existing customers.This could lead to a revenue uplift of between 5-10%. Cable TV Market Startup monopolized in the Cable TV market between 2002 to 2007, until Singlet launched Minot in mid-2007. In order to stay competitive, Startup acquired many new channels. For instant, they acquired a new 24-hour Japanese entertainment channel in 2013 as there has been a lack of Japanese programmer on TV apart from Japan Hour (Straits Times Bibb). In order to tide itself from the loss of PL to Singlet, Startup's TV revenue still remain robust with other strong channels like BEEF Euro 2012.Statistics showed that ARPA increasing from $52 to $54 (Straits Times 2012). Startup is also the first to launch Lions as they see that there was much hype about local football after the Singapore national team won the last Suzuki Cup (Straits Times 20th). This shows that Startup is trying to increase the variety of channels offered and deciding what is to be shown on TV instead of allowing consumers to choose. 2. 2. Weaknesses 2. 2. 1 . Late-Mover Despite moving first into the cable television industry, Startup established itself much later than Singlet.Startup was incorporated on 1998 while Singlet on 1992. Therefore, Singlet already seized the biggest share of the pie and established a respectable name that is highly recognized by consumers. Where else Startup which is new to the consumers will require a longer time to infiltrate into the Tells market ND build up consumers' trust. In addition, Startup is a late-mover in LET rollover of G wireless data communications. Startup is expected to complete this project by the end of 2013. But by then, both competitors, MI & Singlet will already have nationwide LET coverage (Tells – Integrated Singapore, 2013).Singlet's fast and aggressive actions attribute to them being the Tells monopolist. 2. 2. 2. Global P resence Startup also have a smaller global presence as compared to Singlet who is the leading communications company in Asia. In the Superabundant Survey, Singlet ranks at no. 5 while Startup didn't even make it to the list. Being a global company also means that their bargaining power is higher and their geographic presence is stronger (Superabundant, 2012). Although Singlet's main market is concentrated in Singapore and Australia, they also have alliances situated in Indonesia, Belgium, India, Taiwan, Thailand, Philippines, and Honking.This means that Singlet will be less dependent on Singapore market due to their diversification as compared to Startup. 2. 3. Opportunities 2. 3. 1. Fiber Broadband Figure 2: Data taken from Business Monitor International 2012. Figure 3: Data taken from Business Monitor International 2012. The appeal of high- speed broadband services will lead to the decline of fixed line business and increase the use of value-added services such as Poop and PIPIT u sing the fiber line. The Next Generation Broadband Network based on FIFTH will deliver 1 Gaps speeds in 201 5 (Business Monitor International 2012).The growth momentum is expected to pick up in the next two years as operators persuade consumers to upgrade their existing broadband to the fiber technology. Towards the end of 2012, Startup's figures were made up of 439,000 residential broadband subscribers from 431,000 in June 2011. On he other hand, cable modem subscriptions declined from 696,000 in June 2011 to 655,000 in June 2012. This shows that there is a huge opportunity for Startup to reap from the Fiber Broadband Market. 2. 3. 2.Reap the Benefits from their Existing Market Figure 4: Data obtained from Singapore Telecommunications Report SQ 2012. Figure 5: Data obtained from GIGS 2012 Survey. As the Tells industry in Singapore is reaching saturation, the only way for Singlet, Startup and MI to grow is to increase the RAPID for each existing customer or to attract new customers from their competitors. Take for instance; there is an increase f only 0. 7% q-o-q and 4. 1% of y-o-y in Figure 4. The decelerating growth shows that the mobile sector is coming to saturation.Startup has to focus more on generating higher revenue from their existing subscriber base by migrating pre-paid subscribers to post-paid subscribers while sustaining the pre-paid subscriber growth by targeting foreign workers, low-income consumers and long-staying tourists with more attractive promotions. Also, Startup can gain more market share from their competitors as many Singapore are reported being unhappy with Singlet's customer service, reception and Minot slow start-up. MI's customers are also most dissatisfied as it was reported that their number of complaints increases every year from 6. % in 2010, to 9. 1% in 2011 and 16. 3% 2012 the GIGS 2012 survey. 2. 4. Threats 2. 4. 1 . Exclusive Rights to Sports Channel Figure 6: Pay TV dropped by 2% due to the loss of PL Rights. Taken from S tartup Annual Report 2012. Startup has a prevailing position in the Cable TV market due to a lack of competition for a couple of years. Thereafter, Startup's position was challenged by Singlet when they won the rights for PL from 2010-2013. Subsequently, Singlet won 89,000 subscribers in 2011 while Startup only added ,000 subscribers.Towards the end of June 2012, Singlet had 380,000 Minot subscribers while Startup had 543,000 subscribers (Business Monitor International 2012). The statistics will worsen the situation for Startup when it was announced that Singlet outbid Startup for the coveted rights of three more seasons of the English Premier League- 2013-2016. Singlet also aggressively acquired the rights for BEEF Europe League, BEEF Champions League, Series A, FAA Cup, and other prominent football tournaments. This will lead to Startup's customer base switching over to Singlet for sports channel. . 4. 2. Singlet Narrow It's Gap with Startup's Channel Besides losing the bid of PL to Singlet, Singlet's aggressive acquisition of content and customers will continue to erode Startup's market share in Cable TV. Singlet's Minot offerings have broadened significantly after it added 40 channels from Fox International Channels to its line-up on 1 Novo 12. With a new line-up of more than 130 channels, Singlet has substantially narrowed its gap with Startup (1 57 channels), diminishing Startup differentiation and dominance (Singapore Business Review 2013).Secondly, MIM TV service offers potentially slightly cheaper offer (10%) s compared to Startup because of the direct like-for-like cost analysis for both Tells company as a result of product bundling differential on content. If Singlet beef up channel varieties, aggressive sales tactics, and addresses the network quality problems on PIPIT, the gap between Singlet and Startup will narrow drastically. 2. 4. 3. Mobile Data Services Business Monitor International (2012) predicted that the mobile data usage is likely to in crease up to 25% or more of ARPA.This could be due to increasing investors for next generation technologies such as LET and HASP+, which would drive more emend for mobile data service. In response to the dramatic growth of the demand, operators would accelerate their investment in these technologies. Strategy Analytics (2011) forecasted that operators who invest early will see improvements in gross margins after 2014. As MI is the first Tells in South East Asia to launch a nationwide G LET network, it gained a competitive edge over the rest. For now, Singlet has 80% coverage in Singapore, and in early 2013, it will have 95% coverage (Singlet, 2013).Both MI and Singlet launched LET plans earlier than Startup which results in Startup lagging behind. Startup should accelerate their investment in the new generation LET and HASP+ infrastructure in order to prevent their subscribers from switching to other operators. 2. 4. 4. Sunset Industry Figure 7: Data obtained from Telecoms and Techn ology Industry Report in Singapore 2012. Figure 8: Data Obtained from Singapore Telecommunications Report SQ 2012. The fixed line business didn't experience much growth in the first two quarters of 2012 which is attributed to the operators' bundling strategy and consumers' preference of mobile and Poop.It is forecasted that in 2016, the AMONG could replace the fixed line arrive with Poop over fiber. As we can see from the market data above, the figure of telephone main lines has been forecasted to decline from 1. 407 in 2013 to 1,194 in 2016 while the mobile subscription is forecasted to rise from 8,648,000 in 2013 to 9,812,000 in 2016. Hence, Startup needs to offset this fading income (Business Monitor International 2012). In addition, there are lesser television viewers nowadays as they can download shows from the internet and they find that the free television programmer (Channel 5, Channel 8 etc) is sufficient.In the black market, there is also n illegal box whereby consumers ca n get all the channels for free. As Startup requires the installation of cable, so many people don't want to go through the hassle to pay for installation and ruin their existing outlook of their house. 2. 4. 5. Reallocation of Spectrum In 2012, there will be a proposed framework for the reallocation of spectrum for G telecommunication systems and service. With increasing spectrum available, it allows faster data transfer rates and provision of more innovative services (IDA, AAA). IDA will conduct a main auction that involves two bidding stages in 2013.The bid that Leeds the highest total value will earn the final assignment. Based on the bidding for PL, Singlet has been very aggressive because they have the spending power and ability to challenge Startup and MI head on. This would be a potential threat for Startup as if they are unable to win the bid; Singlet would have a larger quantity of spectrums thus withholding a better connection than the rest As a result, the subscribers fr om the other two operators might switch to Singlet as their prices are undifferentiated hence the only unique selling point is the quality of products (IDA, Bibb). . Porter's Five Forces Analysis . 1 . Competitive Rivalry The number of competitors will increase when new technologies are launched in this technologically complex market. They will compete for data intensive and high speed internet connection, hence heightening rivalry in the market (Industry Profile 2010). All three operators have three different markets to compete in such as Mobile, Broadband and Cable TV hence they can diversify their revenue sources. However, these services offered by the operators are fairly similar and this worsens the rivalry.Besides the three existing operators, Singapore also saw new players such as Supernatant and LAG Telecoms and Imperceptibly. Overall, rivalry in this market can be evaluated as strong. 3. 2. Threat of New Entry Figure 9: Data obtained from Business Monitor International â₠¬â€œ ‘Singapore Telecommunications Report SQ 2012'. Potential entrants will be enticed by the dynamic market growth of Mobile, Broadband and Cable TV market. However, they will find it tough to compete with these established companies- Singlet, Startup and MI due to price competitions.New operators without their own structure can buy entrance to the Tells market thus save the capital required to enter the market (Industry Profile 2010). Unfortunately, Singapore popular response for higher bandwidth might infer that the player needs to spend more to invest in the infrastructure for future growth. The saturated market indicates that the new entrants have to attract the customers away from their existing subscriber instead of targeting a new customer segment (Industry Profile 2012).If Startup wants to grow their market share, they need to create more value-added services such as High- definition video chat, Mobile TV. New entrants need to differentiate themselves from the existin g players with more attractive promotion plans, higher bandwidth or faster upload-download time. Take for instance, Imperceptibly enticed subscribers by promising not to bind the first 100,000 subscribers with contracts. By 2013, Imperceptibly boosted 17% market share of the fiber broadband consumer market within one year (Yahoo News 2013). Overall, threat of new entry in this market can be evaluated as strong. . 3. Buyer Power The key buyers are end-users. In this market, buyers have fairly low switching costs and are determined by the time needed to break the existing contract and switch to a competitor's contract or with a cancellation penalty. Buyer power is strengthened, especially since full mobile number portability (NP) was launched in June 2008 (Industry Profile 2010). Brand reputation may play a part in switching operators, but ultimately the price is a bigger consideration for buyers along with factors such as the quality of connection, speed of access and existing bundli ng benefits.Buyer power is weakened again due to the variety of potential customers available- individual customers, business corporations, foreign workers. With only three operators in the Tells industry, this translates into weak bargaining power of the errs as they do not have more choices to choose from. Moreover, in the broadband market, internet access is highly important for normal consumers and especially vital for business consumers. Overall, buyer power is measured as moderate in the Tells market. 3. 4. Supplier Power The key suppliers are manufacturers of software, hardware and network owners with substantial negotiating power.This market is characterized by strong supplier power because of the high cost of switching as exiting a contract prematurely can be challenging (Industry Profile 2012). If the operator own and operate their own hysterical network then their suppliers would be manufacturers of software and hardware such as Cisco Systems. If the operator does not pos sess the network and acquire wholesale access to the infrastructure thereafter offering it to the end- parties, then the key suppliers would be the network owners. Take for instance, Startup purchased Fiber broadband from Opponent or Startup's PL channel rights from PL itself.Network manufacturers are not completely dependent on the Tells Operators' market for their revenues as it's by contractual rights (Industry Profile 2010). Generally, supplier power is evaluated as strong. 3. . Threat of Substitute Substitutes to this market are virtually non-existent because there isn't any strong threat to Internet as a whole. The internet itself is a substitute for various services and products- egg, brick-and-mortar store to online stores. Overall, the strong market growth prevents any potential rivalry hence the low threat of substitution.

Saturday, September 28, 2019

Letter of Recommendation Essay

Very rarely people in teaching profession like me come across a student like gulshan Ramesh. This has been penned down by me to make it very concrete that Mr. Gulshan Ramesh is a very unique and exceptional character in the student community. My relationship with this particular student started when I handled a course on machine drawing for his batch of students. Moreover, Mr. Gulshan was under my guidance for a year fro improving his overall personality. All of this has given me enough opportunity to observe him very closely. My observations have been listed below for your reference. Attitude: Mr. Gulshan is blessed with the positive attitude due to which he has always excelled in academic activity and otherwise Character: This student is highly disciplined, sincere and has pleasing manners. Academic: Constantly Mr. Gulshan has maintained a high grades in academic. I’ll rate him in the top 5% amongst approximately 70 students in the class. Intellectual independence: Mr. Gulshan has the capability to complete assigned tasks with minimum guidance that makes him intellectually independent. Communication: This student is good both in oral and written communication. He has the capability to put across ideas very clearly both orally and in written form. Leadership: In team tasks, this student has always emerged as a team leader because of his sincerity and overall multifaceted personality. Computer literacy: Mr. Gulshan is well versed with the following auto cad, pro e Others: Creativity, individuality and hard work have been the style of this student that has always made him to shine. Mr. Gulshan will be an apt student to undergo a graduate program. I enthusiastically recommend Mr. Gulshan for the graduate program he has applied for in your university with full financial aid.

Friday, September 27, 2019

Confederatesin the Attic Essay Example | Topics and Well Written Essays - 1250 words

Confederatesin the Attic - Essay Example The American civil war happened over one hundred and sixty years ago, and is considered the deadliest war in American history. It pitied the southern states, where slavery was legal and northern states,who wanted to abolish slavery. It should be noted that the the southern side wanted to secede from the union. The southern states depended on black slaves to work on their large plantations, while the economy of the north depended on industries, at that time in history. In his travels through the south the memories of the lost cause are remembered and acted. Using humor and wit, the writer looks at the divines in America, several years after the end of the civil war, be it race, gender and class among others. The writer finds a problem with the way that the war means to the black and white people. This is clearly shown in the writers travels, where he encounters the case of two young men on the issue of what the flying the confederate flag means. In this case a black guy shoots another young man, because he is driving around town with the confederate flag. To the white people the flag is a symbol of pride, black people view it as a form of division along the racial line in America. The question here is whether some people use the flag as a way of showing one race being superior to the others or not. There is no denying that race remains a major issue in America today, not only in the south. The family of the white man who was shot is given money and honored as the last martyr of the confederate, shows how much the ongoing racial strife is , using imagery. The issue of race also comes into play, on whether we should look at the war from a defending the rights of the southern state or the rights of slave who worked in horrific conditions and led terrible lives. The question here is whether to take pride in the efforts of ancestors who wanted to fight in order to continue with slavery. The reason why black people view the war as meaningless is because millions of bl ack people would continue to live in servitude. On the other hand, white people see the victory of the North to have taken their right to having slaves work in their plantation. This obsession with reenacting, to be a way of escaping the past. The re-enactors in this book go through a lot in order to relieve the path of their ancestors who fought the great civil war. The south has very different lifestyles and heritages from the rest of the country. This explains the stereotypes towards the south. This region of the United States may be viewed by some as an area where people romanticize historical events and refuse to move on . An example of an old southern tradition is that of southern belles. This term refers to women from the south upper class, who possess certain lady-like characteristics and natural charm, though most people do not believe they still exist. In his book, Tony Horwitz travels through small museums, where he reportedly finds the minnie ball that transferred semen from a rebel soldier to the womb of a southern belle. Elsewhere, the writer befriends re-enactors, who literally live and breath the civil war in every possible sense. The main re-enactors that the author ended up being close to, and appears on the cover of the book, is called Robert Lee Hodge. They take the practice so seriously, so that just like actors they relieve every moment, just like it could have happened centuries ago. Some of the

Thursday, September 26, 2019

Employment law Term Paper Example | Topics and Well Written Essays - 750 words

Employment law - Term Paper Example Age discrimination can be experienced by all people of all ages but mainly between the older and the younger people mostly if the legal action is implicated for the older workers suffering discrimination. (Sargeant & Lewis, 2004, 87) Ageism encompasses a combination of institutional practices, individual attitudes and relationships Ageism and age discrimination are different from each other, as ageism is application of assumed age –based group distinctiveness to an person, regardless of individual‘s actual personal character. However age discrimination refers to the rough ‘age proxies’ in personal decisions in regards to selecting, hiring, discharging, promotion, transfer, training and mandatory training (Macnicol, 2006, p.3). The Age Discrimination in Employment Act (ADEA) 1967 in the United States is applicable for all apparent groups. The Government’s consultation document identified both the direct and the indirect forms of age favoritism in employment and most obvious forms is the person’s ability to work or to be developed in relation to their age. When the US government had approved (ADEA) act it became a major issue from 1967.The act declared that the older people should be promoted on the basis of the ability than on the age, excluded the subjective age discrimin ation in employment and also facilitate the workers in solving problems arising from the impact of the age on the service (Sargeant, 2006, p.1-5). B) Describe how the changing demographic will continue to effect age discrimination claims? Age discrimination affects the employees at the later stage of their life when many people are not able to put their best effort in the performance due to disability. ADEA in 1967 has abolished the discrimination in recruitment, transfer and compensation for the people aged from 40-64.The law was further amended in 1978 when the private organization employees can work up to the age of 69 and in 1986 the law abolished the compulsory retirement for age together. According to a study in 1997, the inhabitant non-institutional populace of ages from 16 to 64 had suffered from a poor physical, mental health that lased for over 6 months and this prevented the people in carrying out a job. Two types of demographics in respect to the working-age and disability are age and race. Disability in work rises with age and the proportion of black employees in work disability exceeds the proportion of other rac e and Hispanics. (Seagal, 2002, p.385)Discrimination is also done on the basis of race and national origin hat involves the employment actions like hiring, promotion etc. Religion can also affect the work culture if the employee practices his/her religion art work. Sex discrimination is also another issue that includes hiring only male candidates or o the basis of marital status and it also includes sexual harassment among the women. (Bruce, 2005, p.21) C) Discuss whether or not an employer can consider an applicant's or employee's age when making employment decisions? On the basis if the Age Discrimination in Employment Act (ADEA) an employer is prohibited to take decisions on the basis of age. Under this legislation an employer cannot force the employees to retire after a certain age, but it can apply seniority system that should not force an older workers leave the job. The law also includes all the list of employees to take a mandatory retirement like federal judges, pilots, enf orcement officers and executives with provision of pensions. (Duekar, 2000, p.118)The act is applicable in both the private and government organization and it can be unlawful if the management fail to abide by the following rules that are: a) if the employer rejects to recruit or discharge an individual with respect to the compensation, terms and condition on the basis of the age; b)to limit or segregate any employees and deprive any employees opportunities that affect the status because of the age factor, c) to reduce the wage or salary of the workers

The Role of Religious Accommodation at Workplace Essay

The Role of Religious Accommodation at Workplace - Essay Example In General, people in the modern world is spending most of their life time in offices and workplace is a significant environment in their life. The modern century is functioning at a fast space and everyone wants to perform their best at their workplace in peace with his inner self. An employee who keeps his religion alive can inculcate enormous ethics, moral and social values in him. In the same way religious accommodation are essential at work place as it increases the quality of job performance and productivity among employees. As per (Laderman) â€Å"Today, "religion" can mean anything at all, from the most personal and intimate spirituality for the individual to the most diffuse cultural activity in any given society†. Religious values increases work quality First when we think about religion, the most important factor that sweeps through our mind is the serenity and satisfaction it brings to the psyche and personality of an individual. As all know ,religion is the direct ion towards God and anyone engaged in this value is at peace .It is obvious that when the self of a person is at serenity he can bring forth vitality to his thinking and personal behavior despite of the environment he is in. Work place environment is mostly stress abandoned and employees undergo much complication and emotional disturbance, when they engage in work place. So it will be greatly benefited on individual basis if the organizations allot some time to the employees for religious practice. According to (TriNet)â€Å"A Gallup poll states that 90% of American adults say that religion is either very important or fairly important in their lives. And with that, arises workplace conflicts†. Frankly speaking, religious accommodation is important in workplace as it increases the confidence and mental balance of an employee which results in quality job performance and productivity. Only a spiritually evoked employee can regulate his behavior and thoughts and give out optimum potentiality to the organization he/she is working in .In an organization, there can be present people from various religious background. However when an employee engage in his/her religious practice , he connect with God and respect all religions and treat his colleagues with respect and humility. Religion can bring about conflict at work place and time management issues Religion indeed is an essential part of every individual’s life , but as there are different religion in world , the ideology and religious culture in a work place vary immensely. This fact can give rise to conflict among employees as their habit and behavior differ according to their religious concept and beliefs. This contradicting view among employees can lead to chaos and dysfunctional situation. When employees hold vengeance and unfriendly attitude among each other, the flow of business can be interrupted and this can create low quality work and unproductive situation in workplace Generally, failure and lockouts can occur in work place and dealing with this issue can create loss of time. When the employees of an organization hold various religious beliefs then the organization can work on a not unifying nature . This is because the employees on various level look at each other as opponent and enemies and they can feel like competing with each other to prove each one’s religion as the best. Such an atmosphere can dismantle the whole unifying environment of the organization.

Wednesday, September 25, 2019

Industry Analysis, Target Market, and Competition Analysis of Plastic Essay

Industry Analysis, Target Market, and Competition Analysis of Plastic Surgery Center in Morris County, NJ - Essay Example Plastic Surgery Center in Morris County, NJ is one of the most well-known centers in this region. The present marketing activity of Plastic Surgery Center in Morris County profiles as well as overviews industry and situational analysis. A comprehensive overview of the SWOT and industry on the whole give insights on marketing strategy to follow in order to retain existing and attract new customers, who would become regulars. Thus, the analysis identifies marketing problem and offers marketing focus, objectives, program as well as tactics for the marketing plan implementation. The final part provides information on evaluation and control of the marketing implementation. The Plastic Surgery Center provides beauty services to men and women. The main types of services are Breast augmentation, Breast lift, Breast reconstruction, facelift, liposuction, total body lift, Botox, laser skin resurfacing, chemical peels, different types of message, etc. Plastic Surgery Center surgeons pride themselves on superb-quality services with innovative and stunning technology that provide excellent value to the customers. Plastic Surgery Center has positioned itself as a provider of superior service and products to all clients at an affordable price in convenient locations appealing to all family members. The centre has managed to position itself on the high-end of the service providing due to high standards for its customers, who are specially trained for high performance and consulting (Black 44). The strategic focus of all companies in this industry is providing hairdressing services with the superior quality and value for the customers. Efforts are aimed at providing friendly, efficient service from professional surgeons who are well-trained doctors to make the experience memorable and provide for loyal customers. The efforts are incorporated with the Centre's mission and vision as well as with the corporate culture instilled in the team, which according to the company's belief are the things that can bring a big difference (Doyle and Stern 98). The Plastic Surgery Center vision statementis to be a great business that is based on principles of: Profitability Friendliness Creativeness Consistency Great Value Cutting Edge Community mindedness ("Practice Philosophy". 2009). The Plastic Surgery Center puts emphasis on its clients receiving a service of a great value. The goal of marketing campaign, thus, is to retain existing customers and attract new customers, who would become long-term regular loyal customers, by the means of primary services as well as pleasant additional elements, which range from prices to the superior professional and products in terms of provided services. Situation analysis provides an insight on the Centre's position within the industry as well as overview of competitors, customers, industry trends. SWOT analysis outlines Plastic Surgery Center key strengths and weaknesses as well as describes opportunities and threats that its salons may face (Plastic Surgery Center in Morris County NJ 2009). Strengths Established brand equity and name in the industry Strong and business committed franchisees Well-trained medical professionals with high standard skills and creative customer-focused approaches Convenient locations and physical evidence elements in the centres, which are located

Tuesday, September 24, 2019

Business Organizations Essay Example | Topics and Well Written Essays - 500 words

Business Organizations - Essay Example It is known that a creditor who has a claim against a sole proprietor has all rights to receive all his personal and business assets. It is called unlimited liability. The sole proprietor is allowed to run his business under his own name without any other words. Advantages: all profits are received by sole proprietor, relatively low start-up costs and capital, the greatest freedom from regulation, minimal working capital, tax advantages to owner of the business, owner has the direct control over the decision-making process. Disadvantages: unlimited liability, difficulties in raising capital and lack of continuity in sole proprietorship if the owner is absent for a long time. (Lucas 2002) Partnership is an agreement when two or more sides (persons) are going to combine their available resources in one business. Partnership agreement has to be signed with the assistance of lawyers, because in case of dissolution or disagreement the business should protect its shareholders or other partners. According to the agreement terms partners has to share in all the profits. There are two forms of partnerships: general partnership (all partners are personally liable for all debts and obligations) and limited partnership (some members are responsible for debts). (Adelson 2002) Advantages: easy formation, relatively low start-up costs, additional available resources of investments, possible t

Monday, September 23, 2019

Communication in the workplace Case Study Example | Topics and Well Written Essays - 750 words

Communication in the workplace - Case Study Example Communication can be defined as information transfer to receiver from sender under the condition of transmitted message being thoroughly understood by receiver. Business communication can be internal or external but in this study internal organizational communication shall be highlighted. Communication is ever changing and dynamic. It can be categorized into transmission of verbal and non-verbal messages. Trade union is representatives of employees and they should be able to effectively communicate their issues to management. Bad communication between top management and trade union in Maestro Fits has resulted into workplace conflict. The issue started off in 15th November when management had taken decision to close internal restaurant. 30th November had been decided as the closing date. However trade union president sent a letter to top management on 28th requesting shift in the date. The reason behind this was three employees were working there on a part-time basis. Top management replied that trade union would be given responsibility of structuring a business plan for the new restaurant and forming a new worker’s group. Since business plan was not developed by trade union so worker’s group proposed an idea of donating 2 convertible marks by employees per day. A voting poll was organized by trade union where 325 employees supported the donation idea, 188 were against it and 186 employees did not cast any vote. The results were then forwarded to working group stating that trade union shall not insist restaurant formation due to less than 50% of employees in favor of the idea (Ferrante, 2010). On the other hand, top management already had taken decision regarding decrease in employee’s salaries. This decision came into existence on 10th December 2013. The major reason behind this was lack of financial support due to no new business contracts. Trade union strictly opposed this decision. This case study problem clearly reveals

Sunday, September 22, 2019

PHP vs. ASP Scripting Software Research Paper Essay Example for Free

PHP vs. ASP Scripting Software Research Paper Essay ABSTRACT This paper examines the differences between the ASP (Active Server Pages) and PHP (Hypertext Preprocessor) scripting languages. Both ASP and PHP are scripting languages that can be used to create dynamic web pages which are capable of interacting and exchanging information with databases. ASP is a Microsoft product, and is used with Internet Information Server (IIS) which runs on Microsoft Servers. PHP was originally designed by Rasmus Lerdorf, and was later modified by various people. As a parsing language, PHP can run both on Unix and Linux servers, and also has a version that runs on an NT server. This paper also discusses the differences in cost, speed, integration of features, speed, additional costs, base language, database connectivity and Platform Compatibility between both languages. This paper also presents some suggestions offer recommendations as to when one of these languages should be preferred over the other, and how efficiency can be maximized in the usage of each of these scripting languages Introduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ASP and PHP are both website design scripting languages that are processed by backend severs like Apache Server and Windows OS. Apache Server is usually used for PHP and a Windows OS with IIS Server is used to process ASP scripted websites. PHP processed website scripts can also be processed by UNIX OS backend servers, while Window OS IIS backend servers are used to process ASP scripts. ASP.NET is part of the .NET Framework and is the core technology for developing web applications and XML Web Services. ASP.NET is a compiled, .NET-based environment; you can author applications in any .NET compatible language, including Visual Basic .NET, C#, and JScript .NET. Additionally, the entire .NET Framework is available to any ASP.NET application. Developers can easily access the benefits of these technologies, which include the managed common language runtime environment, type safety, inheritance, and so on. .NET developers write Web Parts using Visual Studio.NET 2003. The Web Part Framework is the basis for extensibility in Windows SharePoint Services. It allows developers to write custom components that plug into the SharePoint infrastructure by encapsulating web services and enterprise data as Web Parts. Web Part Pages are special ASP.NET pages which are the building blocks of a Windows SharePoint Services based data driven web site. Web page authors can use Microsoft FrontPage 2003 to leverage Windows SharePoint Services and use the Web Part Framework to easily build data driven web sites using a library of readily available web parts. Microsoft FrontPage 2003 integrates closely with Windows SharePoint Services and is the easiest and the most powerful web site design tool that enables creation of a new category of collaborative, scalable, data driven web sites. (http://www.sharepointcustomization.com/resources/whitepapers/webpartdocs/wp_asp_net.doc)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   PHP and ASP are the two best web technologies in use today. In their own ways, they have created trust and market for their product and development environment, although many people are of the opinion that PHP is an all around better choice than ASP.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to Anstey, â€Å"PHP belongs to a free software community and open source general purpose software which is very easy to use and correct its bugs from the community of developers around the world.† (Anstey 2003). ASP runs on an IIS server and is a free component with the Microsoft windows operating system. ASP offers various useful features like type safety, inheritance, and a managed common language runtime environment.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In a broad sense, PHP is scripting Language, while ASP.NET is a Designing Tool. Also, PHP contains mainly scripting tabs, with a minimum number of controls being used, while ASP.Net has a lot of controls to the designing process.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ASP.NET is a unified Web development platform that provides services necessary for developers to build enterprise-class Web applications. ASP.NET provides programming model and infrastructure for more secure, scalable, and stable applications. ASP.NET is a compiled, .NET based web environment developed in .NET compatible languages like Visual Basic .NET, C#, JScript.NET, etc. Additionally, the entire .NET Framework is available to any ASP.NET application. Developers can easily access the benefits of this technology, which includes the managed common language runtime environment, type safety, and inheritance.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   From many views and perspectives, PHP is an overall better choice than ASP. Although both ASP and PHP are languages used to build Dynamic Web sites that can interact with Databases and exchange information. ASP (Active Server Pages) is from Microsoft and is used with IIS (Internet Information Server) that runs on Microsoft Servers. PHP (PHP: Hypertext Preprocessor) is from Rasmus Lerdorf, who originally designed this parsing language which was later modified by different people. It runs on Unix and Linux servers and it also has an NT server version. (Pires, Halstatt 2005. ASP vs. PHP. Retrieved 18, February 2008 from http://www.webpronews.com/expertarticles/2005/12/22/asp-vs-php)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The foundation of all Web applications is that they deliver dynamic content over a protocol which by model is stateless. Most of the ASP.NET developments fall in client-server architecture programming model. Minimal points to be considered for a typical web application modeled as client-server architecture are given below. User interface and client environment (Page layout). Data verification, transfer and store. Security. Scalability, reliability and availability of the application. Optimized resource utilization and performance. Handling unpleasant instances gracefully. Navigation.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   PHP traces back to the development of Perl and C which emerged quite successfully as a result of the contribution of the various programmers around the globe and as a result of its being an open community. The various versions came out successfully through 1997 to 2004 where the features were added and successfully taken up to cater to the development paradigm of the large scale of internet users.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ASP came handy with Windows 95 with the features of IIS server installed. It was an established standard which takes into account the various databases into consideration and is based on the COM model. The various differences among PHP and ASP make sure that all to a good extent the feature are compiled and carries enough advantage to understand the loopholes and make sure that all the various utilities are enforced well. Differences between PHP and ASP   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   PHP and ASP depict a large array of differences in the form of various factors. Some differences between ASP and PHP include differences in cost, speed, integration of features, speed, additional costs, base language, database connectivity and Platform Compatibility. Cost   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As PHP is not singly owned by any individual or an organization, it does not require purchase before use. â€Å"PHP uses a database technology named MySQL for back-end support. MySQL is also available free of cost.† (DuBois, 2002). The hosting and deployment of PHP webpages into the Linux server is quite affordable and can be done with ease.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   â€Å"ASP is synchronized with the Microsoft Windows operating system and comes along with it, thereby bearing the cost of the operating system.† (Glass 2004) Moreover, hosting ASP pages over the internet is expensive and features like email, file uploading and other features are quite expensive at the same time. PHP is free, but ASP is not free. If you want to use ASP, you have to use IIS, and if you want to use IIS, you have to buy Windows. Traditionally, the cost of Windows has been high. Microsoft has been aggressively trying to reduce this factor but theyre hardly going to give Windows away for free. The cost of running an ASP-based website implies a full Windows server platform; development costs are higher, software licenses are expensive and speed, security and flexibility are all sacrificed. (Anstey, M 2003)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     To run ASP programs, one needs IIS installed on a Windows platform server, which is not free. PHP programs can run on Linux, which is free. Even the connectivity of the database is expensive in the case of ASP as MS-SQL is a Microsoft product that needs to be purchased. PHP generally uses MySQL, which is freely available.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Many of the tools used in PHP are free of charge and a lot of PHP code can be found in open source forums, because PHP is open source. â€Å"PHP also has inbuilt features like ftp, email from a web page and even encryption mechanisms but such features are not built into ASP, which requires some additional components. Therefore additional costs might be incurred for such components.† (Pires, Halstatt 2005. ASP vs. PHP. Retrieved 18, February 2008 from http://www.webpronews.com/expertarticles/2005/12/22/asp-vs-php) Speed   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In terms of speed, PHP is faster than ASP, because when the speed of PHP and ASP are compared, PHP would have the upper hand. â€Å"This is due to the fact that PHP code runs faster than ASP. Also, ASP is built on COM based architecture, which is an overhead for the server, whereas PHP code runs in its own memory space.† (Pires, Halstatt 2005. ASP vs. PHP. Retrieved 18, February 2008 from http://www.webpronews.com/expertarticles/2005/12/22/asp-vs-php) Integration with operating environments and databases   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   PHP makes sure that all the operating environments are taken care to its fullest capability and is compatible with Windows, UNIX, Linux, Solaris and others. Its platform dependency format makes sure that all the various compatibility with operating environments makes it quite viable in nature. PHP integrates with the databases like MySQL and others in a great fashion. â€Å"ASP on the other hand is compatible with Windows only and makes sure that Microsoft oriented databases like MSSQL server would be well integrated with it. For other database platforms it requires to download various libraries and components for integration and workability.† (Hull, 2002) Performance   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   PHP is an interpreted language and make sure that the interpreted nature makes it fast for getting the customization done. The memory requirement of the PHP pages is quite optimizable and runs very fast with the greater understanding of the various features. Database connections of PHP are also quite flexible and make sure that all the various database functionality like stability, transactions, replication, triggers and stored procedures are handled quite well (Merrall, 2000).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ASP on the other hand is a compiled language and the software glitches are quite often not corrected or take a long time to get it done. The compiled nature makes sure that all the various factors like throughput and response time is quite low for the hosted pages. Its exclusivity with Microsoft windows operating system makes it platform independent with regard to various hosting and access problems. PHP offers the best integration of speed and performance, and ensures that all the various promises are met for catering to the web development. ASP is most suitable with the Microsoft platform and makes sure that all the features are captured and managed for the various services. (Zhang, 1999). Base Language   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ASP has a type of syntax that resembles Visual Basic, and is closely related to Microsoft products. In contrast, PHP is based on the C++ language, and the syntax used for PHP looks a lot like C/C++ programming syntax. â€Å"C/C++ is still considered the best programming language by many programmers and people who love this language would surely feel more comfortable with the syntax of PHP.† (Pires, Halstatt 2005. ASP vs. PHP. Retrieved 18, February 2008 from http://www.webpronews.com/expertarticles/2005/12/22/asp-vs-php) Enhanced capabilities and compatibility   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   These include file transfer programs and utilities, compression of data, uploading of files, integration of XML an MD5, encryption techniques and email facilities are not included in ASP, even if it does it requires the support of large third party packages installed, which are very easily integrated in PHP. PHP.net (2008) mentions that complex functions like dynamic images, IMAP, SNMP, dynamic flash, PDF, native access to Oracle, Ovrimos, Postgre, Sybase, mSql, MSSQL, Ingres, Interbase and Informix databases, LDAP, and sockets and many others are easily integrated with PHP, â€Å"however it would create a big problem with its integration with ASP. PHP is compatible with various web servers for its functioning however ASP requires it to be easily integrated with only IIS and PWS† as explained by Pires (2005).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   PHP programs can run on various platforms like Linux, Unix, Windows and Solaris whereas ASP is mainly associated with Windows platforms. However, ASP can run on a Linux platform with ASP-Apache installed on the server. PHP is based on C++ language and the syntax used in PHP is quite similar to C/C++. C/C++ is still considered the best programming language by many programmers and people who love this language would surely feel more comfortable with the syntax of PHP. ASP on the other hand has a more Visual Basic kind of syntax that again is closely related to only Microsoft products. So, it depends on the individual, and which language he or she is comfortable with.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For Database connectivity, PHP is being extremely flexible, and can connect to various databases, the most popular being MySQL. ASP mainly uses MS-SQL for databases. Conclusion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Although both ASP and PHP are good web server end languages for web development, there are some differences between them that should be considered to ensure that factors like cost, installation, performance, and compatibility issues are economized to the full extent. Both languages have advantages specific to various users. Some would argue that both languages have their own importance, and usage of either ASP or PHP depends on the users requirements, the language and the platform in use. â€Å"If a user is looking for some e-commerce application development then ASP is probably the ideal choice. This does not mean that PHP cannot provide e-commerce solutions, but a lot of people tend to choose ASP in such instances.† (Pires, Halstatt 2005). If we talk about developing a discussion board then ASP is equally capable but some people feel that the best discussion boards are developed using PHP.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   While PHP offers the best integration of speed and performance, and ensures that most web development requirements are met, ASP is most suitable with the Microsoft platform, and enables features to be captured and managed for various services. References Anstey, Marty (2003). PHP vs ASP. Retrieved 19, February 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://marty.anstey.ca/programming/php/articles/ An Architectural Introduction to Web Parts and ASP.NET A Microsoft ® Office FrontPage ®   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   2003 White Paper. (Retreived from   Ã‚  Ã‚   http://www.sharepointcustomization.com/resources/whitepapers/webpartdocs/wp_asp_net.doc Argence d Ricardo (2008). Web Hosting, PHP vs AS.P. Retrieved 18, February 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://articles.topofhosting.com/web-hosting-php-asp.php DuBois, Paul (2002). MySQL Cookbook. OReilly, October 2002. Glass, Michael (2004). Beginning PHP, Apache, Hull, Sean (2002). PHP vs. ASP.NET Redux. Retrieved 18, February 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.oracle.com/technology/pub/columns/hull_php2.html Merrall, Graeme (2000). PHP/MySQL Tutorial MySQL ® Web Development. Wiley Publicizing sons. ISBN: 0-7645-5744-0. PHP.net (2008). See: http://www.php.net/manual/en Pires, Halstatt (2005). ASP vs. PHP. Retrieved 18, February 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.webpronews.com/expertarticles/2005/12/22/asp-vs-php Zhang, Ying (1999). Web Database Step-by-Step Guide.

Saturday, September 21, 2019

Internet Threats and Security for Protection

Internet Threats and Security for Protection Introduction Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major issues to most businesses and organisations in Saudi Arabia. Media hype surrounding the topic of Internet security can scare the general public, as the novice users. The continual talk of the latest virus alerts, which have corrupted thousands and stories of teenagers hacking into networks and stealing numerous informations such as personal details, credit card details other details which relates to different institution, is enough to put anyone off the idea using their personal details over the Net. All this media hype needs to be addressed to see if it is just that, or is there a ground for all this sensationalism. The chances to actually undergo extensive research and establish leads and ideas that I have not come across before about Internet Security, it is a major challenge for me and I feel that by conducting this research it will broaden my knowledge about Internet Security and also make people understand the aspects of Internet Security which they havent come across before. Abstract This dissertation looks at the question: ‘Is The Internet Secure?. Where secure is defined as ‘secure enough to trade or pass information via the Internet. With the constant media hype of Internet Security, it felt that this title to be one of interest and appealed. Therefore, research include, determining what types of organisations are present on the net, and categorising them into several groups. Studying past literature to determine all possible threats on the Internet and then to discuss possible solutions to these threats. As society is in the information revolution, in which the Internet is the main channel for distribution, this area of research is related to each and every one of us. Internet trading is a common practice amongst the new age. However, this is a subject that needs to be addressed to see whether all this ‘Media Hype is just that, or is their just grounds for concern. With the number of users on the Internet growing daily, and businesses becoming completely dependant on technology, serious issues of vulnerability need to be looked at. To ensure that no gaps appear in the security aspects of Internet, which will in turn trap the new users. Conclusions where made by in viewed and researched based companies. This research aims to provide the reader with a deeper understanding of Internet Security. The Internet is a medium that will be a part of future generations, and it is paramount that it is managed correctly and to ensure it does not have devastating consequences for those involved in its operation. The research carried out draws the conclusion, that the Internet is not a secure for trading, and that a regulatory body is required or a more structured policing. Therefore more actions from organisations are needed as well as from the government. Future research can concentrate on data recovery methods, application methods and interviewing in more depth and on a longer scale. Acknowledgement Chapter Outline Chapter1: The introductory of this chapter starts with the definition of I.T security. It follows on with what the aims and objectives are and the methodology followed during the fact finding exercise. The chapter outlines the scope and the limitations of the project. Chapter 2: This chapter describes how the internet was formed and how it has developed. Finally it highlights the key developments of the internet throughout its early life cycle, and the growth of its user base. Chapter 3: Defines the types of businesses that trade on the net categorising them into several divisions, which are further explained in the appendix. This chapter also talks about on-line banking and how to purchase over the Internet. Chapter 4: Starts by discussing the potential threats of viruses, how they work and how they spread. It also discusses what different authors believe to be the main threats of the Internet. It also talks about all the potential threats and briefly defines each one. Chapter 5: Discusses the potential answers to the security issues, broadly discussing all of the security applications available. The chapter introduces computer security as well as the different application. Chapter 6: The fact finding stage highlights the responses gained from the organisations, which were interviewed. The findings were incorporated into graphs to illustrate the answer. Chapter 7: To conclude this study, the author discusses what the project aims were, how the findings were achieved and why came to this conclusion. A SWOT analysis was also carried out to assist the conclusion. Appendix: Any information that did not fit in the thesis, which the author felt important, is included in the appendices. There are also other documents and information, which has been referenced in the dissertation in the appendices. I.T security as defined in this dissertation is the practices, procedures, applications and services which ensure a security breach or loss of use of a computer system does not occur. Security provides protection for IT system resources from human action. The security products, services and procedures used will aim to protect any hardware or data in the system. 1 Introduction Media hype surrounding the topic of Internet security can scare the general public, as the novice users. The continual talk of the latest virus alerts, which have corrupted thousands and stories of teenagers hacking into networks and stealing numerous informations such as personal details, credit card details other details which relates to different institution, is enough to put anyone off the idea using their personal details over the Net. All this media hype needs to be addressed to see if it is just that, or is there a ground for all this sensationalism. 1.1Human Action Human-inspired security breaches are defined as accidental or deliberate, passive or active attacks, which result in the loss or damage of I.T system hardware, software or data. This can come in many guises, as the following shows: Viruses where a program is placed on a system with the intention of corrupting its processing. The theft of data. Hacking deliberately gaining unauthorised access to a computer system. The invasion of privacy, through the unauthorised disclosure of data and breaches of data protection legislation. Sabotage interfering with the processing of a system, such as the placing of a ‘clone machine. 1.2The Key areas of I.T Security I.T security involves a number of key areas. The most important of these are introduced under the following headings. 1.2.1 E-Commerce E-Commerce (Electronic Commerce) enables measures to secure web merchants sites from external hacking and intrusion, with the aim to develop secure online transactions. E-Commerce requires the means to engage in electronic transactions without the fear that credit card details and bank details could get into the wrong hands. These involve, for example, the use of secure payment servers and secure software servers. 1.2.2 Network Security The aim of network security is to create a secure environment in which the users can send classified information and business applications solely to those people that they wish to receive them, preventing others from accessing the data. This is an issue of increasing concern, given the growing importance of networks to companies. This aspect of security tends to resolve around using network management and security software tools, and developing network security policies. 1.2.3 Virus Protection To prevent computer viruses from infecting I.T systems, companies use anti-virus software and alert systems. The requirements for information security as well as the type of products and services used to have undergone a major transformation since 1995. The need for security has widened, where traditionally it was confined mainly to governments, protecting classified data, financial institutions and protecting messages with monetary value, today most medium-sized to large organisations require information security. The growth of computer networks, group working and mobile working, and the subsequent need to communicate with contacts outside the organisation, has made I.T systems more open to external forces and more vulnerable to internal action. Today, security is demanded to handle communications through the internet, intranet, extranet and Virtual Private Networks (VPNs). All of these technologies use common, standardised networking protocols and such networks are exposed to greater security threats than before. In a modern computer network, employees share information with each other, and companies share information with their suppliers, partners and customers. This calls for a more sophisticated security system, which is more comprehensive and flexible than the products and services used in the past, and which can be deployed to a large number of users in a consistent, manageable and secure fashion. 1.3 Aims and Objectives Introduce and provide an overview of the development of the Internet. How it was started and how it works. Identify the diverse nature of businesses that trade on the Internet, their roles and their functions. Identify and disseminate the literature available on threats inherent in the use of the Internet including viruses and secure transmission of data. Identify and discuss the appropriate solutions for any potential threats for internet security. Evaluate and conclude the arguments, to discuss potential ways of enforcing a suitable security policy for web-based companies. 1.4 Methodology Information for this study was gathered from journals, books, Internet sources and certain company documentation pertaining to Internet security. The best form of methodology for this type of research would be to use Quantitative and Qualitative analysis as well as the use of secondary sources, as mentioned. Quantitative research was used to gain rich information, basically finding out the ‘experts opinions from the relevant areas of expertise, for the research. The qualitative research consisted of a questionnaire with open ended and some closed questions. The main aim of this questionnaire was to elaborate on the authors literature review, basically agreeing or disagreeing with the literature presented on this study. For the quantitative aspect of the research a short structured questionnaire was designed, this consisted of closed questions, which would give a statistical look to the fact-findings chapter. This questionnaire was distributed in Preston and Jeddah (Kingdom of Saudi Arabia). Closed question questionnaires were used to obtain the awareness of the issues presented, to gain views, beliefs and attitude to these. The questionnaires were designed to ensure easy reading, therefore overcoming any confusion on the respondents behalf. Questions were explained to ensure comple te reliability in their responses 1.5Limitations and scope of Dissertation As Internet Security is a very large topic, this author has limited his research to the following: Types of businesses on the web, categorising them in several areas. Discussing threats that past authors identified. Discussing possible solutions to these threats that past authors identified. Carrying out a first hand fact-finding excersing to either agree with the literature or disagree. Setting out the key differences. Summarising the thesis and presenting the findings. 2What is the Internet and how it started The revolution in computer networking has made it possible for personal computers able to communicate with each other. This chapter is about the Internet and basically a history of its beginning. It provides a comprehensive view of literature regarding factors that promote e-commerce and aid the new era of online banking. The scale of the Internet is awesome and therefore more and more people are connecting to the net. Statistics continues to grow on a daily basis at an alarming rate. People from all walks of life, not just the scientist, teachers and computer experts use the Internet. 2.1Origins of the Internet The Internet has its roots in a network set up by the United States Department of defence in the early 1970s (Ellsworth 1994). This network (ARPANET) was a collection of four computers. By 1996 the Internet was a collection of over 50,000 networks. The methods they slowly developed included a ‘Protocol (which is a computer language) allowing dissimilar computer systems to communicate, and a method that routed data through multiple communication paths using groups of data with their own destination addresses built in packets. Prior to this technology, even with machines that were compatible, the used had physically carry magnetic tapes and insert them into another machine in order to transfer data from one computer to another. With the new technology, a computer simply has to put its data into envelope called an Internet Protocol (IP) packet, and ‘address the packet correctly to send a message on the network. The philosophy was that every computer on the network could talk to any other computer. 2.2NSF Developments In the late 1980s the National Science Foundation (NSF), started expanding its own NSFNET using the technology developed by ARPANET.†(Krol 192). Five supercomputer centres at major universities were created, and connections were used for e-mail, and for transferring data and information between sites. This created a communications problem, they needed a way to connect their centres together and to allow the clients of these access. â€Å"In response, the NSF built its own network based on ARPANET Internet Protocol (IP) technology. â€Å"(Eraase 1994) it connected these centres with telephone lines. Since the telephone lines were paid for the mile, it was obvious that each university could not be connected to a supercomputing centre, due to financial constraints. They instead created regional chains of networks, with each university being connected to its neighbours, at the top of this chain there was a connection to the super computer. Eventually any computer was able to communicate with any other computer by forwarding the conversation through its neighbours. 2.3Internet Created The NSF agreed to commercial exploitation and on-line service sprang up. â€Å"CompuServe, the first of these, started in 1970 and fifteen years later claimed 3.2 million users in 20 countries. It was part owned by commercial relationships with the German group Bertelsmann and the French group Hachette† (Winston 1998). Prodigy belonged to IBM and Sears claimed 1.4 million users. His ‘World Wide Web was open for business in 1992. Meanwhile a commercial Internet Exchange had been established in 1991. Large multinational corporations have been on the Internet for years, although their access has been limited to research and engineering departments. In 1992, many of the restrictions on commercial use began to change. In fact, there are already more commercial sites on the Internet than educational and research sites combined, according to statistic, commercial addresses now comprise of 51% of the network domains. The Internet is made up of over 25,000 networks that can transfer data via many routes. However, it is near enough impossible to pin down any exact numbers concerning its size due to the fact its growth is unparalleled by any other industry. Ghosh 1998 states that the Internet has been adopted faster than any other technological development. 2.4The use of the Internet Between 1993 and 1998, more than 100 million users of the Internet were estimated, and the number of sites of the WWW has grown from 130 to 4.3 million sites. As of June 1999, the Internet users population has been placed at around 170 million people. It has been forecasted that the number users will reach 350 million by 2005 worldwide. In simple terms, the Internet allows millions of people all over the world to communicate and to share. â€Å"The Internet is the first global forum and the first global library† (Hahn and Stout 1994). Commercial businesses are the fastest growing segment of the Internet, you can gather information communicate and actually transact business on the Internet. Here are a few reasons why businesses are using the internet: E-mail is a low cost method for maintaining communication at all levels. Messages can be exchanged in minutes. E-mail is a domain for sharing information and is said to be one of the most important productivity packages around. The Internet allows businesses to be in touch with different branches and work teams at other locations. This creating a virtual community in which people are able to communicate on a daily basis. Using the Internet many organisations are able to bring a global edge to home grown businesses. For many companies, the use of the Internet creates a level playing field; smaller businesses can create an image on the network to compete with larger businesses. â€Å"Many corporations use the Internet to keep a check on the rate of emerging and new technologies, and the market response to these technologies† (Ellsworth 1994). The public information and discussion groups available on the Internet provide insight and feedback that is hard to get in any other manner. Here people from all levels of industry, exchange information on marketing research and technological developments. Having the most up-to-date information about your markets and your products allows you to keep or increase your competitive edge. In a business where the concept of getting closer to the customer prime, the internet is becoming increasingly important as well. Internet sales, where customers are sought and served on-line through Gophers and variety of virtual storefronts, are also becoming more popular. Customers can be and are sought before the sale and supported after sale. Companies are able to do actual product sales transactions on the Internet. In addition, in some cases it is possible to deliver the product via the Internet, as with software and information. Many companies have been using the Internet for the transmission of data. The major financial institutions in the world use the Internet extensively for exchanging information and files. Corporate users are now responsible for the transfer of the largest portion of data. 2.5The World Wide Web â€Å"The WWW is the newest information resources to the Internet† (Krol 1992). It is based on technology called Hypertext Mark-up Language (HTML). Hypertext is a method of presenting information where selected words in the text can be expanded at any time to provide other information about the word. These words are actually links to other documents, which may be text, picture or sound format. The presentation of information on the web is much friendlier that traditional methods and the interface provides for a user -friendly environment. â€Å"The combined with the ability to use any of the Internets tools within the web has been a catalyst for the rush to get on the Internet† (Ellsworth 1994). The WWW can be defined as a global, interactive, dynamic, cross platform, distributed, graphical, hypertext information system that runs over the Internet and is available globally (Lemay 2000 Online). In the early 1990s the advent of the World Wide Web on the Internet represented the tuning point for electronic ecommerce by providing an easy to use technology solution to the problem of information publishing and dissemination. The web made electronic commerce a cheaper way of conducting business and enable more diverse business activities. The WWW infrastructure is built around the following:- Web sites: A web site is a collection of web pages maintained by a college, university, government, agency, company or individual. Web age: A web page is document on the web. Web pages can include text, pictures, sound and videos. Web server: A web server is a computer connected to the Internet that makes web pages available to the world. The Wold Wide Web is a dynamic structure, and due to the popularity of this new phenomenon it is expanding rapidly. The reason for it being so popular is the fact that information can be made available to anyone anywhere in the world in a matter of minutes (Kalakota, Whinston. 1997 p.145). What types of businesses are trading on the web Business is changing. The way we do business is changing. The electronic commerce revolution is upon us, and perhaps represents the greatest single change to the way in which business operates. Companies of all sizes are now working together to establish their position and create opportunities in this world. The Internet phenomenon has result in a major shift in the way organisations do business, and how they intend to proceed in the future. Many organisations now realise that without an e-commerce strategy they will not survive. This realisation has affected, and will continue to affect business relationship of all sizes. E-Commerce E-Commerce (Electronic Commerce) is the buying and selling of goods and services on the Internet, especially the World Wide Web. In practice, this term and a newer term, e-business are often used interchangeably. For online retail selling, the term e tailing is sometimes used. E-Commerce can be divided into: E-tailing or â€Å"Virtual Storefronts† on web sites with online catalogues, sometimes gathered into a â€Å"Virtual mall†. The gathering and use of demographic data through web contacts. Electronic Data Interchange (EDI), the business to -business exchange of data. E-mail and fax and their use as media for reaching prospects and establish customers (for example, with newsletters). Business-to-Business buying and selling. The security of business transactions. Electronic messaging technologies streamline business processes by reducing paperwork and increasing automation. (Kalakota, Whinston. 1997 p.54). E-Commerce today, is a very wide area of study due to its phenomenon growth and thus, can be described as an umbrella concept, which will continue to grow. Therefore incorporating a variety of disciplines and can be described as following path of a hierarchical structure. Recent technology has increased the capacity of e-commerce transactions, resulting in noticeable paradigms in a number of daily transactions. There are unforeseen benefits not only to businesses, but also consumers, the government and even on a global trade level. The technology that is responsible for taking e-commerce to a global stage is the Internet. There are also other factors that have affected the growth of e-commerce, for example, the availability of hardware at affordable costs, as well as the increased power and ease of use of operating systems and software. With the prices of computer hardware and network equipment falling, e-commerce is seen as one of the strategic investments in line with marketing goals of most business, to stay competitive, improve productivity and to deliver quality services. Commonly, e-commerce is associated with the buying a selling of information, products and services via computer networks. It is also known as the paperless exchange of electronic information, whether it is by electronic data interchange (EDI), electronic funds transfer or other similar technologies methods. Overview of E-Commerce E-Commerce, evolved as early as the days of Alexandra Bell, followed by the launch of terrestrial television and radio communications. However recent developments in technology have increased the efficiency in commerce and have placed e-commerce under the spotlight. During the mid 20th century, the channels through e-commerce took place were telephone networks, the television and the radio. In their infancy they impressed businesses and consumers, so did EDI in the early 1970s and now at present the Internet has bought back the same feelings. Below is an illustration of a generic framework for electronic commerce (Kalakota, Whinston.1997) The figure 1 below is an illustration of the e-commerce overview. Electronic Commerce B2A B2C C2A B2B The Internet Telephone Fax The Internet Telephone Fax Cable Satellite, and Digital TV Telephone Fax The Internet including EDI, marketing, purchasing and e-mail Collaborative Work Groups EDI via Internet Telecomm uniting Electronic Funds Transfer E-Mail Video Conferencing Telephone Fax Figure 1 Types of E-commerce E-commerce covers five main categories that are listed below: Business to Business (B2B) Business within Business (BWB) Business to Administration (B2A) Consumer to Administration (C2A) Business to Consumer (B2C) These are discussed in detail in Appendix 3 titled Types of Web Traders. The introduction of e-commerce has facilitated consumer to business transactions, customers learn about products through electronic purchasing. From a consumer perspective electronic commerce facilitates for the following: Social Interaction. Electronic Commerce enables consumers to communicate with each other through electronic mail, video conferencing and news groups. Personal Finance Agreement. Use electronic means to manage personal finance and management using the online banking tools Purchasing Products and Information. Allows consumer to find online information about exiting and new products and services. (Kalakota, Whinston. 1997 p.139) The explosion in Internet traffic has created other problems. Mostly worryingly, there are continuing fears that many companies offering financial services online are not providing a secure environment to clients and customers. Purchasing on the Web The Internet and the World Wide Web have dramatically changed the way consumers seek and use information online. Whether they are shopping for Information or shopping for goods and services on-line, todays consumers must learn how to manage the resources (Kelley, B Weibke, J. 2003). Most attention on e-commerce has focused on business-to-business transactions and analysts say the surging electronic business-to-business market is about to explode. On-line purchasing systems promise to streamline operations, save time and cut the costs of businesses drowning in order processing. Most buying over the Internet focuses on indirect materials, also known as non-production goods or maintenance, repair and operations. Typically, such applications let any employee order through managed access rights, non-production supplies and service from an on-line catalogue using on a web server. They simplify the process of buying day-to-day items such as office equipments, PCs and other electrical goods to run the company. According to a recent study carried out by Forrester Research (2000) has suggested that the on-line commerce will raise form  £657 billion in 2002 and reach the figure of  £6.8 trillion in 2004. The statistics suggested that more customers are shopping day by day and revenue is increasing for on-line shoppers. The view is supported by Swazey (1999) who believes that the on-line shoppers spend more time on-line shopping than normal high streets shoppers and the amount of money spent rises with the amount of time spent on-line. The view point of Swazey (1999) is similar to Ghosh (1998) as he states that the â€Å"On-line shoppers tend to get carried away within the comfort of their own h ome†. However the above viewpoint have contrast in bearing to an article (Computer Fraud Security, Sept 2000, p.2) that seemed to suggest that although it may seems like everyone is on-line, but its not true. Internet Banking Internet Banking is no longer a novelty. Banks have long ceased being worried about trading via the web, and instead have embraced the newest delivery channel with enthusiasm. All clearing banks, including the connected building societies, now offer Internet based banking services and all will have an online current account in place. Some, including Barclays, Woolwich, Abbey National and HSBC have developed other channels of delivery including digital TV and mobile phone banking service. All e-banks promise busy current account users speed and convenience. There are no counter queues in cyberspace and e-banks are open 24 hours a day, seven days a week. On-line banking customers can check their balances, view recent transactions, transfers funds, set-up standing orders and direct debits and also option to pay bills on line. In the past, the banking industry was chiefly concerned with asset quality and capitalisation, if the bank was performing well along these dimensions than the banks would be profitable. Today performing well on asset quality and capitalisation is not enough. (Kalakota, Whinston.1997 p.30) The Internet is a medium that provides a new dimension and introduces much opportunity especially for banks; the main advantages are outlined as follows: Enable innovation Cost savings Increased customer base Enable mass customisation Marketing and communication Developments of non core business In a report issued by the BE Agency (2000), it states that the experts believe that the slump in high street banking due to deregulation can be revived by this new medium e-commerce, offering the potential of reviving or at least halting the decline, by raising customer service standards, increasing the choice of retail financial products, reducing the charges and giving customers a more convenient way to manage their money. It is agreed with Patterson (2000) that the banks will have to go online, his reasons being as to why banks have to adopt this new medium is â€Å"in short answer to win over new customers† it is easier to leave it at that, but also the factors he has also said that it will also promote this new medium are lower cost of account servicing, cross selling opportunities, customer relations and because they have to. Customers can now deal with their accounts personally at any time from anywhere in the word for any reason. Customers can also have the same facility to compare and contrast the products and services of a multitude of banks and choose one that meets their requirements. Knowing how safe is it to use the website an

Friday, September 20, 2019

Unraveling of Myths in Porter’s Old Mortality :: Porter’s Old Mortality

Unraveling of Myths in Porter’s Old Mortality â€Å"There was a kind of faded merriment in the background, with its vase of flowers and its draped velvet curtains, the kind of case and the kind of curtains that no one would have any more. The clothes were not even romantic-looking, bur merely most terribly out of fashion, and the whole affair was associated, in the minds of the little girls, with dead things: the smell of Grandmother’s medicated cigarettes and her furniture that smelled of beeswax, and her old-fashioned perfume, Orange Flower. The woman in the picture had been Aunt Amy, but she was only a ghost in a frame, and a sad, pretty story from old times. She had been beautiful, much loved, unhappy, and she had died young.† (173) Porter uses this second paragraph from Old Mortality to suggest themes and foreshadow future happenings in this story. This passage, which focuses exclusively on the background of Aunt Amy’s picture, is full of language suggesting the outdated feeling of the photograph. Phrases like â€Å"faded merriment,† â€Å"the kind of [things] no one would have any more,† â€Å"most terribly out of fashion,† â€Å"associated†¦ with dead things,† and â€Å"old-fashioned† lend the picture a sense of falseness that only time has exposed. This falseness seems to hint to the reader to be wary of accepting things as they are given. The way that the girls seem to find everything in the photograph to be dated and out of fashion also foreshadows Miranda’s inability to identify with the myth of Amy. It may also point to a larger theme of the crumbling ideal of the Southern Belle and the slowly collapsing walls of the rigid confines of the role of uppe r class, white women. The narrative can be seen as a continual unraveling by Miranda of the many myths generated by the family. The myth of who Aunt Amy was is a part of the larger myth of what constitutes a southern belle to the families of the Old South. Porter’s repeated use of flowers, beautiful, yet easily perishable, can be seen as imagery for the mythical Amy, suggesting her fragility. But just as the smells that the girls associate with the picture –medicated cigarettes, beeswax, and perfume –exist to cover up the real smells of the grandmother’s things and person, so does the created myth of frailty cover up Amy’s real independence, strength, and finally her death.

Thursday, September 19, 2019

Bosnia - Herzegovina Essay -- essays research papers fc

Bosnia-Herzegovina is a country located in southeastern Europe. Bosnia- Herzegovina declared its independence in March of 1992. Usually, this country is referred to as Bosnia, but is officially named Bosnia-Herzegovina. In 1918, Bosnia-Herzegovina became part of the kingdom of the Serbs, Croats, and Slovenes, which later became known as the country of Yugoslavia. In 1946, Yugoslavia became a federal state consisting of six republics, one of which was Bosnia-Herzegovina. Slavic people make up most of the counties population. The largest groups are the Bosnia Muslims, the Serbs, and the Croats. Much of the Serbian population opposed to Bosnia's independence and a civil war erupted in the Spring of 1992. Serbian forces soon occupied about two-thirds of the country. About one-fifth was soon held by Bosnian Croatians. The remainder of the country was held by Bosnian government troops, mainly Bosnian Muslims. From 1945, till 1990, communists held a monopoly on powers in all of Yugoslavia, including Bosnia-Herzegovina. In 1990, non-communists gained a majority of seats in Bosnia's first multi-party election. Bosnia-Herzegovina's capitol city is Sarajevo, which can be found in the center of the country. Although many languages are spoke there, the main language is Serbo-Croatian. In a 1991 census, there was a reported 4,365,639 people living in the borders of Bosnia-Herzegovina which has an area of 19,741 square miles, and in 1995 there was an estimated 4,454,000 people in the country (Twenty-two people per square mile.) Sixty-six percent of those people live in rural areas, leaving only thirty-four percent living in urban areas. Bosnia- Herzegovina's money system is based on the Dinar. Their main agricultural exports are cattle, cherries, corn, grapes, hogs, peaches, pears, plums, potatoes, sheep, soybeans, tobacco, walnuts, and wheat. As a developing country, their industrial production is slightly limited, producing mainly electrical appliances and textiles. There is also a lot of mining of coal and iron ore which also contributes to the countries economy. Bosnia's government is headed by a seven member collective presidency. The presidency consists of two Croats, two Bosnian Muslims, two Serbs, and one individual who is not affiliated with a specific ethnic group. Voters elect members to a four year term. The members then elect a president who serves a one year... ...ims, Serbs, and Croats should fight for what the believe in, and the strongest will eventually prevail. Bibliography: 1. The Christian Science Monitor 11-16-94 Title: Opening the Docket: Trials of a War Tribunal 2. USA Today 12-5-94 Title: Serb Defiance has its Roots in Balkan History 3. USA Today 2-14-95 Title: UN Tribunal Accuses 21 Serbs of War Atrocities 4. USA Today 10-16-95 Title: Mass Graves Yield Horror in Bosnia 5. USA Today 10-11-95 Title: Clear Messages to Bosnian War Criminals...No Deal 6. Pittsburgh Post Gazette 10-8-95 Title: War Crime Trails may be Thwarted by Peace Bid 7. US News & World Report 4-10-95 Title: A Hunt for the Killers of Bosnia 8. Macleans 8-15-94 Title: Serbian Death Camp 9. War Criminals, War Victims by Random House Inc. 1971 10. World Book Encyclopedia Volume B & Y, 1990 11. US News & World Report 11-27-94 Title: Jumping the Gun in Bosnia 12. US News & World Report 9-18-95 Title: The US Risk in Bosnia 13. US News & World Report 11-6-95 Title: Keepers of the Peace 14. Merit Students Encyclopedia Volume 3. 1988 15. Newsweek 8-17-95 Title: Ethnic Cleansing 16. Pittsburgh Post Gazette 11-14-95 Title: Tribunal Changes: Bosnian Croats