Wednesday, November 27, 2019

Development of Space Power

Abstract Over the last few years, space power has received significant attention from the military. According to the military experts, space power can be a great asset to the military if it is fully utilized. Space power theory is regularly evaluated through sea, land, and air theories (Robertshaw Bergin, 2004).Advertising We will write a custom essay sample on Development of Space Power specifically for you for only $16.05 $11/page Learn More Through this, the theory’s development can be illustrated. It is commonly argued that space theory resulted from the advancements in air power theories. Some military experts argue that the difference between air power and space power is negligible. Nevertheless, it should be noted that space power is a unique field in the military sciences. During the Gulf War, the use of space power gave the US and the allied forces an added advantage over the Iraqi forces. During this war, the space power was utilized fo r the first time enabling its users to gain victory over their foes. Currently, it is acknowledged that the future of the military success lies in the ability of the forces to exploit the space power. In this regard, the US military should realize that an extensive knowledge and understanding on space power is very crucial to the future of the country and the world at large. This paper focuses on the developments in space power and its impacts on air power, sea power, and land power. Body As compared to sea power and air power, space power is a new concept in the military. According to the military history, land power has been exploited for thousands of years. However, in the 16th century many improvements in the military power were experienced. During this century, renowned advocates of land power and strategic theories emerged. Among these individuals are Jomini and Clausewitz. On the other hand, the sea power has been in existence for thousands of years. However, new theories wer e introduced in the 19th century enhancing the efficiencies of sea power.Advertising Looking for essay on government? Let's see if we can help you! Get your first paper with 15% OFF Learn More Among these theories were Mahan, Callwell, Rauol, and Julian theories. According to most scholars, land, sea, and air theories have played key roles in the developments of space theories. According to Mahan theory, advancements in land theories led to sea and air theories. Similarly, advancements in air theories led to space theories (Kearsley, 1992). In the 20th century, the air power emerged. Because of its utilization, much advancement was realized in the military. It is believed that improvements in air power inspired the development of space power (Mueller, 2010). As such, the developments in space power were realized after the World War II. According to the US military, advancements in radar and jet technologies led to the creation of satellite and rocket technologies. Duri ng the Cold War, military enmity between the Soviet and the US led to the improvements in space power. With these advancements, the US military became more concerned with human orbital activities owing to the risks and opportunities presented by the activities. Following the Sputnik launch in the year 1957 by the Soviet, the US felt threatened by Soviet’s military advancements (Sheehan, 2007). To counteract this initiative, the US military launched Explorer I in the year 1958. From then on, the space power advanced simultaneously with the Cold War. In the 1960s and the 1970s, space power realized tremendous developments in its skills, infrastructures, and plans. During the 1980s, the US and the Soviet’s military spending and dependence on space power increased significantly. During the same decade, the US military mandated its air force to oversee its space power operations (Mixon, 1988). It was not until the Gulf War that space power was used for the first time in the warfare to enhance land power, air power, and sea power (Swofford, 2003). Using the space power, the US military together with the allied forces gained a considerable lead in the war over their foes (Nardo, 1991).Advertising We will write a custom essay sample on Development of Space Power specifically for you for only $16.05 $11/page Learn More During the war, the use of satellite enhanced accuracy in bombing, navigation, and communication. With GPS, the US soldiers and the allied soldiers were able to navigate through the Kuwait and Iraq’s deserts with ease. Other advantages gained with the use of space power in the Gulf War were operational timing, tactical underground operations, and precise underground targeting. After the Gulf War, great militaries in the world realized the effectiveness and the potentials of space power (King, 1991). In general, the use of space power in the Operational Desert Storm is considered as a breakthrough in the history of the space power advancements. In the 21st century, space power has been employed by the US military in Iraq and Afghanistan wars (Darity, 2008). With the developments in space power, decrease in the land power, air power, and sea power applications in the current warfare has been realized (Ritzer, 2011). Despite the decrease, land, sea, and air operations have been enhanced by the developments in space power. As illustrated during the Gulf War, the use of space war boosted land operations (Bellamy, 2009). Air power theories assert that warfare can be won through the ability to control air operations. In this regard, advancements in space theories have enhanced air operations through satellite communications and dominant maneuver. On the other hand, advancements in the space power theories have boosted sea power theories. Space power theories attributed to Jomini and Mahan, believe that superiority over the sea can allow the interested countries to have control over water bodies for peace and war initiatives. Therefore, advancements in space power have enhanced sea power theories by easing naval operations through better maneuvers and communications (Bailey, 2012).Advertising Looking for essay on government? Let's see if we can help you! Get your first paper with 15% OFF Learn More References Bailey, D. (2012). The future of warfare: what’s next?. Mankato, MN: Creative Education. Bellamy, A. J. (2009). War. London: Routledge. Darity, W. A. (2008). International encyclopedia of the military sciences (2nd ed.). Detroit, Mich.: Macmillan Reference USA. Kearsley, H. J. (1992). Maritime power and the twenty-first century. Aldershot, Hants, England: Dartmouth ;. King, J. (1991). The Gulf War. New York: Dillon Press. Mixon, B. R. (1988). Concentration of Military Force in Joint Operations: Applying Theory to Reality . Ft. Belvoir: Defense Technical Information Center. Mueller, K. P. (2010). Air power. Santa Monica, CA: RAND. Nardo, D. (1991). The Persian Gulf War. San Diego, CA: Lucent Books. Ritzer, G. (2011). Globalization: the essentials. Oxford: Wiley-Blackwell. Robertshaw, A., Bergin, M. (2004). Warfare in the 20th century. Columbus, Ohio: Peter Bed- rick Books. Sheehan, M. (2007). The international politics of space. London: Routledge. Swofford, A. (200 3). Jarhead: a Marine’s chronicle of the Gulf War and other battles. New York: Scribner. This essay on Development of Space Power was written and submitted by user T0adMen to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Old Guard and Young Turks

Old Guard and Young Turks Old Guard and Young Turks Old Guard and Young Turks By Maeve Maddox Both terms, Old Guard and Young Turks, have been adopted for various purposes. According to the Wikipedia disambiguation pages, the terms have been applied to everything from a magazine and Internet news service to a street gang. In a general figurative sense, the terms are ideological opposites. Originally, the term Old Guard had military connotations, but now it is used in reference to any type of group. It refers to the older and most conservative faction in an organization. Aversion to change is the old guard’s most salient characteristic. The term Young Turks originated with the civil conflicts that racked Turkey at the beginning of the 20th century. It referred to opponents of the sultan’s absolute monarchy. They formed the Committee of Union and Progress and seized power in 1913. Nowadays the terms represent opposing models of leadership. The Old Guard want to keep things as they were. The Young Turks want to change the way things are done and don’t want to do it gradually. Here are some uses drawn from different countries and different types of organizations. Tea party vs. old guard in GOP Senate rift (Headline, The Denver Post) Old guard and young turks combine for stunning  victory (Headline for a story about an Australian cricket match) A storm is brewing within the MDC-T dominated Bulawayo City Council (BCC) as the party’s â€Å"young turks† who were elected as councillors in last month’s elections feel the â€Å"old guard† had failed the local authority. (Sunday News, Zimbabwe) [In a book about the C.I.A.] he traces the bitter fights between Langley’s old guard and Young Turks over whether the agency should use the new armed Predator drones to hunt and kill even Osama bin Laden. (New York Times) Army rifts: Is the old guard taking on the young Turks? (Headline, (Daily Monitor, Uganda) The majority which would control the vote would be a coalition between the â€Å"old guard† Democratic Party establishment, and the â€Å"young turks,† recent graduates of the University of Hawaii Law School. (Fighting Tradition: A Marine’s Journey to Justice by Bruce I. Yamashita) Santa Cruz Sierra Club: Old Guard vs. Young Turks (Headline, Santa Cruz Patch) Another â€Å"guard† expression is used when new leaders take over from the previous crew: changing of the guard. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:45 Synonyms for â€Å"Food†75 Idioms and Expressions That Include â€Å"Break†15 Names and Descriptions of Effects

Thursday, November 21, 2019

Aspects and Management of Hazardous Waste Assignment

Aspects and Management of Hazardous Waste - Assignment Example As the discussion highlights  hazardous waste can cause damage if there is improper storage, during transportation, treatment or even in the process of disposal. Improper waste handling can also lead to contamination of surface and ground water supplies. People living near old and abandoned waste disposal sites particularly may be vulnerable to hazards caused by such waste. To remedy existing hazards and reduce cases such as this in the future, most governments closely monitor and regulate practices of hazardous waste management. This report aims at explaining the aspects that relate to handling, managing and transporting hazardous waste as well as how it can be stored such that it does not generate into non- reversible risks to the humans and the environment.  As mentioned in the introduction, hazardous waste is classified according to the chemical, biological and physical properties present. The properties are likely to generate materials that are reactive, toxic, corrosive, ignitable, radioactive or even infectious. Toxic wastes no matter how small traces of it are extremely poisonous. Such waste may have serious effects that lead to death or a violent illness. It may also manifest itself in the human body causing chronic effects that eventually cause irreparable damage. Some of the properties are cancer causing agents that may present after a long period of exposure. Other properties might be mutagenic, in the long run causing observable biological changes in the offspring of exposed humans as well as a nimals.

Wednesday, November 20, 2019

Freud and psychoanalysis Research Paper Example | Topics and Well Written Essays - 2000 words

Freud and psychoanalysis - Research Paper Example No matter what level of education an individual might have, it is likely he or she is familiar with the name of Sigmund Freud. Freud’s name is now synonymous with the theory of psychoanalysis. It is a science he essentially invented near the beginning of the 19th century. Sigmund Freud began his career as a medical doctor. He worked in Vienna with mental patients and it is because of this work that he is today considered one of the founding fathers of modern day psychology. It was while working with these patients that Freud developed the psychoanalytic theory. Clearly, Freud’s original training was not in the field that he started. He originally worked as a neurologist, but the common method of treating patients was to use hypnosis, something Freud wasn’t very good at but which forced him to take a more imaginative approach to treating the mind that would revolutionize the way people thought about thought (Robbins, 1999). Although Freud was obviously not the fir st individual to study how the mind worked and he would obviously not be the last, Freud is given credit for making the first major break-through in treating the mind as an entity existing at least partially separate from the body. He identified that there were at least three different levels of thought and realized that these levels interacted and intertwined. Putting these pieces together led to his development of psychotherapy. Freud classified three major components as comprising an individual’s psyche. These were the id, the ego and the superego. This intuitive leap from biological function to mental processes did not occur by accident. To fully understand Freud’s theories, his theoretical model of the human mind and how these ideas translate into his theories regarding human culture, it is necessary to understand how these ideas developed as well as how Freud expressed

Sunday, November 17, 2019

Is it morally acceptable to consider race and ethnicity as factors in Essay

Is it morally acceptable to consider race and ethnicity as factors in university admissions - Essay Example This was because racism was a major issue of concern during that period and supporting the admissions of racial minorities was considered as a step in overcoming this problem. The recent perspective for this encouragement of admissions of people from different races is the achievement of diversity in the educational institutions (Biskupic). Following the year 1978, there have been different legal proceedings on this issue and questions have been raised regarding the moral acceptability of the consideration of race and ethnicity as factors in university admissions. The year 2003 was very important in the United States with regard to the issue of consideration of races in university admissions. The Supreme Court gave a ruling that admissions in universities by utilizing race as a factor were constitutional if the selection was fair and proper methods of selection of the students were used. This ruling came in the cases relating to the University of Michigan. The court indicated two ben efits of this policy which included the fact that they brought positive effects for the society and they were also associated with bringing diversity to the universities which is a very important part of the educational atmosphere. Furthermore, President Faulkner also supported this ruling and presented positive thoughts on this ruling. He explained that groups that are ignored and not properly represented would be able to come forward and become active members of the society as well (Blum; Editorial). Thus, for the betterment of the society and the proper representation of all the people, the usage of race as a factor in university admissions is acceptable. An important legal proceeding which has challenged the previous rulings of the Supreme Court is the case of Abigail Fisher. Since almost three decades, the Supreme Court supported the utilization of race as a criterion for university admissions but it is now believed that the Court might reconsider its decision. Fisher is a resi dent of Houston and is a white and she has filed a petition against the University of Texas at Austin by claiming that her rejection by the university was unjust and unfair. She has put forward the fact that many students coming from ethnic minorities who had educational records like her were given admission by the university. The proceedings of this case have taken place in the Supreme Court and it is feared by many university administrators that the court might issue a verdict in favor of Fisher. While awaiting the judgment on the case, administrators of educational institutions have sited their fears with regard to this issue. Marvin Krislov who is the President of the Oberlin College of Ohio has put forward these concerns by explaining that the students of minority groups would greatly reduce if the verdict comes in favor of Miss Fisher (Biskupic). Furthermore, the decision of the University of Texas was supported by many universities across the United States and universities pr ovided their written opinions to the court to rule in favor of the University of Texas and allow it to follow its admission policies of considering race as a factor in admissions (Blum). The usage of race and ethnicity as a factor in university admissions has been banned in many states in the United States. These include California, Washington, Michigan, Nebraska and Arizona. The usage of rac

Friday, November 15, 2019

The Importance Of Security In Distributed Systems Information Technology Essay

The Importance Of Security In Distributed Systems Information Technology Essay The total number of computer systems installed within any organization has been increasing at a phenomenal rate. The relative ease of installing and utilizing computer applications is a compelling reason for connecting computer systems together and distributing or sharing the work. These distributed systems allow you to take better advantage of the vast array of processing power now available. Distributed computing probably means many different things to many different people. To some, it means client or server, it is cooperative processing and to still other, its using a distributed database. Further explanations and definitions may be required to ensure that everyone has a common view and understanding of a distributed computing system. When referencing a distributed computing system, every user should be able to see the same thing. A distributed computing system is composed of system elements which are then distributed across different processing platforms connected by a network. In this paper, have 10.0 Section. Each of the section will describe. Section 2.0 is about Distributed System. Section 3.0 is about Threat of distributed System. Distributed System Security will describe in Section 4.0. The next Section 5.0 is about Distributed System Security Mechanism. Distributed System Security Architecture will describe on Section 6.0.We can know about Distributed System Requirements in Section 7.0. In Section 8.0, we can know Factors Affecting Distributed System Security. Contribution in the security, we can see on Section 9.0 and finally Section 10 concludes this paper. Distributed System Today, computers are not stand alone units. Several computers are being networked together to form large computer systems. Not only are computers being network, but they are being networked into large distributed systems where each individual computer, node if you will, can make use of the applications distributed throughout the system (Dobry Schanken, 1994). Study on the formal specification of authorization has become a major challenge in the current development of secure computing and IT systems (Yun, 2008). Figure 1. Authorization (Access control) in a distributed environment. Consider a distributed environment as shown in Figure 1, in which different users can access various resources through the network (Internet). Therefore, from the definition above, it indicates how an organization can benefit from using the distributed system as shown below: Resource sharing It is possible to use different types of hardware, software or data wherever in the system hence reduce unnecessary costs related with the tools. Also it supports resource sharing model that describes the way resources are provided, the way they are used as well as the way provider and users interact between each other. There are more benefits such as through search engines and computer based working were different information can be shared in inexpensive and easy way. Concurrency Several processes can take place at the same time while components access as well as update any of the shared resources including databases. The important thing is that concurrent updates must be coordinated in order to maintain integrity of the system. Openness It allows detailed interfaces of components to be published and supports the integration of new components with existing once. Scalability The system is capable of accommodating changes in case of increase number in of users and resources it should be able to respond faster. This can be done by adding a number of processors with high speed to the system. Therefore the architecture and implementation must be flexible enough to allow it. Fault tolerance Distributed systems are capable of operating correctly even if there maybe some defects within the system (internal errors) for the purpose of increasing system dependability within an organization o a business. 3.0 Threat of Distributed Systems There are different threats when distributed system is concerned, as any networked computer system can face it. It is important to implement countermeasures for all expected threats for the purpose of the system to remain constant and cost effective. Those threats can be distinguished depending on their interaction as follows below: Denial of service Involves attacks that affect the availability of information from the system to the user resulting to paralysation of the entire operation of an organization or part of activities depending on the attack. The use of resource control mechanism can help in solving the above problem by applying timing responses, sizing responses, and connection control. Also problem detection by timing latency in system can easily be done if there is a dramatic increase of latency then denial of service (DoS) can be detected as well as addressed. Information leakage Is one of the threats of computer system specifically distributed systems where sensitive information can easily be revealed to unauthorized users that results to lack of confidentiality. Unauthorized access This can occur due to the reason that the physical configuration is not strong enough to protect such threats from accessing the system (distributed system). This is known as inter process communication threats. There is a need to for an organization that is willing to implement access control system to keep in mind three things which are models, access control policies as well as mechanisms (Krause Tipton, 1998). Access control policies will enable organizations to be able to specify different ways that will lead to proper management of access to resources as well as information which are the valuable assets of an organization. Distributed System Security The objective of any security system is the ability to keep a secret. This is as true automated systems as much as it is for people. It is as important to keep the information secret when it is stored as well as when it sent over a network. A secure system is the one that can be trusted to keep secret, and important word is trusted. Trusts can be defined as a confident reliance on the integrity, honesty or justice of another. Trust refers to the ability of the application to perform actions with integrity and to perform its functions on a continuing basis. However, individuals, governments and institutions such as banks, hospitals and other commercial enterprise will only consign their secrets to a computer system if they can be absolutely certain of confidentiality (Randell Rushby, 2007). The security architecture incorporates elements to safeguard the confidentiality of information and ensure that all access to the computing resources is authorized and authenticated. Defined security architecture can be used to ensure the design of applications and systems will meet the required security objectives. The architecture will help guide decisions between systems and across platforms and ensure all of the systems meet a standard minimum level of security. Nevertheless, the security still has some problem. For example, the problems of maintaining security are compounded because the sharing of secrets is generally desired but only in a tightly controlled manner. In case, an individual can choose other individuals or groups with whom he wishes to share his private information (Randell Rushby, 2007). This sharing is called discretionary security because it is permitted at the discretion of the individual. The trusted portion of a secure system is normally identified with a small operating system nuclear. The name is a security kernel. It is the rest of the operating system and all applications and user programs belong to the un-trusted element. However, certain difficulties attend the use of such kernelized systems. In the part of the structure of all secure systems constructed or designed recently has been influenced by the concept of a reference monitor (Randell Rushby, 2007). A reference monitor is a small, inaccessible, reliable mechanism that controls the behavior of un-trusted system elements by mediating their references to such external entities as data and other un-trusted elements. Each access is checked against a record of the accesses that the security policy authorizes for that element. Distributed System Security Mechanism Cryptography The security of information transmitted from one node to another is questionable, therefore there is a need of using a proper method of transforming it into unreadable formats (secrets writing) through cryptography. The use of a single key or public key cryptographic algorithm which is suitable for protecting message content by hiding information carried by a packet during the transmission process. This can be accomplished using RSA or AES algorithms. Authentication protocol Provides a series of communication procedures between users of the system and the server for the purpose of securing the communication process. Access control mechanism This can be done using access control lists (ACL) that consists of a list related to an object that states all the subjects that can be allowed to access the object, as well as the rights to the object. ACL normally are implemented directly or as an approximation in recent Operating systems Distributed System Security Architecture The OSI Open system interconnection Reference model is often used to depict largely of distributed system architecture for it has the ability to describe various levels of service essential to support distributed transactions. Autonomous computer systems and their processes intercommunicate through the first four levels of OSI-RM. Middleware is considered as the bridge used to connect distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, as well as different programming languages In order to design, maintain and utilize the computational services offered by the distributed system, it is suitable to use abstraction of the distributed system physical architecture (Donnelly. 1979). The abstraction views the distributed system as a collection of processes that normally communicates with each other in the process. Processes communicate by passing messages; there if two processes communicate it means the communication is done over communication channels. 7.0 Distributed System Security Requirement There are many requirements of distributed system security that focus on the area of IT security criteria. That is the development of protection profiles. The protection profile is meant to describe requirements that must be met to achieve varying levels of security. These requirements presented component, categorized or relating to assurance. For example, trusted recovery is the components that refer to functions that respond to anticipated failures or discontinuity in operations (Dobry Schanken, 1994). Following a system failures the system must be able to recreate the Trusted Computing Base (TCB) secure states. Failure from which the system must be able to anticipate and securely recover include action that fail to complete because they detect exceptional conditions during their operations. The distributed system must be competent of recognizing failures in which of its components. This is because the overall TCB is a discontinuity in the protection provided by them. Another example is cryptography. The cryptography is a method of securing of information that has the components to establish the guidelines for using cryptography to secure the paths between nodes. Encryption and decryption performance of the system is the factor of the confidentiality and integrity of data communications .So, several different types of encryption may need to be used depending on the users environment. Although, there have several requirement of distributed system security such as trusted recovery, trusted path, security management and etc. They already have new concepts required to secure the connections between the various products that comprise the distributed system need to be included. A distributed system is one of the first implementations for be secure, must not only make use of traditional computer security concepts but have to utilize communication security concepts as well. Factors Affecting Distributed System Security There is a need to analyze and identify the factors as well as issues related to trustworthiness of services provided by distributed systems apart from network topology and node evaluation. These factors includes distributed system physical security environment, interactions between different security mechanisms and distributed system management structure, are very important and relevant compared to network topology and node evaluation levels. Below is more information concerning the factors mentioned above. Physical security There are some differences that occur in a distributed systems physical environment such as those that occurs due to the reason that the elements/components of a distributed system are located in different location which is the result of changes overtime in its environment. Jurisdiction authorities The wide spread heterogeneity in the physical security environment is the result of the process of administering a distributed system by multiple jurisdiction authorities due to the types of mechanisms supported. Interaction between security mechanisms In distributed system nodes are from different manufacturers, families of a single manufacturer, different versions which results into different security mechanism. In case stand-alone system or distributed systems that may be using different discretionary access control mechanisms are interconnected for the purpose of forming a single distributed system then it brings danger (Anderson. 1985). The interactions between different policies implanted in trusted subjects running in different nodes bring dangers to the system. Contribution The analysis presented in this paper was mention distributed system security that is a computer security architecture that provides a suite of functions including login, authentication, and access control in a distributed system to differ from other similar architectures. The distributed system security includes many applications that can help the system to protect to failure network. Therefore, this paper is suitable for individuals, governments and institutions such as banks, hospitals and other commercial enterprise that they would like to know the information of distributed system security. 10.0 Conclusion Distributed system security is fundamentally more complex than stand-alone system security. Current computer security concepts assume that trusts is assigned to a distributed system element on the basis of viewpoint. This security mechanism for distributed file systems solves many of the performance and security problems in existing systems today.

Tuesday, November 12, 2019

A Communist Society Essay -- Karl Marx Communism Manifesto Essays

A Communist Society A communist society is very different than the society Americans find themselves living in today. Communism is a term of ancient origin and is not a form of political party, but a type of socialism where the whole is greater than the sum of its parts. Therefore, the individual members of this, foreign, society blend into one greater populist all striving to succeed the same goal. In a communist neighborhood everyone shares and there is no wealth, or poverty, no social status at all. This concept of communism comes from a man, Karl Marx, the author of The Communist Manifesto. He shares his ideas of a utopian society and how to achieve it. For Karl Marx the individual man is a being he has the power to forge himself into what he desires, or what is desired for him. Marx decided men could be changed unlike things in nature that remain the same throughout time, "Yet, man does change in the course of history; he develops himself; he transforms himself; he makes his history; he is his own product..." (Fromm 26) It is here that Marx decided that this is what happened to the capitalist society. They chose to forge themselves to be the evil and greedy men communists believe they are today. Now that men can choose how they are to develop it is time for the individual in communism to be born. And the prototypical man for a communist society looks something like this: hardworking, always does his share of the work, never late to work, never leaves early, never complains that his pay is the same as the guy who works half as hard. A man who knows his place and understands that the good of the group comes before his own personal good. See, communists share everything, on paper communism is perfect... ...ite simply. The steps they take and methods to their madness are for them to understand. And if the people for which the society stand are knowingly involving themselves then it is nobody's place or right to tell them that they are wrong. It is no-one's business but their own. If a society can survive through the troubles of today's world, all the better and though it is different it does not mean wrong. FOOTNOTES - Fromm, Erich. Marx's Concept of Man. Fredrick Ungar Publishing Co. New York, 1966 - Dupre, Louis. Marx's Social Critique of Culture. Yale University Press. New Haven and London, 1983 - Gonzalez, Gilbert G. Progressive Education: A Marxist Interpretation. Marxist Educational Press. Minneapolis, 1982 - Zaretsky, Eli. Capitalism the Family and Professional Life. Harper and Row Publishers. New York, 1976

Sunday, November 10, 2019

Maritime Domain Awareness

SYNOPSIS FOR PAPER 3 ON MARITIME DOMAIN AWARENESS AS A VEHICLE FOR EFFECTIVE NIGERIAN NAVY OPERATIONS GUEST LECTURER:Rear Admiral FD Akpan (Rtd) EXECUTIVE SUMMARY 1. This paper discussed the concept of Maritime Domain Awareness (MDA) in the strategic dimension involving the security and safety of the maritime environment. It further stressed that safety and security of the maritime environment are critical for national security and economic wellbeing of any nation. While it highlighted the prospects of Nigeria’s littoral, the paper was quick to enumerate that there was need to present effective patrols, improve maritime security and provide a conducive environment within the maritime domain for enhanced commercial activities and foster the development of Nigeria. 2. The prospect of Nigeria’s maritime domain is enormous due to the presence of huge mineral deposit; however, the paper highlighted some threats to Nigeria’s adequate utilisation of the domain. These threats include nation state threat, terrorism, trans-national criminals, pirates, environment pollution and illegal immigration. Of interest to the presenter was the loss of revenue, employment opportunity and environmental degradation as a result of these threats to Nigeria’s maritime domain. The paper stressed the need for the NN to imbibe the tenets of maritime awareness by acquiring critical response architecture for effective naval operation. Some strategies proposed by the paper to address these threats include the preservation of the freedom of the seas/waterways through effective presence, facilitating and defending commerce and facilitating the movement of desirable goods and people, while screening out dangerous people and goods. 3. The paper enumerated the ISPS code and Safety of Lives at Sea (SOLAS) as some international instruments for enhancing MDA. However, there was need to fuse information and intelligence between government agencies and private ector because sharing of common data bases has been identified as one of the key to the development of an effective MDA. In line with this development, the paper stressed the need for Nigeria to implement the provisions of these instruments as proposed in the code as soon as possible to meet international standards and practice. 4. Building capacity for MDA as posited in the paper could be enhanced through a bill and an enabling act, because the bill would seek to prov ide the national structures, roles and the various guide lines towards the actualisation of the instruments of the conventions on MDA. Though the maritime security Bill is before the national assembly, the paper suggested the partnering of the NN with other key stakeholders in making inputs. However, due to the inhibitive cost of MDA programmes which would cause strains in planning regimes, there is need to utilize the provision for partnership to build enviable capacities for MDA within the International Maritime Organisation (IMO) and other well advanced countries. As part of measures to build capacity towards effective naval operation through MDA, the NN would need to acquire some infrastructure to facilitate the monitoring of vessels that enter Nigeria’s maritime domain. These infrastructures include Port Vessel Traffic Management Information System (VTMIS), coastal VTMIS, Automated Identification System (AIS), Long Range Identification and Tracking (LRIT) and Radio, Radar and Telecommunication system. 5. The strategic approach adopted in the paper for MDA involves consistent domestic and partner-initiated programmes, as well as significant regional collaboration given the trans-national character of most threats and vulnerabilities. Hence the proposal in the paper is a strategy incorporating regional and global realities. However, to achieve the appropriate MDA, understanding the implications of threats would help stakeholders and government to better appreciate their respective roles. 6. The paper was also of the view that while the NN within its premises could provide the wherewithal to educate her personnel on the tenets of the code, the government must compliment the efforts of the NN with the acquisition of the right size and type of ships and platforms. Also, it was opined in the paper that in the short term timeline for the NN to provide the adequate response as required in the MDA strategy, the Forward Operational Bases would have to be developed appropriately to meet the demands of MDA. The development would involve construction of jetties; logistics support facilities and other infrastructures to support helicopters operation. While the long term suggestion in the paper was the phased refit of NN warships. The paper was of the view that the losses to the government could be reduced if the funds for the refit and acquisition of NN ships were provided. However, the paper stressed that the personnel are the greatest assets towards the realisation of effective MDA. Consequently, there was need for the NN to appropriate the right skills towards the management of the equipment required to actualise the regime. VERBATIM REPORT OF INTERACTIVE SESSION 7. The discussion session was conducted by the following resource persons: a. V/Adm J Ayinla (Rtd)-Moderator b. R/Adm OS Ibrahim-Discussant c. R/Adm J Kpokpogri-Discussant d. AVM Atawodei-Discussant e. Cdre IE Ibas-Discussant MODERATOR’ OPENING REMARKS 8. The moderator commended the presenter for doing justice to the topic. He stressed that maritime domain has been given several definitions, but most of the definitions had missed out one part of the definition. According to him the earth spherical and 70 per cent of it is covered by water. He further stressed that the underwater aspect of maritime domain has always been ignored. He then posited that discussants should pay adequate attention to the underwater aspect of the maritime domain. He stated that vision 20 started in 1979. However, timeliness had been a problem in the NN. He posited that NN had continued from where it was in 1979, the NN could have gone far. CDRE IE IBAS 9. The first discussant was Cdre IE Ibas. He thanked the CNS for giving him the opportunity to comment on the presentation. He acknowledged that the presentation was comprehensive, apt and the definitions of the variables of Maritime Domain Awareness (MDA) suited the theme of the conference. He stated that the presenter understood the goal of MDA as the early identification of threats at sea. According to him, the United States was the frontline proponent of the concept of MDA at all levels with the vision of multi layer domain picture involving identifying picture and observing known pattern of vessel movement in the MDA. 0. The discussant stressed the need for Nigeria to pursue an aggressive maritime domain culture. He further highlighted that Nigeria needs MDA in order to achieve 20:2020. The discussant emphasized that the SWOT analysis of the presentation gave an expose of the maritime environment. It was highlighted that MDA must go beyond platform sensors, consequently automated d etection system could be the basis for MDA as they could be employed for activities at sea. According to the discussant, the threats of terrorism are not as potent as militancy in Nigeria. Therefore, according to the presentation, all efforts could be geared towards addressing the potent threat of militancy. The militant attack on Atlas Cove was used for illustration. 11. The presentation also identified man as one of the key element in achieving MDA. However, the present attitude of personnel to attain MDA was stressed. The discussant enumerated the conditions that were prevalent in the 1980’s when the NN had been involved in arresting smugglers and pirates. The discussant stressed that the NN may not achieve the required rchitecture for MDA with the present behavioural attitude of the personnel. However, the discussant stressed that it was gratifying to note that the NN through the RMAC in the NN Base, Apapa through the installation of the Automatic Identification System (AIS) was making positive progress in MDA. He opined that the RMAC could be installed on NN helicopters. He was of the opinion that greater interaction was required between partners and stakeh olders. However, the challenge of inter agency and service rivalry would need to be overcomed in order to achieve MDA. R/ADM J KPOKPOGRI 12. The second discussant was R/Adm Kpokpogri. He thanked the CNS for finding him worthy to discuss this paper. He commended the presenter for a well delivered paper. The discussant stressed that he would look at the paper from one angle. He stated that the United States and the European nations started MDA. It was necessitated by the need to stop drugs trafficking and other illegal activities perpetrated at sea. 13. The importance of the NN is yet to be fully appreciated because the NN lacks the necessary platforms to cope with the present challenges. According to him, the NN needs new platforms in order to cope with the challenges. He stressed that it was alarming to note that about 80 per cent of ships operating in Nigeria’s water are not registered. Consequently, he posited that there was need for the NN to synergise with NIMASA and other maritime agencies such as DPR and NNPC on observation of certificate carried by vessels in our maritime environment in order to enhance efficiency. 14. According to the discussant, there was need for all involved in maritime security including retired senior officer to help the NN in repositioning her for the challenges. According to the discussant, Nigeria’s sub region is dominated by franco phone countries, consequently, he made some prayers for the NN to consider. The prayers made included the introduction of french language to enhance cooperation in the sub region, establishment of MDA watch in ENC and WNC and the need to involve foreign stake holders like the US and UK in perfecting MDA in Nigeria. R/ADM OS IBRAHIM 15. The third discussant was R/Adm OS Ibrahim and he stressed that he would look at the presentation based on 3 premises. The discussant highlighted his assumptions as: . It is upon the NN under the providence of God that the prosperity of the nation rest. b. Patrolling Nigeria’s EEZ is the only safe guard for control. c. Even if the money and resources required are made available today it will take a min of 5 days to achieve the much required state. 16. According to the discussant, MDA in line with vision 20:2020 would eradicate poverty, bring about peace and developmen t. He stressed that MDA could guarantee full security of the maritime domain, make waters safe and attractive for investment. He was of the view that the presenter was modest in his recommendations, however, he stressed that the presentation omitted logistics ship which was important for presence. 17. The discussant stressed that US mentioned capability gap in the regional maritime domain. To cover the gap, the US installed the RMAC in Nigeria. He further stressed that he was pursuing collaborative effort to enhance the utilisation of the RMAC. Consequently, the NN was able to organise a capability awareness discussion on the RMAC with representative from NPA and NIWA including the Director General of NIMASA. He was of the opinion that Nigeria’s maritime agencies would need to cooperate better in order to achieve the objectives of MDA. AVM ATAODE 18. AVM Ataode structured his discussion into 2 parts. He raised some observations which included: a. Was it the first time the NN was discussing MDA? b. He corrected the mistake on the deadline for compliance with ISPS code on para 25 from 21September to 31 July 2009. c. Why has Nigeria not passed its own bill as was done in Ghana. 19. He stressed that the focus for MDA would be on early detection by radars and radios. Consequently, he opined that the NN could set up a task force in determining NN capability on MDA. He stated that MDA could make the sea transparent and continuously available. According to the discussant, PICOMMS came about as a directive from IMO that all maritime nations should put in place a body to oversee the implementation of the ISPS code. He further enumerated that the government organisations were the ones defaulting in the implementation of the ISPS code, however, he stressed that 65 facilities have been declared compliant by the relevant authority. Most compliant facility was Niger dock while the least was the Atlas cove in Lagos. 20. He stated that the contract sum for COMMARAS was over bloated to the tune of 250 million euros, leading to the re-evaluation of the contract. He emphasised that PICOMMS was not meant to be a permanent establishment. According to him the COMMARAS was to be installed at 11 stations, with 93 personnel to man each radar stations. However, some of the locations of these radar station sites are uninhabited. PICOMMS has procured the DA 42 Opale Twin Star and King Air 350 aircraft. CONTRIBUTIONS FROM THE FLOOR 21. Cdr Oluwagbamila. MDA is not an end in itself but a means to an end. Do we have a maritime security policy? Efforts of the government in achieving MDA were borne out of external influence. ISPS by IMO code and AIS by US, there was need to harmonise the 2, because both are meant to achieve the same goal. 22. R Adm Arogundade. MDA is a subset of the policing role of the NN. The absence of training in policing role has affected the capability of young officers from appreciating the recent challenges in policing functions. 23. Capt Carew (Rtd). PICOMMS primary duties is to coordinate international shipping and ports facility. The absence of a senior naval officer could act as an impediment to the functions of the agency. 24. R Adm Adedeji. Real MDA is what is happening at the national high command. Real Change has to come from the political masters. 25. Capt Okunbor. He suggested that papers presented in the CONSAC be forwarded to the national planning committee on the implementation of vision20:2020 as the NN repositions itself for development. 26. Sen Olajumoke. He stressed a point that his duty was to be present for the whole deliberations in order to tow the line of developmental needs of the NN. He noted Capt Carew’s suggestion. He had expected that someone would have reacted on the opinion of the first discussant. PRESENTER 27. The presenter agreed with Cdr Oluwagbamila in working out the terms for maritime strategy, he cited examples with the US. He stated that there was need for the NN to be in charge with issues bothering on maritime security. MODERATOR 28. In summarising the session, political will was needed from the national authority from where national aspiration derives all that needs to be done. He wanted to know the authority to deliver maritime security. He stressed that the national prosperity of Nigeria is dependent on sea power and NN. Also, he stressed that there was consider previous threat appreciation in order to re-align it. Failure of the NN could be hinged on inability to ensure deterrence. In this regard, he highlighted the absence of a compact force and capability of visual deterrence. He further stressed the sophistication of the militants in Nigeria was affecting capacity development for adequate MDA. 29. He enumerated that the budget for maintenance of ARADU was not enough to ensure 15 per cent availability of the ship. According to him there was need for the NN to come up with a plan to growth within a time frame say 2010, 2020 or 2030. Also, in his opinion, discussions bothering on ships could involve training considerations and motivations. These would ensure that the personnel are adequately motivated. The issue of 100 ships for the sub region was raised. He opined that, if Nigeria has to be relevant, Nigeria would have to provide at least 60 ships. In this regard, if Nigeria was to be among the 20 most developed economies, she was to develop her national and sea power. 30. Finally, he stated that the NN does not have the right platforms to counter the present threats in our maritime domain. He opined that the NN could realise effective naval operations through better inter-agency cooperation between the NN and PICOMMS, and also that the NN could rely more on force multipliers for early detection and countering of threats. POSERS FOR PAPER 3 1. How can the NN in collaboration with other stake holders in the maritime sector implement measures to achieve MDA? 2. How can the NN harness her FOBs for improved MDA? 3. How can a framework for setting up a dedicated body structure that would be responsible for coordinating MDA in Nigeria? 4. Identify the factors militating against effective MDA in Nigeria with a view to proffering solutions. 5. Based on an identified structure, does the NN need to pursue an act of parliament? 6. Is there an enabling act for effective MDA or are the existing terms good enough for an effective MDA? 7. Identify sources through which dedicated funding for MDA can be achieved outside government sources. 8. What strategies can be adopted by the NN in effectively combating identified threats so as to sustain effective NN operations? 9. Identify policies for implementing MDA and suggest ways of making them more effective. If none, suggest policies. 10. What infrastructures can be put in place to facilitate effective monitoring of vessels? 11. In what ways can partnership with the various stakeholders be harnessed towards achieving MDA? 12. In extending her influence to cover the Gulf of Guinea, what asset mix would the NN require to be effective? 13. What strategies can be adopted by the NN to ensure that personnel are adequately enlightened or trained on MDA? 14. In what areas should the NN key into or make input towards the proposed maritime security bill in order to ensure that the interests of the service are guarded?

Friday, November 8, 2019

Definition of organizational structure Essays

Definition of organizational structure Essays Definition of organizational structure Essay Definition of organizational structure Essay Introduction After sing the definition of organisational construction we can now see the undertaking in item. As this undertaking wants to research the cultural values about three companies. Following are these three companies. VODAFONE NOKIA SBI BANK First of all would wish to present the companies in brief. VODAFONE Vodafone is a really large company holding its base office in United Kingdom and commanding its concern all over the universe. This is a company covering in cellular service supplying. It is taking company in all over the universe holding a immense client base. Vodafone Group Plc is the universe s taking nomadic telecommunications company, with a important presence in Europe, the Middle East, Africa, Asia Pacific and the United States through the Company s subordinate projects, joint ventures, associated projects and investings. The Group s nomadic subordinates operate under the trade name name Vodafone . In the United States the Group s associated project operates as Verizon Wireless. During the last few old ages, Vodafone Group has entered into agreements with web operators in states where the Group does non keep an equity interest. Under the footings of these Partner Market Agreements, the Group and its spouse operators co-operate in the development and selling of planetary merchandises and services, with changing degrees of trade name association. At 30 September 2009, based on the registered clients of nomadic telecommunications ventures in which it had ownership involvements at that day of the month, the Group had 323 million clients, excepting paging clients, calculated on a proportionate footing in conformity with the Company s per centum involvement in these ventures. The Company s ordinary portions are listed on the London Stock Exchange and the Company s American Depositary Shares ( ADSs ) are listed on the NASDAQ Stock Market. The Company had a entire market capitalization of about ?71.2 billion at 12 November 2009. Vodafone Group Plc is a public limited company incorporated in England under registered figure 1833679. Its registered office is Vodafone House, The Connection, Newbury, Berkshire, RG14 2FN, England. Referee: 2- www.vodafone.co.uk The Board of Directors of Vodafone Group Plc has adopted this codification of moralss ( the Code ) , which is applicable to all its Relevant Officers ( as defined in paragraph 2 below ) , to To advance honest and ethical behavior, including the ethical handling of existent or evident struggles of involvement ; To advance the full, just, accurate, seasonably and apprehensible revelation of the Company s fiscal consequences in conformity with applicable revelation criterions, including, where appropriate, criterions of materiality ; To advance conformity with applicable governmental Torahs, regulations and ordinances ; deter error ; and Require prompt internal coverage of breaches of, and answerability for attachment to, the Code. The Code may be amended merely by declaration of the Board of Directors of Vodafone Group Plc. In the Code, Company agencies, in appropriate context, either Vodafone Group Plc or a subordinate of Vodafone Group Plc Referee: hypertext transfer protocol: //www.vodafone.com/start/about_vodafone/corporate_governance/code_of_ethics.html As defined above Vodafone s organisational civilization means their traditions, their givens, their beliefs and their schemes are easy defined as perpendicular form hierarchy or their on the job construction. They recruit different peoples from different beginnings. They are adaptative to the regulations of the authorities as and when required in different states and that is besides a ground for their success. Now we can see the organisational civilization of Nokia. NOKIA There are three chief concern groups in Nokia Devices, services and markets. All these three chief units receives functional support straight from the Corporate Development Office, led by Mary T. McDowell, which is besides responsible for researching corporate strategic and future growing chances in Nokia. Let us briefly go through this three chief groups. Devicess. This division chiefly concentrate on Nokia s nomadic development and managing portfolio. Multimedia and Enterprise Solutions every bit good as the division consist of the old mainline Mobile Phones division with the separate sub-divisions once centralized nucleus devices R A ; D called Technology Platforms. In the first one-fourth of 2006 Nokia sold over 15 million MP3 capable nomadic phones, which means that Nokia is non merely the universe s taking provider of nomadic phones and digital cameras ( as most of Nokia s nomadic telephones feature digital cameras, it is besides believed that Nokia has late overtaken Kodak in camera production doing it the largest in the universe ) , Nokia is now besides the taking provider of digital sound participants, MP3 participants, outpacing gross revenues of devices such as the iPod from Apple. At the terminal of the twelvemonth 2007, Nokia managed to sell about 440 million Mobile phones which accounted for 40 % of all planetary nomadic phones g ross revenues. Services. The Services division operates in five countries of consumer Internet services: music, maps, media, messaging and games. This group is working with companies outside the telecommunications sector to do amendments in the engineering and germinate new applications and possibilities in countries such as online services, optics, music synchronism and streaming media. MARKETS. Nokia has so many subordinates subdivisions, of which the 2 most of import till2009 are Nokia Siemens Networks and Navteq. And they both are explained here in brief. Communications and webs service platforms and besides professional services to operators and service suppliers Nokia Siemens Networks provides radio and wired web substructure. On June 19, 2006 Nokia and Siemens AG announced the companies are to unify their Mobile and fixed-line phone web equipment concerns to make one of the universe s largest webs house, called Nokia Siemens Networks. The Nokia Siemens Networks trade name individuality was later launched at the 3GSM World Congress in Barcelona in February 2007. On June 19, 2006 Nokia and Siemens AG announced the companies are to unify their Mobile and fixed-line phone web equipment concerns to make one of the universe s largest web houses, called Nokia Siemens Networks. The Nokia Siemens Networks trade name individuality was later launched at the 3GSM World Congress in Barcelona in February 2007. To sum up I can state this is a virtually advanced company runing in all over the universe. This can be a good beginning to compare different civilizations. STATE BANK OF INDIA This is a taking centralized bank holding basal office in India and ran by the authorities itself. It is a authorities venture. Long before this bank was centralised by Indian authorities and now is a taking bank in the most successful bank of universe. The beginning of theState Bank of Indiagoes back to the first decennary of the 19th century with the constitution of the Bank of Calcutta in Calcutta on 2 June 1806. Three old ages subsequently the bank received its charter and was re-designed as the Bank of Bengal. A alone establishment, it was the first joint-stock bank of British India sponsored by the Government of Bengal. The Bank of Bombay and the Bank of Madras followed the Bank of Bengal. These three Bankss remained at the vertex of modern banking in India till their merger as the Imperial Bank of India on 27-1-1921. TASK-2 Your research should take you to look at direction pattern adopted by organisations when faced by different cultural demands. Write a study on each of your chosen administration depicting the different direction pattern for alternate civilizations. In your study, besides include how these organisations have developed formal and informal multicultural relationship. This research subject can incorporate batch information which can spread out the proper length of this topic but in brief we should see this assignment. If we want to speak about the different direction pattern for alternate civilizations we should travel through the pull offing managers of the company. Vodafone Nick Land ( Chairman ) Dr John Buchanan ( Member ) Alan Jebson ( Member ) Anne Lauvergeon ( Member ) Sir John Bond ( Chairman ) Luc Vandevelde ( Member ) Dr John Buchanan ( Member ) Luc Vandevelde ( Chairman ) Simon Murray ( Member ) Tony Watson ( Member ) Philip Yea ( Member ) Nokia Nokia Board of Directors consists of the following 11 members: Georg Ehrnrooth, Lalita D. Gupte, Bengt Holmstrom, Henning Kagermann, Olli-Pekka Kallasvuo, Per Karlsson, Isabel Marey-Semper, Jorma Ollila, Marjorie Scardino, Risto Siilasmaa and Keijo Suila. Chairman Jorma Ollila Vice Chairman Dame Marjorie Scardino Other members. Georg Ehrnrooth Lalita D. Gupte Dr. Bengt Holmstrom Dr. Henning Kagermann Olli-Pekka Kallasvuo Per Karlsson Isabel Marey-Semper Risto Siilasmaa Keijo Suila STATE BANK OF INDIA Sr. No. Name of Director Sec. of SBI Act, 1955 1. Shri O.P. Bhatt Chairman 19 ( a ) 2. ShriS.K. Bhattacharyya MD A ; CC A ; RO 19 ( B ) 3. Shri R. Sridharan MD A ; GE ( A A ; S ) 19 ( B ) 4. Dr. Ashok Jhunjhunwala 19 ( degree Celsius ) 5. Shri Dileep C. Choksi 19 ( degree Celsius ) 6. Shri S. Venkatachalam 19 ( degree Celsius ) 7. Shri. D. Sundaram 19 ( degree Celsius ) 8. Dr. Deva Nand Balodhi 19 ( vitamin D ) 9. Prof. Mohd. Salahuddin Ansari 19 ( vitamin D ) 10. Dr. ( Mrs. ) Vasantha Bharucha 19 ( vitamin D ) 11. Dr. Rajiv Kumar 19 ( vitamin D ) 12. Shri Ashok Chawla 19 ( vitamin E ) 13. Smt. Shyamala Gopinath 19 ( degree Fahrenheit ) Referee From www.sbi.com This is the most of import thing to see the board of managers before sing their organisational construction. This can be illustrated by this board of administration because the issue of ethnicity in enlisting procedure at the in-between degree and lower degree of direction is of import. This shows that all the companies are holding their top degree direction from their ain state and they are non leting any other individual to come in at the top degree direction but at the in-between degree and lower degree direction. All the organisations are flourished to wider skylines. They are working in different states and with different mission but their criterions and direction methods are excessively different from each other. Their human resources section and their scheme execution section are working in different organisational civilization and different traditions. Their working schemes are different. Their work history is developed by the alterations over old ages non merely in one twenty-four hours. They organisational constructions are different non merely due to the difference in their sectors but besides depends on their acceptance. Like are they holding best fit method, best pattern method or resource based method of HRM strategic theoretical accounts. Vodafone is enrolling their employees in all over the universe from the same state in which it is working. It is presently working in more than 20 states all over the universe. They are holding decentalisation of power to better their working methods and to heighten their services but for that ground they are non giving with their values and their mission. To exemplify, they are holding their client attention service Centre in India and in all different parts they are holding the people cognizing their local linguistic communication and to give them the maximal support but in other transnational companies and international companies they are non supplying that much autonomy to their bomber subdivisions in all over the universe. They are supplying a good determination power. Except the chief policies they are allowed to alter and amend the regulations clip by clip for betterment and legal intent and it is besides a ground for Vodafone to come across the whole universe and be the first in all taking telecommunication companies. Their accomplishments are itself the reply of their journey for success can person conceive of that a company started with merely a few employees in a little office now expands to an extent that it can stands for a whole state and its glorification. Nokia Company is holding rather a different organisational civilization comparison to Vodafone and other companies because they believe in centralisation of power. They are merely leting different bomber subdivisions to execute harmonizing the guidelines provided by the higher degree direction. And no legal issue or of import determination can be made by in-between degree or lower degree employees for important issues. Their success chiefly depends on their broad scope of merchandise and their standard quality. They anyhow wants to keep the same as it is and for that are non taking any hazard and now leting any other to entree their companies name for any such issues. Even it is a market listed company and it is holding its capital in equity portions but they maintain a good sum of investing to command the concern on their ain manus. SBI bank its history is really interesting. I took this authorities sector bank and non the private sector to besides explicate the difference non merely in sectors but their direction construction. Their mission will non be the same as a private sector corporate company may hold. Their enlisting procedure is based on the best pattern method and besides depended. There is a significant difference in the behavior of parties to a contract between when they pursue their involvements entirely based on the formal contract in the absence of common trust and when there exists an informal relationship of common trust. To exemplify this, Levin ( 2003 ) cites the labour-management difference of UAL Corp. that broke out in the summer of 2001. While dialogues with the direction from 2000 to 2001 were coming to a dead terminal, UAL s pilots brotherhood called on its members to work to the missive of our understanding. Therefore, UAL pilots ( truly ) refused to work overtime and enforced stricter security cheques, which resulted in the holds and cancellations of a figure of flights and forced UAL to single-foot up $ 700 million in losingss in a individual summer ( Lowenstein, 2002 ) . Quite a few readers might retrieve that at that place used to be a labour brotherhood maneuver called a work-to-rule work stoppage. It is a well-known fact that this sch eme caused immense losingss to the now-defunct Nipponese National Railways ( predecessor of the seven Japan Railways companies ) . Referee: Quarterly Journal of Economics In the same manner there is formal and informal multicultural difference found in organisational civilizations of Vodafone, Nokia, and SBI bank. They are holding difference in acceptance of authorities policies of the national where they are working in and besides they are different in pull offing privacy between the imposts and traditions of people populating at that place. Like wise nokia has late started to utilize local linguistic communication gujrati and Hindi in nomadic phones of India. Vodafone is holding client attention centres with local linguistic communication and standard linguistic communication English. In contrast SBI Bank is holding merely nationalised attention Centre in Hindi and some in English but they are non holding attention Centres in other linguistic communications of India even non of any European linguistic communication, but in existent they are holding their profitable subdivisions in this states. This can province that they are holding tonss of formal and informal differences. All this three companies are non even keeping the same criterions as they have they are making favoritism of schemes and execution of their civilization otherwise in different degree of organisation. For illustration, Nokia is non holding the same enlisting procedure in all over the universe because in Japan senior status is the most and merely of import factor for publicity and occupation handiness harmonizing to their imposts but in other states they give precedence to efficient work. The same in Vodafone in UK they are non enrolling any other people instead than British but in other states they are non following this schemes. Even they started outsourcing of their client attention Centres in other developing states like India merely to cut down the cost but on the other terminal they are non enrolling any other than British to keep a criterion in the head of British people. In India SBI Bank is carry oning an test to enroll employees harmonizing to the norms of Indian authorities but in other states they are following new ways or following that states regulations. So such sort of instabilities is found in organisations itself. Task 3 Carry out appropriate research into at least 2 administrations which operate in a practical mode. Identify and develop suited countries which direction of Furniture works demands to look into when puting up a practical organisation. Produce a presentation reding direction on sound direction pattern in a practical administration. Background FURTINUTE WORKS is a company presently working in south London and as it is true that it is a really successful unit since last twosome of old ages it is recommended to distribute this unit all over the universe by the practical organisation. For that I would wish to see two different companies that can give a perfect thought to develop schemes and to be cognizant about the pros and cons in set uping unit outside the state. My two companies are following. DOMINOZ Metro Both above said companies are advanced and virtually organized. Their success narrative is to animating and advanced. They have besides started with a little figure of unit and now they are broad spread all over the universe merely and merely due to their virtually organized schemes and their execution. Let us see both in brief. DOMINOZ In 1960, Tom Monaghan and his brother, James, purchased Dominick s, a little pizza shop inYpsilanti, Michigan. The trade was secured by a $ 75 down payment and the brothers borrowed $ 500 to pay for the shop. Eight months subsequently, Phil traded his half of the concern to Tom for a usedVolkswagen Beetle. As exclusive proprietor of the company, Tom Monaghan renamed the concern Domino s Pizza, Inc. in 1965. In 1967, the first Domino s Pizza franchise shop opened in Ypsilanti. Domino s continued to turn and in 1978 opened its two-hundredth shop. On May 12, 1983, Domino s opened its first international shop, inWinnipeg, Canada. On the same twelvemonth, Domino s opened its 1,000th shop overall, and by 1995 Domino s had 1,000 international locations. In 1997, Domino s opened its 1,500th international location, opening seven shops per continent on back-to-back yearss. Referee: www.wikipedia.com Metro With over 32070 shop in all over 90 states subway is the taking endeavor in nutrient industry. It is good known for its nutrition and gustatory sensation. Who can conceive of that it was started by a household and now it is world-wide and it is besides due to their important and practical managing schemes. And this causes it to be wining in all over the universe. Subway is besides celebrated for its wellness and safety steps non merely for the employees but besides for the client and each member affiliated with it. For Furniture works they need to concentrate on some of the factors before get downing their concern in all over the universe or any new state. This can be listed below. To look into for the market handiness of such merchandise. To look into for natural stuff handiness. To look into for the constitution cost. To look into for the authorities policy. To look into for the worker supply. To look into for the support. To look into for the cultural environment. To look into for the environmental factors. To be after for economic every bit good as societal factors good in progress. To happen proper location. To supply proper franchises to work without duties. This all above said factors are of import before set uping new unit. These factors are including societal and economical factors every bit good as cultural factors. Understanding the nature of the alteration you wish to consequence and the context in which you are of import in finding an appropriate scheme. Entering chartless alteration district without some kind of path map pots you at an immediate disadvantage from the start. One of the first phases in charting the district is to understand a little more about the type of alteration you wish to do. The demand to place, explore and if necessary challenge the premises that underlie managerial determinations. Understanding that organisational alteration is a procedure that can be facilitated by perceptive and insightful planning and analysis and good crafted, sensitive execution stages, while admiting that it can neer be to the full isolated from tge effects if serendipity, uncertainness and opportunity. An of import message of recent direction of alteration literature is that organisation degree alteration is non fixed or liner in nature but contains an of import emergent component as identified in the subdivision on complexness theory. Above said is some of the alterations that can take topographic point within an organisation and at the sub consecutive consequence on the selling environment. Some of these are driven by invention and betterment others are the consequence of the consumer response to merchandises and the organisations themselves. For many of these, the deduction on the selling can be important. Number if these are discussed with appropriate illustrations. Presentation for sound direction patterns in practical direction. This above said points are chief points the tally any organisation in a practical mode. This can be said a guideline rules for any company including furniture work. To sum up i would wish to propose that this company should travel for developing states instead than choosing for any developed state to spread out fast. Because in developed states the rate of development is excessively slow comparison to developing states because there is nil to be developed and in developing states there are still hope for rapid growing. Task 4 Management is worried that communicating may be a job nevertheless, it has been mentioned that on-line communicating could be good to the organisation. Write a study and depict the assorted facets of effectual online and direct communicating that are available to the organisation. The really indispensable issue is to get the better of the job of communicating in company. Whether it may be between different parts of company or the communicating between degree of organisations or communicating of client to company. If this issue is identified and solved so the company will be certainly win in its way. A great trade of direction s current concern for employee productiveness and the demand to authorise people has revolved around the usage of squads. No uncertainty squads have enhanced productiveness and employee dealingss, but one should neer presume that squads are the remarkable, right way toward authorization. Sometimes single attempt instead than group attempt is needed. But more frequently what is required is the simplest demand of all communicating. When a group of industrial applied scientists were asked in a 1990 survey how to better productiveness, communicating concerns drew the strongest response to any inquiry on the study. More than 88 per centum of the applied scientists strongly agreed that the deficiency of communicating and cooperation among different constituents of a concern leads to cut down productiveness ( P and Q Survey 1990 ) . CEOs have besides recognized the importance of communicating. In a survey by A. Foster Higgins and Company, an employee-benefits consulting house found that 97 per centum of the CEOs surveyed believe that pass oning with employees positively affects occupation satisfaction. Furthermore, the study found that 79 per centum think that communicating benefits the bottom line ; surprisingly, merely 22 per centum communicate with employees weekly or more ( Farnham 1989 ) . Executives think pass oning is highly of import to the success of their concern, but they do non make it. Why is this? Possibly many CEOs and other top functionaries prefer the company of their equals to those who do non portion their positions. Possibly, like generals on the battleground, they are more hypnotized with scheme than with tactics. Regardless of the ground, it is highly rare to happen CEOs or other top functionaries who actively seek out a down-in-the-trenches position. Without this intricate, and mostly unobserved, web of communicating our commercial markets, public services and cultural establishments would fall in and decease. Presupposing a basic cognition of the methods of communicating, Blundell sets the advantages of good communicating satisfied clients, motivated staff, enhanced public repute against the obstructions to good communicating cultural differences, power political relations, fiscal and clip force per unit areas etc. However, there are many times when a bipartisan unrecorded conversation or a direct phone conversation is much more productive. Conversation is the quickest and most effectual manner to clear up any uncertainness and allows for ocular and verbal hints to be used to assist voyage the duologue. Dialogue can besides assist to spread any misinterpretations or improper reactions and can bring out new information that is valuable to the state of affairs. Communicationss that have emotional content, require struggle declaration, require group treatment or incorporate sensitive information are some illustrations of when conversation should probably be used. It s of import for people to acknowledge when these state of affairss exist so they can do the right communicating method pick. The undermentioned illustrations and effects are provided to assist better place these state of affairss. These are common instances where electronic mail is used when speaking straight would be more effectual: Conflict declaration is attempted via electronic mail. This can make long togss of public statements and extended emotional discord. A rebuke is sent through electronic mail. This can do the receiver feel like they were convicted without a test. Brainstorming or job resolution is attempted via electronic mail. This can besides make long togss of messages with big distribution lists and normally generates less than optimum consequences since immediate bipartisan communicating is non feasible. A message is sent incorporating content that may do a strong emotional reaction. If an inauspicious reaction occurs, hours or yearss may go through before the transmitter can turn to the issue. Or worse, the transmitter may neer understand that the receiver had an inauspicious reaction to the message. Group determinations for complex issues are made via electronic mail. Since bipartisan interaction is limited and many people are less comfy talking out on electronic mail, merely a part of information that would be available from a group treatment is used to do the determination. Negotiations are done via electronic mail. The ability of the transmitter to convert or carry the receiver is much more limited over electronic mail. It s really hard to interrupt down person s concerns or read their immediate reaction without direct interaction. Besides, one time the receiver publically refuses a petition over electronic mail, it is more hard to acquire them to alter his or her place. Equally obvious as it may sound, reminding people that speaking is an option may supply great benefit at times. Peoples get so used to pass oning via electronic mail that they frequently forget this point. Talking besides helps to construct informal relationships and webs that are critical to an organisation s success. Normally, if there s any signifier of uncertainness, dissension, or emotional content in an issue, holding a treatment is the best pick. And if there s any uncertainty whether an electronic mail will be effectual, you should likely speak it out alternatively. BIBILLIOGRAPHY WWW.VODAFONE.COM WWW.SBI.COM WWW.NOKIA.COM WWW.WIKIPEDIA.COM WWW.DOMINOZ.COM WWW.SUBWAY.COM

Wednesday, November 6, 2019

Members of the House of Representatives

Members of the House of Representatives There are 435 members of the House of Representatives. Federal law, passed on Aug. 8, 1911, determines how many members are in the House of Representatives. That measure raised the number of representatives to 435 from 391 because of population growth in the United States.   The first House of Representatives in 1789 had only 65 members. The number of seats in the House was expanded to 105 members after the 1790 Census, and then to 142 members after the 1800 headcount. The law that set the current number of seats at 435 took effect in 1913. But it isnt the reason the number of representatives has been stuck there. Why There Are 435 Members   Theres really nothing special about that number. Congress regularly increased the number of seats in the House based on the nations population growth from 1790 to 1913, and 435 is the most recent count. The number of seats in the House has not been increased in more than a century, though, even though every 10 years the census shows the population of the United States grows. Why the Number of House Members Hasnt Changed Since 1913 There are still 435 members of the House of Representatives a century later because of the  Permanent Apportionment Act of 1929, which set that number in stone. The Permanent Apportionment Act of 1929 was the result of a battle between rural and urban areas of the United States following the 1920 Census. The formula for distributing seats in the House based on population favored urbanized states and penalized smaller rural states at the time, and Congress could not agree on a reapportionment plan. After the 1910 census, when the House grew from 391 members to 433 (two more were added later when Arizona and New Mexico became states), the growth stopped. That’s because the 1920 census indicated that the majority of Americans were concentrating in cities, and nativists, worried about of the power of foreigners, blocked efforts to give them more representatives, wrote Dalton Conley, a professor of sociology, medicine and public policy at New York University, and Jacqueline Stevens, a professor of political science at Northwestern University. So, instead, Congress passed the Permanent Apportionment Act of 1929 and sealed the number of House members at the level established after the 1910 census, 435. Number of House Members Per State Unlike the U.S. Senate, which consists of two members from each state, the geographic makeup of the House is determined by the population of each state. The only stipulation spelled out in the U.S. Constitution comes in Article I, Section 2, which guarantees each state, territory or district at least one representative. The Constitution also states that there can be no more than one representative in the House for every 30,000 citizens. The number of representatives each state gets in the House of Representatives is based on population. That process, known as reapportionment, occurs every 10 years after the decennial population count conducted by the U.S. Census Bureau. U.S. Rep. William B. Bankhead of Alabama, an opponent of the legislation, called the Permanent Apportionment Act of 1929 an abdication and surrender of vital fundamental powers. One of the functions of Congress, which created the census, was to adjust the number of seats in Congress to reflect the number of people living in the United States, he said. Arguments for Expanding the Number of House Members Advocates  for increasing the number of seats in the House say such a move would increase the quality of representation by reducing the number of constituents each lawmaker represents. Each House member now represents about 700,000 people. The group ThirtyThousand.org argues that the framers of the Constitution and the Bill of Rights never intended for the population of each congressional district to exceed 50,000 or 60,000. The principle of proportionally equitable representation has been abandoned, the group argues. Another argument for increasing the size of the House is that is would diminish the influence of lobbyists. That line of reasoning assumes that lawmakers would be more closely connected to their constituents and therefore less likely to listen to special interests. Arguments Against Expanding the Number of House Members Advocates for shrinking the size of the House of Representatives often argue that the quality of legislating improves because House members would get to know each other on a more personal level. They also cite the cost of paying for salaries, benefits, and travel for not only the lawmakers but their staffs.

Sunday, November 3, 2019

Case study Barclays and the LIBOR Scandal Example | Topics and Well Written Essays - 1250 words

Barclays and the LIBOR Scandal - Case Study Example m 2007 to 2009, Barclays was seen to submit rates which were below the presumed cost of borrowing, so as to be able to manage the market’s sensitivity relating to financial feasibility. The company’s goal was to keep submission lower than other competing firms. It was seen that Barclays could make huge sums of profits, even by the slightest manipulation of the LIBOR rates (Rose and Sesia 1). It was quite clear that the bank’s employees had undertaken such activities to earn higher profits and to limit the losses which arise from the derivatives trading. Barclay’s traders were trying to consider their own profit motives and earn dishonest profits. The dishonest LIBOR submissions had led towards dampening market speculations. Although the bank was able to make adequate profits, it could not sustain the manipulation process for long. It can be stated that the benefits of such manipulation was very limited and short-lived. However, the negative impacts of the Barclays LIBOR manipulation were quite extensive. The submitted rates had a wide felt negative impact in the derivatives market. The firm had lost the trust of customers and traders during the crisis period, and had also created negative waves in the media regarding its viability in the market. Post the Barclays scandal, 20 more banks were questioned and vividly examined by regulators. In the whole process of LIBOR manipulation, since interbank rates were manipulated, derivative transactions and banks lending to investors had also been impacted in a negative manner (Monticini and Thornton 345). Bob Diamond, the former CEO of Barclays had blamed a small group of employees for the violation of the LIBOR rates. Bob had denied any personal wrongdoing against the allegations made in respect of rigging the LIBOR and limiting the market and media speculations. Bob also went to the extent of stating that Barclays was more honest in submitting its LIBOR rates as compared to other banks (Surowiecki 25). He also

Friday, November 1, 2019

Spa Design History Essay Example | Topics and Well Written Essays - 2500 words

Spa Design History - Essay Example Spa is considered to be the place of relaxation, treatment of various diseases, through different water therapies and of course the mean to be pampered. It can be broadly defined as the treatment or therapies (with water) through the regulated usage of time, place and the method of bathing, washing, showering etc. The origin dates back to the roman era, where the soldiers after long wars used to relax, treated as well by natural medication, which is water. History of Spa culture The concept of spa is derived from the practice used by the ancient warriors, where they used the techniques of practicing water therapy for different medication purpose, for the treatment of the wounds and for rejuvenating after a long war. These were considered to be the best treatment for wounded and tired muscles or body part. SPA- The full form is Sanus Per Aquam or Sanitus Per Aquam, both emphasized the importance and the usefulness of water for health and more importantly treatment. There are different beliefs and understanding relating to the spa culture. The most popular directs to the time of the Roman Empire, where they invented the way to use thermal water to get rid of their ailments. They made the springs and took hot water treatment in it. SPA is derived form that practice, which means by or through water. In this period a town named SPA was founded in Belgium also, which gave the common man a chance to avail the services and the utility of spa. The concept of spa and its popularity reached its peak during this time. Some history dates back to 3100—300 BCE where the Egyptians used water therapy and herbal treatments , in the era 700-200 BCE, the Greeks used cold water for the Spartans, in 200 BCE, Hebrews used the purification practice by immersing in the sea.