Tuesday, December 24, 2019

Failure And Success Of Project - 962 Words

Introduction: There are many literatures on how to make a project success but they are unclear because there is no specific cause or reason to become project unsuccessful. This position paper explores the reasons of failures and success in the projects. Now a day’s major projects are increasingly becoming critical to manage because of the nature of projects of multiple stakeholders, conflicts of thoughts and delays. From the studies of different authors 13 crucial things are documented for the success of project and 5 crucial things for the failure of the project. Steps for success of project 1. Clearly defines goals: This includes general philosophy and General goal of the project and also agreement of team mates to these goals. The main†¦show more content†¦It is necessary to allocate the resources properly for the success of the project. 6. Adequate communication channels: necessary information should be available on the Organizational Coordination, customer and client needs, project goals, status, changes it improvements etc. 7. Control mechanisms: It is necessary to take some steps to run the project as coordinated at the time of the initial schedule of the plan. 8. Feedback capabilities: all teams that are related to this project must be able to provide project reviews, suggestions, feedback and corrections through normal feedback communication channels or through peer review meetings. 9. Responsiveness to client: all the users related to project must provide regular status about the project updates. In future clients will receive the assistance after the project got executed successfully. 10. Client consultation: The members in the project will solicited all the inputs to the potential clients who are the part of the project (Wit, 1998). The team members associated in the project will identify the needs of those who utilize the system. 11. Technical tasks: The technologies that are currently developing the design, the implementation, and the approach must be reviewed by the project leaders that are outside of the project. This gives the clear indication of project flow. 12. Client acceptance: potential clients must be contacted to demonstrate the usefulness of the project. Also make necessary preparations

Monday, December 16, 2019

Nothing Impossible Free Essays

Management Introduction Review of Management Articles Article assigned ANALYSING the thinking of F. W. Taylor using cognitive mapping Introduction Scientific management is one of the three major branches within the classical approach to management. We will write a custom essay sample on Nothing Impossible or any similar topic only for you Order Now Although the concept was suggested approximately a century ago, it still makes a significantly important role in 21st century management with new conditions and a considerable number of challenges. Frederick Winslow Taylor who was regarded as the father of scientific management suggested his concepts in 1911. Scientific management is defined as a theory that emphasises careful selection and training of workers, and supervisory support (Taylor, 1911). Taylor (1911) believed that precise procedures that were developed after careful study of an individual at work should replace the tradition on decision-making. The purpose of this essay is to review three articles that analyses the Taylorism and present how Taylorism is applied in current management sphere. Analysis of Assigned Article Cossette, P. 2002. Analysing the thinking of F. W. Taylor using cognitive mapping. Management Decision, 40 (2): 168-182 The author of this article used the cognitive map and the Decision Explorer to present and analyse the thinking of F. W. Taylor to produce a more in-depth and detailed knowledge and understanding of his ideas. Cossette (2002) demonstrated that the two key variables in Taylor’s scientific management were â€Å"Maintenance of a rapid pace†¦Loafing or soldiering† and â€Å"Harmonious relations between employers and men aware of their mutual interests†. As Taylor’s scientific management related to efficiency, the first concept that the author highlighted had completely reflected the Taylorism. Cossette (2002) concluded that â€Å"the maintenance of a rapid pace† was the most important concept for Taylor, since it was also by far the most important â€Å"consequence† of the cognitive map. Taylor’s scientific management was always considered as the division of labour pushed to its logical extreme, with a consequent de-skilling of the worker and dehumanisation of the workplace (Kanigel, 1999). However, the author showed another aspect of Taylor’s idea which was related to harmony. In cognitive map, the concept of â€Å"Harmonious relations between employers and men aware of their mutual interests† had the second largest number of direct links and the third centrality score compared to other concepts (Cossette, 2002). In addition, Cossette (2002) stated that â€Å"the prior conditions required to improve production and the results of this improvement for both employees and employers, are the two main dimensions that Taylor appears to use as a basis for his conception of the organization of work. Although a small number of concepts from Taylorism were less relevant, they suggested that Taylor’s thinking was not significantly complicated. This article helped us have a better understanding of the ideas of F. W. Taylor, demonstrated the relative importance of the concepts suggested by Taylor and revealed another side of Taylorism. Analysis of Article 1 Wre ge, C. D. Hodgetts, R. M. 2000. Frederick W. Taylor’s 1899 pig iron observations: Examining fact, fiction and lessons for the new millennium. Academy of Management Journal, 43 (6): 1283-1291 However, the authors of this article were in dispute with Taylor in a particular circumstance. Wrege Hodgetts (2000) stated that Taylor simplified the observation by presenting only some of the information and, he omitted many significant facts. The insight thinking of the authors was that contemporary organisation should apply new tools and techniques to achieve their objectives, and managers should increasingly concentrate on data collection and analysis and fight the tendency to accept anecdotes and hearsay as accurate (Wrege Hodgetts, 2000). The authors studied and analysed the case called pig iron observation, which came from Taylor’s scientific management principle, and concluded that although Taylor had made a great contribution to management history, he did neglect some significant real facts in this case such as failure to take the cost of damaging gondolas into account. In addition, the authors suggested five points that we could learn from this observation, which are â€Å"anecdotal data are often erroneous, primary sources must be consulted, all data have inconsistencies, replication is hallmark of good science and digital archiving is now critical† (Wrege Hodgetts, 2000). Moreover, the authors had concluded some suggestions that are valuable for the managers in new millennium. Wrege Hodgetts (2000) demonstrated that researchers’ being more systematic and sophisticated was important in their approach to chieving their goals, and that â€Å"benchmarking† was going to be a critical activity in the 21st century. This article revealed the limitation of Taylor’s scientific management, and the authors of this article recommended a considerable number of approaches and methods to help today’s managers reach their objectives successfully and efficiently. Analysis of Article 2 Boyns, T. 2001. Hans and Charles Renold: en trepreneurs in the introduction of scientific management techniques in Britain. Management Decision, 39 (9): 719-728 The author of this article used the case study of Hans Renold Ltd to extend Taylor’s scientific management theory, and explained how it was applied in this enterprise during the first and second decades of the twentieth century. The core ideals of the author were to confirm the contribution that Hans and Charles Renold made to introduce and develop scientific management in Britain, and distinguish the different methodology between Hans and Charles. It has been accepted that Hans Renold Ltd has been the first company to introduce Taylor’s scientific management in Britain (Boyns, 2001). Hans Renold â€Å"probably was the first British industrialist to appreciate the work of F. W. Taylor and adapt it to British management practice† (Urwick, 1956). He started to change the organisational structure and introduced a new functional organisation supported by a system of committees in 1908 (Boyns, 2001). Although there were some problems arising such as little resistance from the bulk of the workforce, scientific management principles were eventual successfully adopted at Hans Renold Ltd eventually (Boyns, 2001). The author of this article introduced the first application of Taylor’s scientific management in Britain and emphasized the fundamental position of scientific management in management history as it has already been applied for a century and it still plays a significantly important role in increasing the efficiency in the organisations in the 21st century. Application to Current Management Practice Around the Twentieth Century, Taylor’s scientific management theory had been widely used in the manufacturing and services industries. In the 21st century, scientific management does play an important role, and it is applied in several modern organizations. McDonalds is the world’s most famous brands, which is leading in the globally branded quick service restaurant applied the scientific management successfully in their business operations. Initially, Taylor (1911) stated that wage systems without incentive result in low productivity if no matter how much is produced the employee will gain the same pay. McDonalds stimulates employees in many effective ways. Regardless of the base pay, McDonalds develops competitive wage and promotion programs, hard work, motivation and results are recorded and rewarded at McDonalds (McDonalds, 2006). In addition, McDonalds also establishes great incentive programs in which employees have an access to gift and free food (McDonalds, 2006). McDonalds also offers an incentive pay system and provide the opportunity to earn competitive total compensation for employees when they successfully achieve the goals (McDonalds, 2006). Moreover, Long-term incentives are ensured to employees who are qualified to both reward and long-term creation at McDonalds (McDonalds 2006). Secondly, one of the most important principles of Scientific Management is scientifical training. Taylor (1911) suggested that each company should train the workers scientifically rather than passively leave them to train themselves. McDonalds has a strong belief in training, and training becomes a tradition at McDonalds, because they know its value to the bottom line of their business. Everyone in the business should attend a significantly important training, whether part, full time, hourly paid staff or salaried managers undergoing their compulsory restaurant training (McDonalds 2006). When a new employee joins McDonalds and starts his first working day, he will accept training at once. McDonalds even set up a Hamburger University, and the purpose of this action is to provide all McDonalds Corporation and Franchisees employees with training exclusively in various aspects of the business (McDonalds 2006). Those training systems make their staff more efficient and professional. Finally, Taylor (1911) taught that the only one method of work that maximized efficiency was to develop a standard method of performing each job efficiently by companies. McDonalds builds up a series of detailed and strict working standards, which guarantee that every product from any chain restaurant has high quality (McDonalds 2006). Moreover, McDonalds staff is specialized in different production procedure (McDonalds 2006). McDonalds has developed a standard method of performing each job and the employees can perform efficiently. Conclusion In conclusion, the authors of the above three articles explained the Taylorism precisely and explicitly. The core thinking of Taylor’s scientific management was efficiency particularly was speed, and it is widely applied in most modern organizations such as McDonalds to help increase the productivity. Although Taylor’s scientific management has some limitation as sometimes managers could overlook to collect important data by relying on it excessively, it still made an important contribution to the business world in the 21st century. Taylor laid the foundation of management, and with the application of scientific management, production efficiency has improved. Much of core of Scientific Management remains with us today, only been modified, updated and given a human face (Freeman, 1996). Term Paper on Functions of Management Eritrea Education Sector Development Program – Program Management Unit ESDP-PMU Management Functions 1. Introduction: Management is defined as the process of getting activities completed efficiently and effectively with and through other people . It encompasses an array of functions with which it accomplishes different tasks done successfully. These functions include planning, staffing, organizing, directing, and controlling. The Eritrea Education Sector Development Program – Program Management Unit, abbreviated as ESDP-PMU, is an institution destined to accomplish education sector program objectives that have to be viewed in terms of the government policy to boost the education sector in all aspects. Through the educational sector intervention, ESDP-PMU works to ensure increase in access, improve quality, boost capacities in all levels of the sector, and ensure equity in delivery education services. This paper explores the management functions in the ESDP, highlights strengths and weaknesses in view of the theoretical aspect of management function. Finally, it highlights some few salient points that are worth mentioning and by way of recommendations it tries to shed lights on issues that need improvement. 2. Overview of the management functions: Henry Fayol defines management as a science of forecasting, planning, organizing, commanding, coordinating, and controlling. The most commonly cited management functions are planning, staffing, organizing, directing, and controlling. Planning refers to the base of the other management functions. It is the management of the organizations’ future in an uncertain environment . Plans can be strategic, tactical, and operational. They can also be long-term or short-term. Plan should be built on specific, attainable, and challenging objectives. In the materials for the management course of SMAP it is mentioned that planning is important in that it offsets uncertainty and change, focuses attention on objectives, helps in coordination, gains economy of operation, helps in control, and increases organizational effectiveness. In that sense it divides plans to standing and single-use plans. Organizing refers to the organization of resources in an organization. Such organization can be charted on an organizational chart . Through this function management tries to determine the inside directorial configuration, establish and maintain relationships, and also assign required resources of the organization. Staffing functions follows the organizing function of management. Staffing refers to the filling and keeping filled positions on positions created by the preceding organizing function . Thus, staffing encompasses tasks such as recruitment, selection, training and retraining of employees. Directing refers to the control and supervision of the actions of the staff, thus, enables them to achieve the company’s goals and also accomplishing their personal or career goals which can be powered motivation, communication, department dynamics, and department leadership . Controlling refers to activities related to setting performance standards based on the objectives of the organization, measuring and reporting actual performance, comparing the two, and taking corrective or preventive action as necessary. As management is a creative problem solving , the coordination of the various functions mentioned above contribute to an efficient and effective accomplishment of tasks. The section below review the management functions in the ESDP-PMU. 3. Review of the management functions in the ESDP-PMU: The ESDP-PMU is destined to accomplish education related projects. These projects are financed through the proceeds coming from International organizations such as the World Bank, African Development Bank, European Union, as well as other UN bodies such as UNICEF and UNFPA. Each financier or development partner requires the need to follow ones procedures. The other dimension of the matter that needs attention is that each financier or development partner is set up to achieve each project objectives. Thus, there are kind of awkwardness in reaching a harmonized program objectives. Planning function in the PMU The PMU believes that proper planning is a prerequisite to success. It is concerned with the future impact of today’s decisions. In the PMU there is a section that deals with planning issues. It prepares tactical and operational planning in view of the project objectives. The planning that is made part of the Financing Agreements with the respective development partner can be taken as a strategic one. The Planning Section of the PMU prepares an Annual Work Plan and Budget (AWPB). On the basis of which, the procurement section derives its procurement plan, and the finance section derives its financial and disbursement plan. Therefore, we can see the following relationship in the planning function of the PMU. Graph 1. Planning function relationship From the foregoing planning relations graph, we can observe that all the activities envisaged to be done in a year or a year and half through the plans of the respective sections. Overall, all these plans reflect the scenarios â€Å"where we are now? †, â€Å"where do we want to be? †, and â€Å"how do we get there? †. It is good also to note that the submission of plans and seeking approvals is mandatory. This procedure is deemed appropriate and practically does positively affect the projects. Organizing function in the PMU To the PMU organizing function refers to establishing the internal organizational structure of the business. The focus is on division, coordination, and control of tasks and the flow of information within the organization. It is through this function that the manager distributes responsibility and authority to employees. The organizational structure of the PMU is shown below. It takes into consideration the objectives and tactics already identified in the planning stage. The structure decides the division of labor, delegation of authority, departmentation, span of control nd coordination issues. When we come to the division of labor, the PMU is divided into 5 sections, viz. , Planning, Monitoring, and Evaluation (PME), Procurement, Finance, Engineering, and Administration sections. And all the employees are recruited in such a way that they are fully occupied. In regards to the delegation of authority, as reflected in the organizational structure, the authority is exercised as per th e stipulated structure. The sections coordinate their work so as to achieve the objectives. This means that no section can stand alone. Staffing function in the PMU Staffing encompasses the tasks of recruiting, hiring, training, lay-off, and compensation of employees. The PMU recruits its staff with due regards to the management and labor needs. In so doing, it prepares job description, builds a pool of applicants, review the applications and select those to be interviewed, do the interview, check references, and select the best suited candidate and hire him. The PMU provides training to its staff in view of the timely job related developments and requirements. For instance, the staffs are made to be actively involved in the endeavors to upgrade themselves. Similarly, the PMU lays off its staff in view of staff’s reflections of incapacities in doing the tasks or showing other behaviors that are believed against the norms of the organization. It is the right of the employees to receive the needed compensation related with the job they undertook during their stay in the PMU. Directing function in the PMU Directing is influencing people’s behavior through motivation, communication, group dynamics, leadership and discipline. The purpose of directing is to channel the behavior of all personnel to accomplish the organization’s mission and objectives while simultaneously helping them accomplish their own career objectives. Highly motivated people perform better than unmotivated people. Motivation covers up ability and skill deficiencies in employees. The PMU gives motivation top priority. Employees are motivated through the material, financial, as well as work environment privileges. This is very important aspect that expedites the realizations of the objectives. Besides, the communication issues are very important as part of the directing function of management in the PMU. The staffs are careful enough in their communicative efforts such as with the financiers, partners, suppliers etc. The staffs are appraised for what they do, and disciplinary measures are taken for incidents of misbehaviors. Controlling function of the PMU Controlling in the PMU is done in view of the performance standards (indicators) set in each financing agreement back before the start of the implementation of projects. The Planning, Monitoring, and Evaluation Section of the PMU take care of such tasks as monitoring activities and evaluating against standards. The Planning, Monitoring, and Evaluation Section undertake routine or surprise checks of activities. At the mid term and final term of projects, they also conduct evaluations. In so doing, the section seeks preventive and corrective measures such as the incorporation of new mechanisms of implementations. The controlling function is done in all aspects of the program, such as controlling assets owned by the office, control on the staff in terms of their work hours. . General Observations in the PMU The PMU is known for its staff that is aware of the virtues out of team working, learning by doing, and complementarities. These attributes are very important for the management function to achieve effectiveness and efficiency in the tasks that are destined to accomplish. Most of the staff members are young professionals that they can learn easily fr om experiences of others, and that they possess the merit to catch up things through continuous reading. The team work in the PMU has assisted the effective accomplishments of activities as scheduled. Synergism is common place, and supporting one another is highly worked upon. 5. Recommendations From the foregoing we can understand that the PMU fully undertaking management functions. In order to cement the positive sides of what is going on in the PMU, I recommend the following points: †¢ that the various projects need to be harmonized †¢ that the staffing function be done in view of the experiences already nurtured. This means the job description in trying to hire staff has to be used in such a way that team work is given greater weight. that more training need to be provided to the staff †¢ that the young professionals be retained as a team in order to pursue the implementation of similar projects in other sectors such as agriculture, etc 6. Conclusion Efficiency and effectiveness are key words related to the realization of plans. The realization of this is the task of management. Management does these through the coordination of its functions. These functions are planning, organizing, staffing, directing, and controlling. The PMU is reputed for pursuing a management style that assists in the realizations of set objectives effectively and efficiently. All management functions are employed in the PMU, and thus the fruits of these concerted efforts are tangibly realized. 7. Works cited Website http://choo. fis. utoronto. ca/fis/courses/lis1230/lis1230sharma/plan1. htm http://www. ag. ohio-state. edu/~mgtexcel/Function. html http://www. ag. ohio-state. edu/~mgtexcel/Staffing. html http://www. buzzle. com/articles/management-concepts-the-four-functions-of-management. tml http://choo. fis. utoronto. ca/fis/courses/lis1230/lis1230sharma/history4. htm Kiflemariam Abraham, Reading on Principles of Management. March 2007 Management Term Paper * * Help Desk Operations for the Operating Forces Wilfredo Santiago Park University Author Note This is an insider view on how to streamline and improve the services provided by MCTSSA (Marine Corps Tactical Systems Support Activity) Help Desk to the Operating Forces. Abst ract MCTSSA Help Desk was established over 10 years ago to provide technical support to the operating forces. Today the Help Desk is referred to as OFTSSC (Operating Forces Tactical Systems Support Center) with a specific mission stated as: to provide continuous, distributed technical support, troubleshooting, and problem resolution for Command, Control, Communications, Computers and Intelligence (C4I) systems, in order to optimize those systems as force multipliers in assisting Marines to win battles. While the OFTSSC focuses on the needs of the Marine Corps, it offers technical assistance to all C4I system users across the entire Department of Defense (DoD), U. S. Government and all U. S. Foreign National Allies. The OFTSSC provides its customers with remote technical assistance by facilitating online access to supported system documentation, system software and offering live interaction with system subject matter experts (SMEs), via phone, online chat, and email. If a solution to a customer problem is not immediately available, OFTSSC personnel will actively work to obtain a solution by elevating customer issues to MCTSSA support engineers, system vendors, Marine Corps Systems Command program managers or other commercial or DoD customer support agencies. Help Desk Operations for the Operating Forces The OFTSSC from the start operated in an ad-hoc manner maintaining its mission capability with a support staff composed of contractors and civilian government analysts and a limited number of uniformed personnel. This odd mix of employees with identical goals as a mission end state has presented a management challenge that has hampered efficiency and responsiveness in providing the services as defined in the stated mission. This paper will address three persistent problems that exist within OFTSSC. First, the lack of a verifiable control measure to gauge analyst productivity and quantified work output. Staffing is also a source of issues that continue to impact OFTSSC’s ability to maintain its credibility as a reliable source of SME (Subject Matter Experts) and it has a continuing difficulty at retaining well trained employees to stick around. In fulfilling its function as a help-desk/support center for the operating forces, employees routinely receive calls from customers describing problems they encounter when employing tactical systems whether in garrison or on deployment. These calls are inducted into a database repository, Remedy. Here the adequacy of Remedy in providing as an output control comes into question. Although Remedy is widely used in the help desk community it is a system that requires a lot of labor intensive modifications to get take advantage of its capabilities as a help desk database tool. Currently, Remedy is employed as an out of the box software with limited modifications. Remedy can be modified as an output control tool that will enable management to effectively monitor employee productivity and efficiency. By design Remedy not only archives problems customers refer for solutions it also is a repository of all solutions created by analysts which is then made available for future use or reference as a knowledge based article (KBA). As calls are received from customers analysts input all data related to problems being referred for assistance into Remedy. The information will include system type and nature of the problem and complete customer information. All these information is populated onto a standard template. The analyst then proceeds to research the KBA archives by using a key word search related to the problem. If a solution match is found this is provided to the customer and the problem is marked resolved and archived. The utility of the Remedy database is not fully exploited as any type of record created is only available only thru accessed. With all these information available within a central repository it should be made available for for all analysts at a glance providing a snapshot of the problem, the status, whether pending, resolved or in progress. This should be displayed on a large monitor for all to see. With this information on display all analysts will have current status of all problems available at a glance. At a minimum this should display two weeks worth of activity. This display will serve as visible output control measure to gauge analyst activity and productivity. This quantifiable and measurable display of work output can be used as an objective measure of performance and used as a basis for compensation rewards. For the analyst this will also serve as a current constant visible reminder of work that is pending, in progress or completed. Today the mix of employee analysts within OFTSSC has a variety of skill sets whose qualifications for the jobs are based on their past work experience with a particular system. This has been a detriment to OFTSSC’s ability to provide reliable analysts consistently without periodic unavailability due to SME absence. This is a cause for concern because of its impact on the service reputation that is expected by the customers – availability among others. To fill this requirement gap it is imperative that the depth of analyst skill sets be enhanced. There are thirty analysts currently employed supporting over forty varying systems which include a variety of tactical radios. The systems are grouped into Command and Control (C2) or Tactical Applications (TacApps) with tactical radios included into TacApps. This grouping is done for purposes of limited management and tasking deconfliction. Personnel tasking however blurs the lines of personnel assignments as analysts are often randomly assigned to provide assistance on systems that he or she is not officially assigned. The practice has in many situations caused unexpected disruptions in service quality. Because too often analysts assigned to tasks do not possess the subject matter expertise to provide support requested. To mitigate this situation a training program that will involved cross training all analysts need to be instituted within OFTSSC. Staffing has to be reviewed and a reorganization of the analyst teams will have to be done in a manner that permits a well defined tasking of all analysts based on skill sets and grouping them based on previous assignments. Within each grouping a program of OJT (On the Job Training) will be initiated by pairing each analyst together and each one go thru a training program designed to increase their depth of skill and familiarity with systems other than those they are qualified on as an expert. During the training period ample opportunity will be dedicated to having the trainer and trainee to conduct business as a team. This process will be akin to a mentoring process that facilitates the transfer of knowledge and skill that will improve the services provided to customers. Reorganization and staffing once completed will result in a reliable and available analyst well trained on the system supported. The improved skill sets will require to be maintained if the quality of service is to be credible, this can be achieved with a programmed sustainment training that should include in-service training and follow-on continuing education to keep current with the dynamic nature of technology. Summary The operation of a support center such as OFTSSC is unique in that its main customer is the operating thus the focus of its services are the uniformed personnel who maybe in harm’s way, because of this it is critical that the quality and accuracy of service and information provide require a level of expertise that is above the norm. Analysts are assumed to be the experts on the systems they support therefore it is imperative that their training and quality of service measure up to the standards. If the service provided is to have any value or credibility the provider must have the requisite knowledge and training to be consistent with the required standards. At the onset staffing should focus on critical skill sets that are vital to the operational demands of the customers and they should sustain the currency of those skills. In order to maintain and improve the depth of knowledge and skill sets training is essential and once established sustainment will be required. Hiring standard is another area that will have to be visited to ensure that standards are maintained and qualified personnel are selected. This will preclude the impact of substandard services to the customer. References -3 points for not utilizing MG352 text to support term paper. 1. Operations Chief: OFTSSC Standard Operating Procedures, 2010 2. The Information Technology Infrastructure Library (ITIL) version 3, 2011 3. http://www. bmc. com/solutions/itsm/it-service-management. tml -3 points for improper citing of reference; below is how article from the Internet should be cited Author (2012, May 15). Name of Article, Date retrieved from the internet http://www. link. com 4. http://www. marines. mil/unit/marcorsyscom/mctssa/Pages/OFTSSC. aspx -3 points for improper citing of reference; below is how article from the Internet should be cited Author (2012, May 15). Name of Article, Date retrieved from the internet http://www. link. com How to cite Nothing Impossible, Papers

Sunday, December 8, 2019

Management Principles TESCO

Questions: Task 1Briefly explain: manager, management and organisation. Assess the significance of managers in achieving organisational success for a company of your own choice. Task 2Analyse how size and strategy of a company can affect its organisational structure? Support your answer with relevant examples.Task 3Scenario:Tesco has said it will close 43 unprofitable stores across the UK, The firm is also shelving plans to open a further 49 new "very large" stores. Additionally, Tesco is closing its staff pension scheme, will make cuts of 250m and reduce overheads by 30%. Shares in Tesco rose by more than 13% on Thursday, as investors welcomed the company's announcements. It comes after two years of troubles at Tesco, which has suffered falling sales, in another development, credit rating agency Moody's downgraded Tesco's rating by one notch to Ba1, equivalent to "junk" status. (BBC, 2015)a) Discuss Tescos current mission, vision and corporate strategy.b) Suggest and explain the process that can help Tesco to formulate its corporate strategy for the year 2015.c) What do you understand by the term organisational culture? Can Tesco improve its performance by changing its culture? Discuss. Answers: Introduction Agnihotri (2014)) outlined that management is basically the art of the perception and also on that basis what any person needs to do and also the seeing which needs to be done through the cheapest and the most possible way. It also necessitates the essentials of all the co ordination of both the resources and also the human efforts which helps the specific organization in doing the achievement of the specific objectives and the goals (Palomares, Martnez and Herrera, 2014). This whole assignment is divided into 3 tasks: in the first task it includes the brief explanation about the topic of manger, management and the organization. It also assesses the significant role of the manger in order to achieve the organizational success (Levenson, 2014). In the second task it does the proper analyze of the affect of the organizational structure with the size and the strategy of the organization (Janicijevic, 2012). In the task it does the critically analyze of the above two tasks on the basis o f the mentioned case study. Task 1 The personnel who is more basically responsible for directing and also to do the planning of all the individual of the specific group, properly monitoring of the works of the team members so that it also can have the capabilities though which it helps to take the counteractive measures which becomes more suitable in respect situations (Levenson, 2014). The manager also possesses some of the capabilities and the powers which include both the hiring and the firing of the peoples (Dauber, Fink and Yolles, 2012). Some of the fundamental roles which the manager needs to follow in respect of the proper guidance of the organization which are mentioned: at first the manager needs to acts as the good leader with the capability of the proper organization of the group or the team and also have the ability to do the proper creation of the effective strategies (Makasi, 2014). The manger needs to also act as an effective mediator between the suppliers and the employees so that the proper basis of the negotiation can occurs with all the available staffs, contractors who are connected with the organization both directly and indirectly (Janicijevic, 2012). The manager also needs to possess some of the capabilities through which it becomes easy to do the proper corroboration of both the mission and the visions of the specific organization to all the employees, stake holders and also the customers (Dauber, Fink and Yolles, 2012). For completing this assignment the organization Tesco is taken into account (Levenson, 2014). Some of the specific roles which the manager needs to cooperate to maintain the proper organization success of the mentioned company are listed below: Operating margin increase The manager needs to maintain the proper knowledge about the employees of the organization which helps them to give the proper knowledge of the technique to draw the relation between the employees and also the companys goals and also helps the employees to properly understand and also the setting up of the goals. To do the proper boost up of the productivity of the employees through which it can lead to increase the percentage of the profits and also the operating margins the manager needs to play the crucial role (Makasi, 2014). The manager also needs to maintain the proper engagement of the concerned staffs and the employees in the development of the smart objectives and the goals (Janicijevic, 2012). Companys strategies execution In order to maintain the proper execution of the goal alignment and also allow to maintain the proper visibility of the goals so that it can occurs the quick execution of the developed strategies by doing the proper allocation of the available resources of the various projects. The manger also helps in the elimination of the redundancy of the job and also needs to maintain the respective focus on all the employees through which it becomes easier to achieve the objectives and the goals of the company (Dauber, Fink and Yolles, 2012). Reduce the employee turn over The manger desires to earn the business values in more numbers with the proper engagement of all the employees (Levenson, 2014). It also needs to clarify the proper alignment of the goals through which they can take the remedial action of the respective situation and also helps to do the proper creation of the ownership of all the employees which helps the manger to earn the companys success. With the help of doing the proper management the manager needs to influence the employees by initiating some of the special plans which includes the incentive program, reward programs etc (Makasi, 2014). Task 2 In order to change both the strategies and the sizes of the organizational structures it needs to take account some of the measures which are given below: Decision making evolution Evolution help to cultivate the respective organizational structure with the availability of both the power of doing the decision making and also the supremacy power which are more concerned with the help of the top level manger (Levenson, 2014). To take part in the effective decision making, the manger needs to plays some of the major roles through which it deals with all the available perspectives and the issues which the employees are facing in doing the top level management (Dauber, Fink and Yolles, 2012). Customer interaction In order to implement some of the new level of the innovative features with both the indirect and the direct interaction of all the customers through the top level management helps them to improve the basic quality of the implemented products of the organization by doing the critically analyzing of the version of the risk, complexity and also the structure of the mechanics (Makasi, 2014). Values of innovation To improve the innovation of all values of the manager it needs to do the proper look after of the organizational structure, control of the just in time value and the total quality management etc. Task 3 The organization Tesco put their main focus on doing the business and also to maintain the long term goals of the business. To do the proper illustration of the vision statement of the organization Tesco it reflects on the five elements which includes the innovation, full and the modern ideas of the concerned products, it also needs to do the proper inspiration and the earning of the trust, faithfulness of the communities and the customers. It also concerned with the growth of the proper structures of the concerned opportunities and the business (Levenson, 2014). By properly analyzing of the mission statement of the organization Tesco it mainly deals with all the basic impression by concerning all the businesses purposes of the organization. It also reflects about the basic objectives and the goals for all the stake holders of the organization. Setting of the mission statement of the organization performs as the basic inspiration of any of the overall principles of all the concerned employees and the stake holders in doing the achievement of the goals and the objectives (Makasi, 2014). In the context of the corporate strategies of the organization Tesco it takes account of some of the basic features which are mentioned below (Palomares, Martnez and Herrera, 2014): Valuation of the money: Tesco always needs to commit in doing the delivery of the quality basis of the products with the guarantee of the unbearable prices. Customer service: Tesco always maintain some of the special focuses on the targeted customers to maintain the unique basis of the products and also needs to compact with the offering of the first class services (Dauber, Fink and Yolles, 2012). Customer loyalty: with the availability of the first quality of the products and also other facilities customer also reward Tesco with their enough loyalty and also the dedication on a specific organization. Stores: Tesco always needs to maintain the investment in some of the existing stores and also helps them in the doing the development of the flexibility of the new stores which gives the customers with the availability of the enough stores so that the customers can get the better experience for doing the shopping (Makasi, 2014). Some of the available key products in the basis of which Tesco formulate their own strategies of the corporate values are given below: External: concerning of the external environment of the organization it includes the various types of the variables like employees, customers, competitors, trade associations, creditors etc. Internal: in the internal environment of the organization it includes both the weakness and the strength of the organizations which takes the control of the short run variables of the top level management of the organization. By taking account all the internal factors of the organization it mainly deals with the proper assessment of the value chain which includes both the strengths and also the weakness of the business on the basis of the linked activities which helps in doing the generation of the values to the customers (Seal, 2012). Environmental issues and trends: the issues which have that ability to create an impacts on the organizations are concerned with the both the external and the internal factors. Under the external factors it includes threats, outsourcing etc and then under the internal factors services, needs, skills, resources etc. (Levenson, 2014). The concerned cultures and the behaviors of the employees of the organization and also the process through which the employees are attached to the concerned nature and the behavior of the organization are conferred as the organizational culture. Under the organizational cultures it includes the norms, mission, visions, beliefs and the assumption of the organization. Organizational culture also includes some of the seven characteristics which are given below: Teamwork: companies needs to organize all the work activities in a team so that it becomes easy to build up the natures of the team build up inside the organization which helps to place the high quality values in the characteristics of the organization. Innovation: to maintain the profits of the organization the companies always needs to maintain the innovative natures so that they can introduce the new types of the products and also needs to keep more focus on the improvement of the performance of the employees. Emphasis on the outcome: it also needs to maintain the more focuses on the outcomes and the results of the organization which helps to create the values and also the importance of the organization (Janicijevic, 2012). In doing some of the changes of the organizational cultures of the Tesco it helps in the improvement of the performance of Tesco. Tesco also needs to do the implementation some of the new techniques and the innovative features in the context of the organizational cultures so that they can improve their revenues and the values of the organization by implementing some of the new features and also innovating the existing features on the basis of the requirements of the customers (Clausen, Pohjola, Sapprasert and Verspagen, 2011). Conclusion The main beliefs of the management are fundamentally the guidelines based on which the organization can takes their essential decisions and also the specific actions of the manager and the managerial role. To give the proper conclusion of the entire task it describes all about the managerial roles, organizational cultures and also some of the aspects of these mentioned factors on any of the specific organization. References Agnihotri, A. (2014). Corporate reputation based theory of choice between organic, hybrid and inorganic growth strategies. Corp Comm: An Int Jnl, 19(3), pp.247-259. Clausen, T., Pohjola, M., Sapprasert, K. and Verspagen, B. (2011). Innovation strategies as a source of persistent innovation. Industrial and Corporate Change, 21(3), pp.553-585. Janicijevic, N. (2012). Organizational culture and strategy. Ekonomika preduzeca, 60(3-4), pp.127-139. Levenson, A. (2014). Organization design and talent strategies for emerging markets. Organizational Dynamics, 43(3), pp.205-213. Seal, C. (2012). Managerial Roles and Implications in Emergent Change. Organization Management Journal, 9(1), pp.3-3. Baker, E. (2014). Leadership and ManagementGuiding Principles, Best Practices, and Core Attributes. Journal of Public Health Management and Practice, 20(3), pp.356-357. Dauber, D., Fink, G. and Yolles, M. (2012). A Configuration Model of Organizational Culture. SAGE Open, 2(1). Grey, C. (2014). An organizational culture of secrecy: the case of Bletchley Park. Management Organizational History, 9(1), pp.107-122. Vizzoto, A., Pereira, B., Campanher, M. and Ravanello, F. (2014). An Overview on the Studies of Organizational Culture in Journals Indexed in the Business Administration Area (2008-2013). FSRJ, 6(1), pp.132-151. Prictor, R. (2012). The Strategic Quality Manager: A Handbook for Navigating Quality Management Roles in Health and Aged Care. Australian Journal of Primary Health, 18(1), p.88. Baker, E. (2014). Leadership and ManagementGuiding Principles, Best Practices, and Core Attributes. Journal of Public Health Management and Practice, 20(3), pp.356-357. Jere, M. (2014). Customer Perceptions of Loyalty Programs in an Emerging Market Context. Mediterranean Journal of Social Sciences. Makasi, A. (2014). The Impact of Operational Customer Relationship Management on Customer Loyalty. Mediterranean Journal of Social Sciences. Palomares, I., Martnez, L. and Herrera, F. (2014). MENTOR: A graphical monitoring tool of preferences evolution in large-scale group decision making. Knowledge-Based Systems, 58, pp.66-74.

Saturday, November 30, 2019

Muslim Empires free essay sample

The Ottoman Turks consisted of Turkic-speaking nomadic people who had spread westward from Central Asia in the ninth, tenth, and eleventh centuries. They were located in the northwestern corner of the peninsula, which allowed them to expand westward and eventually take over empires between the Mediterranean and the Black Seas. The sultan was the supreme authority in both a political and a military sense. Administrative and military power were centralized under the bey, who was only a tribal leader, tribal law was before Muslim law. The Ottoman authorities were Sunni Muslims. The sultan assigned duties to a supreme religious authority, who then maintained a system of schools to educate Muslims. There were some who believed in Sufism or other doctrines, but the government allowed it as long as they were still loyal to the empire. Non-Muslims had to pay a head tax since they were exempt from military service. The Ottoman Empire was divided into four main occupational groups: peasants, artisans, merchants, and pastoral people. We will write a custom essay sample on Muslim Empires or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Shah Ismail founded the Safavid Dynasty. The Safavids was a mixed society like the Ottoman Empire; majority of the population were Iranian. They used the Shi’ite faith, and Shi’ism was declared the state religion. Like the Ottoman’s sultan, the Safavids had their shahs who would check up on their people. This empire was not as wealthy as the Ottomans and the Mughals. Their greatest area of productivity was in textiles. The founder of the Mughal Dynasty is known as Babur. Ruling of the dynasty was passed down from Babur to his son, Humayun, and then to his grandson, Akbar. As emperor, Akbar didn’t just focus on the views of Muslim but also gave Christian views a chance. He later formed a new type of worship called the Divine Faith, which combined characteristics of different religions. He believed in having a harmonious society, which meant each individual and group would play their assigned role and contribute their part to society. This dynasty was the last of the great traditional Indian dynasties. All three of the empires were Muslim, and they all displayed an impressive capacity to create and run a large empire. The Muslim World was protected by the military and political abilities of these empires. Unlike their European counterparts, these empires continued to thrive.

Tuesday, November 26, 2019

Free Essays on Dates Are Awkward

Most dates are awkward at best, so try to imagine a date ten times more uncomfortable than those. If you can’t I suggest trying a blind date! They all come in different shapes, sizes, and circumstances, none of which are predictable. Blind dates can be either a night mare or a daydream depending on how you go about them and how you get them. The oldest and most revered â€Å"blind date† is an arranged marriage. As modern as romance is today, it is hard to fathom someone giving their parents the decision of whom they will spend their life and mate with. Silly you may say, but arranged marriages are still held to this day and statistically last longer than marriages made by free will. Some even marry sight unseen. Can you imagine spending a life with someone you have never laid eyes upon? I won’t give my father a chance to set up a meeting much less a life partner! The â€Å"set up† is a little more western than an arranged marriage. Friends team with other friends or partners in an attempt to conjure up a more perfect union between people they know. For some reason or the other, I usually fall for the â€Å"favor†that ends up in an uncomfortable double date. I have , at times, questioned my friends’ opinions of me due to the wide array of men they have set me up with. These types of blind dates are typically accompanied by the matchmakers. Every move or sound made is then studied by your friends to ensure that this brainchild will blossom into a fabulous relationship, upon which they will receive high praises for their insight. I personally advise anyone accepting one of these dates to remain neutral in the event of a disagreement between any party members. Your opinion may lead to the disastrous break up of a friendship, relationship, or even both. Newspapers have carried classified ads for as long as I can remember. In my experience, â€Å"blind† isn’t even the word for this type of blind date. In this f... Free Essays on Dates Are Awkward Free Essays on Dates Are Awkward Most dates are awkward at best, so try to imagine a date ten times more uncomfortable than those. If you can’t I suggest trying a blind date! They all come in different shapes, sizes, and circumstances, none of which are predictable. Blind dates can be either a night mare or a daydream depending on how you go about them and how you get them. The oldest and most revered â€Å"blind date† is an arranged marriage. As modern as romance is today, it is hard to fathom someone giving their parents the decision of whom they will spend their life and mate with. Silly you may say, but arranged marriages are still held to this day and statistically last longer than marriages made by free will. Some even marry sight unseen. Can you imagine spending a life with someone you have never laid eyes upon? I won’t give my father a chance to set up a meeting much less a life partner! The â€Å"set up† is a little more western than an arranged marriage. Friends team with other friends or partners in an attempt to conjure up a more perfect union between people they know. For some reason or the other, I usually fall for the â€Å"favor†that ends up in an uncomfortable double date. I have , at times, questioned my friends’ opinions of me due to the wide array of men they have set me up with. These types of blind dates are typically accompanied by the matchmakers. Every move or sound made is then studied by your friends to ensure that this brainchild will blossom into a fabulous relationship, upon which they will receive high praises for their insight. I personally advise anyone accepting one of these dates to remain neutral in the event of a disagreement between any party members. Your opinion may lead to the disastrous break up of a friendship, relationship, or even both. Newspapers have carried classified ads for as long as I can remember. In my experience, â€Å"blind† isn’t even the word for this type of blind date. In this f...

Friday, November 22, 2019

Meaning and Uses of Decompilation

Meaning and Uses of Decompilation Simply speaking, decompilation is the inverse of compilation: translating an executable file into a higher level language. Suppose you lose your Delphi projects source and you only have the executable file: reverse engineering (decompilation) is useful if the original sources are not available. Hm, sources not available, does this mean that we can decompile other peoples Delphi projects? Well, yes and no... Is True Decompilation Possible? No, of course not. Fully automated decompilation is not possible - no decompiler could exactly reproduce the original source code. When a Delphi project is compiled and linked to produce a standalone executable file, most of the names used in the program are converted to addresses. This loss of names means that a decompiler would have to create unique names for all the constants, variables, functions, and procedures. Even if a certain degree of success is achieved, the generated source code lacks meaningful variable and function names.Obviously, source language syntax no longer exists in the executable. It would be very difficult for a decompiler to interpret the series of machine language instructions (ASM) that exist in an executable file and decide what the original source instruction was. Why and When to Use Decompilation Reverse engineering can be used for a several reasons, some of which are: Recovery of lost source codeMigration of applications to a new hardware platformDetermination of the existence of viruses or malicious code in the programError correction when the owner of the application is not available to make the correction.Recovery of someone elses source code (to determine an algorithm for example). Is This Legal? Reverse engineering is NOT cracking, although it is sometimes difficult to draw the fine line between those two. Computer programs are protected by copyright and trademark laws. Different countries have different exceptions to the copyright owners rights. The most common ones state that it is ok to decompile: for the purposes of interpretability where the interface specification has not been made available, for the purposes of error correction where the owner of the copyright is not available to make the correction, to determine parts of the program that are not protected by copyright. Of course you should be very careful / contact your lawyer if you are in doubt whether you are permitted to disassemble some programs exe file. Note: if you are looking for Delphi cracks, key generators or just serial numbers: you are on the wrong site. Please bear in mind that everything you find here is written/presented for exploration / educational purposes only. For the moment, Borland does not offer any product capable of decompiling an executable (.exe) file or the Delphi compiled unit (.dcu) back to the original source code (.pas). Delphi Compiled Unit (DCU) When a Delphi project is compiled or run a compiled unit (.pas) file is created. By default the compiled version of each unit is stored in a separate binary-format file with the same name as the unit file, but with the extension .DCU. For example unit1.dcu contains the code and data declared in the unit1.pas file. This means that if you have someones, for example, component compiled source all you have to do is to reverse it and get the code. Wrong. The DCU file format is undocumented (proprietary format) and may change from version to version. After the Compiler: Delphi Reverse Engineering If you would like to try to decompile a Delphi executable file, these are some of the things you should know: Delphi programs source files are usually stored in two file types: ASCII code files (.pas, .dpr), and resource files (.res, .rc, .dfm, .dcr). Dfm files contain the details (properties) of the objects contained in a form. When creating an exe, Delphi copies information in .dfm files into the finished .exe code file. Form files describe each component in your form, including the values of all persistent properties. Every time we change a forms position, a buttons caption or assign an event procedure to a component, Delphi writes those modifications in a DFM file (not the code of the event procedure - this is stored in the pas/dcu file). In order to get the dfm from the executable file we need to understand what type of resources are stored inside a Win32 executable. All programs compiled by Delphi have the following sections : CODE, DATA, BSS, .idata, tls, .rdata, .rsrc. The most important from decompiling point of view are the CODE and .rsrc sections. In the Adding functionality to a Delphi program article some interesting facts about Delphi executables format, class info and DFM resources are shown: how to reassign events to be handled by other event handlers defined in the same form. Even more: how to add your own event handler, adding the code to the executable, that will change the caption of a button. Among many types of resources that are stored in an exe file, the RT_RCDATA or the Application-defined resource (raw data) holds the information that were in the DFM file before the compilation. In order to extract the DFM data from an exe file we can call the EnumResourceNames API function... For more information on extracting DFM from an executable go see: Coding a Delphi DFM explorer article. The art of reverse engineering has traditionally been the land of technical wizards, familiar with assembly language and debuggers. Several Delphi decompilers have appeared that allow anybody, even with limited technical knowledge, to reverse engineer most Delphi executable files. If you are interested in reverse engineering Delphi programs I suggest you to take a look at the following few decompilers: IDR (Interactive Delphi Reconstructor) A decompiler of executable files (EXE) and dynamic libraries (DLL), written in Delphi and executed in Windows32 environment. Final project goal is development of the program capable to restore the most part of initial Delphi source codes from the compiled file but IDR, as well as others Delphi decompilers, cannot do it yet. Nevertheless, IDR is in a status considerably to facilitate such process. In comparison with other well known Delphi decompilers the result of IDR analysis has the greatest completeness and reliability. Revendepro Revendepro finds almost all structures (classes, types, procedures, etc) in the program, and generates the pascal representation, procedures will be written in assembler. Due to some limitation in assembler the generated output can not be recompiled. The source to this decompiler is freely available. Unfortunately this is the only one decompiler I was not able to use - it prompts with an exception when you try to decompile some Delphi executable file. EMS Source Rescuer EMS Source Rescuer is an easy-to-use wizard application which can help you to restore your lost source code. If you lose your Delphi or CBuilder project sources, but have an executable file, then this tool can rescue part of lost sources. Rescuer produces all project forms and data modules with all assigned properties and events. Produced event procedures dont have a body (it is not a decompiler), but have an address of code in executable file. In most cases Rescuer saves 50-90% of your time to project restoration. DeDe DeDe is a very fast program that can analyze executables compiled with Delphi. After decompilation DeDe gives you the following: All dfm files of the target. You will be able to open and edit them with Delphi.All published methods in well commented ASM code with references to strings, imported function calls, classes methods calls, components in the unit, Try-Except and Try-Finally blocks. By default DeDe retrieves only the published methods sources, but you may also process another procedure in a executable if you know the RVA offset using the Tools|Disassemble Proc menu.A lot of additional information.You can create a Delphi project folder with all dfm, pas, dpr files. Note: pas files contains the mentioned above well commented ASM code. They can not be recompiled!

Thursday, November 21, 2019

Was Hitler's rise to power due to his own strengths or to the Essay

Was Hitler's rise to power due to his own strengths or to the situation in Germany - Essay Example Political power sometimes is achieved out of situational advantage.The greatest racist in history Adolph Hitler did exactly that His views as a racist seeped into the general German mass that ultimately helped him to perform the notorious genocide killing 5 million Jews.The greatest racist in history Adolph Hitler did exactly thatHe incorporated racism within the cross section of the German mass against the Jews though various methods like using media to his benefit and through overwhelming oratory. The idea of racial discrimination through methodical racial institutionalization of education, employment and health was put into the ultimate practice with fearful results. For example the speech presented at Munich on the date April 12, 1922 presents the insight of the conceptualization and formulation of raciest ideas and making it the instrument of gaining power at the Reichstag. The situation and the groundwork were favorable for Hitler. Germany was passing through a phase of humilia tion and unemployment with economic downfall after the defeat of First World War.The Weimar republic was in power during the post First World War period starting from 1919. The Weimer government was completely unsuccessful with their political and financial policies and unemployment was on a high. As it is the country's defeat in the First World War resulted in economic instability that further incorporated fascist and Spartacist coups, like that of Hermann Ehrhardt's Freikorps, with wide spread political extremism and overall lawlessness. Constitution formed after abdication of Kaiser Wilhelm II was inappropriate and weak and soon it lost popularity. The economy was badly hurt as a result of WWI defeat and treaty of Versailles claiming 20,000 billion gold marks as war reparations. This result in the currency to be unstable with 469,000 million marks national debt. Furthermore the economic coal fields of Rurh were occupied by the French government. To add more problem the 1929 stock market crisis made matter more severe. All these conditions ultimately led into hyperinflation that summed up to 663 billion marks. There are also enough evidences that Hitler political power was based upon brute force with his incorporation of brutal political murders with included murder of communist leaders. Additionally, he blamed the Jews for all economic and political crisis of Germany and motivated the population to become anti-Semitic. Once the population became Anti-Semitic it was helpful to gain popularity and thus gain political power as the Germans regarded Hitler to be their savior. However, election results show that there is a gradual rise of popularity of the Nazi party from 1928-1932 but the main problem remained that there was no specific party individually strong enough to rule. This was a situation of an example of political instability in Germany that Hitler took complete advantage. (Rise of Nazism, 14-15) An evaluation of the sources Hitler, Adolph; Hitler Speaks in Munich; SPEECH OF April 12, 1922; NBT; 1999 The Rise of Nazism; pp-14-15 This book published in 1999 was recovered from Russian Achieves and presents a wide range of speeches by Hitler. These speeches show the methods by which Hitler uses to motivate the audience with fact at the beginning and fallacy to back his intentions. In his speech Hitler started off with the right note by pointing towards the defeat of the First World War as this would be the best possible mode of attracting the audiences' attention as logically enough that would be the most concerned element of the mass during the 1922 Germany. He promptly indicates that there was a "debt of some 7 or 8 millions of marks and beyond that was faced with the debts of the rest of the world" (Hitler, 1, 1). This the best possible manner by which he could effectively guide his intentions towards a well formulated methodical approach that would enable him to take the audience by his side

Tuesday, November 19, 2019

Attachments theory as it affects adolescants Essay

Attachments theory as it affects adolescants - Essay Example According to attachment theory, primary caregivers become increasingly differentiated from other people in the minds of infants during their first year of life. During childhood, adolescence, and adulthood, many individuals encounter difficulties in their relationships with parents and spouses that shake their confidence in the availability of these attachment figures. Such difficulties may fundamentally disrupt attachment bonds and dramatically reduce an individual's capacity to adapt to challenges outside the family. In the second volume of Attachment and Loss, Bowlby (1973) refined his definition of the set goal of the attachment system. In considering the effects of separations on children, he moved toward the notion that security derives from a child's appraisal of an attachment figure's availability (Bowlby, 1973). The child needs to experience a parent who is not only accessible but also responsive. This aspect of security incorporated Ainsworth's findings that it is the quality of day-to-day interactions, not just major separations, that influences infants' attachment expectations. In contrast, various nonresponsive or insensitive f orms of care can undermine the infant's confidence or even lead to expectations for rejection or inconsistent response. Separation distress results from the appraisal that a parent is inaccessible (Ainsworth et al., 1978). This perceived threat to a parent's accessibility activates the attachment system and motivates a child to reestablish contact. Emotional reactions accompanying the appraisal of threat include fear and anger. Fear activates the attachment system and signals the child's distress. Anger results from frustrations that the child encounters in trying to regain access, and it mobilizes efforts to reestablish contact. Adolescents The adolescent, by contrast, may act out her conflict about separating through fights with her mother and open defiance. Her upheaval may be more visibly apparent in her relationship with her mother, more provocative and dramatic. Girls may direct their acting out toward their bodies and engage in behaviors that are outside of the domain of parental control. They are at increased risk for eating disorders, reckless or promiscuous sexual activity, and self-cutting or other forms of mutilation. Adolescents may also use drugs and alcohol to rebel, explore, and escape painful feelings. Self-defeating or destructive behavior may provide an illusion of independence while also serving to defend against regressive longings. The thrill and power of reckless acting out can reduce their sense of vulnerability and distract from feelings of loss associated with the transition from childhood dependence. The attachment to a therapist can take pressure off the mother-daughter dyad, as some dependenc e needs are being met in a relationship outside the family. However, the stage is then set for the adolescent to recreate with the therapist elements of her struggle with her mother. Her dependence on the therapist can trigger resistance to treatment. Like the defiance at home, acting out within therapy may serve both to rebel against therapeutic influence and to pull for protective intervention (Cassidy et al., 2003). Similar patterns of maladaptation have been identified in adolescents and adults who are classified as

Saturday, November 16, 2019

All Souls Essay Essay Example for Free

All Souls Essay Essay All Souls Essay In the memoir All Souls, by Michael Patrick MacDonald, one significant event that takes place were the busing movements, along with the riots that followed. During the 70s, when Michael was very young and in grade school, the Boston busing crisis began. The Boston government began busing kids to schools in different neighborhoods, in an attempt to desegregate schools. This caused mass outrage in many areas, especially Southie. Outside of Southie and the projects, society expected people accept these changes and to accept the desegregation. But in Michael’s community, everybody was against this, and took violent actions against it. By both his family and his community, Michael was expected to be against the busing movements. As it would turn out, Michael was also against it. He went as far as to throw rocks at the buses coming into his town. He described it as shameful if you did not partake at least a little bit in the violent acts. This example of the busing is a great example of how one’s mind is influenced by others. Here, Michael can be influenced by one of two sides; larger â€Å"outside† society telling him to accept the busing, or his family and small community telling him to deny it. I feel as if no matter who or what, one is much more influenced by the ones closest to them, whether it be a close family or a close community. Michael describes in the book that at many points, it feels like it’s Southie vs. the World. And no matter what, as another member of the Southie community, Michael will side with his home.

Thursday, November 14, 2019

Personal Narrative On Being Teased and Accepting Yourself :: essays research papers

I had always been comfortable in myself, it never really bothered me how I looked, nor did it seem to bother others, the people who I called friends. As I walked through the door somehow it was as if, overnight I was expected to wear clothes that I felt awkward in (but still looked cute), shoes that hurt my feet, and makeup that clogged my already full pores. I was met with grins and giggles from others. I caught tidbits of what they were saying. ?Look at her shoes! Why is she wearing those? They have holes and don?t even match what she has on.? said anonymous person number 1. I looked down, sure my Chucks were a little faded (okay a lot faded), but they were comfortable and isn?t that what mattered I thought. ?God does she even wash her face anymore, its like erupted, I can?t even see a smooth patch of skin? chimed in anonymous person number two. Its genetic, who are these people, and why are they making me feel bad about myself, I thought. Okay, now as I think back, I will admit that it being the first day of middle school I should have put a little effort in my appearance but, who did I have to impress? Weren?t we coming here to learn? If I was going to sit in a classroom for 8 hours a day I needed to be comfortable. By now I?m sure you have already gathered I was a tomboy. The kind of girl who would rather play with the boys than sit on the sidelines and talk about how ?oh so cute they looked when they caught the football?. Now I think my mother is to blame for this, she never really did give into that girly stereotype that most mothers did. Where I was only going to do cheerleading ?because I?m a delicate flower and all that yadda yadda yadda ya?. She always let me make my own choices and never forced things upon me. Boy did she really mess me up, I mean being so understanding and all. And so my morning went, being verbally assaulted by people who I didn?t even know, scrutinizing every aspect of my wardrobe, being so blunt and uncaring to the fact that I could hear them, I was on the verge of tears. Somewhere in between hearing them trying to figure out why ?

Monday, November 11, 2019

Scarlet Letter Pearl

Scarlet Letter- pearl Through out the story Pearl was said to be a curse of Hester's adultery but personally I believe she was somewhat of a blessing and a curse. For a child Pearl had amazing intelligence and was able to imagine a multitude of different personas but being as intelligent as she is, is not always a good thing for she knew that she was an outcast and even the imaginary personas she created were not her friends but enemies.The ways in which Pearl was a blessing were for fact that other than Mr. Dimmesdale she was her mother's only companion throughout all the years and the other than Mr. Dimmesdale she could be there all the time not just when they can meet in the forest. Pearl was thought by Hester to be her redemption even if it was too late for herself she wanted the best life for pearl so she would try to do everything for her to Hester, Pearl was the greatest blessing she could have asked for and maybe even more so. he was also a blessing because when Hester and Di mmesdale meet up in the woods she would not acknowledge Hester without the letter on her chest and would not accept a kiss from Dimmesdale because she did not want them hiding in secret any longer and wanted them to come fourth and for them to be a family by asking if they were all going to walk back into town together holding hands. Although Pearl was a blessing she was sort of a curse in more ways than one. She was always hard for Hester to manage throughout the years because she was a very difficult child to manage being her mother's daughter she was strong willed and very hard headed.Also she was look upon as a curse for even after the letter is removed Pearl will be looked upon as the one remaining emblem to remind every one of the sin of how she was created. she is also looked as a curse for her outbreaks of anger when children would lash out with their tongues she would burst into an outrage scaring off her cruel taunters then she would return to normal and be just as happy a s can be. Pearl was believed to be a curse by most because she was the product of sin and often showed signs of which she was of evil origin.Pearl was not purely evil or a curse because what she wanted was pure even if sometimes she went about it wrong, all she really wanted was for Dimmesdale to admit that he is her father and for them to be a happy family. Pearl is drawn to the scarlet letter on Hester's chest because she believes it is not a sign of sin or crime but one to show that it was her love and not to be ashamed of it that Pearl was not a product of sin but a product of love and affection and wear it proudly till she can show all of them that she and Dimmesdale love each other.Pearl was a blessed curse one in which was made on a sin of act but turned to help both Dimmesdale and Hester realize what it was that they wanted. if you look at one of my favorite quotes â€Å"I see now that the circumstances of one's birth are irrelevant; it is what you do   with the gift of l ife that determines who you are. â€Å"-Mew-two from Pokemon: the first movie it relates highly to Pearl because does it really matter how she came in to this world she did something no other could do by bringing out both the truth of who the father was and helped them realize they all wanted to be together as a family, that is why Pearl was a blessed curse.

Saturday, November 9, 2019

Computer architecture Essay

Describe how analogue data can be converted and stored in computer systems Analogue data needs to be sampled in order to be processed by a computer. As computers deal in One’s and Zero’s it can only record specific intervals. For example, when recording a sound that gradually gets louder over a minute, a digital recording could record the level of sound every second, but would lose the information between seconds. If the sound was sampled every half second, there would be half as much information lost from the original source, but file size would be doubled. This is the trade off that has to be made between file size and quality. Bit depth is the number of bits of information recorded per second . The higher the bit depth means, the higher the sample rate and this results in higher quality sound file. A good example of bit depth is in CD quality audio which has a bit depth of 16 bits and a sample rate of 44. 1 kHz. Task 3 (P5) Describe the key components of a computer architecture and how they interact 1. Data Buffer – this is a region of memory used to temporarily hold data while it is being moved from one place to another. 2. Accumulator A – An 8 bit CPU has 1 register called the accumulator, this holds temporary data e. g. the carry-out when you do addition. 3. Arithmetic Logic Unit (ALU) – this is the workhorse of the CPU because it carries out all the calculations. 4. Data Buses – the mechanism that moves information around a computer. 5. Address Buffer – this holds the address part of the instruction register, 6. Program Counter – this contains the location of the next instruction to be executed and, therefore, keeps track of where the computer is up to in a program. 7. Instruction Register (IR) – this divides the information it receives into two fields. One field in the IR contains the operation code that tells the CPU what operation is to be carried out. The other field, called the operand field, contains the address of the data to be used by the instruction. 8. Condition Code Register (CCR) – this takes a snapshot of the state of the ALU after each instruction has been executed and records the state of the carry, negative, zero, and overflow flag-bits. In the above diagram the flag-bits are H, I, N, Z, V & C. Task 4 (P6) Describe the features of a processor Multi-tasking. Multi-tasking is a method where multiple processes are dealt with at once sharing common processing recourses such as a CPU. It involves the CPU assigning which instructions to be carried out first but it only focuses on one instruction at a time. Pipelining Pipelining is a method in which the Processor begins to execute a second instruction before the first has finished. Every pipeline is divided into segments and each segment can be ran along side each other. When each segment completes its task it moves on to the next. Cache (Level 1 and Level 2) Cache is a portion of memory made of high-speed static RAM (SRAM). As a result Cache memory is much more efficient than the main memory (RAM) which is dynamic RAM (DRAM) that runs slower but also cheaper. The cache is a smaller, faster memory which stores copies of the data from the most frequently used main memory locations. DRAM is dynamic in that, unlike SRAM, it needs to have its storage cells refreshed or given a new electronic charge every few milliseconds. SRAM does not need refreshing because it operates on the principle of moving current that is switched in one of two directions rather than a storage cell that holds a charge in place. If the computer processor can find the data it needs for its next operation in cache memory, it will save time compared to having to get it from random access memory. Level 1 cache is normally built on to the processor chip. It is extensively used for all sorts of purposes such as data fetching, data shifting and data loops, storing only small amounts of data. Level 2 cache is normally located on the motherboard. L2 cache stores much more data, coming usually from the L1 cache. L2 cache can be up to sixteen times the size of L1 cache; this also means that it takes up much more room so it has to be located on the motherboard. Clock Rate The clock rate is the speed at which a processor clock oscillates constantly from a one to a zero, this is measured in hertz. The clock rates speed is determined by an oscillator crystal and amplifier circuit inside a clock generator circuit. The limiting factor of the clock rate is the time it takes for the signal line to settle down from its on state to off state. The Clock rate is also as fast as L2 cache. Task 5 (P7) Describe the operation of logic gates using truth tables NOT   AND (2 inputs) OR (2 inputs) Consider how these three main gates can be combined. NOR (2 inputs) NOT Logic Gate also known as (Inverter) The output is â€Å"true† when only one input is â€Å"false. † Otherwise, the output is â€Å"false†. A Not gate is a logic gate which reverses the state of the input. AND Logic Gate The output is â€Å"true† when both inputs are â€Å"true. † Otherwise, the output is â€Å"false. † OR Logic Gate The output is â€Å"true† if either one or both of the inputs are â€Å"true. † If both inputs are â€Å"false,† then the output is â€Å"false. † These three main logic gates can be used to make other possible combinations of logic gates such as a NOR gate. NOR Logic Gate. The NOR gate is a combination of an OR gate followed by an inverter. The output is â€Å"true† if both inputs are â€Å"false. † Otherwise, the output is â€Å"false. † Task 6 (M1) Explain using examples how data travels around the processor Task 7 (M2) Create logic circuits using simple logic gates and provide truth tables This is a circuit that shows binary addition. Here are a few examples of the circuit being carried out. The Red circle/circles show input and Green circle/circles show output data This can be shown in the truth tables below. Task 8 (M4) Provide a description of both astable and bistable flip- flops. A flip-flop is an electrical circuit that can be in one of two states. Astable flip flop Astable flip flop is an oscillator which regularly switches states all the time. It has one 1 input and 1 Output. It can be used as a clock. Bistable flip flop Bistable flip flop is a memory device/gate which keeps one state indefinitely while it has power it also has 2 inputs and 2 outputs. The difference between An Astable and Bistable flip flops. A bistable flip-flop is a multivibrator with two stable states and can be put into either of its two states and it will stay like that. An example of this could be: A simple light switch; turn it on, it stays on, turn it off, it stays off. Task 9 (D1) Create complex logic circuits made up of arrays of simple logic circuits. To produce an addition of two numbers each of four bit’s in length we must first. You can add two numbers together each four bit in length by extending the first full adder’s carry out to another full adder and so on. Until you get 4 full adder’s each following on from the last carry out. The way a full adder works: The circuit adds two bits Input A and Input B, taking into account the previous carry in, to give the Sum, and the carry out. Now we know how a full adder works we can now relate this to the idea of 4 full adders joined together by the last carry out and the diagram below illustrates this. Diagram 1 These diagrams (below) will show you how you can add two four bit binary numbers together using a logic circuit. Example 1 Binary 1111+ 1111 ______ 11110 These binary numbers with value of 1 stand for both switches (The inputs i. e. the two four bit numbers added together) and the sum which in this case are shown by the flashing of LED lights (The sum is the output). 0 means no switch or light is active. The first line of inputs for this study will always be A4,A3,A2,A1 The second line of inputs for this study will always be B4,B3,B2,B1 these two numbers will be added together Then it is a long underscore followed by Carrys C3,C2,C1 directly underneath And then finally the output sum shown as O Task 10 (D2) Compare and contrast two different processors I will compare the AMD Opteron quad core and the Intel core 2 quad processor q9650. AMD Opteron quad core 64-bit Computing Yes L2 cache 512kb x4 L3 cache 2mb Clock Speed 2. 1Ghz Special Features Rapid Virtualization Indexing AMD Smart Fetch Technology Front Side Bus (FSB) Speed 2000Mhz Watts 45 Price i 165 new Intel core 2 quad processor q9650 64-bit Computing Yes L2 cache 12mb Clock Speed 3Ghz Special Features Intel Virtualization Technology Enhanced Intel SpeedStep Technology Front Side Bus (FSB) Speed 1533Mhz. Watts 65 Price i 223 new Key components: Front Side Bus – The Front Side Bus allows the components to send and receive data from the CPU to the North Bridge and vise versa. The faster a computer’s bus speed, the faster it will operate, but a fast bus speed can’t make up for a slow Clock Speed. Clock Speed – The Clock Speed is the speed at which a microprocessor executes instructions these clock cycles per second are measured in hertz. Special Features: Virtualization -Virtualization also known as a virtual machine makes it possible to run multiple operating systems on one computer. SpeedStep Technology – SpeedStep Technology is built into some new Intel processors this can be used to change the clock speed by using a piece of software. Speed Step Technology allows the processor to keep up with performed operations. It greatly reduces power consumption and heat loss. Smart Fetch Technology – Smart Fetch Technology allows the processor core to enter a â€Å"halt† state and draw less power, which reduces CPU power consumption. Recommendation: Both processors have Quad-Core technology and 64 bit computing, however the difference is in the Clock speed, Cache memory and the extra features. Both processors have similar special features such as the AMD Rapid Virtualization Indexing and the Intel Virtualization Technology. Although the Intel core 2 quad processor q9650 has no L3 cache I think that the higher clock speed and L2 cache more than makes up for not having any L3 cache. Not to mention the Intel core 2 quad processor q9650 has Speed Step Technology which makes for a much greater performance. The Intel core 2 quad processor q9650 is more expensive but it is a price worth paying for such a greater performance.

Thursday, November 7, 2019

Bullying My Proposed Solution Essays

Bullying My Proposed Solution Essays Bullying My Proposed Solution Essay Bullying My Proposed Solution Essay Of all the trials and tribulations of parenthood, possibly one of the hardest things to deal with is knowing that your child has become the victim of a bully and deciding how to deal with this. Bullying in schools can be very hard to spot and put an end to it. Recent evidence suggests that bullying is very common in British schools. A survey by the childrens charity Kidscape found 69 percent of children aged 5 to 16 had been bullied at sometime, more than half of them repeatedly or seriously. When occasional teasing turns into serious physical or verbal harassment, the parents often think it is their time to step in. But there is usually little they can do. Any direct involvement by parents or teachers may backfire. Bullies can become infuriated when other people get involved and try to intervene. When the victims go to a teacher or adult it usually results in the bullies treating them worse for getting them into trouble. This can put children off getting any sort of help about any problems they are having because it would make them even more scared and insecure. When a victim of bullying has been harassed for a long period of time it can leave them feeling self-doubting, timid, depressed and possibly emotionally scarred. Continual bullying can influence the victims to take their stress out on other things or people. The victims may eventually begin taking out their anger on younger and smaller children, or in other ways such as self-harm, stealing, anorexia or, in serious cases, suicide. A person who is being bullied will feel unable to stop it happening. It may be carried out by a group of people or simply by one person. This bullying could involve physical abuse, threats, name-calling, or in less obvious ways such as ignoring or excluding someone. Bullying is very similar to harassment and other forms of abuse such as racism. Contrary to some belief both sexes bully and are bullied. The reason for the bully taking their anger out on younger or more vulnerable children could be problems at home or school, or possibly as a result of being abused or bullied by other people. Bullies usually seek attention and affection and it can sometimes be very hard to reason with them, as they may be stubborn and unwilling to cooperate.  The bullying should be stopped as quickly as possible as it may be harder to control if it goes further and gets more serious. Victims of bullying are usually small for their age, quiet and sensitive, the type of child who wouldnt fight back. The victim is seldom very popular or loud. As a result of this, other children are less likely to help them or come to their defence. School classes can be very large and it is not uncommon for bullying to occur in the classroom when teachers are present. This classroom bullying can surprisingly be very difficult to spot, whether it is verbal or physical. Teachers can be put in an awkward position when having to make a quick decision on how to confront the bully and this is the problem that is facing them at present.  In different schools across the country there are various methods in which bullying is dealt with, some more successful than others. Some of which include encouraging victims to tell a teacher or parent, punishing the bully, telling the victim to fight back or even holding a bully court run by fellow pupils. In my opinion bullying in schools should be tackled in the following way. One or more older, sensible members of the school should be elected as counsellors, which children can visit, in their spare time, to share any troubles and problems they are having with bullies. This confidential system enables the children to speak privately to an older and wiser member of the school and then get advice on what to do without going to a higher authority such as a teacher. The counsellors should be advised on how to recommend what to do in the victims situation. This method of confronting bullying has already been put to use in a minority of schools around England. I feel that this process would be very successful and help many victims of bullying out in dealing with their problem. How the counsellors deal with the cases that come up is either up to them or could be discussed in a large group of other counsellors or even teachers and, in serious cases, victims should perhaps be recommended to go to a higher authority if unquestionably necessary. Bibliography When the Bullies are in your court, www.antibullying.net.

Tuesday, November 5, 2019

English Role Play Practice - A Business Presentation

English Role Play Practice - A Business Presentation This dialogue focuses on asking questions about a business presentation with the present perfect and past simple tenses. Make sure you understand  the differences between these two tenses, practice the dialogue and then have your own conversations about work. Ask questions about what he or she has done, and use the past simple to ask specific questions on details. Teachers can use this guide to teaching the present perfect to further practice this form. On a Business Trip: A Presentation Betsy: Hi Brian, this is Betsy. How are you doing?Brian: Ive just returned from the Head Office. The weather is great! Boston is a great city!Betsy: Have you met Frank yet?Brian: No, I havent seen him yet. We have a meeting at 10 oclock tomorrow morning. We are going to meet then.Betsy: Have you made your presentation yet?​Brian:  Yes, I made the presentation yesterday afternoon. I was very nervous, but everything went well.​​Betsy: Has management given you any feedback yet?Brian: Yes, Ive already met with the sales director. We met immediately after the meeting and he was impressed with our work.Betsy: Thats great Brian. Congratulations! Have you visited any museums yet?Brian: No, Im afraid I havent had any time yet. I hope to take a tour around town tomorrow.Betsy: Well, Im happy to hear that everything is going well. Ill talk to you soon.Brian: Thanks for calling Betsy. Bye.Betsy: Bye.

Saturday, November 2, 2019

Q. Explain how high risk investments can end up contaminating fixed Essay

Q. Explain how high risk investments can end up contaminating fixed income securities - Essay Example This essay tries to answer how the high-risk investments contaminate fixed income securities. Although fixed income securities are safe to invest in, their earnings are relatively low thus it is wiser for an investor to invest in high-risk investments in the short run since the chances of earning more are high. The anticipated higher returns as stated above have led to the contamination of fixed income securities since an investor who aims to generate more income tends to invest in high-risk investments (International Monetary Fund, 2004). Liquidity is another factor of contaminating fixed income securities since the high-risk investments are easily convertible to cash in comparison to the fixed income securities (The Wall Street journal, 2010). This means that fixed income securities demand is low in the open market thus in case of inflation; an investor will lose more due to the depreciation of his principle amount. In high-risk investment, the market is always open thus one can sell his stock when he anticipates that its value will reduce incase of anticipated inflation. The risk of missing opportunity also contributes to high-risk investments contaminating fixed income securities (Moodys manual of investments, American and foreign, 1998). If the investor does not invest in a risky investment and the high returns are realized, he will curse why he did not take the risk. This makes it more possible for an investor to take the opportunity in high-risks investment more than in in the fixed income