Wednesday, October 30, 2019

Generic Strategies Model by Charles O. Godornes Essay

Generic Strategies Model by Charles O. Godornes - Essay Example In order for these businesses to be successful they have to follow and practice a certain Generic Strategic model which would be Cost – Leadership, Differentiation or Focus. Cost – Leadership is where a business has a low level of differentiation or low level of costs in order to have a competitive market price edge to the market. Businesses that wish to venture and be successful in this type of strategy must focus on lowering their costs and offer value to their customers by producing effective products. Companies should be alert in controlling and monitoring their production costs, overhead costs, and their costs on research and development and in their service costs, so that they could offer a competitive price to the market. Companies should also invest in state-of the-art manufacturing technology in order to lower their costs which would lead to its primary goal which is having competitive market price. In differentiation strategy, businesses create value to their market by offering products which are unique in features and in characteristics; these are products that meets the customers’ preference and satisfaction by charging customers with a premium price. Companies that practice differentiation strategy must charge its customers with a premium price in order to attain its unique products which satisfies and meets the customer’s preference by producing high – end quality products which would also charge companies higher costs. In order for companies to have differentiated products they have to have superior quality, advanced technological features and etc. And in focus strategy, companies focus and pay very close attention to its core competencies or in its smaller segments to offer its products to a particular group of customers in the market, this strategy is commonly used by smaller companies.

Monday, October 28, 2019

The Loyalists and Their Arrival Essay Example for Free

The Loyalists and Their Arrival Essay Who were the Loyalists and what is significant about their arrival? British North America’s demographics changed when the Loyalists arrived. The English-speaking claimed for agricultural land and population increased. They strongly asked for a sufficient extent of democratic rights. A Loyalist is a person who remained faithful and supported British during the American Revolution. They migrated to Britain North America to live under their British regulations. Some found life painful and unbearable in the United States because rebels persecute anyone who had not sustained the rebel cause. Many of these Loyalists’ families travelled with them because there were no limits and they were free to make family decisions at that time. The following paragraphs are more detailed information about the arrival of the Loyalists and who they are. When Loyalists arrived, British North America’s demographics had changed. The English-speaking loyalists increased and grew about a percent of the population in Quebec. Most significantly, they hoped and claimed democratic rights where many people viewed fundamental. English and French were the two dominant groups in a colony that the Constitutional Act acknowledged. Upper Canada and Lower Canada were created by Carleton to give back the reality that they had different religious, political, legal outlooks and had different economic and land owning traditions. Each colony would have its own capital city and a Governor General appointed by Britain who would manage its governance of colonies. Most Canadians lived in agreement with the more traditional and tending to preserve the status quo of the Roman Catholic Church. Loyalists are the people who remained loyal to British. They live in a North American society where there are mixed of rich and poor people, young and old, male and female, and European, African and First Nations. Resulting the American Revolution of 1776, individuals who had supported Britain were persecuted, lost their properties and generally their lives. The Loyalists who has survived fled to areas of British protection and those who had fought with the British joined the exodus. The first legal British settlement in Canada took place in Western Quebec, which is now the eastern Ontario. A few loyalists were playing safe such as Mennonites who would not want to fight. Rebels impartiality had been as good as a declaration of Loyalty to Britain. Whoever attempted to fight them was persecuted. Free lands were being offered to the loyalists. The loyalists who were rich brought their possessions with them but most of them only brought the things they can carry. A land has been promised to them but they mostly have to wait years to claim it because the promise had drawbacks. Furthermore, most loyalists did not find their homes even roads or services when they arrived at their grant. Some of them had to be farmers and pioneers but some found it way to hard so they had to go back to United States or Britain. Many of the loyalists remained alive on their first years by the help of their neighbors. Some shared their stores of corn in winter, 1794. They think others first and help one recover with their sicknesses or childbirths. United Empire Loyalists were the people who remained faithful to Britain. Not everyone in the colonies assisted the move when Americas original Thirteen Colonies went to war with Britain over arguments to unwanted taxes. Those who were against the revolution became known as Loyalists since they remained loyal to the British but they were persecuted, did not want to vote, sold land, and bring legal charges against debtors. Britain recognized the independence of the United States as they signed the Treaty of Paris in 1783. Almost one-third of the 250,000 colonists who had remained loyal to Britain fled to other British Possessions. About 35,000 traveled north to what was then British North America with the most settling originally in the Maritimes. An estimated 10,000 Loyalists settled in Quebec. In June 1784, many of these loyalists’ families were provided, put aboard boat and sent up the St. Lawrence River to what became known as the Royal Townships. Here they cleared land and established themselves on farms. More lasting significance to Loyalists and their descendants was the governments recognition of the stand that they had taken. Realizing the importance, on November 9, 1789, Lord Dorchester, Quebec’s governor, declared that it was his wish to put the mark of Honour upon the Families who had obeyed to the Unity of the Empire. First Nations people came from the Haudenosaunee or Iroquois. Many people from Tuscarora and Oneida joined the rebels and many people from Kanienkehaka, Onondaga, Cayuga, and Seneca fought next to the British. First Nations were fighting for their neighbors’ survival and their arena were their homelands. The confederacy’s associates stayed cool at the beginning of the war. By the encouragement of the two brothers, Konwatsi’tsiaieeni and Thayendanega they decided to enter the war in 1777. These two leaders were find guilty that helping Britain was their people’s only desire to keep the territory in the Ohio Valley and the Great Lakes. Unfortunately, the British before had tricked the First Nation at the transacting table. Even though they were loyal and helped provide the things needed in the war, they were ignored in the Treaty of Paris of 1783. Black Loyalists were the larges group of people of African Birth and descent to arrive to Nova Scotia between 1783 and 1785. They started finding a neighboring town in early May 1783. They were slaves who ran away to find protection under the British and who served the loyalist cause. Slaves were not allowed to vote many congregate or move freely By their dignity and independence in a word of equal citizenship under the British monarchy they arrived on the shores of Shelburne Harbor. Throughout the American War of Independence, the Britain supported the slaves to escape their owners to join the British army and destroy the American Economy. Thousands of slaves accepted the freedom and the land the British governor had promised to them by engaging with them. After the war, many of these black loyalists went to Nova Scotia from New York but some came to British North America to continue serving their loyalists’ owners. The British were harassed with major difficulties in fighting the war. They had no major allies compared to the Americans. They only had troops provided by small German states to assist the force of the British Army in North America. The British Army started the war with only less than 48,000 strong worldwide and experience hardships building up or recruiting soldier. By 1778, the army forgave the criminals for military service and had extended the age limit for service from 16 to 50. Although its officer and non-commissioned officer corps were somewhat professional and experienced, this professionalism was weakened because rich officers who have lack of military experience could purchase commissions and promotions. As a consequence, unskilled officers sometimes found their way into positions of high responsibility. To sum it all up, A Loyalist is a person who remained faithful and supported British during the American Revolution. They live in a North American society. Their arrival changed the British North America’s demographics by growing its population and requests for agricultural land. These loyalists came from different races and descents. They are the United Empire Loyalists, First Nations Loyalists and African American or Black Loyalists. They remained faithful even though in the end Britain had betrayed them.

Saturday, October 26, 2019

Mark Twain/ Huck Finn Essay -- essays research papers

In Mark Twains’ books he relates himself to a characters by giving them some of his personal life and history. In the book The Adventures of Huck Finn, Mark Twain relates the most to the main character of Huck Finn. Mark Twain and the character Huck Finn have similarities in their lives, such as, Twain placing Huck on the river he grew up on, having Huck not be specific with his religious beliefs, and never staying in the same place for long.   Ã‚  Ã‚  Ã‚  Ã‚  The main thing that stood out in the book was that the story always happened around the river. Huck would go away from the river for a while but would always end up coming back to it a short time later. It was the same way with Mark Twain, whose real name is Samuel Langhorne Clemens. â€Å"Mark Twain† is a river man's term for water that was just barely safe for navigation (Kaplan). He was only four years old when his family moved to Hannibal, a small town in Marion County on the west bank of the Mississippi River. There Clemens spent his boyhood, amazed by the romance and shocked by the violence of the river life, with the steamboats, keelboats, and giant lumber rafts, as well as by the people who washed up by the river, the professional gamblers and confidence men. Near the river, the men were fierce and had little cares. It was no place for a young boy.   Ã‚  Ã‚  Ã‚  Ã‚  Further from the banks of the Mississippi was Hannibal. Hannibal was a fine place to raise children. There were many places to go with fun things for young boys to do. Twain let his imagination go when he went to places like Holliday’s Hill and the caves close to the summit, where he may have played pirates just like Huck. A close friend of Clemens was Tom Blankenship, the son of the village drunkard, who was to be immortalized years later as Huck’s friend Tom Sawyer (The Adventures of Tom Sawyer). Tom Sawyer is Huck Finn’s best friend in the book. Tom freely invents lies and loves adventure, just as Tom Blankenship did.   Ã‚  Ã‚  Ã‚  Ã‚  When Clemens was just a young boy he saw death on the river and in his owns home. One of his sisters died when he was four years old, and his brother died three years later when he was seven years old (Encyclopedia Britannica). After the death of Samuel Clemens’ father, it became necessary for him to contribute to supporting his family. He worked so hard that he bu... ...g. So Clemens rode the Mississippi for almost four years, and he remembered these years as the most carefree of his life.   Ã‚  Ã‚  Ã‚  Ã‚  The river is the main focus of the book. They never seem to stay away from it for very long. Even with all the bad stuff going on at the river, it seems to be the only place that Clemens and Huck can find peace. The river even takes his evil father away from him for good. Through spending so much time with Jim, and all the experiences on the river, Huck reveals a strong sense of humanity (â€Å"Huck Finn Notesâ€Å"). He showed this when he did everything he could to save the two murderers who fell off of the ship. Huck will always do everything that he can to help a person if they need it. Huck is a very clever character who always thinks his plans out, unlike Tom who just acts upon an idea.   Ã‚  Ã‚  Ã‚  Ã‚  Clemens seems to use his childhood experiences to write this book. To represent his self as a child he uses Huck and lets him live out all of his childhood adventures. Twain and Finn are similar because they both grew up on the river, have no specific religious beliefs, and they never stay in one place for a long time.

Thursday, October 24, 2019

Midterm Congressional Elections

On 7 November 2006, the United States midterm elections were held. Results of the said elections show that the Democratic Party got the majority in the gubernatorial seats as well as the United States House and Senate seats. This feat was dubbed as the â€Å"Democrat Revolution† as the Democratic Party mustered enough seats in both houses of the legislature for the first time since 1994. Traditionally speaking, the US midterm elections was seen as an assessment of the incumbent political leaders – whether their political and economic policies are acceptable to the American people, whether conditions of living has markedly improved during the President’s administration. This 2006 elections is no different from that traditional viewpoint. In fact, social critics did hope for a Democrat victory as a clear and concrete manifestation of the disgust of the public on how President Bush administers his office. In a sense, it concretized the past negative net satisfaction that America has been giving the incumbent president. Given that the recently held elections was an assessment of the Republican President and its supportive Republican Congress, let us take a look at how the voters appraised their leaders. I agree at how political analysts gave the remark that the Americans voted through the issues of national and international import rather than of the local affect. The global image of America was at stake with the manner of handling of the Bush administration with Iraq. Yes, the US invasion of Iraq proved to be a quagmire for President Bush. Two years after he had declared that the war was over and we have brought â€Å"democracy† to that side of the middle east and even after the capture of Saddam Hussein, US troops continue to be maimed and die in the fronts of Iraq. Though until now, the supposed weapons of mass destruction are yet to be found in Iraq while its neighbors and other countries are the obvious ones that harbor these weapons. Honesty is an issue here as the public believes that they were led to support a war that could prove to be a bigger blunder in the contemporary world history. Americans felt they were deceived,  and this perception was shown in the past surveys. Only, it was concretized in the recent midterm elections. The Democrats promised reforms in the Iraq policy, and it also mirrored their platform for changes in the present international policies of the US government, i.e. war on terror. However, this is just one side of the idea running in the heads of Americans on Election Day. The other half, which stems from the â€Å"war on terror† policy, is homeland security. The haphazard management of President Bush on the Iraq war, including war crimes and economic costs, did trickle down to the manner of homeland administration. The people can very well remember how the Bush administration mismanaged its disaster and security measures during Hurricane Katrina. Still related with the national and international policies, the immigration policy of the Bush administration has been highly criticized. Though the Americans understand that the issue of security is a factor in the hard-line immigration policy, most believe also that it must not go overboard to even create an environment that fueled anti-America. To the general public, that is a no-no, of course. Homeland security policies must not fuel another rage of racial discrimination in this free country. What then should we expect with a Democrat Congress and a Republican President?   Some pessimists say: not much. While the more optimists say that there will be marked changes built on the former, but the running current may most likely pull the same efforts as before. Clashes between the Iraq issues will have to happen, and this might be good for a democratic country in the name of the highly-regarded principle of check-and-balance. The situation, though, is that President Bush still has the final say in the arena of international security policies like that of Iraq.   In the end, we are always hopeful that this will improve the lives of the Americans here and abroad. We are always hopeful that the changes will be done.

Wednesday, October 23, 2019

Prostate Cancer in African American Men Essay

Cancer has always been one of the most dreaded diseases of humans. This incurable disease has broken the hearts and spirits of many, and has continuously left an indelible mark in its patients’ lives. One of the cancer types associated with men is prostate cancer. The National Cancer Institute website defined prostate cancer as the type of cancer occurring in the male reproductive system, more specifically in the prostate tissues. This type of cancer is normally triggered in older men (n.d.).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In addition to this, the disease also reiterates that genetically mutated cells, known as cancer cells, are present in the prostate. The Prostate Disease website also added that tumors are formed, spreading to the different areas in the body. The spread of the said cells causes permanent damage to the normal functions to the different organs (2006).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Aside from the fact that cancer is genetically transmitted, the underlying causes of prostate cancer are still undecipherable. The profile of an individual candidate for prostate cancer is usually taken into consideration. Since males are the only ones with prostates, the women are fortunately exempted from acquiring this disease. Race is another factor affected.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Intercultural Cancer Council website stated that Prostate Cancer affects 37% of African American men (Baylor College of Medicine, 2007). It was also stated that the percentage rate of men afflicted with prostate cancer is relatively higher in Europe and in North America, as compared to Asia, Africa, and South America. Diet is one of the most unrecognizable causes of prostate cancer. Eating of food rich in carcinogens can increase the cancer rate in the body.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to the National Prostate Coalition website, African American males are afflicted by Prostate Cancer far more than the other types of cancer. In an estimation made by the same website, there were 4,240 prostate cancer deaths in 2007. The chances of genetically acquiring the disease are very big for African Americans. For a close relative afflicted with the disease, the individual has a one out of three chance of acquiring the cancer. For those who have two relatives afflicted with prostate cancer, the chances increase, with an 83% possibility. Worse, if there were three or more members afflicted, the possible acquisition of the disease is 97% (NPCC, 2007). Quite disappointing, but true.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The early stages of prostate cancer inhibit the patient from experiencing and seeing the symptoms. This is primarily due to the fact that these symptoms may also be caused by the presence of other diseases. Such symptoms may include frequent urination, urinary incontinence, presence of blood in the semen and in urine, erection difficulties, and agonizing ejaculation. Presence of at least two of the above mentioned should be enough basis for the patient to consult an oncologist or urologist at the soonest possible time (Marks, 2003).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Biopsy is one of the most reliable tests done in the diagnosis of prostate cancer. With the presence of a Urologist, a tissue sample is harvested from the patient using a needle. The sample is then forwarded to the Pathologist for extensive examination that could lead to the possible detection of prostate cancer. Several other tests are also performed after biopsy that act as the other opinions in proving the presence of cancer cells. Some of the tests include   a CT scan, bone scan, and an MRI (Strum, Pogliano, 2005).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   With the rampant upgrades in technology, several treatment methods have been available for prostate cancer. According to the website of the American Academy of Family Physicians, the tumor spread of prostate cancer plays an important role in the type of treatment used (2008). The most common treatments used were Radical Prostatectomy, Radiation Therapy, Cyrotherapy, and Active Surveillance.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   One of the used surgeries is Radical Prostatectomy. This process focuses on the extraction of the prostate gland and the nearby tissues from the body. This surgery requires the patient to undergo a general anesthesia, so as to avoid the unbearable pain that can be felt during surgery. As replacement, a catheter is placed through the penis so that urination may be facilitated while the wounds are healing (Blasko, Grim, Sylvester, 2003) .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Undergoing Prostatectomy is one of the most certain treatments for prostate cancer. The removal of the prostate and its nearby tissues inhibits the spread of the cancer cells to the other parts of the body. This also gives the doctor firsthand information of the results, giving them enough evidence as to whether the cancer will spread or not.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Radiation Therapy on the other hand, does not involve any surgery. Instead, the procedure makes use of x-rays whose energy is high enough to kill cancer cells. For this specific disease, two types can be used. These are the External beam and the Internal. The External beam uses a machine that beams radiation from the outside of the body. The target of the beam is the prostate, making sure that radiation is exposed on the pelvis and in the prostate. The side effects for this treatment include diarrhea, rectal irritation, bleeding and painful urination. Sometimes, this therapy may also cause impotence.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Internal radiation therapy, as compared to the external beam, emits radiation seeds that were implanted on the prostate. These seeds are powerful enough to kill cancer cells, but may be very painful.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Cryotherapy, according to the Prostate Cancer Institute website, is one of the newest therapies discovered in the 1990’s. The treatment utilizes the freezing of the prostate gland, destroying the whole organ, including the cancer cells that may be incorporated in the process. The process requires the patient to undergo general anesthesia, and is over in about two hours. The side effects experienced by the patient are usually treated after a few weeks. These may include urinary incontinence, pains in the pelvis, and swelling in the scrotum (2006).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Active surveillance, on the other hand, is yet the most simple among all treatments. The patient does not undergo a specific treatment, and instead is in close communication with the physician. This process includes regular tests and exams that monitor the health of the patients (2006).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Having to bear the pain of prostate cancer and the thought of actually dealing with the disease is heartbreaking for anyone. The best thing to avoid such heartbreaks is to try and avoid contacting the disease. According to the WebMD website, the consumption of food rich in fiber can be very beneficial in the prevention of the disease. These include the consumption of tomatoes, vegetables, and soy products. In addition to this, researches are being conducted in finding the correct preventive measures of prostate cancer. Some of these researches include the fact that the administration of a Non-Steroidal Anti-inflammatory drug (NSAID) helps in the protection of men from having prostate cancer. Another is the fact that drinking red wine also helps in the prevention of prostate cancer (July 24, 2006).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Regardless of what the effects of prostate cancer are, what is important is the fact that people, cannot avoid such disease. May they be Caucasians, Asians, or even African Americans; no one is exempted from having such. We all just have to take good care of our bodies, and of our lives. References (24 July 2006). Prostate cancer health center: Prostate Cancer-Prevention. Retrieved March 20,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   2008 from http://www.webmd.com/prostate-cancer/tc/prostate-cancer-prevention.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   American Academy of Family Physicians. (2008). Prostate Cancer Treatment Options.   Ã‚   Retrieved March 20, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚   http://familydoctor.org/online/famdocen/home/common/cancer/treatment/264.html Intercultural Cancer Council. (2007). African Americans & Cancer. Retrieved March 20,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   2008 from http://iccnetwork.org/cancerfacts/cfs1.htm Strum, S.B., & Pogliano, D.L. (2005). A primer on prostate cancer: The empowered patient’s   Ã‚  Ã‚   guide. Life Extension Media. National Cancer Institute. (n.d.). Prostate Cancer. Retrieved March 20, 2008, from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.cancer.gov/cancertopics/types/prostate Marks, Sheldon. (2003). Prostate and cancer: A family guide to diagnosis, treatment and   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   survival. Perseus Books Group. Grimm, P., Blasko, J., Sylvester, J. (2003). The prostate cancer treatment book.   Contemporary    Books. Prostate Disease. (2006). Prostate Cancer. Retrieved March 20, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.prostatedisease.org/prostate_cancer/default.aspx Prostate Disease. (2006). Prostate Cancer- Causes and Risk Factors. Retrieved March 20,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   2008 from http://www.prostatedisease.org/prostate_cancer/risk_factors.aspx Prostate Cancer Institute. (2006). Cryotherapy for Prostate Cancer. Retrieved March 20, 2008    from  Ã‚  Ã‚   http://www.prostate-cancer-institute.org/prostate-cancer–  Ã‚  Ã‚   treatment/cryosurgery.html

Tuesday, October 22, 2019

Private Equity in Southeast Asia Region Essays

Private Equity in Southeast Asia Region Essays Private Equity in Southeast Asia Region Essay Private Equity in Southeast Asia Region Essay As many investors and finance people know, the United States has been the biggest laying field for PEE firms since 1980 as it is a developed market with mature structure and clear regulations. However, due to competition and limited resources in the United States, investors and PEE firms have a growing need for a new market to grow and expand their business. One of these new, emerging markets for PEE is the Southeast Asia region. This Southeast Asia region is characteristic of developing countries that are rich with natural resources. Most of the countries in this region of Southeast Asia have a lot in common including; they are developing countries, they re rich with natural resources and they all have a big market in terms of population. One of the exceptions in this region is Singapore as it is considered a developed country, especially in the finance sector. Southeast Asia is very lucrative in the sense that it offers a lot of opportunities for investors, including PEE investors and firms, however, in order to realize the revenues and returns of these opportunities these firms would need more knowledge on how to deal with the challenges in this new emerging market. Private Equity in Southeast Asia The emergence of Private Equity (PEE) markets outside the United States and Europe as significantly broadened the scope of portfolio diversification. Also, due to the growing importance of PEE in nontraditional markets, the need for investors to broaden their knowledge has increased significantly as knowledge is the key in regards to international investing as a whole. Hence, the purpose of this paper is to provide relevant information about PEE market in the Southeast Asia as well as provide recommendations on how to deal with the challenges. Market Typology With the exception of Singapore, most companies in the Southeast Asia region are developing countries and are therefore referred to as an emerging market. Table 1 describes the market typology of PEE market based on four market types. Table 1 Market Typology Mature Markets Non-traditional markets in advance economies Emerging markets Frontier markets Economic structure Sophisticated Sophisticated Relatively developed Early stage of economic/financial development Economic stability High High Track record is being establish Track record still short Size of the economy and growth Large/high level of prosperity Varies Varies with high growth prospect Small size, lower level growth Debt markets Highly liquid Liquid Emerging Still embryonic Exit markets Developed public equity markets with high market capitalization Developed public equity markets with significant market capitalization Relatively developed public equity markets with sufficient market capitalization Underdeveloped Global PEE firms Investing Investing Investing Very limited, if any investment Domestic PEE industry Developed Emerging Emerging Rudimentary PEE exits Considerable history Track record being established Visible exits already occurred Very limited Key markets United States, ELI-1 5, Switzerland Australia, Canada, Hong Kong, Japan, Singapore Brazil, China, India, Russia, South Korea, Slovenia, South Africa, Southeast Asia countries: Indonesia, Vietnam, Thailand, Malaysia, Philippines Bulgaria, Colombia, Pakistan, Astrakhan, Tunisia, Ukraine Source: Cornelius (2011). The term emerging markets has been widely adopted by international investors to refer to all developing countries. Specifically, Emerging PEE markets refers to those where an indigenous PEE industry is already developing and visible exits have begun to attract a growing amount of interest among international investors. Southeast Asian Private Equity market In general, PEE investment is growing in Asia entirely. According to Perrine, PEE funds share of investments in Asia has grown from a mere 2. 6% in 2006 to 10. 6% in 2012, due to PEE funds investing a total of SIS$27. 8 billion in Asia (Figure 1). Although some of this increase in share can be attributed to the decline in PEE investment in North America and Europe as a result of the financial crisis, the PEE investment in Asia continued to grow at an average annual rate of 8% from 2006 through 2012. In fact, trends show that Asia was the only region in which PEE investment grew over this timeshare. Figure 1 Global PEE Investments by Region (Left) and Trend in Asia for P Deals Source: Pretentiousness Asia has continued to become increasingly attractive as a P destination over the years. According to an investor survey conducted by Ernst Young that involved both general and limited partners, 36% of the respondents believe that PEE investment in Southeast Asia will in fact increase. The survey results from 2012 to 2014 (figure 2) shows an increase in PEE investors confidence level AIBO Southeast Asia Market in comparison to China. Figure 2 PEE Investors Survey: Which geography will see the most PEE activity in the next 12 months? Source: Ernst Young Based on Perrine data, the Southeast Asian PEE Investment reached the highest peak I terms of both investment value and number of deals in 2007, right before the financial crisis. There was a slowdown during the crisis but the markets start to bounce back in 2012. Figure 3 below shows the PEE Investments in major Southeast Asian countries. In Indonesia, Malaysia, and Thailand, the PEE Investments started to increase in 2012 after the financial crisis. While the PEE Investments in Singapore, Vietnam, and Philippines in 2012 started to recover after the crisis. Figure 3 PEE Investments in Southeast Asia Countries Source: Predisposed on Boston Consulting Groups (BCC) report, from 2005 through 2010, Southeast Asia accounted for about 18 percent, by value, of PEE deals in Asia. In 2010, the value of the regions deals was about one-fourth of Chinas and 30% of Indians. Deal sizes and volumes vary significantly by country: Singapore has historically led in the number and size of deals, while Thailand and Vietnam have small and relatively underdeveloped PEE markets and have therefore lagged. Indonesia is extremely active indeed, the largest PIP in the history of the Indonesian stock market was a private-to-public deal. On the other hand, trend shows that Malaysia has delivered mix results. Overall, with a host of new players entering the region, Southeast Saiss share of Saiss deal pool looks set to continue to increase. The growing interest from investors and the recovery of PEE markets in Southeast Asia from the crisis is as a result of several growth-driving factors including: Macroeconomics growth According to Pain Company data, the total GAP in Southeast Asia in 2011 was SIS$2 trillion, accounting for 4. 2 percent of the world total GAP and is expected to row at 4. To 7. 9 percent compound annual growth rate from 2011 to 2016. Natural resources The Southeast Asia region has lots of natural resources such as oil and gas, mineral, marine resources, fertile-land for plantations, palm oil, agro commodities, and many more. These natural resources can stimulate growth opportunities for companies who operate in the region that will lead to signifi cant returns in their investments. Demographic Southeast Asia was home to a mostly young and dynamic population of nearly 600 million in 2011 and this population is projected to grow at 10. Percent compound annual growth rate from 2011 through 2016. With this type of demographic, Southeast Asia offers a big market for consumption especially in its lower to middle class population. In addition to creating a large consumer market, Southeast Asia demographic also provides human resources for companies to support their business in this region with relatively lower costs compared to other regions or countries. Economic Liberalizing Economic reform has spread across the region with democracy in politics and law enforcement significantly improving. Restrictions on foreign investments and winnowers have been relaxed, and some governments are actively developing the PEE sector. At the same time, the connection between countries in Southeast Asia is strengthening to create rationalization and intraregional trades. Capital market Another driving factor is that the capital markets in Southeast Asia are generally underdeveloped and predominantly revolve around indirect finances. In other words, access to traditional capital markets is generally difficult however not for large companies and therefore PEE funds will emerge as a source of growth capital for rowing companies in need of financing. China and India Slowing Economic Growth This is an external factor that creates opportunity for Southeast Asia to grow the PEE markets. Many investors shift their focus to Southeast Asia due to economic slowdown in the two biggest markets in Asia, China and India. Besides economic slowdown, PEE firms reportedly encountered challenges in these two countries. The main challenge in both countries is difficulty exiting investment or selling the portfolio companies. Ipso in China and India are currently inhibited by the regulatory body and market environments. Beside PIP, the strategic selling also faces a problem because of the difficulty of negotiating attractive sales price with potential buyers, particularly in India in the wake of economic slowdown and currency depreciation. All the opportunities and driving factors create optimism for the investors including PEE investors. Result from a Joint survey conducted by Pain Company and the Singapore Venture Capital PEE Association (SVGA), showed clear signs of optimism about the regions prospects, which could have marked 2012 as the start of Southeast Saiss time to shine. Respondents looked for deal activity to increase substantially, especially in consumer, healthcare, and energy sectors. PEE firms that are active in the region reported that they would boost their investments in Southeast Asia, with some 40% of respondents planning to invest more than SIS$1 50 million in 2012, compared with Just 20% in 2011 (see figure 4). Figure 4 Survey Result Growing Optimism for PEE Markets in Southeast Asia One of the negative effects coming from those opportunities is the growing competition for PEE investments deals. Such competition has led to concerns about oaring valuations that make most of the acquisition prices in Southeast Asia rise since 2012. The main cause of this problem is the limited number of good portfolio companies. Most of the PEE firms focused their deals on consumer-related sectors such as food, beverages, healthcare, media and telecommunication, and energy. It is understandable since these sectors are the one that have the best growth and return opportunity due to consumer market growth (huge and young population) in Southeast Asia. Moreover, Southeast Asian countries still possess some classical robbers that can be considered as the major risks for PEE firms to invest in Southeast Asia. These risks include: Economic risk Economic conditions in most countries in South Asia, including Singapore are facing some macroeconomic risks, such as inflation, currency exchange fluctuation, and the dependency of foreign investment. All these risks can cause instability to the economic condition. According to Cornelius (201 1), between the time span of 1993 and 1999, many PEE firms failed to meet investors return expectation due to the currency exchange rate changes. Inflation is another big problem in Southeast Asia, inflation can suddenly spike because of the sharply higher commodity prices thus leading to a considerable increase in the general price level. According to Cornelius, in emerging markets, including Southeast Asia, average consumer inflation surged to 9. 2 percent in 2008 from 5. 6 percent in 2006. The inflation rates can have a big impact on real investment returns. Political risk Political instability has been identical with the Southeast Asia region for decades. Political instability causes investment uncertainty and could potentially result in a monumentally different investment regime. Governments in Southeast Asian countries still have a big role in business and economics. They control the business by imposing several regulations that can change from time to time creating uncertainty in business. Moreover, every time there is a change of government, the policy will be changed and can sometimes harm the investments that have already been made. Unanticipated changes in regulations have substantial return implications through their impact on production costs, market prices, and the repatriations of profits. Governance risk Except for Singapore, all the countries in Southeast Asia hold governance problem, especially corruption and law enforcement. Law enforcement is very important for investors in relation with the protection of investors rights in case of disputes. There is an absence of well-functioning and predictable legal institutions in most countries that can give a negative effect for business and legal assurance. Of all the risks we consider in this section, corruption perhaps the most evil one. Corruption has many dimensions, including tax bribery, procurement bribery, and Judiciary bribery. Corruption has flourished in previous years within the Southeast Asia region due to complex bureaucratic regimes. This risk can severely distort policy dimensions in all areas imposing huge macroeconomic costs. Conclusion and Recommendation 2014 will continue to be a competitive year for PEE investors in Southeast Asia. Pain ; Company stresses that with more PEE firms turning their focus to the region and cash rich corporate on the prowl for acquisitions, valuations in 2014 are expected to remain at lofty levels. Respondents polled by the research outfit pointed o a scarcity of high quality target companies as one of the most pressing challenges. Macroeconomics volatility, political instability, and corporate governance are still the major threats in Southeast Asia. But with all the opportunities going forward, Southeast Asia will become the deal making hotshots, drawing an influx of PEE firms from the United States and Europe. However to get all the benefits that Southeast Asia offered and to get the best investment returns, PEE firms should be able to overcome the risks and challenges that exist in the region. Some of the strategies and commendations are: Choose a focused Model An investing model focused on a specific industry sector or on Just one or two countries will maximize the chances of sourcing and converting the right deals. For example, targeting consumer sectors, since this sector offers a robust growth due to increases in middle-class populations and growing consumption. The biggest beneficiary country of consumption growth driven by growth in the middle class is Indonesia, the most populous country in Southeast Asia, with a population of over 240 million. Enhanced due diligence and deal-execution process Allow plenty of time for due diligence process, especially when creating market scenarios and mapping industry structures and value chains. PEE firms that excel in converting more acquisitions into winners and avoiding losers use probing due diligence process to dig deeper into a potential targets operations before they commit to an investment. Superior due diligence is very critical in Southeast Asia where information often less transparent and reliable sources of date are hard to find. A good due diligence can also reduce the negative effect from uncertainty in economic and political condition. Proprietary sourcing and smart partnership To find the best companies quickly and avoid overpaying, fund managers need to forge alliances and have people on the ground that can spot opportunities before competitors do. To be able to do that, PEE firms should reinforce local connections and consider partnerships with conglomerates or family groups seeking to institutionalize their investment capabilities. Other potential partners include local PEE funds as well as local banks, government-linked organizations, and state-owned wealth funds. They can facilitate access and help build up a steady deal flow. PEE firms should consider

Monday, October 21, 2019

Pysch essays

Pysch essays Personality develops from the day we are born and is aided by physiological development. The personality that us as humans develop occurs throughout our lifetime, the most significant stage of our personality is growth through the stage of adolescence. During this time in a childs life, most people and especially the childs parents easily influence him or her. Parents have the most impact on how the child is raised, what they are to teach it and how the child should function in society. Beyond the parents, there is outside influence that can affect the child, such as a teacher, peers or any individual the child comes in contact with. Beyond any individual, I believe that the TV also has a great effect on a child. Such factors influence the way personality develops in an individual. The way such factors alter or add to the growth of personality is rather complex. All the thoughts and words taken in by the subject are interpreted and in some cases acted upon. For instance, one might watch a TV show and see or hear something interesting or might be fascinated by how a character might act. With these thought and views, the child might act like the TV character; making or shaping their personality like that of a Batman or a Homer Simpson. While such influences can be unhealthy for a young child, depending on the role portrayed by the character, at times the role of a certain actor can cause the child to learn to be an exceptional individual. Perhaps Mr. Rogers' demeanor can give a child a strong grasp on how to behave or act. Personality development, I believe has three sides, a good side, a bad side, and a neutral side. It would be desirable if personality could lean toward the good side but that is not always the case. Bad influence is the easiest and most common influence a child can adapt because it can be fun whereas being an exceptional person with a caring personality is boring. Wh ...

Sunday, October 20, 2019

How to Grow Orange Potassium Dichromate Crystals

How to Grow Orange Potassium Dichromate Crystals If youve mastered basic crystals, try growing an orange potassium dichromate crystal. Usually you have to use food coloring to get an orange crystal, but this crystal color is natural. Materials Potassium dichromateDistilled water Time Required Hours for seed crystal, weeks for larger single crystal What You Do Dissolve as much potassium dichromate as you can in warm water.Filter the solution, cover it, and allow it to sit undisturbed for several hours or until growth is observed. Alternatively, you could produce a seed crystal by evaporating a few drops of this solution in a shallow dish.You can grow a mass of crystals by just allowing the solution to evaporate, but for a large single crystal, decant the solution into a clean container whenever you notice growth other than on your seed crystal(s).You can control the growth of your crystal by changing the temperature of the solution or by controlling the rate of evaporation by the type of cover you put on the container (e.g., coffee filter has free airflow, sealing the container with plastic doesnt).The resulting crystals will be bright orange rectangular prisms.

Saturday, October 19, 2019

Movie report Essay Example | Topics and Well Written Essays - 1500 words

Movie report - Essay Example The sacrifices of the Jesuits in the movie closely mirror the life that Jesus lived in the Bible. â€Å"The Mission† is a movie written by Robert Bolt and directed by Roland Joffe. Produced by Fernando Ghia and David Puttnam, it stars Jeremy Irons as Father Gabriel, the head of the Jesuit mission, Robert de Niro as a former Spanish slaver who becomes a Jesuit, Liam Neeson as a young Jesuit, Ray McAnally as the Spanish cardinal sent by the Catholic Pope to look into the Jesuit missions, and Chuck Low as the Spanish Governor Cabeza who led the Spanish troops to attack the Guaranis. The setting of the story is in the 1970s. The movie’s historical background suggests that under the Treaty of Madrid, the Portuguese were given the power to take over the Guarani community, which at that time was run by Jesuit missionaries. The natives themselves resisted and many died including the Jesuit missionaries headed by Father Gabriel. The introduction presents an example of how the Je suits risk their lives in their mission to convert non-Christians. The scene in which one priest is salvaged by tying him to a cross and letting him run down through the Iguazu falls depicts how cruel the Guaranis could be towards the missionaries. In fact, history recounts Jesuit missionaries in different countries who died for their belief. Martinez (73) reports the death of eight missionary Jesuit priests in an attack in Mexico. Tylenda (372), Butler (68) and Molinari (26) also report the sacrifices of the Jesuit missionaries in different parts of the world especially in Japan, China and Southern America. The scene in which Fr. Gabriel plays his oboe in a river illustrates the courage and determination that Jesuits should possess in order to enter the mission. This is despite the death of the other missionary priest in the falls. Fr. Gabriel plays his instrument to capture the hearts of the Guaranis. Soaked in the river, he positions himself on a rock and plays his oboe until the Guaranis pay attention to him and ask him to come with them. Fr. Gabriel uses music to communicate and bring peace to the people because that is the only way to communicate with them. In sending his disciples, Jesus did not mention the use of music but he equipped them with different languages in order to spread the Word. On the part of the Jesuits, music serves as the way to capture the hearts of the people. In the latter part, we see the people singing in harmony, a scene that touches even the heart of Cardinal Altamirano. This shows the strategy of the Jesuits in converting non-believers. The music of Fr. Gabriel communicates peace and harmony with the people. Until now, Jesuits are known for the beautiful music they make, which one can hear from mass in Catholic churches. The movie also sets the example on how the Jesuit missionaries deny themselves of material pleasures in life. Mendoza, the Spanish slaver, leaves his armor and other personal belongings behind when he follows Fr. Gabriel. The scene is momentous because leaving his sack signifies Mendoza’s preparedness to enter the mission by denying his personal needs and embracing the missionary life. It is also in this scene that the Jesuits and the Guaranis welcome him as their brother. Based on his reaction, Mendoza experiences true happiness and finds relief from the pain caused by his

Article critique Example | Topics and Well Written Essays - 1000 words

Critique - Article Example states where same-sex marriage is prohibited. Research Objective The authors aimed to examine the impact of pro-gay marriage policies, enacted in 2003 in Massachusetts, on health care use and expenditures among gays and bisexuals. They postulated that if same-sex marriage policies can reduce health problems among gays, bisexuals, and lesbians, then such policies may have implications on the health care use and expenditures of sexual minority men. It was clear that the authors were only interested in examining the effect of pro-gay marriage policies on the health care use and expenditures among gay and bisexual men. Theory/Framework Although the theoretical framework was not explicitly presented, it is apparent that the study was anchored on the notion that same-sex marriage policies could improve the physical and mental health conditions of gays, bisexuals, and lesbians. They postulated that same-sex marriage policies reduce structural forms of discrimination against gays, bisexuals, and lesbians, resulting in the reduction of health care use by such groups of individuals. Methods The authors employed quasi-natural experiment method to examine the impact of the legalization of same-sex marriage in Massachusetts on the health care use and expenditures among sexual minority men. This research design lacks random assignment of participants to comparison groups. Similar to a true experiment, a quasi-experiment has a control group and a treatment group, but the members of these groups are not explicitly or randomly chosen by researchers. Rather, these groups naturally arise from an exogenous event. Through random selection, research participants have an equal chance of being assigned to either control group or treatment group. Thus, the resulting groups are statistically identical at baseline, on both observed and unobserved characteristics. Any changes in such characteristics can be attributed to the intervention made. However, this is not the case for quasi-experi ments. Since the control and treatment groups are not randomly selected, the quasi-experiment method faces threats to internal validity. That is, a causal link between the treatment and outcomes may not clearly establish. Independent and Dependent Variables The independent variable is the same-sex marriage policies while the dependent variable is the health care use and costs. The factors measured were sexual orientation, partnership status, and health care use and costs. However, the measures or instruments used were not properly referenced and their reliability was not even mentioned. Study Design The authors employed a quasi-experiment design, which has threats to internal validity because the participants were not randomly selected to be assigned in either control group or treatment group. Hence, the participants’ groups in the study may not statistically comparable at baseline. Consequently, any changes in the observed and unobserved characteristics of the participants m ay not absolutely be attributed to same-sex marriage policies. Quasi-experiments can be utilized in studies where many variables are involved because this research design can control extraneous variables and may infer cause-and-effect relationships. However, if there are differences between the control and t

Friday, October 18, 2019

HUMAN GROWTH AND THE LIFE COURSE Essay Example | Topics and Well Written Essays - 3750 words

HUMAN GROWTH AND THE LIFE COURSE - Essay Example Sociologically, they have to cope with their changing roles. The aged are not only mothers and fathers they have to take on new roles as grandmothers and grandfathers. Most of them have exited their jobs because of retirement and are now unemployed. Because of the new roles that they have to assume they feel differently about themselves and so their attitudes towards life and towards others change (Tavris, 1991). This in fact indicates just how important income generating employment is to most individuals. Santrock (1999) emphasizes that biological, psychological and sociological processes are all interwoven as sociological processes shape psychological processes and psychological processes promote or restrict sociological processes, just as biological processes are impacting on psychological processes. Tavris (1991) has indicated in her papers that sometimes the sex drive does not slow down but there is no one around to relate to in a sexual manner. Based on my experience the males in the old aged homes see the females as fulfilling the role of sexual partners and so these institutions are not just where old people go to die but where life and intimacy is sometimes revived. Although this type of event is not part of what these institutions are about they happen sometimes without the knowledge of the caregivers. Developmental theories of the life cycle such as Erickson’s stages theory have often been used to explain aging. Erickson’s theory identifies three (3) stages of adulthood: the early adulthood – twenties and thirties, middle adulthood – forties and fifties, and late adulthood – sixties and over. However, there are those who have suggested that in recent times age has become a less effective predictor of human behaviour. Erickson sees early adulthood as a period of either intimacy or isolation. Intimacy he describes as the ability to develop relationships that are close and loving. If intimacy does not develop then the individual will feel isolated. Whatever, happens at one stage starting from childhood affects the next stage and so this Intimacy versus Isolation in what is Erickson’s sixth stage has been impacted by the adolescent years which might have been a vey tumultuous one for some adolescents as we will see in the next section. In his seventh stage Erickson sees it as a period of generativity versus stagnation. Generativity refers to shaping the next generation by assisting them to lead useful lives. Middle aged adults who have not been able to make some level of contribution would be seen to have been impacted negatively through stagnation. In the eighth and final stage which he describes as â€Å"integrity versus despair,† it is a time in which the older adults look back at what they have done with their lives. If the periods or stages that preceded this stage were positive then the individual would feel satisfied with some sense of integrity and if it was negative then the individual would have been dissatisfied and thus felt a sense of despair. According to Greenburg (1999, p327) A person who is not successful with this crisis is likely to be overcome with despair because the time left is so short, death approaches too quickly and there is no time left to try another route to gain some integrity. The person may then become bitter, depressed and paranoid as they use disgust to hide this despair. However, this is not the only time that individuals look back. Some

A good man is hard to find Essay Example | Topics and Well Written Essays - 500 words

A good man is hard to find - Essay Example She says, â€Å"I wouldn’t take my children in any direction with a criminal like that aloose in it† (O’Connor). Interestingly, it is the same grandmother who convinces the family to branch there on their way to since she wants to revisit a house. They unfortunately meet their untimed deaths at the hands of this Misfit. There is also something attractive in the way O’Connor describes Grandmother’s dressing. Despite her dislike of the idea of going to Florida, she is the first to get into the car wearing â€Å"a navy blue dress with a small dot in the print. Her collar and cuffs were white organdy trimmed with lace and at her neckline she had pinned a purple spray of cloth violets containing a sachet† (O’Connor). I think this dress symbolizes how a body is prepared for burial; dressed in their best attire. It is the grandmother’s reason for her glamour that removes any doubt on the coming events, â€Å"in case of an accident any one who sees her body on the highway will know that she is a lady† (O’Connor). O’Connor makes the protagonist to ignorantly speak of her coming death. The death of the whole family is also foreshadowed in the â€Å"passed by a cotton plantation with five or six graves†¦Ã¢â‚¬  (O’Connor). The numbers of the graves coincide with that of the family members, with O’Connor doubting if the baby can have its own grave or share one with its mother. Later the grandmother remembers one of her visits to an old plantation in Tennessee, neighboring â€Å"Toomsboro.† The word toomsboro brings to mind a tomb, an image that symbolizes death. The family faces the tombs at the end. Ironically, the house grandmother yearns to visit is not in the area they get a car accident. And when Wesley asks to know the plantation whose owners were buried in the five or six graves, grandmother says â€Å"gone with the wind.† This only shows what awaits the family in the end. After death, their souls will be â€Å"gone with the

Thursday, October 17, 2019

The Values of Wal-Mart Research Paper Example | Topics and Well Written Essays - 500 words

The Values of Wal-Mart - Research Paper Example From this paper it is clear that its competitive advantages are not only its low-cost products, but including its high-value quality products, and sophisticated strategic management and control. These are what made Wal-Mart successful in the United States. After all, where do an individual can find products with substantially low prices, yet with high quality as well? The ultimate answer is at Wal-Mart itself.   Wal-Mart should replicate its original business model in China for the following reasons. China is a highly-dense and populated country. There is a great opportunity for Wal-Mart to serve more than 50,000 people in a certain location. Wal-Mart can eventually reach out to those people outside the center of a certain town or those not readily reach by advanced basic services. In this way, Wal-Mart could try to penetrate its services by reaching out customers who could not afford to go to the center of the town. Secondly, the low-cost strategy for its products is suitable in C hina where there are many competitors trying to be a cut above the other on the basis of price. Not only that, in China the labor cost is substantially low compared in the United States, so there is another great opportunity for Wal-Mart to replicate more than just what it had started into its other international counterpart. Finally, what it had already started in the international setting and applying into China is possible because the said country is home to various investors who could create what is essential for the business, exposing customers to a different level of understanding business.  In order for Wal-Mart to go forward is to improve its way of handling its human resource. Especially in its international expansion, what is essential is the thought that it could create a unified cultural approach within the entire organization.

Multi-sensory Impairments Affecting Children's Development Essay

Multi-sensory Impairments Affecting Children's Development - Essay Example I felt it was crucial that I develop strategies that help them to connect with the world. My main aim was to enable them to experience the world around, and motivate them to move on. Overall, I was determined to incorporate strategies to overcome difficulties in accessing world around them. Introduction ‘A deaf-blind child is not a deaf child who cannot see or a blind child who cannot hear; the problem is not an additive one of deafness plus blindness. Nor is it solely one of communication or perception. It encompasses all these things and more. The deaf-blind are multisensory deprived; they are unable to utilize their distance senses of vision and hearing to receive non-distorted information.’ (McInnes & Treffery, 2001:2) The deafblind, like a multi-sensory impaired child, lacks the capability to use his/her senses to receive and process information. This is due to the limited access to information received through damaged senses. The deafblind children face a complexity of issues such as failure to communicate effectively in their social environment and interpreting events. This often results to restriction of the affected individuals in accessing and acquiring important information, as well as hampering their development (Chen, 1993, 1996 & 1999; Chen & Dote-Kwan, 1998; Fraiberg, 1977; McInners, 1999; McInners & Treffery, 2001; Mednick, 2004; Murdoch, 1994; Orelove et al., 2004; Wasserman et al., 1985). In this assignment, I will explain the complexity of needs that multi-sensory impaired children experience, and how this affects their development, knowledge, and understanding of the world around them. I will also seek to explore possible strategies that could be implemented to gradually extend thei r worlds, based on my observations of two particular pupils in my school. This assignment is divided into the following three sections. Firstly, I will attempt to define multi-sensory impairment and thoroughly explore its direct impact on learning on a day-to-day basis. Secondly, I will outline the abilities of two particular pupils in order to gain an insight into their learning. Finally, I will discuss various strategies, which would enable the pupils to access and improve their understanding and knowledge of the world, including a comprehensive reasoning behind the choice made and its effectiveness in practice. My role in relation to this project chiefly concerned observing and working with pupils. It was important to collaborate with teachers and support staff, as they could provide additional knowledge and experience of the children. In addition, I received a lot of support from my colleagues in this project. My objective was to find was of improving learning opportunities for pupils. Therefore, it was crucial to facilitate various strategies to increase pupils’ awareness, understanding, and knowledge of the world around them. Meaning and definition of multi-sensory impairment Children with multi–sensory impairment have historically been referred to as â€Å"deafblind†. Indeed, some people still refer to them as deafblind (Best, 1983; Brown, 1997; Brown & Bates, 2011; Collins, et al., 1991; Miles & Riggio, 2011; SENSE, 2011). In my opinion, being deafblind is different from being multi-sensory impaired. Children with multi-sensory impairment have more complex needs than deafblind. When it comes to cognition, it is even more difficult to determine their intellectual abilities and capabilities (DfE, 2011; DfH, 2011; Murdoch 1992; Pallant, 2011). According to available literature, the task of recognizing and identifying the needs of multi-sensory impaired children with regard to learning and educational needs is one of the key barriers f aced by educators

Wednesday, October 16, 2019

The Values of Wal-Mart Research Paper Example | Topics and Well Written Essays - 500 words

The Values of Wal-Mart - Research Paper Example From this paper it is clear that its competitive advantages are not only its low-cost products, but including its high-value quality products, and sophisticated strategic management and control. These are what made Wal-Mart successful in the United States. After all, where do an individual can find products with substantially low prices, yet with high quality as well? The ultimate answer is at Wal-Mart itself.   Wal-Mart should replicate its original business model in China for the following reasons. China is a highly-dense and populated country. There is a great opportunity for Wal-Mart to serve more than 50,000 people in a certain location. Wal-Mart can eventually reach out to those people outside the center of a certain town or those not readily reach by advanced basic services. In this way, Wal-Mart could try to penetrate its services by reaching out customers who could not afford to go to the center of the town. Secondly, the low-cost strategy for its products is suitable in C hina where there are many competitors trying to be a cut above the other on the basis of price. Not only that, in China the labor cost is substantially low compared in the United States, so there is another great opportunity for Wal-Mart to replicate more than just what it had started into its other international counterpart. Finally, what it had already started in the international setting and applying into China is possible because the said country is home to various investors who could create what is essential for the business, exposing customers to a different level of understanding business.  In order for Wal-Mart to go forward is to improve its way of handling its human resource. Especially in its international expansion, what is essential is the thought that it could create a unified cultural approach within the entire organization.

Tuesday, October 15, 2019

Principles of Social Workers Essay Example | Topics and Well Written Essays - 4750 words

Principles of Social Workers - Essay Example Thesis Statement Considering the task of social workers this report would intend to discuss the ethical standards and responsibilities of social workers. Thus, the objective of report is to understand various aspects of the moral concerns and other operating principles to be considered by the social workers taking into account the working standards, historical outlooks, confidentiality and ethical responsibilities. Unique Aspects of Social Worker’s Profession Social worker’s occupation has its unique form of understanding, ‘code of ethics’, values, state certifications and countrywide system of qualified education packages. These aspects prepare social workers to syndicate the aspiration and to assist others with the knowledge, abilities and morals which are essential to offer such assistances with efficiency. Contextually, besides various non-governmental organizations, social workers are also found in public organizations, profit-seeking companies, hospit als, universities, police branches, courts and numerous other modern day workplaces serving various people, families and societies at large (National Association of Social Workers, 2012). It is worth mentioning in this regard that professional social workers assist people to restore or improve their abilities for social working through developing societal situations favorable of the accomplishment of their objectives. Hence, the tasks of social work require acquaintance of human behavior of social, financial and cultural establishments and the incorporation of all these characteristics. Furthermore, social workers’ occupation is considered as highly qualified and knowledgeable specialists, which is also regarded as one of the rapidly increasing professions in the United States. The report of ‘Council on Social Work Education’ depicts that in the year 2000, almost 22,163 students were registered in social working programs which was further anticipated to grow by 3 0% in 2010. Unlike other professions, social workers attempt to assist people to overcome the challenges faced by them in their daily lives in terms of poverty, discernment, abuse, addiction, physical sickness, annulment, joblessness, educational limitation, disability and mental sickness. It is in this context that the social workers attempt to inhibit crisis situations and guide people to deal with the pressures of regular life more efficiently (National Association of Social Workers, 2012). National Organization for Human Service Education (NOHSE) Standards In general terms, there are no specific standards which can provide action for every situation that might appear in the tasks of social workers. However, in the year 1995, National Organization for Human Service Education (NOHSE) had approved ethical standards for social workers in order to reduce the conflict of strategies towards determining the course of actions to be taken in certain circumstances. These standards narrated the responsibilities bestowed on social workers defining social work as an occupation which has developed in reaction to the expectation of human requirements and problems. Therefore, social workers should preserve the truthfulness and morals of occupation, encourage welfare of people and improve their professional qualities on a continuous basis.

Monday, October 14, 2019

International Association of Bloodstain Pattern Analysts Essay Example for Free

International Association of Bloodstain Pattern Analysts Essay Bloodstain pattern analysis is one technique of several in the discipline of forensic science. This technique of using bloodstains as evidences is not new; however, the application of modern science has made bloodstain analysis more and more reliable (Wikipedia). When current technologies and advances within DNA analysis become available to enforcement agencies, the apprehension of criminals and offenders become less problematic (Wikipedia). The forensic science of bloodstain pattern analysis applies scientific knowledge from other disciplines in order to solve a myriad of practical problems. Bloodstain pattern analysis can draw on biology, chemistry, math, and physics, among others (Wikipedia). When an analyst follows a strict scientific process, this applied science can produce strong, solid evidence (Wikipedia). This is an imperative tool when in the hands of law enforcement. An understanding of bloodstain analysis may allow first responders to a crime scene the know-how in currently collecting and preserving any bloodstain data (Wikipedia). Bloodstain analysts receive specialized training. The foundation course in bloodstain pattern analysis is the Basic Bloodstain Pattern Analysis Course. This is taught at many government and private institutions. The course criterion was developed by the International Association of Bloodstain Pattern Analysts (IABPA) with the following stated purpose: A course of instruction designed for investigators, crime scene technicians, forensic technicians, and others involved in criminal and medical-legal investigations and crime scene analysis. The course is intended to develop a fundamental knowledge of the discipline of bloodstain pattern analysis. The course should illustrate to the student basic principals of bloodstain pattern analysis and the practical application of the discipline to actual casework. The course syllabus is not intended to create an â€Å"instant† expert. There are three classifications of bloodstains: passive, projected, and transfer/contact. These classifications were developed by the IABPA. Passive stains are developed when the acting force creating it is gravity. A passive pattern is then divided into three sub-categories: passive drop, drip pattern, and flow pattern (IABPA). Passive drops are created by the force of gravity alone, and the drip pattern is created when blood drips into blood. The flow pattern is a change in shape or direction due to influence of gravity or movement of the object (IABPA). Projected blood patterns are the result of an energy source being transferred through blood. There are several types: low velocity impact spatter (LVIS), medium velocity impact spatter (MVIS), high velocity impact spatter (HVIS), and expiratory blood (IABPA). The three types of velocity impact patterns are caused when an impact at either a low, medium, or high velocity make contact with the blood source (i. e. medium impact = a battery; high impact = a gunshot). An expiratory pattern is blown out of the nose, mouth, or a wound as a result of air pressure and/or air flow which is the propelling force (IABPA). A transfer/contact stain is the result of a blood bearing object coming in contact with a non-blood bearing object – thus causing the transfer of blood. Two types of transfer/contact patterns are the wipe and swipe pattern. A wipe bloodstain pattern created when an object moves through an existing stain, removing and/or altering its appearance. A swipe pattern is the transfer of blood from a moving source onto an unstained surface (IABPA). Blood splatter flight characteristics show that blood tends to form a sphere in flight opposed to the artistic teardrop shape. This is the result in the surface tension that binds the molecules together. This spherical shape is important to the calculation angle of incidence of blood when it hits a surface. This angle is then used to determine the point of origin (PO) – the original area where the blood originated in (Wikipedia). In 1954, Marilyn Sheppard was bludgeoned to death in her home. Her husband, Dr. Sam Sheppard survived what he called an attack by an intruder. Dr. Sheppard reported that he had been knocked unconscious as he tried to defend his wife (Lyle). Their home was ransacked. Investigators would come to realize that Dr. Sheppard had no blood located on his body nor clothing, and he denied ever cleaning up before the police arrived (Lyle). This troubled the police. The attack was so brutal that the killer would have been covered in blood, and Dr. Shepard should have had blood transfers located on his body or clothes. Sheppard had no blood located on his hands, which would be impossible because he said he checked for a pulse of his wife’s neck, which was covered in blood. Furthermore, Sheppard claimed that his watch, wallet, ring and keys were missing. This was true. A bag with these items was found no too far from the house; however, they had to traces of blood. Moreover, Sheppard’s pants had no blood on them – impossible is the killer robbed him with bloody hands (Lyle). The watch, however, did have traces of blood. Theses blood splatters came from flying droplets, indicating that the watch must have been close when the victim was received the fatal blows. If the watch made contact with her neck – as he checked for a pulse – the watch would have blood smears and not droplets (Lyle). Police determined that Dr. Sheppard most likely bludgeoned his wife to death. Then he cleaned himself and trashed the items outside the house were police would find them and made the house look as if it was a burglary (Lyle). Based in large part on the blood evidence, or lack of it, Sheppard was convicted of murder. After spending ten years in prison, Sheppard was released when the U. S. Supreme Court overturned his conviction. A representative from the coroner’s office stated that the blood located on Sheppard’s watch represented a blood splatter. This means the watch must have present when the blows were struck (Lyle). A renowned criminalist, Dr. Paul Kirk testified that the blood on the watch was a result of Sheppard checking his wife’s pulse. If so, why was the watch found outside the house? This controversy still surrounds the case. In 2004, Nick Berg was horrifically murdered by insurgents in Iraq. His throat was cut and he was decapitated. His body was found by an Iraqi overpass. The tape was on review on May 11, 2004 for a type of bloodstain analysis. Laura Mansfield, certified in bloodstain analysis by the Laboratory of Forensic Science and is a member of the IABPA, begins her analysis of the footage (Crime Library). It’s reported: â€Å"The time displays 13:45:47 in the lower right corner, the victim is pushed onto his left side where his legs are bent at the knees and raised toward his chest and his arms still tied behind his back. At this point, the video becomes out of focus and essentially useless for the purposes of analysis from approximately 90 frames. As the video comes back into focus, the primary assailant is viewed using the knife to cut the throat of the victim, beginning at the area near his left carotid artery. Almost immediately, blood is seen pouring onto the floor (target surface) from the wound caused by the incision (Crime Library). † There appears to be an edit point. At this point the primary insurgent is no longer holding the knife. â€Å"The individual wearing the white hood and previously standing on the right side of the primary assailant is now using the knife in a saw-like manner, holding the knife in (his) right hand while holding the victims hair with (his) left hand. At 13:47:xx, the individual wearing the white hood ultimately detaches the victims head from his body and holds the head outward in (his) left hand, still holding the knife in (his) right (Crime Library). † The frames that follow appear to jump, at which time the victim’s head is completely detached and the primary object in the frame. Through out the video, time changes frequently from military time back to â€Å"regular† time and vice versa. â€Å"Interestingly, the time display on the video changes to 2:46:20 (regular time format) and then switches back to 13:48:45 (military format) while the victims head is shown detached from his body in a similar series of frames (Crime Library). † Bloodstain pattern analysis is an age-old technique, which with new technologies and advancements aid in the capture and prosecution of criminals. This analysis procedure is used in many different ways and draw upon a myriad of disciplines. In result of a strict process, bloodstain pattern analysis will prove solid, concrete evidence and is a useful tool in the hands of law enforcement. References IABPA (International Association of Bloodstain Pattern Analysts). Suggested IABPA Terminology List. Date visited 8 April 2006. http://www. iabpa. org/Terminology. pdf Lyle, D. P. , MD. Uncovering the Evidence: Those Messy Bloodstains. Forensics for Dummies. John Wiley Sons Inc. p. 98 Nick Berg Tape. Crime Library. Court Tv. Date visited 8 April 2006. http://www. crimelibrary. com/about/authors/mansfield/ Wikipedia Online. Bloodstain Pattern Analysis. Date visited 9 April 2006. http://en. wikipedia. org/wiki/Bloodstain_pattern_analysis

Sunday, October 13, 2019

Simple Network Management Protocol (SNMP) for MIB

Simple Network Management Protocol (SNMP) for MIB SNMP Abstract: SNMP or Simple Network Management Protocol (SNMP) is an application layer protocol that provides the exchange of management information between network devices. SNMP is a part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Through this research the emergency of network management will be managed for fire alarm, power off. Managing devices such as computers is vital and tracking for its safe and emergency issues will assist in many aspects such as identifying location, solving communication issues etc. In this research we will propose a SMNP based solution for effectively managing computer devices. In this research we will propose a MIB [Management Information Base] using ASN1.0 specification and also proposing a prototype on the implementation. Then based on our proposed prpotype we will evaluate. ASN for the proposed MIB has been designed as part of this research but it could not be implemented with real time implementation due to lack of resource for SNMP based developemnt. Aim: Propose a solution for SNMP based Emergency management for an organization Objectives: Research on network management using SNMP. Proposing an MIB Tree for the emergency network management Critically evaluating the proposed solution for SNMP based emergency network management. Introduction Network management is managing and maintaining different components and its functioning in a network. Network should be managed in an efficient way for avoiding different attacks. Several protocols are used for managing network. Management plays a vital role for monitoring the state of the network and analyses the performance. Among such protocols Simple Network Management Protocol (SNMP) is one which is used for monitoring the network. The main purpose of this protocol is designed for maintaining devices in network in internet protocols (IP). The network management performance can be used for transporting network information and its elements functioning (Stephen F. Bush and Amit B Kulkarni, 2001). SNMP in networks provides reliable and integrated network management. Several attacks may occur in network, for analyzing networks should be managed in an efficient way. The SNMP manages the network with the usage of different commands to the network and is useful in different networks. Th ere are several architectures for SNMP which is used depending upon the network mechanisms. It performs several operations in network for managing different components in the network. For performing all these operations SNMP uses Management Information Base (MIB) for handling components in the network. In this project SNMP and its performance in network is analyzed with the help of case study approach. The emergency preparedness is important part in network management and is equal to other maintenance works. One of the problems in network is traffic (German Goldszmidt and Jurgen Schonwalder, 2003). Sometimes the flow of data is more in network which causes traffic in network. In order to avoid traffic limited number of data should be transmitted in the network. Another problem that occurs in networks is security. Sometimes intruders may involve in network which leads to loss of data, in order to avoid this SNMP protocol performs several operations. For identifying network problems w ith SNMP components in network uses Management Information Base. Manager plays major role in managing the network. SNMP emergency services are very much helpful for the managing the network. This project uses emergency management of SNMP in order to solve problems that occur in networks (Geln E. Clarke, 2005). Hence from above context it can be concluded that SNMP is one of the protocol which helps in managing the network. Several problems may occur in network like traffic and security to the data. SNMP emergency management helps in managing the networks by performing different operations. Research Problem The network management protocols identify the communication between the network management server programs that are executing on the router or host, and the network management client program invoked by the manager. Considering these factors, it can be expected that the network management protocols contains numerous commands (Douglas Comer, 2006). The major disadvantage of constructing the network management protocols is the resulting complexity because this protocol needs an individual command for every operation on the data item. The Simple Network Management Protocol (SNMP) is useful in such types of cases. SNMP makes an interesting approach to network management. In place of defining the large command set, SNMP directs all the operations in a fetch-store paradigm. SNMP makes use of only two commands which allow the manager to store values into the data item and get the value from the data item. Other operations are described as the side-effects of the two operations. The main adva ntage of using the fetch-store paradigm is simplicity, flexibility and stability. SNMP is stable as its meaning remains fixed. SNMP is also easy to understand, debug and implement as it evades the difficulties of using special cases for every command. Finally the SNMP is flexible as it can contain the arbitrary commands in a well-designed framework (Douglas Comer, 2006). Problem Context: Importance of emergency in SNMP In the present scenarios of the Simple Network Management protocol, there are numerous of conditional factors that involves in defining the perspectives of the response in emergency SNMP (Amjad Umar, 2003). The emergency response can be used as a tool guide to the proposed scheme. The situation of the emergency can be found in the several areas of the networking management. The state of emergency can be found in many context such as market demand, failure in the key resources, shortage in the areas of the supply, in the same way there is a need of the emergency can be found in the areas of the political sciences and public administration. As in the same way in this research the point to be focused on is the emergency response of the Simple Network Management Protocols (Harold F. Tipton and Micki Krause, 2004). The factor that contributes to the difficulty in the emergency are lack of flexibility in making decision, lack of available resources, lack of response in option, failure in c ommunicating and cascading the events. To overcome these whole problems in the SNMP emergency, it must have to develop the outstanding plans that can be used for giving the training on the extensive simulation of the Emergency Response. Most of the organizations get failure only because of the one reason that is managing the emergency situations (Rob Cameron, Neil R. Wyler, Trent Fausett, Kevin Fletcher, Patrick Foxhoven and Mark J. Lucas, 2007). If the emergency situations in an organization are maintained in a superior approach then it may lead to loss in the communication, information and essential data. Hence a proper management system is required for organizing the emergency situations in Simple Network Management protocol. This protocol is used to reduce the traffic when a emergency situation is occur in the network, then the preventive measures that has to be taken are recovery, preventives in the system, improving the communication scheme, performance and work on the basis o f the propriety. Research Method: Case study is one of the best methods for researchers; these are effectively used by the people to understand the contest of the study. It is less complexity and adds strength to the data which is used in the research. The steps that is followed in this case study are * Determine the theme of the research * Select the cases and analysis the techniques for gathering the data * Preparation for the collection * Collection of the data according to the field * Estimate and analyze that data * Preparation of the report This study is to manage the emergency in Simple Network Management protocol. The organization that involves in the SNMP managements standards, that provides the major introduction to the organization management. There are several conditions that have an impact on the areas like co-operation and trading (Bill Gillham, 2000). To develop the management system in the SNMP is based on the information and communication. This includes the problems, listing the questions, describing the method that involve in the research. The key features of the report includes the detail of the Simple Network Management Protocols in the management information of specific data that relates to the successes or disappointments experienced by the organizations that were conveyed during data collection and answers or comments illuminating issues directly related to the research questions (Ben Beiske, 2007). The researcher develops each issue using quotations or other details from the data that is collected, and points out the uses of data where it is applicable. The data also includes the confirming and conflicting findings from literature reviews. The report conclusion makes assertions and suggestions for further research activity, so that another may apply these techniques to another electronic community, network and its management to determine whether similar findings are particularly to in communities that belongs to the network (George L. Dunbar, 2005). Final report distribution includes all participants. Within the case study it has been analyzed at the first time whether the technique used with each non-profit organization under study. The assigned investigator studies each organizations written documentation and survey response data as a separate case to identify unique patterns within the data for the single organization. A detailed case study that is, written ups for each organizing management, categorizing interview questions and answers and examining the data for within group similarities and differences. Cross case analysis follows. Investigators examine pairs of cases, categorizing the similarities and differences in each pair (Kathleen Stassen Berger, 2004). Investigators then examine similar pairs for differences, and dissimilar pairs for similarities. As patterns begin to emerge, certain evidence that may stand out as being in conflict with the patterns. In those cases, the investigator conducts follow-up focused interviews to confirm or correct the initial data in order to tie the evidence to the findings and to state relationships in answer to the research questions. Chapters Summary: In summary, here there is a discussion about the case studies in terms of the different types of case studies which is found in the literature. The case studies are considered to be useful in research as it enable researchers to examine data at the fine level. It is an alternative to quantitative or qualitative research, case studies is a practical solution to when a big sample population is difficult to obtain. Although the case studies have a variety of advantages, so it is used for data management for having the better situations and it provide a better insights for the document in detail to which the subjects of Interest is related. Case study method has always been criticized for its lack of severity and the tendency for a researcher. It is the base for establishing reliability and generality in subjected to uncertainty when a small sampling is deployed. Some case study research is dismissed as useful only as an exploratory tool. Hence as the case study have various advantages o ver the qualitative or the quantitative researches. So it is used in this research. Summary of chapters: Chapter 2 includes the Literature review for the related research work. Chapter 3 discusses the analysis of problem requirements which is providing a solution for managing or developing emergency based system. We have used SNMP and MIB based approach to provide the design of the emergency based provision. We will be using MIB tree and ASN based design and development for this. Chapter 4 includes the development and data collection which will be obtained through SNMP Query for Firealarm and Power off. Chapter 5 covers the analysis and evaluationof results or test data, This has the effectiveness of the research and proposed solution for emergency. Chapter 2: Literature Review 2.1 Network Management Network Management is a service which employs different applications, tools and devices to assist the network managers in maintaining and monitoring networks. Hence the meaning of Network Management is different for different users. For example in certain cases the network management involves a single network advisor monitoring the network activity by utilizing an obsolete protocol analyzer. In other cases the network management involves auto polling, distributed database and high end workstations producing real time network topology traffic and changes (Network Management n.d). Architecture of Network Management Many of the network management architectures use similar set of elements, structure and relationships. The managed devices or end devices like the computer systems and network devices run the basic software which allows them in producing alerts when problems are recognized. For instance consider the exceeded user determined thresholds. The alerts received are programmed by the management entities to respond by executing one, group of actions like operator notification, system shut down, automatic attempts and event logging by system repair. Even the entities of the management can be polled for end stations to verify the values of definite variables (Network Management n.d). The polling can be user initiated or automatic but the agents of managed devices react to all polls. These agents are the software modules which first compile information regarding managed devices in which they reside. Later the information is stored in management database and is finally produced to the management entities reactively or proactively of the network management systems (NMSs) through a protocol of network management. The network management protocols include Common Management Information Protocol (CMIP) and Simple Network Management Protocol (SNMP). Figure 1 represents basic network management architecture (Network Management n.d). Sampling Techniques Network Management involves the status information of queue occupancy, latency, load and other parameters which is available from devices like switches, networking interfaces and routers. This information of the network management is accessed by the Simple Network Management Protocol (SNMP) (Edwin A. Hernandez, Matthew C. Chidester, and Alan D. George, 2000). The Network Management Station (NMS) of the SNMP queries the agents or network devices to evaluate the status of the network links or devices periodically. The accuracy of the data measured is determined by period of sampling. A transient activity cannot be detected accurately if the sampling interval is large and a greater storage capacity is required at the NMS as small intervals consume larger bandwidths on the network. For instance, a burst of major action with few seconds is probable to be undetected with sampling interval of some minutes. To balance the accuracy with sampling several sampling techniques have been practical to the managers of network. Some of these sampling techniques are: SNMP Architecture: Simple Network Management Protocol (SNMP) is the network protocol which is used in network management systems. This protocol is designed to administer the devices on an Internet Protocol (IP) network. It collects the information from different network devices such as routers, servers, hubs on an internet protocol. It is used for managing complex networks. The SNMP architecture consists of different set of components such as network management system and the SNMP agent and the managed device. The managed device is also known as the network elements. It is connected to the data network. The SNMP agent collects the data from the managed device and transforms it to another format using SNMP. This agent acts as a server, switch, hub and many others. The NMS is the one of the module of the SNMP which basically executes the applications which can manage and control the managed devices like physical devices such as routers, network interfaces and software. They manage the remote monitoring of these managed components and do the sampling. Then after do the analysis of the collected information and finally gives the presentation of the information (Steven Karris T, 2004). All the devices in the architecture are referred as managed devices. The managed device in the architecture acts as an SNMP agent which facilitates the network management syst em to recover the status of managed device. All the available information of the managed devices is been addressed through management information base (MIB). There are two types of MIBs. They are scalar and tabular. The scalar object of MIBs denotes the single object instances and the tabular objects of MIBs define the multiple object instances. If the network management system recognizes which device to be managed in MIB then it changes the MIB objects with the relevant requests to the agent of SNMP. The information of MIB is loaded into the network management system with the help of MIB file. The network management system acts as the master device where as the managed device and the SNMP agent acts as a slave device. It provides security by preventing unauthorized users to gain access on the system. This security is performed with the help of community string. This string acts as the password and groups the data either to read-only or read-write areas (Thomas Porter, 2006). The ap plication server of the SNMP agent is designed to run the specific applications. The SNMP agents and the network management systems communicate each other with different set of operations such as read, write and trap. The NMS requests the SNMP agent through read operation and it sends the information through write operation. The notifications are sent from SNMP agent to NMS through trap operation. Hence from the above context it is understood that SNMP is used in many applications. It is implemented in many operating systems. The storage network of the SNMP architecture consists of switch and the hub which acts as the interface between the components. All the devices such as managed devices, MIB are connected only through storage network. Tape library contains more than one tape drives which stores bulk amount of data. It acts as a SNMP agent. The SNMP agent translates the whole information. Different SNMP versions are derived to increase the performance of the system. SNMP ahs the followings: Network Element: if any tool connects to the network then that tool can be called as network element. Some of the tools like gateways, hosts, terminal servers, servers, switches, firewalls, and active hubs. Management station: this station includes a platform which contains software in SNMP that manages and controls the network elements. SNMP agent: it is a software management agent which is responsible for executing the functions in the network management after receiving the messages from the management station. SNMP request: a message which travels from management station to SNMP agent in the network device. SNMP trap receiver: it even receives the notification messages from SNMP agent on network devices. Management information base: it is a method which identifies the elements in SNMP database. SNMP Architecture Simple Network Management Protocol is very popular not only because of its simple operation but also due to easy of usage. This protocol is very useful for manufacturers and seller as it is easy to use SNMP technology for the manufacturers while adding network management functions to their products (Kerrie Meyler, Cameron Fuller, John Joyner Andy, 2008). Components of the SNMP Architecture: The SNMP architecture mainly contains two components, managers and agents, apart from standards which are used for controlling the interactions between components. By using SNMP commands, these managers and agents communicate with each other. These commands are explained in RFC 1157. Here, the managers organize the functioning of agents. The agents provide the data to the managers by interacting with the devices like routers and computers. These devices are also known as managed devices (Ramadas Shanmugam, R. Padmini S.Nivedita, 2002). The protocol used for communication between manager and agent is referred as SNMP. Generally, the SNMP managed network consists of three components; they are (Deon Reynders Edwin Wright, 2003): * Managed devices. * Agents. * Network-management systems (NMSs). Managed devices: It is a network node which includes SNMP agent which exists in a managed network. These devices gather and store the management information. By using SNMP, managed devices enable the management information to network-management systems (NMSs). It also responsible for querying the agents by using SNMP commands. Managed devices can also be known as network elements, these can be any type of devices like routers, switches, hubs, access servers, bridges, IP telephones, printers, or computer hosts (Gilbert Held, 2003). Agent: It is a network-management software module which exists in managed devices. Agent software represents one or more program modules which operate within the managed devices like bridge, router, workstation or gateway. Each of the managed agent stores information and provides these information to the manager after receiving the request from the manager. It translates the management information into a well-suited form with SNMP (Deon Reynders Edwin Wright, 2003). Network-managed systems (NMSs): This system performs applications that examine the managed devices. It provides a large amount of memory resources for network management. In any managed network, there should one or more number of NMSs (Gilbert Held, 2003). SNMP operations SNMP reads or writes the values in applications from SNMP devices. There are four basic SNMP operations, they are Get, Get-next, Set and Trap. Get and Set are the basic operations which are mostly used for reading and writing data to a node which are identified by a specific OID. It also requests the values of one or more SNMP objects and sets the values of SNMP object. Get-next reads the content of the tables at a time and steps through MIB hierarchy. Trap is an asynchronous notification from server (agent) to client (manager) which reports the occurrence of an interesting event. It sends the information in the form of packet to SNMP (Evi Nemeth, Garth Snyder Trent R. Hein, 2006). Basic commands of SNMP Commands are explained in RFCs, there are many RFCs which relate to SNMP components. The importance of these RFCs is it describes the operation of the protocols. Generally, there exists three RFCs; they are RFC 1155, RFC 1157 and RFC 1213. RFC 1155 used for Structure of Management information (SMI), it explains about the data types and structure that should be used for managed objects. RFC 1157 is used for Simple Network Management Protocol (SNMP), it describes protocol and operation of SNMP. RFC 1213 is used in Management Information Base (MIB) (Philip Miller, 1997). By using four basic commands in SNMP, managed devices are monitored and controlled. They are namely read, write, trap, and travel operations (Deon Reynders Edwin Wright, 2003). Read command it is used by NMSs, in order to monitor the managed devices. NMS inspect various variables which are maintained by managed devices. Write command to control managed devices, these commands are used by NMS. The variables in the managed devices are changed by NMS. Trap command- these commands are utilized by the managed devices to asynchronously report the result to the NMS. Whenever there are certain results in the managed devices, then managed devices send rap to NMS (Deon Reynders Edwin Wright, 2003). Transversal operations- NMS make use of these operations to identify the variables which supports managed device and also collects the data in variable tables like routing table. SNMP Network Management Managing a network is very difficult task for any administrator as it deals with huge number of nodes and protocols. The best way to keep track of all the nodes that exists in a network is to identify and implement an effective protocol which can allow a user to read or write a particular piece of information. SNMP is one of the network management protocol preferred by most of the network administrators in organizations. SNMP can be available with three versions; each has enhanced features when compared with its previous versions. SNMPv3 can offer high security features while managing organizational network. A network manager in an organization has to play a key role in managing the networks. Using of SNMP for network management can be advantageous as it can solve most of the problems that exists in a network (Sebastian Abeck and Adrian Farrel, 2008). Thus, performance of network mostly depends on the network protocols used by the administrator. Network management using SNMP protocols can be identified as a request/reply process. SNMP makes use of request messages like GET and SET while managing a network. Through GET request a SNMP server can retrieve the required information from a node where as SET request can stores specific information on a node. SNMP servers mostly use GET requests in order to manage a network. SNMP implementation efficiency largely depends on these requests and replies from the nodes or servers (Dinesh Chandra Verma, 2009). A network administrator has to recognize the network details before implementing SNMP protocols. Client programs in networks can be utilized by network administrators in order to display the actual details of a network. While displaying network details a client program acts like an interface. When a user or administrator wants to access specific information, a request must be sent to the server. For sending request to particular node, a client program makes use of SNMP protocols. R equests from the users will be received by SNMP servers running on the specified node. SNMP server processes these requests and finds the information required for a user. Finally a client program will display the information based on the response received from SNMP servers. The major aspects that has to be understood in SNMP network management is, how a user can specify the information request and how a server recognizes the required information (Larry L. Peterson and Bruce S. Davie, 2007). SNMP makes use of Management Information Base (MIB) for retrieving the required information. MIB performs the function of identifying information from SNMP databases. As SNMP uses MIB, a particular syntax for the requests has to be specified. For implementing SNMP with MIBs a standard specification like ASN.1 can be used. A SNMP client agent keeps an ASN. 1 identifier in MIB, SNMP server searches the required information based on the identifier specified by the client. For managing a network SNMP makes use of various network components. Every SNMP agent will interact with MIBs and Network Management Systems while managing a network (Monique Morrow and Kateel Vijayananda, 2003). Hence from the above discussion it can be understood that, SNMP operates in client/ server mode which establishes virtual connections with the servers to provide information to the Network Management Systems (NMS). The information provided to NMS can provide the devices status at a particular time. MIB in SNMP refers to the databases controlled by SNMP agents and SNMP servers retrieve the information based on MIBs in networks. Network management through SNMP can be an effective and most used method in present organizational networking environments. Many large organizations use SNMP tools for managing their networks effectively. Why SNMP SNMP is defined as simple network management protocol. Network management system will make use of SNMP for communicating with various network objects. SNMP is mostly used for the remote management of network device. SNMP is widely used because it easy to use and user can easily add the network management functions to their new or existing products. SNMP runs on various devices like network tools, core network devices and office network tools (Ray Rankins, Paul Jensen and Paul Bertucci, 2002). SNMP allow network and system administrator to access network devices that are present in their networks such as server, routers etc. SNMP for the management of network device contains one SNMP station and management station. Management station is mainly utilized to arrange the network elements and to receive the SNMP traps from those elements. By making use of SNMP, network monitor can observe changes and alerts that are identified in the network elements. If the size of network is increased th en method called management is required. In SNMP errors obtained are varies from one agent to other agent but will include system failure, disk warning etc (Harold F. Tipton and Micki Krause, 2004). If the device passes an alert to the management station then network management itself involves in rectifying the problem. Time to time configuration request should be send to the device. If provided string is correct then automatically configuration of the device will change according to the requirement. Organizations can identify the status of all equipments and can also perform remote trouble shooting. SNMP is nothing but a protocol that is used to develop and manage nodes that are present in the network system. SNMP allows system administrator to work on the problems that are executed in the network and should plan for the growth of network. Network management service will identify the changes that are done in the network devices based SNMP (Douglas R. Mauro and Kevin James Schmidt, 2005). SNMP consists of three features; they are managed device, agents and network management system. Managed device is usually a network node. It contains SNMP agent that is located on a managed network. Management data that is gathered and stored will be available to network management system of SNMP. Managed devices can also be called as network elements. An agent is nothing but network management module software module which is present in the management device. This device has great knowledge on local management information and this information can ne transferred to SNMP. NMS usually carry out applications that can manage and control the managed device. Hence from the above discussion it is identified that SNMP is a protocol which can help in managing the networks. Why MIB Management Information Base (MIB) is an essential component for handling a network. The importance of MIB increased as it comprises data definitions for managed objects. For managing the networks through SNMP protocol, an information base is necessary. The information base must allow a user to retrieve required data. MIB provides the facility of managing databases in SNMP agents. Managed object instances stored in MIBs will be exchanged between SNMP agents and managers (Stephen B. Morris, 2003). Thus, MIB is necessary for managing the information while implementing SNMP protocol in networks. Managed objects in MIB will be specified with a unique identifier, a user has to send request regarding information by following a particular syntax. MIB in SNMP also helps in recognizing the present status of a network device. Identifying the network information in case of small networks can be done very easily as the host names and IP addresses can be available to the users directly. But in lar ge networks, a MIB