Wednesday, December 25, 2019

The Frontier Of American History - 1567 Words

The Frontier in American History was one of the most famous essays by Frederick Turner in the nineteenth century. In this essay, Turner expressed his thoughts about how the frontier set up and created unique American characteristics. He explained the idea of American exceptionalism, which states that America is different than other nations in the world. The development of America included many significant events, and our nation s identity was made up by many factors, not just only the frontier. Nowadays, the America defines itself as a large and powerful country in the world. We are all proud to be an American. Thus, the stress on a distinct national identity is appropriate within an increasingly diverse nation-state and an ever globalizing world. American Exceptionalism defines how the United States special through its individualism, democracy and liberty. The America is believed to be unique based on its traits of economic opportunities, religious freedom and the protection of al l citizens. According to Turner, it was the frontier which influenced and shaped the America today. His frontier thesis became an important influential document in American history. He argued that the frontier is the line of most rapid and effective Americanization, and American frontier is distinguishable because of its abundance of free land. Turner also emphasized that the existence of free land, its continuous recession, and the advance settlement, explain the American development.Show MoreRelatedThe Frontier Of American History1116 Words   |  5 PagesIn the Significance of the Frontier in American History, Frederick Jackson Turner discusses the understanding of the West as a concept. Turner’s claims included that the expansion into the frontier fueled individualism, stimulated democracy and nationalism, and widened the opportunity of advancement. In the census of 1890, the frontier no longer had a place in the report because the previously unsettled areas had been br oken into areas of settlement. Turner uses the definition of two people per squareRead MoreThe Significance of the Frontier in American History1439 Words   |  6 Pagesalong the American frontier? What Turner wants to point out here is that the American West is the most important feature of American history, and of the development of its society. He refers several times to a process of â€Å"Americanization† and we will see that the definition he gives of it is a very peculiar one. He gives a definition of the frontier: â€Å"it lies at the hither edge of free land†, meaning that he considers the Indian territory to be free land. According to him the frontier is the â€Å"meetingRead MoreResponse to Turners Essay on The Significance of the Frontier in American History501 Words   |  3 PagesSignificance of the Frontier in American History Turners The Significance of the Frontier in American History essay presents the primary model for comprehending American history. Turner developed his notions on the uncovering of the 1890 census that the frontier was coming to an end, that the nation had occupied its continental borders. As Turner discusses in his essay, an extensive era of American development approached an ending, but left enduring marks on American societyRead MoreThe Frontiers of American History in Last Child of the Woods by Richard Louv 581 Words   |  3 PagesIn the second chapter of Last Child of the Woods, Richard Louv makes the claim that there have been three frontiers in the course of American history. The first phase was the original frontier, before the Industrial Revolution. This was the time of the prairie schooner, the cowboy, the herds of bison that were thousands strong. This was a rough, hard time, when man and nature were constantly thrown together. There was wilderness to spare, and people were willing to move West to get to it. Read MoreHistory Of The American Western Frontier Through Narratives, Testimonies, And Primary Documents1350 Words   |  6 Pageshistorical books, this book offers a different angle on viewing the history of the American western frontier—through narratives, testimonies, and primary documents that capture the true voices of the Native Americans. Spanning across the 1860s to the 1890s, Dee Brown tells the plight of the Native Americans after their contact with the American settlers and the United States government. The repetitive stories of the Native American groups during the second half of the nineteenth century— the welcomingRead MoreThe Significance Of The Frontier By Frederick Jackson Turner869 Words   |  4 Pages Frederick Jackson Turner s â€Å"The Significance of the Frontier† is, in his eyes, an accurate depiction of America s development since the Colonial Period. However, Turner s Frontier Thesis fails to discuss the involvement of two very specifi c groups of people, groups that certainly had too much of an effect on the progression of the country for him to safely leave out. Native Americans have a pivotal role in America s history, yet Turner s mentions of them in his thesis are extremely limitedRead MoreRediscovering The American Frontier Of The United States882 Words   |  4 PagesRediscovering the American Frontier Humans have always had a sense of curiosity for the unknown and a greedy fascination for individual growth without seeing the repercussions on others. The United States culminates these qualities not only as a first-world country but it can also be seen from the very beginnings of the nation’s history. The philosophies’ of early settlers in the United States was to have equality between the people, however Americans failed to incorporate this ideology of equalityRead MoreFrederick Turner Jackson: Frontier Thesis1136 Words   |  5 Pagesaround him, Turner chose to become a history professor, devoting his entire life to studying American culture/society while teaching at the University of Wisconsin and Harvard. Constantly having the opportunity to study and observe the development of the â€Å"American†, Turner wrote extensively, about which attributes composed and influenced American democracy, societal values, and image. He published an essay, â€Å"The Signi ficance of the Frontier in American History† about these topics in 1893, and presentedRead MoreEssay about Turner Thesis Summary653 Words   |  3 PagesTurner Thesis Summary Throughout history society has to go through many changes that not only affect many of the people but also the areas around the transformation. The main point of Fredrick Jackson Turner’s thesis is what the real essence of America is, and how we’re all influenced by the many changes we have to go through. He believes that American history should not be focused on the extension of European enterprise. The society will have to realize that America will have to be emancipatedRead MoreEssay on Two Part of the United States Reconstruction Era590 Words   |  3 PagesIn the United States’ history, the Reconstruction Era had two senses. From 1865 to 1877 was the first, which involved the post Civil War action. The second sense, focused on the transformation of the Southern United States from 1863 to 1877 with the Congress directing the issue of reconstruction of state and society (â€Å"Reconstruction Era†). Frederick Jackson Turner argued that the frontier wa s the chief determinant in American history (â€Å"Frederick Jackson Turner†). Both the Reconstruction impact and

Tuesday, December 17, 2019

The Contrast between Gothic Architecture and Romanesque...

The Romanesque and Gothic architecture period both occurred during the Middle Ages with the Gothic period taking place during the later half. Gothic and Romanesque architecture were related in many ways, but they also contrasted in style too. Over time, masons began to test the waters and push the limits. They thought of new ways to add lighting and ways to allow more height to the building without it being to heavy and weak. Many of the reasons for the change in styles had a lot to do with society and the changes it faced. There was a greater intensity occurring in piety and literature. The Gothic style embodied this new urban society. Romanesque and Gothic shared similar characteristics, but Gothic architecture was a greater departure†¦show more content†¦These characteristics contrasted with the style of Gothic architecture. With the new Gothic style, the walls were thinner. Masons worked towards a more artistic look. Unlike the Romanesque style, which had few windows, Go thic architecture had many. The Gothic style, dating between the 12th century and 16th century, began in France and eventually spread throughout the rest of Europe. An example of the first true Gothic church was St. Denis of Paris. Now, it is considered one of our finest artistic periods, but at the time, the term â€Å"gothic† did not exactly hold the same meaning it does today. The name came from the Goths and was used rather negatively when describing this style of architecture as they considered it to be similar to the works of the barbarians from which the name was derived. Defining characteristics which began to create the line between Romanesque and Gothic architecture was the use of flying buttresses, this allowed for more light, bigger windows, and of course the use of a pointed arch rather than the rounded arches. Other characters which were developed and characterized as Gothic were the inclusion of large vertical towers, flamboyant spires, plate tracery windows, emphasis on windows, the reintroduction of sculptures, glass stained windows. Within the Gothic architecture style there were three forms, the Early Gothic period, theShow MoreRelatedDifferences Between Eastern And Western European Architectural Styles1223 Words   |  5 PagesGothic architecture is often characterized just by the visual aspects that define it; however, there is much deeper influence in the structure and form of the style. The term is sometimes used to define a time period, but some critics believe there is no true definition of the term gothic. The style has evolved from many different things throughout history, and its influence is still evident throughout buildings in Europe. Gothic architecture and different styles of architecture can commonly beRead MoreSaint Brigid s Centre For The Arts1657 Words   |  7 PagesThe Romans’ most greatest techniques of architectures were influenced by its of the Etruscans and has developed three architectural features: arch, dome and vault in the 1st century BC. Romanesque architecture has char acteristically elements: Semi-circular arch, Barrel vaulting of the nave, thick buttress walls and Gothic architecture has three elements which came together in Gothic period: Pointed arch, Ribbed vault and Flying buttress. Among Architecture terms, a vault is an arch- shaped structureRead MoreAncient Architecture : Ancient And Medieval Architecture1015 Words   |  5 PagesReligion’s Architecture Ancient and Medieval Architecture spans from the meaningful Zygurats in Mesopotamia to the elaborate Gothic Churches in France. Architecture has been influenced by many factors like environment, politics, and culture. However, the greater factor that influenced Ancient and Medieval Architecture is religion. Religion, Gods, and the heavens where the key factors in creating Mesopotamian Ziggurats, Egyptian Pyramids, Greek Temples, Christian Basilicas, Islamic Mosques, andRead MoreThe Basilica Of St Denis2337 Words   |  10 PagesIn this essay I intend to compare and contrast the Basilica of St. Sernin and Basilica of St Denis in France with references to how they differ structurally (as Romanesque and Gothic buildings respectively) followed by critical analysis of the advancements in architectural construction methods. The progression in architectural capability from Romanesque to Gothic led to a change in how religious architecture was approached spatially, with far greater emphasi s on the use of light and a desire forRead MoreGothic Architecture in Europe Essay1897 Words   |  8 PagesThe research paper, shall be concerned with discussion Gothic architecture in Europe-namely England, France, Germany, and Italy starting from 12th to the 16th Centuries. Architecture was the most original and lasting form of art during the Gothic Period, which lasted for four centuries starting from the mid 12th century. The impetus for this architecture was the Roman Catholic Church, which sought to portray their houses of worship as something which transcended the realm of mankind. It is interestingRead MoreEssay on Renaissance and Medieval Architecture2537 Words   |  11 PagesRenaissance’s predecessor. During the Medieval Era, Gothic and Romanesque Architecture was seen throughout Europe. Since Renaissance followed the Middle Ages, it is possible to describe their differences throughout Europe. The changes that happened throughout culture, religion, ideology , and government ultimately led the people of the Renaissance Era to express their skills in architecture, sciences, arts, and etc. The contrast in expression of art or architecture is apparent both eras. The ideologies amongRead MoreFrench And English Gothic Cathedrals1837 Words   |  8 PagesFrench and English Gothic Cathedrals Gothic Europe was a time of change in many aspects of life. Aside from the change in art and architecture, philosophical and religious revolutions were occurring. The social transformations fueled the fire behind the changes in art and architecture. As we know, any time the social aspects change it flows into the artistic side of life. Additionally, new architectural technology and improvements helped to transform the architecture of the Gothic period to fit theRead More Three Architecture Styles Essay1390 Words   |  6 PagesThree Architecture Styles In this essay information will be given in order to compare and contrast data about three different styles of architecture. The three styles are Art Deco, Art Nouveau, and Neo Gothic. In order to fully give a clear explanation of these styles, information about architecture will be given first then the three styles will follow with comparing and contrasting points in between. First, to inform about architecture, one must explain what it is. Architecture, referringRead MoreComparison and Contrast of Two Gothic Cathedrals Essay625 Words   |  3 PagesComparison and Contrast of Two Gothic Cathedrals Gothic Style is some of the most beautiful works of art that man have ever made. It originated with the Romanesque style of building which lasted for about one hundred years before it was replaced by Gothic styles. The founder of the Gothic style was a man by the name of Abbot Suger. Notre Dame de Chartres cathedral was built in France between 1145 and 1513 and is Gothic architecture. Another Gothic architecture is the Bourges and it isRead MoreThe Existence Of A Renaissance1404 Words   |  6 Pagesinclination may have caused historians to place a label on the twelfth century simply because it shares a few features with The Renaissance of the sixteenth century. Clear distinctions must be upheld to properly categorize any major movement, or lines between periods blur. A closer look at the changes that occurred in the twelfth century allows assessment of which definition—if any—best fits the era and, in turn, procures the decision of whether the twelfth century can properly be labelled a ‘renaissance’

Monday, December 9, 2019

Educational and Entertaining Tv free essay sample

Did you know that TV can be entertaining AND educational? Most shows help with learning in some way or another in people of all ages. For example, children shows like Barney and Sesame street can help with talking and reading in babies and toddlers. Higher level learning shows like the programs on Discovery can relate to the things studied at school for older children, teenagers, and even adults. They can help further the persons knowledge in a more entertaining way than school. Additional programs teach how to do multiple tasks, while others teach safety in critical and dangerous situations. The importance of education on television is huge. Most children watch TV from a very young age and the shows they watch can affect their life as they get older. This is why there are programs for infants and toddlers. These shows include Barney, Mickey Mouse, Sesame Street, and much more. We will write a custom essay sample on Educational and Entertaining Tv or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page They help teach kids early in life how to talk, read, and write. As the kids get older, they can watch more advanced shows like the ones on Discovery Channel, The History Channel, and The Animal Planet. Shows on these channels inform watchers about major events in history, new discoveries in the world, nature, animals, and many other important subjects. Helping with the education of older children to adults is most likely the main point of these channels Some shows on TV also teach how tos. For example, HGTV has shows that give advice on how to makeover your home for a good price, what to look for in a new home, and how to repair your home. One specific show, Holmes on Homes, my dad watches to learn more about issues on houses and how to fix them, since he is a contracter. Also, my mom has learned how to make amazing meals from the Food Network Channel. Shows on this cooking channel teach how to make meals in a certain amount of time. Some have challenges between chefs. Some just teach cooking in general. These how tos make great shows to watch when you need advice on selling your house, buying a house, or planning a meal for your family or a party. They are all very educational. The last way TV is educational is in safety. Most shows that teach safety are about true life experiences. he news and weather channel inform watchers how to be safe from natural disasters occurring daily. Some other shows teaching safety can actually be entertaining along with informing. These include 1000 Ways to Die, Man vs. Wild, I Shouldnt be Alive, etc. 1000 Ways to Die has taught me many things about the human body, how it works, and what it can withstand. It shows how something as little as kicking a locker or smelling too many strong spices can kill you in some way. T he other two, Man vs Wild and I Shouldnt be Alive, are real life experiences of people taking on nature. I learn about natural disasters, animals, and nature from these shows. Some other things these shows teach are safety from injury, poisons, sickness, catastrophe, and more. I have learned so much from these shows and so can other people. Ive learned from watching TV that it is up to the viewer if TV is educational or not. Tv can affect people of all ages because there are shows out there for all ages. Television can be watched for entertainment and education and the shows named above are perfect examples of how to get educational information while being entertained.

Sunday, December 1, 2019

Othello- Iago Essays - Othello, Iago, Michael Cassio, Emilia

Othello- Iago As villain in Shakespeare's play Othello, Iago has two main actions. They are to plot and to deceive. Iago hates Othello for two reasons. He believes that Othello made love to his wife, and Iago is mad that Cassio was chosen to be Lieutenant instead of himself. From this hate comes the main conflict of the play. Iago plans to ruin Othello by carrying out a plan based on lies and deceit. This plan will make Iago the only person that Othello believes he can trust, and Iago will use this trust to manipulate Othello. First, Iago plans to remove Cassio from his position as lieutenant so that he himself take over Cassio's position as confidant and Lieutenant to Othello. Then Iago hopes to convince Othello that Cassio and Desdemona are having an affair. If Iago's plan unfolds properly, he will be granted the revenge that he believes he deserves. Iago's plan and his motives are disclosed through a series three of conversations. He speaks with Roderigo twice and Cassio once. These three conversations show how Iago manipulates others to gain his own ends, and they also give motives for Iago's behavior. The conversations all follow the same pattern. Iago first speaks with Roderigo and Cassio to forward his plan, and then Iago has a soliloquy in which he discusses his motives. Iago states that the reasons for his hate are that Othello slept with Emilia and Cassio was chosen to be Othello's Lieutenant. However, Iago's actions lead to ends that do not revenge his given motives. Coleridge calls Iago's actions the motive-hunting of a motiveless malignity . In other words, Iago's only reason for destroying Othello is that Iago is an inherently bad person. The conversations that Iago has with Roderigo and Cassio show that Iago invents reasons for his actions against Othello, so that his own selfish ends can be met. Iago's first dialog with Roderigo serves as an introduction to Iago's plan. In this scene the reader learns that Roderigo is in love with Desdemona, because he threatens to drown himself when he learns that Othello and Desdemona are engaged. Uses Roderigo's weakness to help him remove Cassio from his lieutenant position. Iago tells Roderigo to put money in thy purse (333) . Iago believes that Othello and Desdemona will not be together for a very long time since Othello is a Moor and Desdemona is an aristocrat. Iago urges Roderigo to earn money now so that he can be an eligible suitor when Desdemona is looking for another husband. This conversation and the soliloquy following it introduce the two different sides of Iago. Iago tells Roderigo what he wants to hear in order to enlist his help. However, in the following soliloquy the reader is introduced to what Iago really has planned. He states that he would never associate with someone like Roderigo except to gain his own ends. Thus do I ever make my fool my purse--/ For I mine own gained knowledge should profane/ If I would time expand with such a snipe/ But for my sport and profit (365-368). Iago feels that Roderigo is a foolish man who exists only for Iago's use or sport. This idea a strengthened by the word snipe. The Arden Shakespeare defines snipe as fool (p. 159) and states that the word meant gull or dupe (p. 159) before Shakespeare. These definitions emphasize the fact that Iago feels no respect for Roderigo and is manipulating Roderigo only to further his plan. In the same speech, Iago's real plan is revealed only to the audience. Iago wants to convince Othello that Cassio and Desdemona are in love. They are the two people that Othello trusts, and if Othello believes that they have turned on him, this will lead to his downfall. Iago plans to tell Othello that Cassio and Desdemona are having an affair. Cassio is a ladies man, and Iago believes that Cassio's charm makes women fall in love with him. Iago will make the innocent flirtations of Cassio and Desdemona seem like secret love to Othello. After some time to abuse Othello's ears/ That he is too familiar with his wife/ He hath a person and a smooth dispose/

Tuesday, November 26, 2019

Chowan University Admissions - SAT Scores, Costs...

Chowan University Admissions - SAT Scores, Costs... Chowan University Admissions Overview: Admissions at Chowan University are only somewhat competitivethose with grades and test scores above average have a good chance of being admitted. Students applying to Chowan need to submit scores from the SAT or ACT, along with high school transcripts and a completed application. There is no writing or personal statement requirement as part of the application. Students interested in Chowan University should check out the schools website, and are welcome to visit campus and/or contact the admissions office with any questions.   Admissions Data (2016): Chowan University Acceptance Rate: 57%Test Scores 25th / 75th PercentileSAT Critical Reading: 360 / 445SAT Math: 360 / 450SAT Writing: - / -What these SAT numbers meanACT Composite: 14 / 17ACT English: 11 / 16ACT Math: 15 / 17What these ACT numbers mean Chowan University Description: Chowan University is a private Christian college in Murfreesboro, North Carolina, a town just an hour away from Virginia Beach. With a student/faculty ratio of 16:1 and a student body of just over 1,300, Chowan offers plenty of individualized attention on its 300-acre campus. The college hosts over 45 student clubs on campus and 13 NCAA Division II sports. The Chowan Hawks compete in the  Central Intercollegiate Athletic Association (CIAA). Popular sports include football, soccer, softball, tennis, and cross country. Chowan also has plenty of intramural sports, including pick-up Frisbee and extreme dodge ball. For those with more interest in the fine arts, Chowan is home to the Wayland L. Jenkins Jr. Fine Arts Center, a gallery with almost 90 original works of art as well as a collection of early 19th-century furniture. There is plenty to do at Chowan, including watching performances by TheatreChowan, playing to win the Chowan Ping-Pong title, and surfing at one of the nearby beach es. Enrollment (2016): Total Enrollment: 1,534  (1,525 undergraduates)Gender Breakdown: 46% Male / 54% Female96% Full-time Costs (2016- 17): Tuition and Fees: $23,930Books: $1,000 (why so much?)Room and Board: $8,950Other Expenses: $1,664Total Cost: $35,554 Chowan University Financial Aid (2015- 16): Percentage of New Students Receiving Aid: 100%Percentage of New Students Receiving Types of AidGrants: 100%Loans: 92%Average Amount of AidGrants: $17,193Loans: $10,696 Academic Programs: Most Popular Majors:  Business Administration, Criminal Justice, Health and Physical Education, Social Sciences, Psychology, Elementary Education, Religious Studies, History, Communications, Studio Art Graduation and Retention Rates: First Year Student Retention (full-time students): 48%4-Year Graduation Rate: 12%6-Year Graduation Rate: 23% Intercollegiate Athletic Programs: Mens Sports:  Football, Tennis, Track and Field, Cross Country, Basketball, Baseball, Golf, SoccerWomens Sports:  Lacrosse, Softball, Soccer, Tennis, Track and Field, Cross Country, Volleyball, Basketball, Bowling Data Source: National Center for Educational Statistics If You Like Chowan University, You May Also Like These Schools: Shaw UniversityNorfolk State UniversityOld Dominion UniversityMars Hill UniversityVirginia Commonwealth UniversityBarton CollegeNorth Carolina Central UniversityWingate UniversityUniversity of North Carolina - GreensboroVirginia Union University

Saturday, November 23, 2019

Can rejecting a job offer actually elevate your career

Can rejecting a job offer actually elevate your career Imagine going through the grueling process of creating your resume, optimizing your LinkedIn profile, applying to dozens of jobs, and going on a handful of interviews to finally be offered the job – only to turn it down! Are you insane? Why would anyone ever decline a job offer after going through all this? Maybe the salary wasn’t up to par. Perhaps the vacation time didn’t start for a year after you began. You may have found during the lengthy interview process that you just weren’t feeling the company’s culture. You may have even accepted a better job offer. But is it bad to decline offers? Will this hurt your career? Not necessarily. Rejecting a job offer may actually help elevate your career. Sharpens your negotiation skillsOne of the main reasons candidates turn down job offers is due to salary discrepancies. Unfortunately, you really can’t discuss how much you’ll be paid during your first interview before any job offer was extend ed. You may have only seen a salary range from the job description or perhaps no salary was listed at all.You went on the company’s multiple interview process expecting to make a certain amount but ended up being offered much less. Now is the perfect opportunity to negotiate your salary! Negotiating your salary is something that can improve your career and forces you to know what you’re worth in your industry. Knowing how to negotiate your salary during the interview will benefit you when you’re up for a promotion and want to negotiate your raise.Improves your interview skillsTurning down a job offer opens you up to interview at other places. Regardless of the rapid expansion of technology today, interviewing is a skill that isn’t going away anytime soon. Knowing how to effectively speak with different types of employers, who all have their own unique methods, will significantly increase your confidence and make you comfortable with the process. As a bonu s, the more interviewing you do will not only make you a better interviewee with other companies but will make you a better interviewer if you’re a manager and need to recruit new talent.Leaves the door open for better opportunitiesIn today’s digital world with companies and job boards regularly posting positions online, there are always opportunities out there, even during recessions. It’s not uncommon for professionals and executives to routinely go on interviews just to get a feel for what’s out there. They may initially have no intention of accepting the job offer if extended, but just seeking better opportunities and feeling the pulse of the current job market in their industry is invaluable.Makes you a more attractive candidateThe Chronicle of Higher Education published an article that showed interest from one company can serve as a leverage point or negotiation for another company. This is especially true when you’re in a specialized field w ith a select number of qualified candidates. I once worked as an executive recruiter where there was a frenzy in search of plastic injection molding engineers. These specialists were very difficult to find, and many companies were competing with one another to try and hire them. The plastic injection molding engineers would routinely decline offers, which only made them more appealing. Talk about a specialized field with a small talent pool!Teaches you how to say â€Å"no†Learning how to say no is an often-underrated but invaluable skill. Many CEO’s and top-level executives attend leadership training sessions to learn how to strategically say â€Å"no,† which has shown to enhance their abilities to work more efficiently since they’re constantly bombarded with proposals.One thing that’s essential when declining a job offer and saying â€Å"no† is to respond quickly to the job offer and be honest and polite. People will respect your honesty be cause it requires a lot of courage and takes responsibility. Learning to say no will sharpen your focus and keep you from making unnecessary mistakes because you may have been too polite to just say â€Å"no.†In the end, if you have any doubts about a position, then it clearly wasn’t meant to be. You’ll feel better knowing you made the right decision and that your gut was telling you the offer just wasn’t right. This newfound attitude will allow you to go after the job you’ve always wanted and push you to elevate your career goals. Being decisive and not regretting your decisions are characteristics of success. Trust your judgment, and you just might be surprised where your career path will take you.About the Author: Maria Gold is currently a Content Manager/Writer for Empire Resume. She is dedicated to helping educate people with the latest career articles and job search advice. When Maria is not working, she enjoys reading and spending quality ti me with her family.

Thursday, November 21, 2019

Learning with educational games Essay Example | Topics and Well Written Essays - 750 words

Learning with educational games - Essay Example Therefore, educational games and some activities in the textbooks are good learning strategies that help students in overcoming problems of information reception and acceptance. These are activities performed by students in order to develop their mental and physical abilities and also bring them fun and entertainment. In addition, learning with educational games helps students to acquire knowledge (Al-Ghamadi, 2009). Play, as a part of learning, has a number of benefits to students. Firstly, it promotes interaction between individual students. As the students interact, they also get to discover individual differences and personalities among them (Van, 2006). This discovery shall help to understand each other more. Educational Games also help students with visual learning preferences understand topic concepts easily. Lastly, games boost mental health by activating the mental capacity. Learning with games usually requires that students cluster into different learning groups. One advantage of this clustering during learning games is that a student gets his or her capabilities and superiority over the others. This fact gives one confidence and heightens self esteem. Gaming also promotes thinking and imagination of an individual since most games are usually in the form of puzzles. Besides, these games have rules that must be strictly adhered to. As students keep on following these simple rules of gaming, they also learn and grow up to be law abided citizens. Lastly, learning with educational games in groups promotes corporation and unity among students thus; individual group members feel a sense of belonging (Balkis, 1987). A teacher plays an overall oversight role in learning with educational games. The teacher, other than identifying and selecting the most appropriate games for the students, facilitates the formation of various groups and defines the role of each group member (Balkis, 1987).. He also plans and schedules the time and place for these

Tuesday, November 19, 2019

It depends on which topic you choose Research Paper

It depends on which topic you choose - Research Paper Example This paper evaluates knowledge intensive firms and workers in the Southern Company (SO) which is a public utility company focusing on production, wholesaling, and retailing electricity in the Southeastern area of the United States (Ruiz, Benefield, Horton, Nielens, & Akins, 2012). For more than a century, the Southern Company employees have been learning from their predecessors resulting in a workforce characterized by the accumulation of relevant knowledge for use in facilitating a long lasting commitment to the communities and customers they serve. With its investment in Knowledge base management, Southern Co used an IT Aids Post-Katrina Recovery system that enabled to prepare for hurricane Katrina even before the 2005 storm struck. With this knowledge, the recovery from Hurricane Katrina was possible within 12 days unlike 28 days (McKeller, 2013). According to McKellar (2013), Southern Company is one of the companies with notable modification of groundbreaking solutions characterized by innovation and agility to serve the company’s customers and their communities.Today, Southern Company deploys unparalleled and comprehensive program in Asset Lifecycle Information Management (ALIM) that includes Engineering Information management (EIM) and a smooth asset document and data handover to promote maintenance and operations (Weitzman, 2015). In addition, SO has a great program through which it manages documents such a program to store drawing content and updating it with present conditions. In order to improve its document ma nagement, SO has invested in including asset references to drawings through investment in strong and productive relationships among people, technology, and process. This way, it will become possible for technology to support documented processes through clear standards and procedures that can be executed by actual persons (Kavas,

Sunday, November 17, 2019

Social Responsibility Essay Example for Free

Social Responsibility Essay Economy is a main component is of having a healthy society not suffering from unemployment and inflation. How is it possible to have social responsible executives acting as agents and not as political officials? (Freidman, 1970). †¢The role of the government is to set a balance between the legislative, executive and judicial branches. Thus, there must be a set of regulations on corporate executives in order not play the role of an elected political official and by not having the complete control in navigating the economy through inflation or deflation. †¢Thus, as indicated by Freidman (1970), this is the basic reason why the doctrine of social responsibility involves the acceptance of the socialist view that political mechanisms, not market mechanisms, are the appropriate way to determine the allocation of scarce resources to alternative uses.(p.3) †¢Therefore, Friedman shares this concept with Cohen in relation to managers and critical leadership of executives. †¢In relation to which aligns best with green environment? Friedman, Cohen and Drucker concepts align with the current business climate promoting a safe environment. What differs is in relation to how far the balance is applied between the social responsibility of a corporate executive and by taking the role of government officials in controlling the economy. †¢Drucker explained the role which must be played by the businessmen in relation to public good, knowing the fact that governments are incapable of completing all obligations. Thus, the question arises: how far is the limit set on corporate executives? The question is crucial in order to avoid the consequences of what Freidman (1975) indicates: †He becomes in effect a public employee, a civil servant, even though he remains in name an employee of a private enterprise.†(p.3) †¢The problem arises when benefits and profits conflicts with the environmental protection. †¢The negligence towards the environment is justified by the reliance on the technological advancement of the future which will heal any damage committed nowadays by companies. Thus, is it justifiable to increase the benefits of a company even though its profits are aimed at supporting ecofriendly technological advancements? †¢Furthermore, statements such as indicated by (Freeman, York and St ewart, 2008), â€Å"Maybe global warming is a simple weather pattern that will reverse in five years.† (p.5) could be justified through scientific evidence conducted by companies having interest in neglecting the environment and increasing its profits. Thus, the critical leadership as indicated above by Drucker in relation to corporate executives is being fulfilled towards the companies interests as well the environment. †¢In addition, lobbying plays a huge role in political campaigns and elections which can surpass the socialist view of freidman by having leaders of private enterprise supporting candidates solely for their economic advantages and neglecting environmental protective policies whether through the national or international level. Cohen, W. A. (2009). What Drucker taught us about social responsibility. Leader To Leader 51, 29-34 http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=truedb=bthAN=35755461site=ehost-live Beebe, G. (2012). Character formation. Leadership Excellence, 29, (6), 20 http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=truedb=bthAN=76463146site=ehost-live Drucker, P.(1981). What is business ethics? Public Interest, 63, 18-36 http://www.nationalaffairs.com/doclib/20080708_1981632whatisbusinessethicspeterfdrucker.pdf Friedman, M. (1970). The social responsibility of business to increase its profits. New York Times 32-33, 122-124, 126 http://www.colorado.edu/studentgroups/libertarians/issues/friedman-soc-resp-business.html

Thursday, November 14, 2019

guitar :: essays research papers

An acoustic guitar strums softly in the back alley of a rock concert.Thousands of people stampede by. They flood the streets like hungry animals.It starts to rain; slowly the guitar raises and smashes into the concrete-ridden ground over and over until it is screaming,raging-a guitar madness! It breaks and cracks into millions of tiny pieces. Another dream is broken. The people don't notice. They crowd the street, standing on someone else's misery. They kick the pieces aside and enter a world where self -involved entertainers sell their misery to a world where misery is fashionable. Music today is being controlled by pop culture. They use it as a weapon to over power and trick young listeners into buying their products.Pop culture today is seeming to be full of "faceless bands". They all look the same, and they all sound almost exactly the same. If someone even tries to enter the world of music, pop culture immediately takes control. They've turned it into a "music business". You'll get chewed up and spit out, if you don't look the part. It isn't about sounding the part anymore. It's all about looking the part for their self-proclaimed "music business". What ever happened to the musicians who performed just for the love of it? It's all about money now. They've all realized the power music has over people. They tried to take it away, and are now using it against us, for their advertisements, t.v. shows, radios, and various products. Music is more powerful than you think it is. Music creates the way you feel, and think. It is a huge social interest. If you go out with your friends, usually there will be music. It is a big impact on a teenage life. Think about dances, parties, and other social gatherings. It's turned into a new fashion. If your friends listen to a certain type of music, there is a high percentage that you will too. People treat music like a clothing brand; a product to brainwash large quantities of people . What happened to the real musicians? Where are they? Well I'll tell you. They are the ones sitting in the back alley of a rock concert, going unnoticed, until their dream is smashed and they give up the dream of being "company property", and they wake up. Why bother trying to grasp the media's attention? You will just become one of them: a money craving beast. guitar :: essays research papers An acoustic guitar strums softly in the back alley of a rock concert.Thousands of people stampede by. They flood the streets like hungry animals.It starts to rain; slowly the guitar raises and smashes into the concrete-ridden ground over and over until it is screaming,raging-a guitar madness! It breaks and cracks into millions of tiny pieces. Another dream is broken. The people don't notice. They crowd the street, standing on someone else's misery. They kick the pieces aside and enter a world where self -involved entertainers sell their misery to a world where misery is fashionable. Music today is being controlled by pop culture. They use it as a weapon to over power and trick young listeners into buying their products.Pop culture today is seeming to be full of "faceless bands". They all look the same, and they all sound almost exactly the same. If someone even tries to enter the world of music, pop culture immediately takes control. They've turned it into a "music business". You'll get chewed up and spit out, if you don't look the part. It isn't about sounding the part anymore. It's all about looking the part for their self-proclaimed "music business". What ever happened to the musicians who performed just for the love of it? It's all about money now. They've all realized the power music has over people. They tried to take it away, and are now using it against us, for their advertisements, t.v. shows, radios, and various products. Music is more powerful than you think it is. Music creates the way you feel, and think. It is a huge social interest. If you go out with your friends, usually there will be music. It is a big impact on a teenage life. Think about dances, parties, and other social gatherings. It's turned into a new fashion. If your friends listen to a certain type of music, there is a high percentage that you will too. People treat music like a clothing brand; a product to brainwash large quantities of people . What happened to the real musicians? Where are they? Well I'll tell you. They are the ones sitting in the back alley of a rock concert, going unnoticed, until their dream is smashed and they give up the dream of being "company property", and they wake up. Why bother trying to grasp the media's attention? You will just become one of them: a money craving beast.

Tuesday, November 12, 2019

Mobile Phone and Samsung Galaxy Note

The word Samsung means â€Å"three stars† in Korean. Samsung is known globally for its electronic products and it is one of the successful brands in the electronic industry. It is an established company almost all around the world. While the Samsung Electronics is a South Korean multinational electronics and information technology company headquartered in Samsung Town, Seoul. It is the flag ship subsidiary of the Samsung Group. With assembly plants and sales networks in 61 countries across the world, Samsung has approximately 160, 000 employees. In1938, the Samsung's founder Byung-Chull Lee set up a trade export company in Korea, selling fish, vegetables, and fruit to China. Within a decade Samsung had flour mills and confectionary machines and became a co-operation in 1951. From 1958 onwards Samsung began to expand in too the industries such as financial, media, chemical’s and ship building. In1969, Samsung Electronics was established producing what Samsung is most famous for, Televisions, Mobile Phones (throughout90's), Radio's, Computer components and other electronics devices. In 1987, Byung-Chull Lee passed away and Kun-Hee Lee took over as chairman. In the 1990, Samsung began to expand globally building factories in the US, Britain, Germany, Thailand, Mexico, Spain and China until1997. On the other hand, Samsung has developed the ‘lightest' mobile phone of its era. Then they developed smart phones and a phone combined mp3 player towards the end of the 20th century. To this date Samsung are dedicated to the 3G industry such as making video, camera phones at a speed to keep up with consumer demand. Introduction of Product Brand Line A product line is a group of products that are related and manufactured by the same company. Product lines are not to be confused with product bundling, which combines various items into one type of product. For example, Samsung home appliances product line might include refrigerator, washing machine, air conditioner, vacuum cleaner and others. Other example, Samsung's mobile phones are divided into product lines based on the following features; touch screens, slider or folders, QWERTY keyboards and ar phones base on the product price, product quality, who the product is aimed at target group, and product specification. Product lines help to manage their products as product strategy can be designed around product lines. Samsung has offered more than one product line with the product that are all closely related. Different type of product line might toward different type of segmentation based on the customer. Samsung try to expand its business is by adding to its existing product line. This is because people are more likely to purchase products from brands with which they are already familiar and confident. Product Introduction The introduction of Samsung Galaxy Note in the year 2011 popularized the term Phablet, mainly because of its large display screen. Now, the updated version of Galaxy Note is released. The Samsung Galaxy Note 2 comes with many high end features and it runs on Android 4. 1 (Jelly Bean) OS. The phone is powered by a 1. 6 GHz quad-core processor. The Samsung Galaxy Note 2 is wider than the previous version. The display screen measures 5. 5 inches and it offers visuals at a resolution of 720 x 1280 pixels. The phone weighs about 180 grams and it is 9. mm thick. The super AMOLED display screen of the phone is protected by Corning Gorilla Glass 2. The phone sports an 8 MP camera for capturing images at a good resolution. Users can also record HD videos using this handset. The Samsung Galaxy Note 2 also comes with a 2 MP secondary camera. The powerful 3100 mAh battery in the handset offers ample talk time and standby time. The phone comes with 16/32/64 GB internal memory capability. This is expandable further up to 64 GB through a microSD card. The Samsung Galaxy Note 2 has multiple platforms for connecting to the internet. High speed internet is possible through 3G, 4G and Wi-Fi connectivity. The phone has Bluetooth and micro USB port for file transfer with other devices. The A-GPS feature can guide you when you are lost in an unknown city. The phone comes with a stylus stick and it offers many high end features for users. Samsung Product (Luxury Product) Samsung Galaxy Note 2 is a luxury good. A luxury good is a product that not necessary but which tend to make life more pleasant for the consumer, often more expensive and primarily purchased by people with more wealth and income. In other words, as people receive more income, they devote an increasingly larger share of income to the purchase of luxury goods. This is because Samsung Galaxy Note 2 has just concentrated on market segment that are high income. People will purchase the Samsung’s product although with a high price as their income increases. Samsung Galaxy Note 2 has a many competing brands in the market such as Nokia, Apple and HTC. These alternative brands also offer the same products but with different features. Complement and substitute Substitution effect is always negative for Samsung, that is because consumers will always switch from spending on higher-priced goods to lower-priced goods ones. For example, if they are not satisfied with the price of Samsung Galaxy note II, definitely they will seek for other products which have same function and cheaper than Samsung’s smartphone such as Sony Ericsson, Iphone5, Nokia N9. Those competitors’s product is strong enough to compete with Samsung because their products are quality and cheaper than Samsung Galaxy note II. In conclusion, those threats will definitely decrease the demand for Samsung Galaxy note II. But, the one reason which differentiates the Samsung Galaxy note II with another product is their complementary products. The complementary products which exist in Samsung Galaxy note II is a removable battery, memory expansion via a micro SD slot and a built-in stylus, The S pen, that help users work well in their handwritten note and simple drawing. Those complementary products helped in increase of the demand of Samsung Galaxy Note II. Market Structure Samsung Company had been categorized as oligopolistic market structure because they have only a few sellers such as Nokia, Apple, Sony Ericsson and HTC. Even with such small amount of firms, they manage to control all the market. Other than that, Samsung products are classified as differentiated product because they set the price on different product with different design. This market structure had high barrier to entry because it is too costly or difficult for potential rivals to enter the market. Besides that, irms that are interdependent such as Samsung and LG are mutual interdependence. A firm operating in a market with just a few competitors must predict the potential reaction of its closest rivals when making its own decisions. For example, if Samsung Company wishes to increase its market share by reducing price, they must also predict the possibility that close rivals such as Nokia and HTC, may do such action too. Furthermore, the firms under oligopoly market structure are price maker; this is because they set the price by themselves, not determine by the government. The Samsung company also do a lot of advertisments to promote their products so that the comsumers will know about their products through multimedia such as televesion, radio, newspaper and internet. Part 2 Compare the price of Samsung Galaxy Note II with Nokia N9 The price of Samsung Galaxy Note II with 1 year contract is about RM 1899 than will be higher the Nokia N9 for RM 699. The price of Samsung Galaxy Note II without contract is about RM 2299 and for Nokia is RM1199. The price gap between the Samsung Galaxy Note II and Nokia N9 will be RM 1200 with contract and RM 1100 without contract. The reason the price of Samsung Galaxy Note II will higher than Nokia N9 is the technical specifications of the phone. The product differentation would be Samsung Galaxy Note II is counting on a totally different approach across the entire Android ecosystem with diversity but for the Nokia N9 is just using the normal windows software as the processer. This cause the Samsung Note II became the world best smartphone for now and the customers will be proud and happy when using the phone. Besides that, the Samsung Galaxy Note II has a Quad-core 1. GHz Cortex-a-9 chip as the processor and with 2GB of RAM as for the Nokia N9 used 1 GHz Cortex a-8 ship as the processor with 1GB of RAM. Obvious the Samsung Galaxy Note II will react faster than the Nokia N9 because of the internal build-in. The customers now a day would prefer better and faster software even through the price will be higher but they will statifisfy with it. Other than that, will be the advertisement of Samsung Galaxy Note II and Nokia N9. The Samsung Galaxy Note II was released at 30 August 2012 that will be 1 day before Merdeka day. The Samsung Company rabs this opportunity to promote their new product by giving discount to attract more customers in the day of Merdeka. They also promote through television, internet, newspaper and as a banner at roadside. With this huge promotion, they are able to profit their sales. As for the Nokia N9 was released at 21 June 2011. At that time the Nokia company do not promote their new product rapidly and there are just several people know about the Nokia N9 and also don not notice that it was quite a useful smartphone. Because of the lack promotion of Nokia Compan y, they are not able to set the phone at higher price. Furthermore, in this modern world the Samsung Company already achieved a standard brand name compare to Nokia Company because the qualities of the products is better. The Samsung product automatically will have a greater cost of production than Nokia product. The costs of production of Samsung Galaxy Note II also higher than the Nokia N9. Because Samsung Galaxy Note II is more advance in design, body shape, internal software used and better sound system than Nokia N9. So the cost of production also will be higher. The Samsung Company is willing to produce and sell a greater quantity of Galaxy Note II because the product price is high. Samsung Company hopes that the brand new Galaxy Note II will be the greatest smartphone for the year so they put effort on it. Conclusion is that Samsung Galaxy Note II is better, faster and performance well than Nokia N9. Samsung company promote their new product but Nokia company do not and with the reason above will be why the price of Samsung Galaxy Note II will be higher than Nokia N9. Part 3 The market structure of Samsung company is oligopoly which proven by a few characteristic. The first one is a few sellers which control the most of the market. It sells differentianted and high barriers to enter the market for new firms. From the Samsung firm’s viewpoint, there are a few advantages and disadvantages of being an oligopoly. The first advantage for the firm is high barriers of entry for new firms. This is because the exclusive financial requirement to start the business which can prevent the small firm from entering the market. This can avoid the profit being shared to other new firms. The company also needs to spend money on the Research and Development (R&D) to do new products which needs large money. This is to prove that the new entrants no easily if they want to enter the market. Secondly, oligopoly encourages firms to make efforts to innovate and produce more advanced product because all the firms are crazy about winning a more competitive place in the whole market. For Samsung Company, it tries to design the phone that suit for most of the consumers with the latest technology and resources they have. For example, Samsung galaxy note II is a popular phone among the consumers because of the design, the function, and the size of screen which preferred by the consumers. This can increase the profit of the Samsung Company when the sale of phone is increasing. On the other hand, the disavantage from firm’s viewpoint is high cost spent on adverstiment and Research and Development for the product. This can increase the input cost and the firm will set higher price for the product to cover the cost. The company has to spend money to develop a new product. After developed a new product, the company has to promote the product through television, internet, newspaper and radio. This is to inform the consumers that there is a new product launched by Samsung Company. Furthermore, there are strong competitors like Apple Company, Sony Company and somemore which can compete with Samsung Company. Some of the consumers like to buy iphone and some like to buy Sony phone. Samsung have to launch new products which can give the cosumcers high satisfaction to maintain the position in the market. If other company able to produce a new phone which bring higher expactation than the consumers expact, the consumers will buy the new phone. This can reduce the buyers to buy the Samsung Company’s product. In the consumer’s viewpoint, the advantages of buying a product under oligopoly market structure is the consumers can easily make price comparison among the few companies. Consumers can compare the phone price between the phone companies such as Samsung, Nokia, Iphone, Sony and somemore. As comparison done, they will choose the phone with suitable price which equivalent to the quality of the phone. For example, the consumers will think about the features of the phone and look at the price. When the consumers are the office workers, they will prefer Samsung Galaxy Note II because the screen is bigger and there is a pen used to write things on the phone which makes the phone act like a note book. The second advantage for the consumer is the consumers can expenrience new phone with different features. Because of strong competitors between these companies, the companies have to design new phone with the features that can attract consumers to buy it. This can make the consumers have many choices of phones which have different features. However, the disadvantage of consumers buying the product under oligopoly market structure is the firm is a price maker which means the companies can determine the product by themselves. This can harm the consumers because as the company is a price maker, the company can set higher price to earn more profit. But this can make the consumers have to pay higher price. Besides, the disadvantage for consumers is the differentiated products. The consumers have to choose which one phone is better. Sometimes, it will be confusing when chosing the phone with different brand, different quality and different price. At this time, they have to think deeply before purchasing a phone because one phone is very costly. Part 4 In conclusion, the assignment is very useful to us. we find out that Samsung Company is operated under oligopoly market structure. Byung-Chull Lee has set up the Samsung Company with small business and takes over by Kun-Hee Lee after Byung-Chull Lee has passed away. The business start to expand globally at the end of 20th century. This can show that Samsung Company is slowly developed and required a large financial requirement. Under Samsung Company, it sell different types of products such as refrigerator, washing machine, air conditioner, vacuum cleaner and others. But in this assignment, we only focus on the Samsung mobile phone. In mobile phone market, there are only a few sellers such as Samsung, HTC, Apple, Nokia and Sony who control most of the market. Samsung Company is selling differentiated products which mean the phones have different in term of price, features, design, and quality. This can let consumers have different choices of chosing a phone. Samsung Company is a price maker which means the company can determine the price of the phones by themselves. Under oligopoly market structure, there is high barriers to entry for new entrants because the start-up cost requires large money to set up the company. Samsung Company also do a lot of advertisment when a new phone is launched through television, radio, internet, newspaper and the banners along the road. In my observation Based on the research done on this assignment, we find out that the concept of oligopoly can apply on he realistic life. The characteristic of a firm under oligopoly is shown as above and is applied in real life. Besides, we have come out an assumption about the price changes and the demand. If the price of the product increases, the quantity demanded for the product would decrease. Using the logical thinking of a consumer, people would definitely buy more of a certain product if the prices w ere lower. Besides that, according to the law of diminishing marginal utility, buyers would receive less satisfaction when they buy more units of a product. Hence, consumers would only buy if the prices were lowered. Another reason is because when the price increases, the buying power of consumers would decrease as they are unable to buy as many at higher prices as at lower prices. This is basically known as the income effect of a price change. Besides that, if the price of the product increases, consumers could choose and buy other substitutes available in the market. Hence, the quantity demanded would also fall. This is known as the substitution effect. As for the supply, if the price of the product increases, the greater the quantity supplied. This is because the higher prices are an incentive for the producers to produce more of a good in the form of profits. My empirical findings in this research does not fulfilled my expectations regarding economics. This is becauset the concept of price decrease and demand will increase will not very appliable in real life because there are many factors to influence the decision of consumers to buy a new phone which are brand, quality, the features, the income of the buyers, and the promotion such as free gifts and free vouchers. Better quality of phone even though with higher price, the demand of the phone still increase. Phone with many features will cost higher price. If we intend to establish a company, we will chose to enter oligopoly market. This is because the market is only a few sellers but many buyers. With the characteristic of a few sellers and many buyers, we can control most of the market and earn profit in the long run. Our company also sells differentiated products like phones which can give consumers a lot of choices to choose the phone which suit them. Our company also needs to advertise our products to stimulate the awareness of the consumers through television, radio, internet, newspaper and banners along the road. Even though oligopoly market structure has the characteristic of high barriers to entry for new entrants, we can start from a small company and slowly become a big company like Samsung Company or we can team with other people to set up one big company and divide the profit equally.Reference Oligopoly. (n.d.). In  Wikipedia, the free encyclopedia. Retrieved  March  12, 2013, from http://en.wikipedia.org/wiki/Oligopoly About SAMSUNG – SAMSUNG. (n.d.).  Samsung US | TVs – Tablets – Smartphones – Cameras – Laptops – Refrigerators. Retrieved from http://www.samsung.com/us/aboutsamsung/ Advantages and Disadvantages of Oligopoly. (n.d.).  Buzzle. Retrieved from http://www.buzzle.com/articles/advantages-and-disadvantages-of-oligopoly.html History Of Samsung. (n.d.).  Samsung Mobile – Home. Retrieved from http://www.samsung-mobiles.net/history-of-samsung.html Home Page. (n.d.).  University of North Carolina at Chapel Hill | The University of North Carolina at Chapel Hill. Retrieved from http://www.unc.edu/depts/econ/byrns_web/Economicae/oligopoly.html Microeconomics : The Change in Market Structure in the Mobile Phone Market. (n.d.).Microeconomics. Retrieved from http://tbs2015microeconomics.blogspot.com/2012/10/the-chang-in-market-structure-in-mobile.html Oligopoly. (n.d.).  Economics Online Home. Retrieved from http://www.economicsonline.co.uk/Business_economics/Oligopoly.html Samsung Galaxy Note 2 Review |Gadget Review. (n.d.).  Gadget Review | Your lifestyle gadget siteGadget Review | Your lifestyle gadget site. Retrieved from http://www.gadgetreview.com/2012/12/samsung-galaxy-note-2-review.html Samsung Galaxy Note II N7100 – Full phone specifications. (n.d.).  GSMArena.com – GSM phone reviews, news, opinions, votes, manuals and more†¦ Retrieved from http://www.gsmarena.com/samsung_galaxy_note_ii_n7100-4854.phpSamsung GALAXY Note2- Samsung Mobile. (n.d.).  Samsung US | TVs – Tablets – Smartphones – Cameras – Laptops – Refrigerators. Retrieved from http://www.samsung.com/global/microsite/galaxynote/note2/index.html?type=find Samsung. (n.d.). In  Wikipedia, the free encyclopedia. Retrieved  March  12, 2013, from http://en.wikipedia.org/wiki/Samsung Appendices -The items inside the box after bought Samsung Galaxy Note II

Saturday, November 9, 2019

Favourite Food Essay

Recently, I was visiting a tiny village in Germany, about 80 km from Berlin. It was like going back in time — it was a quiet old European village, just like I had imagined. We went to a little restaurant run by a family in their cottage. Traditionally, the family belonged to the blacksmith community, but they shifted to cooking 200 years ago and had set up a cozy restaurant in their own house. The cottage was lovely and had all the rustic old-world charm of European countryside. It was surrounded by woods and our host told us we would be going into the forest to pick our own mushrooms. I had never Picked mushrooms before and didn’t even know how to begin. The host, Volker, showed me how to tell the good mushrooms from the bad ones. When you turn the head of the mushroom, it should be smooth and flat — if it’s serrated or horned, it’s likely to be bad. We spent quite a bit of time looking for mushrooms and got so hungry picking them, we were really looking forward to eating. Anybody will agree that hunger is the best spice to any hearty meal. We sipped on some cold beer while the mushrooms were cooked in wine and white sauce and then baked into pizza-style bread. That was just wonderful. They also served plum cakes and apple pie along with another chicken preparation. They also gave us some homemade wine to go along with the food. It was a sumptuous country meal. I remember the restaurant and the delicious food well, but what I remember most is the warmth of the hosts. The usual impression about Europeans is that they are cold and indifferent but my hosts in Germany were very welcoming. I also remember it as a day I learned so much about mushrooms and I had to go forage for my own meal. This was by far my most memorable food experience in all these years.

Thursday, November 7, 2019

The Love Song

The Love Song of J. Alfred Prufrock contains T.S. Eliots perception on modern man. The narrator of the poem, J. Alfred Prufrock, represents Eliots depiction of modern man. Eliot explains his reasons for writing about this topic by saying, "Poetry may help to break up the conventional modes of perception and valuation which are perpetually forming, and make people see the world afresh, or some new part of it. It may make us from time to time a little more aware of the deeper, unnamed feelings which form the substratum of our being, to which we rarely penetrate; for our lives are mostly a constant evasion of ourselves, and an evasion of the visible and sensible world. But to say all this is only to say what you know already, if you have felt poetry and thought about your feelings." Eliot personally feels that modern man has an exiguous view on the quality of life and the truly important entities. His character, J. Alfred Prufrock, represents all aspects of modern man that ! Eliot despises. For example, Prufrock is obsessed with appearance and age and he exhibits deficient communication skills. All three of these fixations lead Prufrock to individual isolation, perpetual loathing of mankind, and they negatively affect his love life. Alfred J. Prufrock lacks confidence in himself mentally and physically because he allows the terror of what others think greatly effect his life. When people see his balding head or his slim and aging body, Prufrock can not even image the consequences. The fact that the younger generation is constantly examining him, bothers Prufrock a great deal. Farther into the poem, he continues to ramble about how people will talk about him behind his back. They will say "How is hair is growing thin..."But how his arms and legs are thin!" Prufrocks insecurity indisputably hinders him. It holds him back from doing the things he wishes to do. This sort of char...

Tuesday, November 5, 2019

6 steps to reduce stress and anxiety during your commute

6 steps to reduce stress and anxiety during your commute Commuting to work is a job in itself. There is always an incident that occurs, unexpectedly. Whether we’re dealing with people on the crowded train or stuck in rage inducing  traffic, we can all agree that our commute takes a major toll on us. While we may  not be able to predict with 100% accuracy what will occur during our commute, we can reduce the stress it inflicts on us by taking calculated precautions. Here are 6 steps to reducing commuter stress.Source [Success]

Sunday, November 3, 2019

Technology and business assessment Essay Example | Topics and Well Written Essays - 2250 words

Technology and business assessment - Essay Example As stated on its website, Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Cisco hardware, software, and service offerings are used to create Internet solutions that allow individuals, companies, and countries to increase productivity, improve customer satisfaction and strengthen competitive advantage. The Cisco name has become synonymous with the Internet, as well as with the productivity improvements that Internet business solutions provide. Cisco Systems vision statement claims that their vision "is to change the way people work, live, play and learn." Source from website ) Stanford University Computer Scientists Sandy Lerner and Leonard Bosack founded Cisco Systems. There was a genuine need for large scale computer networks based on industry standard technologies and while in college, they found that the inefficiencies of the current infrastructure led to great technical hitches in being compatible with the numerous mail clients. This inspiration served as a spark that set their ideas in motion and when they left the campus, they were ready to embark upon the operation. Surprisingly, its stupendous growth was the harbinger of its problems. Cisco grew rapidly and to cater to the company and product information distribution, launched an official website in 1991. It had a 50% share of the networking market and struggled to keep up with the calls it was receiving. By 1992, its market share was 85% and the customer service requests and training programs were severely straining its existing systems that were not built for these volumes. By 1993, Cisco boasted a growth of an astounding 270% growth, but its IT department was sorely lacking to cope with a half billion-dollar company growing by 50% each year. Unable to sustain, its customer service was not up to the standards desired and Cisco was losing its ratings. Its IT budget was a paltry 0.75% of sales that was way below industry standards. The Plan CIO Pete Slovik and Senior Executive, Doug Allred, brought a revolutionary concept that entailed that the IT spending was linked to the business units that in turn necessitated close alignment to the company goals. The managers of the business units would be required to independently take decisions about the investment required to reach the company targets and the level of customer satisfaction. Cisco's internal network would play a strategic role in providing the connectivity needed for the business units to build applications creatively and therefore this would require a thorough revamp of its internal infrastructure. Because it was a major decision that would cost millions, cash-strapped Cisco deliberated over the decision. Small technical difficulties kept occurring and in 1994, Cisco's systems broke down unable to cope and Cisco was forced to close down for two days. The Solution The board went ahead and approved the proposal for a $15 million Oracle ERP system. This would entail a 2.5 percent of the 1993 revenues, thrice the IT budget of the previous year. The total cost of completing the ERP was $100million. It is not an overstatement to say that the Oracle ERP system became the backbone of the Cisco E-Business. It unified all of the Unix Servers and became a source of centralized information.

Thursday, October 31, 2019

Operation management Essay Example | Topics and Well Written Essays - 2750 words - 1

Operation management - Essay Example The organisation implemented a philosophy and culture which they called The Corus Way in order to sustain competitiveness, productivity and profitability. Along with this philosophy is the practice of continuous improvement programmes across the company. Specifically, this paper explores the applicability of the Corus Way and Continuous Improvement Programmes in the Port Talbot Strip Products site. The site was experiencing lost, damaged and stolen equipments in their depot operations. The problem was investigated through a structured questionnaire where the results were collated, summarised and analysed. Using quality tools and techniques, this paper arrives at four recommendations for the improvement of the depot operations in accordance to the Corus Way. Corus Group is an international metals organization. The core competence of the company is providing steel and aluminium products and service to different market sectors. It is one of the top ten steel producers in the world. The customer base of Corus mostly comprises of businesses in the automotive, aerospace, packaging, engineering, building and construction markets. (Datamonitor, 2008) Corus Group has operations in thirty different countries reaching over Europe, Asia and other international markets. In Europe, UK is the major market of the organization. The company is headquartered in London and employs 21,300 people in UK. (Datamonitor, 2008) Corus was created in 1999 through a merger of British Steel and Koninklijle Hoogovens, a Netherlands-based company. In 2004, Philippe Varin, CEO, initiated and launched the Restoring Success programme which aimed at closing competitive gap between Corus and the European competitors. The program includes waste minimization and process simplification where waste is reduced and unnecessary copying of activities is eliminated.

Tuesday, October 29, 2019

Ubermensch, the Superman, and who he really is Essay

Ubermensch, the Superman, and who he really is - Essay Example he demonstrates in his work Thus Spake Zarathustra, Nietzsche’s idea of superman held that he was a man of ordinary means and stature with an extraordinary commitment to his own definition of the world. As is communicated through the many small individual sermons Zarathustra delivers to those people interested in learning, Nietzsche conceived of the overman as an individual who was capable of removing himself from the group mind by ignoring the common moralities and religious teachings to develop his own morals and values. As a result of his beliefs, he is always redefining himself, but taking joy and serenity in the knowledge that it is up to him how to define what is good and bad in each situation. While Nietzsche’s idea of the overman was an individual who held himself aloof from the activities and thought of normal men, Bernard Shaw felt the role of the superman was to also provide assistance to his fellow man as is shown in his play Man and Superman. He agreed with Nietzsche that the superman was an individual capable of removing themselves from the group-speak of the common world to attain higher thoughts and ideals but felt responsible for bringing the rest of humanity up to his own level. While the hero is strong in his own will, he is capable of recognizing the greater needs of the world around him and applies practical means of accomplishing the necessary goal. Another significant difference found in Shaw is in his inclusion of the woman as an important element in the development of the Superman. By pursuing the life force and stabilizing the home, Shaw indicated that women were essential if a man was to transcend to superman. Ayn Rand seems to conform more closely with the ideas of Nietzsche in her depiction of the superman in her novel Atlas Shrugged. Again portrayed as otherwise ordinary, Rand depicts the superman as an individual who is capable of higher forms of reasoning and logic. The goal of mankind to reach this height through

Sunday, October 27, 2019

Looking At Port Scanning Techniques Information Technology Essay

Looking At Port Scanning Techniques Information Technology Essay This article gives you an in-depth knowledge on some of the commonly used TCP port scanning techniques along with the pros and cons associated with each of the port scanning technique. Apart from the TCP based port scanning, it also briefly explains the different port scanning techniques available to scan the non TCP ports. Index Terms three-way handshake, open port scanning, stealth scanning, half open port scanning, Ident scanning, FTP bounce scanning, Decoy scanning, UDP scanning. In this paper firstly we will see an overview of port scanning, which includes what it is, why it is used, how it can be used and what are its effects. The second section explains in details about the various port scanning methods. This section includes detailed description on each of the port scanning methods based on TCP and some of the other port scanning methods, including the advantages and disadvantages of each of the methods. This section also contains information on the TCP connection establishment, which would be helpful to have a better understanding on the various port scanning techniques. Overview on Port Scanning Before start discussing about the actual topic port scanning, first lets see what a port is, how it is used and what its functions are. The Transmission Control Protocol and User Datagram protocol are used for communication over the internet. Each of this protocol contains 65536 ports (from 0 to 65535). Each port has an associated service running. The first 1024 ports are the reserved/privilege ports which runs the dedicated service defined by IANA (Internet Assigned Numbers Authority) (for example port 80 is reserved for HTTP service, port 21 for FTP, port 23 for telnet access and etc.) and these ports are known as well-known ports. The remaining are called registered ports (from 1024 to 49151) and dynamic and/or private ports (from 49152 to 65535). So, the applications in the computer use its specific port for communication with the server or with another computer. Now lets discuss about port scanning. Port scanning is a technique used to uncover the port details in a computer. Details like whether the port is open/listening or not, if it is open/listening which service is running on that port, etc can be obtained by scanning the ports. Port scanning is mainly used to find if there is any security risk involved in the computer and also to check for its weaknesses. Port scanning is done by sending messages to all the ports of the computer, and based on the response from each of the ports we can check whether the computer is prone to attacks. This technique is used by the network administrators to check for vulnerabilities in the network, like if a port is unused and it is open, then it should be closed immediately, because open ports will listen to the incoming messages which could me malicious. This could be a useful technique for the network administrators to secure their network. Also it would be good to port scan our own computers periodical ly, so that we will be able to find out what are the unwanted process and some of the malwares running in our own computer systems. Having said this, we should also be aware of the fact that, the port scanning methods will be known to the hackers too, who will try to break into the network/computer to steal the vital information. Using this technique the hackers will try to get a list of unused open/available ports. The hackers will then try to probe these ports for additional information and weakness. Using these results the hacker will try to exploit and will gain access to the computer. The operating system in the target computer will have the knowledge of logging the request that is used for port scanning activities. So the hacker will use an effective method to perform port scanning else the hacker can be easily identified. Port Scanning Methods The port scanning technique can be classified into three main types, they are Open scanning This type of scan opens a full TCP connection with the targeted host. Half-open scanning In this type of scan the client terminates the connection on receiving a response from the targeted host. Stealth scanning This type of scan prevents the connection request to the targeted host to be logged. All the above mentioned scanning types are used by a hacker to get the list of open or closed ports in the server. Among the three the open scanning technique gives accurate information about the state of the port, but it is easily detectable. Stealth scan technique can fool some of the basic Intrusion detection systems and some of the basic firewall rule sets. Before explaining in detail about each of the port scanning technique lets look into the steps involved in establishing a full TCP connection and the usage of each of the flags in the TCP message [Marco, Eddy, Germinal, Gabriela, 1999]. This is because most of the port scanning methods are based on the TCP connection and the functionalities of each of the flags bits in the TCP message. Following are the list of flags used in the TCP message and its functionalities. SYN This flag is used to initiate a TCP connection. FIN This flag specifies that the sender has finished sending the entire data. RST This flag is set to reset the connection. ACK This flag is set to acknowledge for the request. URG This flag is set to indicate that the urgent pointer is valid. PSH This flag is set to indicate that all the data should be pushed to receiver immediately without waiting for the additional information. The TCP connection establishment consists of three steps hence it called as three-way handshake. First the client will send a TCP message with SYN flag set with an initial sequence number to the targeted host. The second step is that, if the respective port in the target host is open then the target host will acknowledge the clients SYN by incrementing the clients initial sequence number by 1 and sends back to the client along with its own initial sequence number with the SYN message. Third step, the client on receiving the target hosts TCP message with SYN flag set it will send an ACK message and the target hosts initial sequence number incremented by 1 to the target host. This is how the TCP connection will be established between two hosts. Shown below is the pictorial representation of three-way handshake TCP connection. SYN, Clients ISN (initial seq. num) Client Target host SYN, Target hosts ISN (initial seq. num) Clients ISN + 1Client Target host ACK, Target hosts ISN + 1 Client Target host Having the basic knowledge of TCP connection and the functionalities of each of the flags in TCP message we will discuss in detail in each of the port scanning techniques. Open Scanning Technique: The open scanning technique will try to establish a full TCP connection with the target host. Based on the response from the target the client will decide whether the port in the target host is open or closed. This technique is slower when compared to other two techniques, since it involves in establishing a three way connection with the target. Also this technique is easily detectable and can be filtered easily. Described below is one of the open scanning methods. TCP connect scan method: The TCP connect scan method uses the connect() method in the operating system to establish a three-way connection between the target host [Dethy, 2001]. Client will send Æ’Â   SYN Server will respond with Æ’Â   SYN, ACK Client will respond with Æ’Â   ACK In the above three-way handshake the server responds with the SYN message which means that the listening port in the targeted host is in the open state. Client will send Æ’Â   SYN Server will respond with Æ’Â   RST, ACK Client will respond with Æ’Â   RST In this case, the server responds with the RST message to the request. This shows that the listening port in the targeted host in the closed state. By this way a list of open or closed ports in the targeted host can be obtained. The advantages of this scanning method are that it is fast, accurate and does not require extra user privileges. The disadvantages are this method is easily detectable and could be logged. Half Open Scanning Technique: In the half open scanning technique the client will terminate the connection even before the three-way handshake is completed. Two types of scanning methods come under the half open scanning technique. They are 1) SYN scanning and 2) IP ID header or dumb scanning. SYN scan method: This method is similar to the full connection/TCP connect scan method. The difference is that when the client receives a SYN message from the target host it will close the connection by sending a RST message to the target machine. This is because the SYN message from the target host is enough to know that its listening port is in open state. If a RST message is received from the target host then it means that the listening port in the target host is in closed state. Thus a three-way handshake is restricted in this type of scan method. The pictorial representation of which is shown below [Dethy, 2001]. Pictorial representation if the port is in open state, Client will send Æ’Â   SYN Target will respond with Æ’Â   SYN, ACK Client will respond with Æ’Â   RST Pictorial representation if the port is in closed state, Client will send Æ’Â   SYN Target will respond with Æ’Â   RST, ACK The advantages of this method are it is fast, accurate and it is less frequently logged when compared to open scan method. The main disadvantage is that for this type of scanning the sender or client needs to customise the IP packet which requires special user privileges, and this is the case for almost all of the operating systems. IP ID header or dumb scanning method: The basis of this scan method is similar to the SYN scan method but the difference is that IP ID header or dumb scanning method uses a third host to scan the target host, and based on the id value in the IP header field this scan method will decide whether the listening port in the targeted host is in open or closed state. The third host should be identified in such a way that it should send very little amount of traffic or preferably no traffic, hence this type of host is said to be silent or dumb host. It requires lots of effort to identify this type of host. In this scenario, there will three different host. One is the attacker host (A), second is the silent host (S) and third is the target host (T). First A will send consecutive ping packets to S, this is to analyse the id value in the IP header field. Each time the silent host will increment the id value by 1 in its response. An example of which is shown below, 60 bytes from AAA.BBB.CCC.DDD: seq=1 ttl=64 id=+1 win=0 time=96 ms 60 bytes from AAA.BBB.CCC.DDD: seq=2 ttl=64 id=+1 win=0 time=88 ms 60 bytes from AAA.BBB.CCC.DDD: seq=2 ttl=64 id=+1 win=0 time=88 ms Now using the source address of host S, host A will send a spoofed SYN message to the host T. The host T will respond to host S with either SYN message or the RST message based on the listening ports state. Now the host A will examine the ping responses from the host S to check the id value in the IP header. If the id value is more than 1 then it shows that the respective port in the host T is open, because only when the host S will respond back to host T and increments the id value. That is the host T would have responded to the host S with the SYN message for the spoofed SYN message from the host A. If the value of id is 1 then it indicates that the respective listening port in the host T is in closed state. Stealth scanning technique: The stealth scanning technique is a technique used to avoid the logging of port scan performing in a host and to break into the basic filters and firewalls implemented. This technique slows the scan due to which the ports are scanned over a long time period. Thus it restricts the target host to trigger an alert. In this section we will discuss about four types of stealth scanning techniques. FIN scan method: As the name implies this method uses the FIN flag in the TCP message to identify the list of open or close ports in the target host. That is the attacker will send a TCP message with FIN flag set to target host. Based on the response from the target the attacker will determine whether the listening port in the target is open or closed. If the listening port in the target is closed then it will reply back with the RST message. The negotiation is shown below, Attacker will send Æ’Â   FIN Target will respond with Æ’Â   RST If the listening port is open then the target will not send any response back. The negotiation is shown below, Attacker will send Æ’Â   FIN Target response Æ’Â   none The advantages of this method are it can bypass many intrusion detection systems and these scans are not logged. The disadvantage is that at times it can produce false results. NULL scanning method: The null scanning method will send a TCP message to the target without setting any of the six flags in the TCP message. Based on the response from the target the attacker will generate a list of open ports. If the response from the target is RST then the listening port in the target host is said to be in closed state, else if a there is no response from the target then the port is open. The advantages of this method are it can bypass many intrusion detection systems and these scans are not logged. The disadvantage is that at times it can produce false results and it can be used only in UNIX systems. XMAS scanning method: The implementation of XMAS method is exactly opposite to the NULL scanning method. That is, the Xmas scanning method will send a TCP message with all the six flags set. If the response from the target is RST then the listening port in the target host is said to be in closed state, else if a there is no response from the target then the port is open. The advantages and disadvantages of this method are same as that of the NULL scanning method. TCP fragmenting method: The TCP fragmenting itself is not a port scanning method; instead it is used to improve the other stealth port scanning methods like FIN, NULL, and XMAS [Marco, Eddy, Germinal, Gabriela, 1999]. This method splits the TCP header into smaller fragments such that it is not easily detected by the firewalls and other intrusion detection systems implemented. All the above discussed port scanning techniques are specific to the TCP ports. There are other port scanning techniques available for scanning non TCP ports, some of which are explained below. UDP scanning technique: The UDP scanning technique is used to get a list of available/open DUP ports in a target host. The method sends a UDP message to the target, and based on the response from the target the attacker will determine whether the port is open or closed. If the response from the target host is a UDP message then the port is open. If the response from the target is an ICMP port unreachable [Dethy, 2001] message then the port is closed. If the response is some other ICMP unreachable message then the port is filtered. If there is no response from the target host then the listening port is either open or filtered. The advantages are, it is used to scan non TCP ports and it is not restricted by TCP Intrusion detection system. Its disadvantages are it is easily detectable and requires root access. Ident scanning technique: The scanning methods that we have discussed so far is used to get a list of open/available ports, but the Ident scanning technique is used to get the information about the owner of the process running in those available/open ports. This method uses the insecure issue in the Identification protocol to uncover the owner details of the process running in the listening ports. This technique can be employed only when the target host is running the identd service in port 113. FTP bounce scanning technique: This technique uses an option in the FTP protocol to perform port scanning. That is, this method uses proxy ftp servers to communicate with the target host and to perform port scanning in each of its ports. For this the proxy functionality in the ftp server should be enabled. In this method, first the attacker establishes ftp connection with the proxy FTP server. Then using the port and list commands it tries to scan each of the ports in the target host. If the listening port is open then the server will send 150 and 226 response codes to the attacker, else if the port is closed the server will respond with the 425 reply code to the attacker. Decoy scanning technique: The decoy scanning technique sends several packets to the same port in the target host. All of these IP packets contain spoofed IP address except one of the packet. That is, one in a several packets holds the actual attackers IP address. Thus this method makes sure that at least one response from the target host is sent to the attacker. The advantages of this method are that it is extremely hard for the administrator to identify the exact scanner/attacker and the result obtained from this method is accurate. The disadvantage of this technique is that, since it sends several packets to the same port the flow of traffic will be high. Conclusion The different types of port scanning techniques are explained in detail along with their advantages and disadvantages. We have seen that most of the port scanning techniques are based on the TCP protocol, but other port scanning techniques are available to scan the non TCP ports. At present numerous software tools are available to perform an effective port scanning in the local host or the remote host to check for the existing vulnerabilities and ways to fix them. Some of the popular tools are SATAN and N-Map. Port scanning techniques are not only used by the attackers to break into the computer/network, it can also be used to check our own computers for vulnerabilities and to take preventive actions for those vulnerabilities.

Friday, October 25, 2019

Comparing the Power of Love in Uncle Tom’s Cabin and Beloved :: Comparison Compare Contrast Essays

The Power of Love in Uncle Tom’s Cabin and Beloved There are several common themes in the film Beloved and the book Uncle Tom’s Cabin. They both deal with the effects of slavery on the white and black communities. They both address the brutal treatment of blacks within slavery, including the sexual mistreatment of black women by their masters. A prevalent theme out of both works is the power of a mother’s love for her children. The film Beloved paints a grim picture of what it was like to be a black woman in the 1860’s. Like the book Uncle Tom’s Cabin, it takes us through the story of an escaped slave in the South traveling to the North in order to gain freedom. The main characters, Sethe, in the movie Beloved, and Eliza, in the book Uncle Tom’s Cabin, are both mothers who want nothing more that to see their children delivered from the bonds of slavery. Although the film and the book were created using very different styles, their objectives are somewhat similar. In Stowe’s book Uncle Tom’s Cabin we follow Eliza through a dramatic escape from her plantation after she learns about the impending sale of her only son. Determined to take him out of slavery or die trying, she runs away in the night with him holding on to her neck. Stowe focuses much attention on the power of maternal love. She felt strongly against slavery because it often broke the bonds of maternal love by ripping children away from the mothers. Families were continually being torn apart by the auction block; Stowe wanted the reader to be aware of the effects of this horrible institution. Logic tells us that no mother would ever willingly put her children or herself in danger. However, through Eliza’s character in Uncle Tom’s Cabin we see the desperation that many women had to experience to save their children. Harriet Beecher Stowe’s novel, though fictional, did more to change the hearts of Americans who were standing on the edge abolitionism than any other work at that time. In fact, near the conclusion of the Civil War she was invited to the White House in order that President Lincoln might meet the â€Å"little woman that started this big war.† Stowe felt that she had an obligation to inform the world of what really went on in the South, what life was really like for slaves.

Thursday, October 24, 2019

How Global Trends Influence the Strategies Used by Samsung in the Communications Market Essay

As global trends shape the business landscape, they will certainly influence competition among companies; and just as companies frequently fail to examine global trends in details, they can also fall short in their analysis of the competitive factors those trends create. Czinkota, Ronkainen,and Kotabe, (2010) carried out a survey that showed that â€Å"competition is becoming more intense: 85% of them [executives] describe the business environment of their companies as more competitive. † As such organizations to include the owners and staff have to continually make changes to supplement the ever changing demands of their target market as well as the total market. Samsung has felt the negative effects associated with changes in global trends and as such have developed strategies to compliment those changes in the communication market. Overview of Samsung In the present unpredictable business trade, marketing plays a fundamental and considerable role and it is a course of action or means to create, deliver, exchange and communicate with customers and clients which is now more pronounce because of globalization. Globalization according to Hamilton (2009) is not a new phenomenon. Nonetheless, within the last few decades, the improvements in technology, international trade and communication have rocketed. However, before we move on to discuss this great phenomenon, it is imperative that we define the terms globalization and marketing. Bilton, Bonnett, and Jones, et al. (1996) argued that globalization can be defined as â€Å"the process whereby political, social, economic and cultural relations increasingly take on a global scale, and which has profound consequences for individuals’ local experiences and everyday lives. † Hamilton (2009), in view of some of these profound consequences of globalization aptly states, â€Å"International trade through globalization can have many benefits. Trade helps increase economic wealth and establishes good political relationships with trading partners. Globalization also promotes free trade and competition between corporations which in turn gives consumers throughout the world more options and cheaper products from which to choose. † Therefore, the increase in trade, as well as technological communication and transportation advancements have allowed societies to become more connected. The term globalization signifies the combination of the marketing process with global business requirements. The globalization of marketing has made marketing processes more intricate, unwieldy and costly to deal with. Ferrell (2011) postulates that marketing may be defined as â€Å"an organizational function and a set of processes for creating, communicating, and delivering values to customers and for managing customer relationships in ways that benefit the organization and its stakeholders. † Global sourcing and hostile global competition, pooled with growing customer demand, are drastically affecting the supply chain. To battle these new globalization challenges, many companies are moving away from a â€Å"push† supply chain model to a demand-driven, customer focus model. The desire to become demand-driven requires sophisticated, flexible responsiveness at every point along the supply chain, from sourcing and obtaining to use. One such company is Samsung; founded in 1938. From its foundation as a petite export company in Taegu, Korea, Samsung has developed into one of the world’s top electronics companies, specializing in digital appliances and media, semiconductors, memory, and system integration. For over three decades Samsung has defended developments in the business and played a fundamental part in the advancement of the mobile telecom sector. Their powerful past performance in invention and manufacturing is in line with a history of financial stability, and an extensive globally distributed, skilled employee base. This combination of factors has lead to Samsung being the favored partner of top-tier operators around the world. In 1980, Samsung joined the telecommunications hardware industry with the purchase of Hanguk Jenja Tongsin. Originally building telephone switchboards, Samsung expanded in to telephone and fax systems which ultimately moved to mobile phone manufacturing. The mobile phone business was grouped together with Samsung Electronics (Burris, 2013). Kumar (2004) opines that in the contemporary information age, mobile communications has enabled us to use laptop personal computers linked to the internet without a ‘wired’ local area network (LAN). Simply put, if the internet gave us the ability to access any web address on a desktop, mobiles have given us the access at any time and from anywhere. This capability, derived from modern telecommunication technology, is crucial in conducting international business operations. Samsung Telecommunications is one of five business units within Samsung Electronics. This unit has been influenced by global trends, causing the company to use marketing strategies in order to stay on top in the communications market. Samsung’s Marketing Strategy Developing a clear and profitable strategy relies on balancing the business’ competencies and abilities against the market opportunities into the future. The marketing strategy of a business includes a definition of the business, a description of the products or services, an outline of the target market, and defines the business’ role in relationship to the competition. In other words, marketing strategy is a synopsis of the business’ products and position in relation to the competition; the sales and marketing plans are the exact actions the business will assume to attain the goals of the marketing strategy. According to Materson and Pickton (2010), constructing and using a marketing strategy has a strong positive impact on profitability. This is because companies that utilize a marketing strategy tend to focus on their customers and markets, integrate their marketing responses and work out in advance where their profits will come from. Operating a flourishing business can be challenging; business operators can build a business but they might not materialize. Marketing is all about informing the public about the product or service the business offers, and influencing them to purchase or use it. Thus, Samsung zoomed in on strategies that will improve the company’s communication market. The company also used SWOT analysis in order to keep up with the global trends in the communication market. Like every other businesses, Samsung is very much aware that information is an important resource essential just like money, machinery and manpower. Information is considered one of the most fundamental necessities for the continued existence of the organization. In the past, before the computer era, it was not easy for the businesses to gather, store, maintain, organize and distribute enormous volumes of information and data. Nowadays, managers are competent in getting contemporary information at the required time in a precise manner. Consequently, as a powerful business leader, Samsung accepted the fact and had given precedence to the process of information throughout the organization at every stage. â€Å"To gain from its Managing Information System and Information Technology, Samsung addressed information needs not only in its environment but also in their relationships with customers, suppliers, trade partners, production systems, work processes, skills and labor requirement. These advancements of Samsung have created huge and complex processes and information systems, thereby creating a requirement to align them to have a universal overview of the complete information system setting it as a strategic tool† (Unknown). Ultimately, a manager evaluates the information gathered for accuracy. Evaluating this information enabled Samsung to identify potential threats and opportunities linked to environmental changes, which bring us to another market strategy, the market environment. Understanding the present state of the market environment and recognizing threats and opportunities that might arises from changes within it helped Samsung to assess the performance of their present marketing efforts and develop future marketing strategies (Pride & Ferrell, 2012). This is so because the global marketing environment is becoming increasingly competitive to an extent that requires companies to target their products and services at markets regardless of national boundaries (Hassan & Erdener, 1994). SWOT Analysis Samsung’s SWOT analysis was used to examine the strengths and weaknesses of the business, determining the long term objectives of the business and aid in the design of the new strategies to assist in the process of achieving targets set by the organization. The SWOT analysis also include the processes to determine the investment direction, the business markets to be addressed, extension of the operations of the business and limitations faced by the business in order to undertake the business activities. In essence, Samsung used SWOT to help identify possible strategies by building on strengths, resolving weaknesses, exploiting opportunities and avoiding threats. An opportunity is a major favorable situation in a firm’s environment. Key trends are one source of opportunities. An evaluation needs to be completed drawing conclusions about how the opportunities may affect the firm whether positive or negative. However, changes in competitive situations, technological changes and improve buyer or supplier relationships could symbolize positive opportunities for businesses. In this case, Samsung capitalized on their opportunities by designing new technology, sponsoring the 2012 Olympics, offered more models with stylish and individuality and giving the consumer real entertainment for their money; offering plenty opportunity to get more sales. Threat refers to challenges posed by an unfavorable trend or development that could lead to deterioration in profits or sales, in absence of a defensive marketing action. Threats are the main obstructions to the business’ existing or preferred position. Changes in technology, decrease in market growth, increase in bargaining power of suppliers and buyers, new or revised regulation could pose threats to the achievement of businesses. From the information gathered and evaluated, Samsung recognized that there is new and existing competition, price volatility, economic recession, and extremely huge competition for customers and resources. The internal analysis of strengths and weaknesses focuses on internal factors that give businesses certain advantages and disadvantages in meeting the requirements of its intended market. Strengths refer to core capabilities that give the business an advantage in meeting the requirements of its intended markets. Any analysis of company strengths should be market oriented and customer focused because strengths are only meaningful when they assist the business in meeting customer needs. Weaknesses refer to any limitations a company faces in developing or implementing a strategy. Weaknesses should also be examined from a customer perspective because customers often perceive weaknesses that a company cannot see. Being market focused when analyzing strengths and weaknesses does not mean that non-market oriented strengths and weaknesses should be forgotten. Rather, it suggests that all businesses should bind their strengths and weaknesses to customer requirements. Samsung’s strengths: 1. Strong international experiences 2. Strong global business network 3. Vast credibility of brand name 4. International documented accomplishments (awards received and nominated for) Samsung’s weaknesses: 1. Perception of high prices 2. Loss of customers’ interest in products 3. Buyer sophistication and knowledge 4. Substitute products or technologies and limited availability of 3D viewing Conclusion Marketing has changed in focus over the past twenty years. Nowadays, marketing stresses value and customer relationships (Ferrell, 2011). However, it is imperative to note that marketing is parallel to other business functions such as production, research, management, human resources, and accounting. The fundamental function of marketing is to connect the company to its customers. As such it shapes the objectives of companies to include Samsung, through which it is able to delivery top of the line communications while superbly satisfying the market. Reference Bilton T. , Bonnett, K. , Jones, P. , Skinner, D. Stanworth, M. & Webster, A. (1996). Introductory sociology. (MacMillan Press Ltd. , Ed. ). Great Britain: MacMillan Press Ltd. Burris M. (2013). The history of Samsung. About. com. Retrieved March 29, 2013 from http://components. about. com/od/Companies/p/The-History-Of-Samsung. htm Collins, J. , & Porras, J. (1996). Building your company’s vision. Harvard Business Review. Retrieved March 29, 2013 from http://www. tecker. com/wpcontent/uploads/2011/07/CollinsBuildingVisionSept96. pdf Czinkota M. , Ronkainen, I. , & Kotabe, M. (2010). Emerging trends, threats and opportunities in international marketing: What executives need to know. New York, NY:Business Expert Press, LLC. Ferrell, O. (2011). Marketing strategy (Hartline M. , Ed. ). Mason, Ohio: South-Western Cengage Learning. Hamilton S. (2009). Globalization. Edina, Minnesota: ABDO Publishing