Thursday, October 31, 2019

Job offer content and job interview Essay Example | Topics and Well Written Essays - 750 words

Job offer content and job interview - Essay Example To increase the success rate of recruitment and selection, properly written job offer content, job interview, and employment contract will be tackled in details. Job offer content indentify what is expected from a job applicant for a particular post. To increase the understanding between the job applicants and HR manager concerning the available job, job offer content should be written short and straight to the point. Preferably in point form, job content should include the date when the applicant is expected to report back to the company, duration of the employment contract, the job description and responsibilities, work options like part-time job, flexy time at work, job sharing, paid or unpaid leave, compensation packages, and rewards. Attracting prospective applicants remains a challenge to most HR managers. Therefore, HR managers should make use of effective HR strategies like work flexibility, compensation packages, and rewards at all times. Work flexibility includes offering new employees the option for a â€Å"part-time job, flexy time at work, job sharing, and unpaid leave† (Hough & Oswald 2000, p. 632; Secord 2003, p. 173). To increase the chances of attracting competitive applicants, the HR manager may apply the concept of work flexibility in the job offer content. Job interview is the stage wherein the HR manager can personally assess the qualification and personality of a job applicant. During the official job interview, HR managers are expected to inform the applicants about a particular job responsibility aside from identifying each individual’s working abilities, acquired skills, educational background, and previous work experiences necessary to allow the person to perform a given job position (Stone 2005, p. 10). Likewise, HR managers should be able to conclude whether or not the job applicant is capable in performing the work expectations for each post. Through keen observation, it is also during the job interview when the HR manager could

Tuesday, October 29, 2019

Foundations of Learning and Collaborative Working Essay Example for Free

Foundations of Learning and Collaborative Working Essay â€Å"Discuss the concept of collaborative working within your professional area† To be able to understand the rationale, the different factors influencing the outcome of collaborative working and how this can be applied to Perioperative practice, it is important to have a sound understanding of the concept â€Å"Collaborative Working.† This concept has many terminological variations, one of the more frequently used is â€Å"Inter-professional working.† Hornby and Atkins (2000) state that collaborative working is â€Å"a relationship between two or more people, groups or organisations, working together to define and achieve a common purpose. † Barrett et al (2005) declares that inter-professional working is â€Å"the process whereby members of different professions and/or agencies work together to provide integrated health and/or social care for the benefit of service users.† Disregarding what is seen as the correct/incorrect terminology, the common denominator here is that all health care staff/ agencies’ are working together to provide the best healthcare possible for patients and service users. There have been many debates about the variation in terminology, Leathard (1994:5) refers to it as â€Å"terminological quagmire† that has been created due to rapid developments in practice, and in her analysis of terms, Leathard (1994:6) prefers to use the term multi-professional as it â€Å"infers a wider group of professionals.† In this instance the term â€Å"Collaborative working† will be used. Over the years there have been many drivers behind the rationale for collaborative working dating as far back as the 1960’s in the USA, where Henderson (1966) reports that â€Å"one hospital has weekly inter-professional ward conferences.† The idea of collaborative working is therefore not a relatively new concept. In recent years increased emphasis has been placed on collaborative working and the need to work together due to changes in technology, accountability and government reports. Technological advances such as telecommunication is now used by surg ical staff to live feed surgical procedures to other parts of the world. This has aided remote-area surgeons in their own practices (Shields Werder 2002) Similarly, the introduction of the National Health Service (NHS) direct advice line has created a way in which doctors can consult patients over the telephone. However a study by the Economic and Social Research Council (2005) concluded that â€Å"telemedicine is disappearing† compared to NHS direct advice line. The introduction to new machinery which takes blood pressures automatically rather than manually, this and other technological advances have all required healthcare staff to change the ways in which they work collaboratively. On the other hand, Government reports also change the way in which healthcare professionals work as they are often mandatory measures. The NHS Knowledge and Skills Framework (KSF) was introduced in 1999 under the Agenda for Change. Day (2006) claims that the use of KSF will â€Å"enable team leaders to identify gaps in the knowledge and skills of their inter-professional teams.† KSF is an essential requirement carried out every year to ensure pay progressions. Collaborative working is also brought about by accountability. All healthcare professionals are governed by a professional body such as the Health Professions Council (HPC) in which it is their duty to ensure compliance with the legislation on the use of protected titles (HPC, 2008) Not only are registrants accountable to the HPC they are also accountable to statutory and criminal law which means healthcare professionals must interact with patients and staff on an acceptable level at the risk of being prosecuted for their actions. Another driver for collaborative working is seen through the ever scrutinizing media. A recent news report by Hughes (2011) titled â€Å"Emergency surgery patients’ lives at risk, say surgeons† is one of the many examples of negative media that is putting more pressure on healthcare professionals to work more collaboratively. On the other hand, many of the publi c viewers do not see the bias in the majority of these news reports and many examples of good collaboration is missed. Resulting from the rationale behind why people work together it is important to understand the ways in which people do work together. Safe Surgery Saves Lives was an initiative that arose in 2006 by the World Health Organization and in 2008 a Surgical Safety Checklist was released globally. Research proved that â€Å"postoperative complication rates fell by 36% on average† and the checklist has also â€Å"improved communication among the surgical teams.† (Haynes, B.A et al, 2009, Pg: 496) Many trusts also have a theatre list policy and this ensures that staff are working collaboratively to ensure the lists are correct, accurate and the most important procedures have been prioritised. The idea differentiates among the trusts, but is most commonly referred to as a â€Å"Group hug.† This is carried out each morning before any surgical procedures commence and it is a chance for staff to collaborate and share any ideas or concerns over that day’s list. A big part of collaborative work, especially in peri-operative care, is about recognising each other’s skills and importance thus the idea of â€Å"inter-professional learning.† Kenward Kenward (2011, pg; 35-39) outlines the importance of mentors, stating that â€Å"mentors should act as role models for students of all professions.† Further promoting this the General Medical Council (2006) document on Good Medical Practice propounds that doctors also act as role models to try and â€Å"inspire and motivate others.† It is evident that there are many ways in which healthcare staff work together, however major issues are still identified around the factors that influence the outcomes of collaborative working. Miscommunication has been identified as a reoccurring problem. Certain behavioral patterns among peri-operative staff which included ignoring requests they did not understand, failing to seek clarification, failing to speak loudly enough to be heard and communicating information to the wrong person. (Gardezi et al 2009, pg: 1390-1399) This can be fatal especially in the case of Elaine Bromiley who had undergone a routine sinus surgical procedure. Due to a breakdown in communication between surgeons, Elaine unfortunately died. A video titled â€Å"Just a routine operation,† (LaerdalMedical, 2011) released after the death of Elaine Bromiley, identifies the breakdown in communication between the surgeons and the theatre nurses who had actually witnessed the surgeon’s distress and suggested an alternative method to intubating the patient which was ignored. This concept has been previously recognised as â€Å"professional separatism.† D’Amour et al (2005) argued that because professional groups are educated separately they are then socialised into â€Å"discipline-specific thinking.† Research concluded that 69% of respondents to a questionnaire they set out reported disagreement between surgeons and nurses. And that 53.4% reported experiencing aggressive behavior from consultant surgeons (Coe and Gould, 2008, Pg: 609-618) Thus meaning the outcomes of collaboration will suffer if all professionals do not interact and recognize the importance of other professionals’ skills. It is evident that collaboration and inter-professional working largely exists but with the constant changes in peri-operative practice as mentioned previously and the way healthcare is constantly observed, especially by the media, it is evident that collaborative working is a continuous development or a lifelong learning process. As technology changes and government policies are continually released it is inevitable that the ways in which healthcare professionals work together will also change and develop. References Barret, G, Sellman, D and Thomas. J (2005) Inter-professional working in Health and Social Care: Professional Perspectives. Basingstoke: Palgrave Macmillan. Coe, R and Gould, D (2008) ‘Disagreement and aggression in the operating theatre.’ Journal of Advanced Nursing. Volume: 61, Issue: 6, Pg: 609-618. Day, J (2006) Inter-professional working: An essential guide for health-and social-care professionals. Cheltenham: Nelson Thornes. D’Amour, D, Ferrada-Videla, M, San Martin Rodrigues, L and Beaulieu, M (2005) ‘The conceptual basis for inter-professional Collaboration: Core concepts and theoretical frameworks.’ Journal of Inter-professional Care. Supplement: 1, Pg: 116-131. Economic and Social Research Council (2005) Telemedicine revolution is ‘disappearing’ from the NHS. [Online] Available at: www.esrc.societytoday.ac.uk. (Accessed: 8 October 2011) Gardezi, F, Lingard, L, Espin, S, Whyte, S, Orser, B and Baker, G.R (2009) ‘Silence, po wer and communication in the operating room.’ Journal of Advanced Nursing. Volume: 65, Issue: 7, Pg: 1390-1399. General Medical Council (2006) ‘Good Medical Practice guidelines: working in teams.’ [Online] Available at: http://www.gmc-uk.org/guidance/good_medical_practice/working_with_colleagues_working_in_teams.asp (Accessed: 9 October 2011) Haynes, B.A, Weiser, G.T, Berry, R.W, Lipsitz, Sc.D et al (2009) ‘A Surgical Safety Checklist to Reduce Morbidity and Mortality in a Global Population.’ The New England Journal of Medicine. Volume: 360, Issue: 5, Pg: 496. Health Professions Council (2008-09) Continuing professional development annual report. [Online] Available at: http://www.hpc-uk.org/publications/reports/ (Accessed: 8 October 2011) Henderson, V (1966) The nature of Nursing: A definition and its implications for practice, research and education. New York. Macmillan. Hornby, S and Atkins, J (2000) Collaborative Care: Inter-professional, interagency and interpersonal. Oxford: Blackwell. Hughes, D (2011) ‘Emergency Surgery patients’ lives at risk, say surgeons.’ BBC news. [Online] Available at: http://www.bbc.co.uk/news/health-15098114 (Accessed: 8 October 2011) Kenward, L and Kenward, L (2011) ‘Promoting Inter-professional Care in the Perioperative environment.’ Nursing Standard. Volume: 25, Issue: 41, Pg: 35-39. Proquest [Online] Available at: http://proquest.umi.com/ (Accessed: 9 October 2011) Laerdal Medical (2011) ‘Just a Routine Operation’ [Online] Available at: http://www.youtube.com/watch?v=JzlvgtPlof4 (Accessed: 9 October 2011) Leathard, A (1994) Going Inter-professional: Working Together for Health and Welfare. London: Routledge. Shields, L and Werder, H (2002 ) Perioperative Nursing. Cambridge University Press.

Sunday, October 27, 2019

The Corporate Culture Of Fedex Business Essay

The Corporate Culture Of Fedex Business Essay In order to complete the task the organization selected was FedEx. The corporate culture of FedEx was based on superior client service as well as displayed an attitude of doing whatever it takes to serve clients as of the top to the bottom. The expansion of the Internet, therefore, was something FedEx might employ to enhance its client base plus create a competitive service advantage. It allowed FedEx to not just let its clients pull real time information moreover data into their internal systems, however in addition to that turn out to be further involved in the internal processes of its clients. which involves the contributing factor in transforming FedEx into an e-trade. Even though there was no planned strategy to build an e-trade, the decisions that the business made to align the organization structure by means of systems plus processes has carved out a model for building a successful trade for the 21st century, which lends support to transportation logistics competence as well as selling as well as supply chain logistics answers management. (De Wit, 2004) FedEx is renowned for plus recognized for its total fidelity plus its attention to detail. FedEx accomplishes this by not being a mass of bodies moving in one direction however rather by being the several parts that compose it plus working together. FedExs guaranteed on-time service plus complete satisfaction is unconditional. The image the business has so meticulously cultivated assists maintain as well as extend its market share. FedEx Logistics offers customized, integrated logistics in addition to warehousing answers worldwide. FedEx Logistics is the parent business of FedEx Logistics furthermore Caribbean Transportation in February 2000 to offer customs brokerage moreover trade facilitation answers. FedEx Corporate Services formed in January 2000 to bring together the sales, client services, public relations in addition to IT resources. On January 19, 2000, FedEx announced a novel branding strategy that involved transforming the businesss name to FedEx Corporation, as well as ex tending the FedEx brand to four of its five subsidiary companies. Providing clients by means of an integrated set of trade answers was the pivotal reason for the renaming of the business as FedEx Corporation. Clients wanted to deal by means of one business to meet their transportation plus logistics needs. The announcement created to pool together the marketing, sales, client services, information technology plus electronic commerce resources of the group furthermore offer variety of trade answers. (Johnson, 2005) Technological growth has always been a major manner for FedEx to add value since it can cut costs along by means of creating novel manners of finding competitive benefits. Lastly, FedExs improving in addition to transforming of the organizational structure over the last few years has added value. By developing different subsidiaries all operating under the FedEx brand name has organized the business down by means of improving the communication inside the business as of one division to another. (De Wit, 2004) The ability to keep up by means of e-trades will depend on how well a business can keep up by means of novel emerging technologies. FedEx has transformed into an e-trade by improving several of its core competencies. On January 19, 2000, FedEx announced a novel branding strategy that resulted in the transform of the businesss name to FedEx Corporation as well as extended this FedEx name to four of its five subsidiary companies. FedExs strategy was to take advantage of its brand image, the name that clients have counted on for reliable service plus cutting edge technology. The transformation created an integrated set of trade answers. Clients will just need to deal by means of one business for all its supply chain, logistics, moreover delivery needs. This offered a single point of access to client service, billing, sales furthermore automation systems. Each business under the FedEx umbrella operates independently however competes collectively. The novel organization is geared to assis t trades of all sizes in achieving their goals. (Johnson, 2005) Mission: FedEx Corporation will produce superior financial returns for its shareowners by providing high value-added logistics; transportation furthermore related information services through focused operating companies. Client requirements will be met in the highest quality manner appropriate to each market segment served. FedEx Corporation will strive to develop mutually rewarding relationships by means of its employees, partners plus suppliers. Safety will be the first consideration in all operations. Corporate activities will be conducted to the highest ethical as well as professional standards. (Lynch, 2006) Problems: FedExs strategy was to capitalize on the growth of e-trade moreover aimed at integrating its physical transportation by means of its virtual information infrastructures to create a large matrix of systems that meets the needs of trades ranging as of transportation services to complete supply chain management answers. FedEx has taken a client focused approach in addition to all systems are cantered on the client. The process of building the systems furthermore technology infrastructure was the first step in the transformation. Next, was the integration of trade processes into these systems? (Lynch, 2006) This was not an easy task moreover required expertise in logistics plus supply chain management. FedEx was following the technology age taking place in our country at this time as well as piggy backed on the growing e-trade market. The final step is for FedEx to transform its trade furthermore make people aware of the innovations and advancement. (Lynch, 2006) Political: FedEx conducts its trade internationally moreover therefore is required to follow international laws, rules furthermore regulations. FedEx will not carry shipments, which are in violation of any U.S. export laws. As by means of all shipping companies, they will not assume liability for any loss or expense, including, however not limited to, fines in addition to penalties, due to failure to comply by means of export laws or regulations relating to the export, import or movement goods at central hub locations, FedEx employees work jointly by means of U.S. Customs officials to prevent contraband as well as restricted items as of entering plus leaving the U.S. FedEx has initiated strict shipping guidelines furthermore know ones client rules, in conjunction by means of law enforcement, to deter moreover prevent the movement of dangerous furthermore deadly agents into the U.S. They screen packages for illegal currency and monetary instrument shipments in violation of the Bank Secrecy Act r eporting requirements. (Lynch, 2006) Economic: FedEx Corporation has grown as of a package mover to the leading transportation offer in the world. It was the first to establish critical factors to transform a conventional trade into an e-trade. FedEx developed a global network which offers services beyond transportation, including full service management tools plus support. FedEx led the manner in the deregulation of the transportation industry, which resulted in economic competition in addition to a decrease of transportation costs as of 7.4 % of GDP in 1980 to 6% of GDP in 1999. It employed 166,000 full-time furthermore part-time workers in the United States in 2000, by means of a payroll as well as benefits of  £7.2 billion. The direct and indirect employment impact of FedEx operations is over 550,000 jobs, or around 1 in every 270 jobs in the United States. The businesss revenues exceeded  £18 billion in fiscal year 2000 while the combined direct plus indirect output produced by FedEx activities totalled approximately  £53 billion. The number of export packages transported by FedEx has been growing steadily over 15 percent. FedEx has tripled its market share over the last seven years. The value of these exports has in addition augmented 300 percent, an annual average of over 22% while during the same period U.S. exports just augmented 50%, a 7% annual augment. The evolution moreover success of FedEx has had a multiplier effect on the U.S. economy. It continues to make technological furthermore operational advances that are impacting on global markets as well. (Johnson, 2005) Socio-cultural: FedEx has established that it cares very much regarding the global community. It uses its resources to assist thousands of organizations throughout the world. Their aircraft furthermore vehicles deliver tons of aid to disaster sites. Employees volunteer countless hours to make their communities better places to live, play, in addition to work. FedEx gives financial support to assist ensures childrens safety as well as improve education. FedEx is committed to all their employees and the communities in which they live. They demonstrate this by offering financial support plus volunteer support for charities that promote educational, artistic moreover cultural, civic furthermore humanitarian well being. (De Wit, 2004) Technological: The FedEx Corporation has made massive strides in technology and is setting the industry standard for competence furthermore client service. FedEx has sought technological advances in response to client needs, and has excelled in anticipating as well as projecting demands of an environment that would depend plus thrive on information. The technology FedEx has developed enables clients in addition to support personnel to have wireless access to essential information systems networks anytime moreover anywhere. FedEx was the first to integrate wireless technology further than two decades ago, furthermore continues to develop and lead the industry in developing innovative wireless answers. (De Wit, 2004) FedEx has long been in the forefront in recognizing the potential of the Internet to offer fast, easy furthermore convenient service options for its clients. In 1994, the FedEx Web site was launched by means of a bold package tracking application that was no doubt one of the first true corporate Web services. FedEx turned out to be the first transportation business by means of a web site offering a feature that allowed clients to generate their own unique bar-coded shipping labels moreover contact couriers to pick up shipments. The web site today handles over 1.1 million package-tracking requests daily. Further than 2.5 million clients connect by means of the business electronically everyday as well as electronic transactions account for two-thirds of the five million shipments FedEx delivers daily. The web site is acclaimed in the trade community for its speed, ease of employ plus client-focused features. (Lynch, 2006) Global: The international market place is by far the businesss most prominent growth opportunity. The FedEx global story began by means of the growth of FedEx Express, which today covers further than 210 countries by means of quick, reliable express transportation. FedEx has been a leader in the global economy, offering clients further choices and further places. The family of companies representing FedEx operates hubs all over the world, giving clients limitless opportunities to expand their client base. (Johnson, 2005) FedEx Trade Networks offers global e customs clearance in the U.S. in addition to Canada, offers freight forwarding services that connect the U.S. furthermore Canada by means of Asia, Europe, Latin America moreover other major international regions. FedEx Supply Chain Services leverages the global transportation in addition to information networks of the FedEx companies as well as their affiliates to offer international supply chain management answers to clients in North America, South America, Europe, and Asia. (Ward, 2006) Competitive Environment The competitive environment is made up of the life cycle stage, competitors, key success factors, plus Porters 5 forces. FedEx is still in the growth stage of the life cycle. There are few competitors in the postal service plus delivery industry. Top Competitor: UPS The United Parcel Service was founded in 1907 inside the United States. Today UPS is a  £30 billion business that focuses on enabling commerce around the planet. UPS is one of the most recognized plus admired brands in the world on top of express carrier and package delivery. UPS is a leading offer of specialized transportation, logistics, capital, plus e-commerce services. UPS is involved in further than 200 countries worldwide. (De Wit, 2004) UPS Internet Shipping is ones fastest in addition to most convenient shipping answer on the Web. Access the industrys widest array of shipping options right as of ones computer. UPS Internet Shipping offers several key benefits including: Store up to 300 addresses in Address Book Access shipment details plus tracking data for up to 90 days Customize preferences for fast, easy shipping Shipping software not required nothing to install Strategic Analysis: Most carrier firms emphasize the same strategic dimensions furthermore employ similar strategies moreover that once common strategy that is the carrier trade is the high investment in research and growth in order to develop better technologies. In the trade, firms by means of the best technology tend to have a higher market share and this can be seen as a competitive advantage. (Johnson, 2005) Key Success Factors: The key success factors for FedEx trade is technology. This is what makes a business run as well as ultimately makes the money for the business. Another key success factor is marketing. People need to be familiar by means of the carriers names in addition to services so they have trust in the quality of the service offered. The further a parcel carrier is globalization; the better success it will have when it comes to international deliveries. International deliveries are costly plus there are just a few carriers that can offer total global delivery services furthermore this might be a competitive advantage. Client service is very significant; carriers need to keep the clients satisfied by means of the service so they continue to come back moreover employ the service. (De Wit, 2004) Value Chain Analysis Identification of Core Competence Primary activities: Inbound logistics- handling and storing of products to be shipped. Operations- shipping products, logistics, value chain analysis, financial analysis, handling orders, checking orders. Outbound logistics- delivery of the products, receiving payment. Marketing furthermore Sales- develop a positive image of the business making people feel comfortable plus satisfied by means of the product. Service- Concentrates on client satisfaction, doing anything that satisfies the clients. Support Activities: Procurement- purchasing, trucks, planes, gas in addition to other assets Technology growth- investments in systems innovation, research moreover growth and information technology HR management- hiring, training, developing and compensating employees as of truck drivers to top-level management Firm infrastructure- General management, planning, accounting, legal support, government regulations, required to support the value chain Global distribution involves managing not just the movement of goods, however in addition the flow of information furthermore finance that moves by means of the goods. A FedEx supply chain answer is a streamlined organization as well as that one core competency leads to another it is a continuous flow. (Stacey, 1996) SWOT Analysis: Strengths: Market Leader Number one in the International Air Express Industry They had a head start in the trade Can clear customs faster allowing shipments to avoid delays Weakness: Major competitors and its operations Growth demand Opportunities: Expand into further countries Buy further planes plus trucks to deliver further packages faster Start delivering further heavy weight cargo Improve ground delivery Upgrading distribution in addition to logistic services Threats: Competitors that offer better prices, faster travel time Clients stop buying products Gas Prices can rise that will have an impact on the prices Five Forces Model: Threat of Novel Entrants: The threat of novel entrants is low in the parcel industry. It is low for the reason that it is very expensive to get involved in the industry. Starts up costs are high. It is expensive to have the services that are equal to that of FedEx moreover the other competitors. (Lynch, 2006) Bargaining Power of Suppliers: The bargaining power of suppliers is high. It is high for the reason that when looking at the items that the parcel industry employ such as, planes, computers, furthermore vehicles. If FedEx is not on good relations by means of these people, the costs can augment drastically. (Ward, 2006) Bargaining Power of Buyers: The buyers have a very strong bargaining power. They have the ability to switch their user to one of the other members of the industry at any time. It is the job of FedEx to make sure that the client is always happy. It comes as no extra cost to the buyer to switch their parcel delivery business. The just lose that is really suffered comes at the expense of the business for losing a client. (Whittington, 2000) Product Substitutes: It is very easy to substitute a delivery service. There are not several out there however the ones that are well established in the eyes of the client and the industry. It would not be a complex task to switch one business for another. Since this is the case, FedEx has to maintain good client relations by means of their clients. (Stacey, 1996) Intensity of Rivalry: The parcel industry is an intense industry. There are five main players in the industry competing for market share. The features that they are competing on are the speed of delivery, the competence of the delivery, furthermore prices. If one can create a successful mix of the three of those factors, one will hold the greatest market share. (Lynch, 2006) FedEx has turn out to be a major technology user. The employ of IT to its trade enabled FedEx to surpass the rest of the industry as well as acknowledge Fred Smith as the visionary who forced his plus other companies to think outside the proverbial one. He rationed that the business have to acquire its own transportation fleet while competitors were buying space on commercial airlines moreover sub-contracting their shipments to third parties, reliable on its overnight delivery commitments, an image that has turn out to be fundamental to FedExs overall success. The introduction of novel technology allowed FedEx to install further than 100,000 sets of PCs by means of its software, allowing clients to be linked in addition to logged into their ordering and tracking system. The emergence of PCs loaded by means of FedEx software transformed the client base into an electronic network. Information enables corporate clients to tighten their order-to-delivery cycle, exercise just-in-time (JIT ) inventory management furthermore synchronize production levels to market demand. FedExs quality of service turned out to be synonymous by means of the quality of the information offered to its workforce. (Johnson, 2005) FedEx has enhanced information management in terms of being able to identify the critical factors involved by means of success of an e-trade. It has successfully transformed as of a conventional trade into an advanced e-trade in its network economy. FedEx has succeeded in several areas including: visionary leadership in the application of novel technologies, defining the information infrastructure, integrating internal processes, and aligning the organizational structure for maximum benefits. FedExs key strategy was client service furthermore for its clients to adapt into its novel information technology. FedEx harnessed its novel technologies plus extended the electronic trade to all of its clients. FedEx has developed this technology moreover made it possible for its clients to connect by means of them in any manner the client chooses. The restructuring of FedEx addressed several processes however in exacting the integration of logistics as well as supply chain management proved to be most successful. The enabled FedEx to cut inventory levels, reduce costs as well as shortening order-cycle time. This is a key for FedEx to improve the quality of service they offered to their clients. (Mintzberg, 1998) FedEx has laid out a vast matrix of transportation in addition to information networks that will offer them by means of a huge competitive advantage for some time. To function as e-trade Business will need to turn out to be increasingly client/answers focused. All processes have to be integrated to ensure a unified client centred front that offers services throughout the value chain, logistics, and parcel carrier trade. FedExs novel restructuring will serve their clients as well as apply novel technologies constantly to improve their response time and the value of the information they offer. FedEx will continue to build, innovate, furthermore exploit technologies as of the successful base they have created and will be on top of the industry for a long time to come. FedEx can be classed as an innovator in its field, being the first business to introduce several of the technologies furthermore processes that are worn in the courier trade today. Innovation can be seen as a context-speci fic process of invention, diffusion, adoption in addition to implementation. (Lynch, 2006) FedEx management understands the strategic significance of innovation plus has forged links to create the FedEx Technology Institute. .FedEx has in addition shown a strong trend for technological innovation. This means that the business is not always reactive to competition; rather they often force the competition to follow their lead. This gives FedEx a competitive edge, moreover in addition continues to ensure that the FedEx brand-name is well respected. (De Wit, 2004) Challenges Faced: While carrying out this task the experiences that were face while used the analytical tools and techniques introduced in the module were really very fruitful and I came across situations where I felt that I really am an employee of the organization and felt the situation the organization was facing and going through. And the techniques introduced and taught in the module enabled me to think about the solutions that might help the organization. The advancement in the nature of the techniques introduced in the module and the way the over all modules was organized throughout it really enabled me to understand the situations an organization may go through during its business process. This was a great experience as along with focusing on the task I also practiced and learned how to search and go through different sources more efficiently in order to complete a task.

Friday, October 25, 2019

The Road Not Taken and the Journey of Life :: Road Not Taken essays

The Road Not Taken and the Journey of Life This poem by Robert Frost was first read to me in the last year of my high school experience. Back then, not only did I have absolutely no interest in any literary work, but moreover, had no intension to lye there and analyze a poem into its symbolic definitions. Only now have I been taught the proper way to read a literary work as a formalistic critic might read. With this new approach to literature I can understand the underlying meaning to Robert Frost's "The Road Not Taken". In addition to merely grasping the author's intension, I was able to justly incur that this poem, without directly mentioning anything about life's decisions, is in its entirety about just that. Robert Frost interpreted most of the decisions we make in life into this twenty-line poem of a man choosing which path to take in a "yellow wood". Everyday I make a decision to do a certain task, take that certain walk, or to sit at home and do absolutely nothing. Being one person, I can never know for sure what the exact outcome might be if I were to choose the other decision. For instance, I take a leisurely walk every night and I sacrifice my time to do something else. Although this may not always account to me personally, I do sometimes think what the other choice may have brought me. And often times, I complete the task with a sense of relief, a "sigh" perhaps, that the choice I made turned to be a well-made decision. Though most people rarely look into the sacrifice of decision making the way Robert Frost does, it is indeed a highly examined way too understand "a path less traveled by". The first stanza introduced the reader to the decision the author would have to make. "Two roads diverged in a yellow wood" to me signified that the result of his decision would arise from the same origin to which in my own life, I can reflect on. And though he would like to have seen the outcome of both paths, he knew he could only choose one. And to help him decide, he would look down both choices and see only until the road took a bend.

Thursday, October 24, 2019

Vampire Academy Chapter 1

ONE I FELT HER FEAR BEFORE I heard her screams. Her nightmare pulsed into me, shaking me out of my own dream, which had had something to do with a beach and some hot guy rubbing suntan oil on me. Images – hers, not mine – tumbled through my mind: fire and blood, the smell of smoke, the twisted metal of a car. The pictures wrapped around me, suffocating me, until some rational part of my brain reminded me that this wasn't my dream. I woke up, strands of long, dark hair sticking to my forehead. Lissa lay in her bed, thrashing and screaming. I bolted out of mine, quickly crossing the few feet that separated us. â€Å"Liss,† I said, shaking her. â€Å"Liss, wake up.† Her screams dropped off, replaced by soft whimpers. â€Å"Andre,† she moaned. â€Å"Oh God.† I helped her sit up. â€Å"Liss, you aren't there anymore. Wake up.† After a few moments, her eyes fluttered open, and in the dim lighting, I could see a flicker of consciousness start to take over. Her frantic breathing slowed, and she leaned into me, resting her head against my shoulder. I put an arm around her and ran a hand over her hair. â€Å"It's okay,† I told her gently. â€Å"Everything's okay.† â€Å"I had that dream.† â€Å"Yeah. I know.† We sat like that for several minutes, not saying anything else. When I felt her emotions calm down, I leaned over to the nightstand between our beds and turned on the lamp. It glowed dimly, but neither of us really needed much to see by. Attracted by the light, our housemate's cat, Oscar, leapt up onto the sill of the open window. He gave me a wide berth – animals don't like dhampirs, for whatever reason – but jumped onto the bed and rubbed his head against Lissa, purring softly. Animals didn't have a problem with Moroi, and they all loved Lissa in particular. Smiling, she scratched his chin, and I felt her calm further. â€Å"When did we last do a feeding?† I asked, studying her face. Her fair skin was paler than usual. Dark circles hung under her eyes, and there was an air of frailty about her. School had been hectic this week, and I couldn't remember the last time I'd given her blood. â€Å"It's been like? ­more than two days, hasn't it? Three? Why didn't you say anything?† She shrugged and wouldn't meet my eyes. â€Å"You were busy. I didn't want to – â€Å" â€Å"Screw that,† I said, shifting into a better position. No wonder she seemed so weak. Oscar, not wanting me any closer, leapt down and returned to the window, where he could watch at a safe distance. â€Å"Come on. Let's do this.† â€Å"Rose – â€Å" â€Å"Come on. It'll make you feel better.† I tilted my head and tossed my hair back, baring my neck. I saw her hesitate, but the sight of my neck and what it offered proved too powerful. A hungry expression crossed her face, and her lips parted slightly, exposing the fangs she normally kept hidden while living among humans. Those fangs contrasted oddly with the rest of her features. With her pretty face and pale blond hair, she looked more like an angel than a vampire. As her teeth neared my bare skin, I felt my heart race with a mix of fear and anticipation. I always hated feeling the latter, but it was nothing I could help, a weakness I couldn't shake. Her fangs bit into me, hard, and I cried out at the brief flare of pain. Then it faded, replaced by a wonderful, golden joy that spread through my body. It was better than any of the times I'd been drunk or high. Better than sex – or so I imagined, since I'd never done it. It was a blanket of pure, refined pleasure, wrapping me up and promising everything would be right in the world. On and on it went. The chemicals in her saliva triggered an endorphin rush, and I lost track of the world, lost track of who I was. Then, regretfully, it was over. It had taken less than a minute. She pulled back, wiping her hand across her lips as she studied me. â€Å"You okay?† â€Å"I? ­yeah.† I lay back on the bed, dizzy from the blood loss. â€Å"I just need to sleep it off. I'm fine.† Her pale, jade-green eyes watched me with concern. She stood up. â€Å"I'm going to get you something to eat.† My protests came awkwardly to my lips, and she left before I could get out a sentence. The buzz from her bite had lessened as soon as she broke the connection, but some of it still lingered in my veins, and I felt a goofy smile cross my lips. Turning my head, I glanced up at Oscar, still sitting in the window. â€Å"You don't know what you're missing,† I told him. His attention was on something outside. Hunkering down into a crouch, he puffed out his jet-black fur. His tail started twitching. My smile faded, and I forced myself to sit up. The world spun, and I waited for it to right itself before trying to stand. When I managed it, the dizziness set in again and this time refused to leave. Still, I felt okay enough to stumble to the window and peer out with Oscar. He eyed me warily, scooted over a little, and then returned to whatever had held his attention. A warm breeze – unseasonably warm for a Portland fall – played with my hair as I leaned out. The street was dark and relatively quiet. It was three in the morning, just about the only time a college campus settled down, at least somewhat. The house in which we'd rented a room for the past eight months sat on a residential street with old, mismatched houses. Across the road, a streetlight flickered, nearly ready to burn out. It still cast enough light for me to make out the shapes of cars and buildings. In our own yard, I could see the silhouettes of trees and bushes. And a man watching me. I jerked back in surprise. A figure stood by a tree in the yard, about thirty feet away, where he could easily see through the window. He was close enough that I probably could have thrown something and hit him. He was certainly close enough that he could have seen what Lissa and I had just done. The shadows covered him so well that even with my heightened sight, I couldn't make out any of his features, save for his height. He was tall. Really tall. He stood there for just a moment, barely discernible, and then stepped back, disappearing into the shadows cast by the trees on the far side of the yard. I was pretty sure I saw someone else move nearby and join him before the blackness swallowed them both. Whoever these figures were, Oscar didn't like them. Not counting me, he usually got along with most people, growing upset only when someone posed an immediate danger. The guy outside hadn't done anything threatening to Oscar, but the cat had sensed something, something that put him on edge. Something similar to what he always sensed in me. Icy fear raced through me, almost – but not quite – eradicating the lovely bliss of Lissa's bite. Backing up from the window, I jerked on a pair of jeans that I found on the floor, nearly falling over in the process. Once they were on, I grabbed my coat and Lissa's, along with our wallets. Shoving my feet into the first shoes I saw, I headed out the door. Downstairs, I found her in the cramped kitchen, rummaging through the refrigerator. One of our housemates, Jeremy, sat at the table, hand on his forehead as he stared sadly at a calculus book. Lissa regarded me with surprise. â€Å"You shouldn't be up.† â€Å"We have to go. Now.† Her eyes widened, and then a moment later, understanding clicked in. â€Å"Are you? ­really? Are you sure?† I nodded. I couldn't explain how I knew for sure. I just did. Jeremy watched us curiously. â€Å"What's wrong?† An idea came to mind. â€Å"Liss, get his car keys.† He looked back and forth between us. â€Å"What are you – â€Å" Lissa unhesitatingly walked over to him. Her fear poured into me through our psychic bond, but there was something else too: her complete faith that I would take care of everything, that we would be safe. Like always, I hoped I was worthy of that kind of trust. She smiled broadly and gazed directly into his eyes. For a moment, Jeremy just stared, still confused, and then I saw the thrall seize him. His eyes glazed over, and he regarded her adoringly. â€Å"We need to borrow your car,† she said in a gentle voice. â€Å"Where are your keys?† He smiled, and I shivered. I had a high resistance to compulsion, but I could still feel its effects when it was directed at another person. That, and I'd been taught my entire life that using it was wrong. Reaching into his pocket, Jeremy handed over a set of keys hanging on a large red key chain. â€Å"Thank you,† said Lissa. â€Å"And where is it parked?† â€Å"Down the street,† he said dreamily. â€Å"At the corner. By Brown.† Four blocks away. â€Å"Thank you,† she repeated, backing up. â€Å"As soon as we leave, I want you to go back to studying. Forget you ever saw us tonight.† He nodded obligingly. I got the impression he would have walked off a cliff for her right then if she'd asked. All humans were susceptible to compulsion, but Jeremy appeared weaker than most. That came in handy right now. â€Å"Come on,† I told her. â€Å"We've got to move.† We stepped outside, heading toward the corner he'd named. I was still dizzy from the bite and kept stumbling, unable to move as quickly as I wanted. Lissa had to catch hold of me a few times to stop me from falling. All the time, that anxiety rushed into me from her mind. I tried my best to ignore it; I had my own fears to deal with. â€Å"Rose? ­what are we going to do if they catch us?† she whispered. â€Å"They won't,† I said fiercely. â€Å"I won't let them.† â€Å"But if they've found us – â€Å" â€Å"They found us before. They didn't catch us then. We'll just drive over to the train station and go to L.A. They'll lose the trail.† I made it sound simple. I always did, even though there was nothing simple about being on the run from the people we'd grown up with. We'd been doing it for two years, hiding wherever we could and just trying to finish high school. Our senior year had just started, and living on a college campus had seemed safe. We were so close to freedom. She said nothing more, and I felt her faith in me surge up once more. This was the way it had always been between us. I was the one who took action, who made sure things happened – sometimes recklessly so. She was the more reasonable one, the one who thought things out and researched them extensively before acting. Both styles had their uses, but at the moment, recklessness was called for. We didn't have time to hesitate. Lissa and I had been best friends ever since kindergarten, when our teacher had paired us together for writing lessons. Forcing five-year-olds to spell Vasilisa Dragomir and Rosemarie Hathaway was beyond cruel, and we'd – or rather, I'd – responded appropriately. I'd chucked my book at our teacher and called her a fascist bastard. I hadn't known what those words meant, but I'd known how to hit a moving target. Lissa and I had been inseparable ever since. â€Å"Do you hear that?† she asked suddenly. It took me a few seconds to pick up what her sharper senses already had. Footsteps, moving fast. I grimaced. We had two more blocks to go. â€Å"We've got to run for it,† I said, catching hold of her arm. â€Å"But you can't – â€Å" â€Å"Run.† It took every ounce of my willpower not to pass out on the sidewalk. My body didn't want to run after losing blood or while still metabolizing the effects of her saliva. But I ordered my muscles to stop their bitching and clung to Lissa as our feet pounded against the concrete. Normally I could have outrun her without any extra effort – particularly since she was barefoot – but tonight, she was all that held me upright. The pursuing footsteps grew louder, closer. Black stars danced before my eyes. Ahead of us, I could make out Jeremy's green Honda. Oh God, if we could just make it – Ten feet from the car, a man stepped directly into our path. We came to a screeching halt, and I jerked Lissa back by her arm. It was him, the guy I'd seen across the street watching me. He was older than us, maybe mid-twenties, and as tall as I'd figured, probably six-six or six-seven. And under different circumstances – say, when he wasn't holding up our desperate escape – I would have thought he was hot. Shoulder-length brown hair, tied back in a short ponytail. Dark brown eyes. A long brown coat-a duster, I thought it was called. But his hotness was irrelevant now. He was only an obstacle keeping Lissa and me away from the car and our freedom. The footsteps behind us slowed, and I knew our pursuers had caught up. Off to the sides, I detected more movement, more people closing in. God. They'd sent almost a dozen guardians to retrieve us. I couldn't believe it. The queen herself didn't travel with that many. Panicked and not entirely in control of my higher reasoning, I acted out of instinct. I pressed up to Lissa, keeping her behind me and away from the man who appeared to be the leader. â€Å"Leave her alone,† I growled. â€Å"Don't touch her.† His face was unreadable, but he held out his hands in what was apparently supposed to be some sort of calming gesture, like I was a rabid animal he was planning to sedate. â€Å"I'm not going to – â€Å" He took a step forward. Too close. I attacked him, leaping out in an offensive maneuver I hadn't used in two years, not since Lissa and I had run away. The move was stupid, another reaction born of instinct and fear. And it was hopeless. He was a skilled guardian, not a novice who hadn't finished his training. He also wasn't weak and on the verge of passing out. And man, was he fast. I'd forgotten how fast guardians could be, how they could move and strike like cobras. He knocked me off as though brushing away a fly, and his hands slammed into me and sent me backwards. I don't think he meant to strike that hard – probably just intended to keep me away – but my lack of coordination interfered with my ability to respond. Unable to catch my footing, I started to fall, heading straight toward the sidewalk at a twisted angle, hip-first. It was going to hurt. A lot. Only it didn't. Just as quickly as he'd blocked me, the man reached out and caught my arm, keeping me upright. When I'd steadied myself, I noticed he was staring at me – or, more precisely, at my neck. Still disoriented, I didn't get it right away. Then, slowly, my free hand reached up to the side of my throat and lightly touched the wound Lissa had made earlier. When I pulled my fingers back, I saw slick, dark blood on my skin. Embarrassed, I shook my hair so that it fell forward around my face. My hair was thick and long and completely covered my neck. I'd grown it out for precisely this reason. The guy's dark eyes lingered on the now-covered bite a moment longer and then met mine. I returned his look defiantly and quickly jerked out of his hold. He let me go, though I knew he could have restrained me all night if he'd wanted. Fighting the nauseating dizziness, I backed toward Lissa again, bracing myself for another attack. Suddenly, her hand caught hold of mine. â€Å"Rose,† she said quietly. â€Å"Don't.† Her words had no effect on me at first, but calming thoughts gradually began to settle in my mind, coming across through the bond. It wasn't exactly compulsion – she wouldn't use that on me – but it was effectual, as was the fact that we were hopelessly outnumbered and outclassed. Even I knew struggling would be pointless. The tension left my body, and I sagged in defeat. Sensing my resignation, the man stepped forward, turning his attention to Lissa. His face was calm. He swept her a bow and managed to look graceful doing it, which surprised me considering his height. â€Å"My name is Dimitri Belikov,† he said. I could hear a faint Russian accent. â€Å"I've come to take you back to St. Vladimir's Academy, Princess.†

Tuesday, October 22, 2019

American National Government

What a piece of writing must that be, one inevitably thinks, the story which contributes to and precedes by two months the scandalous fall of a President. All the President’s Men is the real account of Washington Post’s two young reporters, Carl Bernstein and Bob Woodward who conducted two years of investigations to untie the Gordian knot and eventually expose of a very complicated political conspiracy mounting up to the Chief of State.The actual report starts one sunny Saturday in the Capital in 1974, when the two authors have started working on the topic of the Watergate break-in and develops into a broad inquiry through the political fraud and crimes that lead to the resignation of the then president Richard Nixon and his administration. Even though narrated in a simple and succinct manner, almost telegraphic, the story astonished me because of the huge bid of the search and the courage of taking it to its end, the chain-reaction it provoked, which obviously disrupte d the political life of the US and fired up the world’s public opinion.Placing it in real-time, we see that President Nixon resigned two months after the story was published. Carl Bernstein & Bob Woodward’s investigation was altogether a great factor which contributed to the disclosure of a dirty business including money laundering, fraudulent electoral campaign, illegal wiretapping and other crimes that contravene to the very principles of the American Constitution and the Governmental establishment, and to the values of democracy in total.Undoubtedly, the sum of notes, papers and inquiries that the two reporters have gathered for the two-year coverage in The Washington Post has given birth to a book full of suspense, easy to read for the less initiated, full of insight into the political machinations and hierarchies at the White House and other organisms like CIA and FBI. The true story was awarded the Pulitzer price and inspired a very faithful cinematographic adapt ation in 1976, which in my opinion respects exactly the long and thorough problem-solving demarche of the two reporters through a net of hundreds and hundreds of leads.What I liked is the rhythm of the story and the perfume of the time. It is astounding to read the original chronicles of a journalistic investigation that made so much difference in the political and administrative life of the United States. At first, I found it a good, fast-paced detective story that appeals to the adventurer hidden in any of us, featuring a burglary intrigue and two â€Å"ordinary† heroes describing their obstinate effort to penetrate a very scary wall of silence that lead higher that either of them had imagined.Until then, it was like all good detectives normally do. But some dozen pages later, the heavy responsibility of the whole account struck me. I mean, as foreigner, this gave me a very crude and abrupt insight into the ramifications of the American administration seen through the eyes of professional journalists at that time, without much of introduction or decryption. This could account for a negative point, the rapidity of the narration, if the book had been meant to be didactic, not informational: a snapshot of the event.And because it was written at a time when this scandal grew to be central to the daily life of Americans, it achieves a role that I find essential for a very good documentary: the pulse of the time, the organisms of decision, the power structures and pressure games, the small hassles at the Post’s headquarters etc. Even though I had some notion about the affair before, the book launched me into a roller-coaster ride into the world of politics, newspaper journalism and communications.Before reading it as a sensational story, for me it was a manual of journalistic methodology and intuition. I particularly liked considering the ethical issues of such a public-related endeavor and the responsibility towards the audience, sources and actors, the dedicated meticulousness in working their way through this spider web of secret connections and political protocols. But overall, I found particularly inspiring the unequal buildup of the whole scheme up to the final takeover.There are several stages where Woodward and Bernstein’s findings give butterflies in the stomach, like discovering that one of the Watergate intruders was a CIA security agent, or when the two reporters meet the secretive agent â€Å"Deep-Throat†, and then when they publish the findings of the FBI regarding the greater scope of the burglary, which was in fact a huge misappropriation of funds, sabotage meant to create funds for Nixon’s reelection. And even though this book is not written in a pedagogical manner, the facts speak for themselves beyond any morals or heavy conclusions.As their echo proves, the articles, book and then the movie they inspired created a completely new approach to America’s institutions and, most probabl y, raised a great questioning mark over the political regimes worldwide. Taking up by the traces it left, I believe â€Å"All the President’s Men† managed to prove that any earthly institution is deeply questionable and may be biased or fraudulent despite its ideology. However, from a historical point of view, the book further shows that these regimes are savable provided the freedom of speech and research is allowed.The very principle of democracy is that each individual has the privilege and the duty to contribute for the collective well-being, and so they can become agents of change, when irregularities happen. I deeply believe this book stimulates such awareness and, why not, the reflex to keep one’s eye open and act with abnegation when needed. In consequence, the papers make an excellent material for our American National Government course because it provides a very strong case study of the American federal scheme of government and its potential breaches.I t underlines how the 4th state power, the mass media, can contribute to the regulation of an eventually corrupted system by rendering it transparent. We also have a very intricate access to very confidential information and behind the scene leads in the governmental hive. Because I come from a different culture, I esteemed the way this story, written with modesty, reveals the power of the press within American political process, as well as the power of the individual(s) within the hierarchies of power.The determination, perseverance of the two reporters, even after hitting apparent dead-ends lead to a huge mobilization of forces and a substantial change. In accordance, I would like to mention the patriotism of the veteran â€Å"Deep Throat†, revealed after more than 30 years of confidentiality as â€Å"FBI ‘s No. 2† official, W. Mark Felt† . This is an example of a personal belief initiative taken despite the great threats, without which the whole story cou ld have passed unproven.Wondering about the real contribution of Felt, I came about the statement of the two reporters in a 2005 Washington Post article. According to article’s author David Von Drehle’s, â€Å"Woodward and Bernstein expressed a concern that the Deep Throat story has, over the years, come to obscure the many other elements that went into exposing the Watergate story: other sources, other investigators, high-impact Senate hearings, a shocking trove of secret White House tape recordings and the decisive intervention of a unanimous U.S. Supreme Court. † To my understanding, Bob Woodward and Carl Bernstein have been very aware of the boom their investigation would consequently incite. There followed a great chain-reaction by which the juridical power, the intelligence services and other institutions have equally contributed to the making of the complete case against the President and his administration, through extensive legal procedures. For me, thi s is in a sense a revolution.It is a revolution because the corruption and the anti-constitutional deeds are denounced to the public opinion and, even though this mounts up to the head of the state, the guilty part finishes exposed, with reprimands in accordance. Even though this book has been written in a short and snappy manner, without personal elaboration or explanations, it surely reconstructs the pulse of the time and the dramatic beat of the ascending inquiry. Personally, I feel I had been dragged also in the â€Å"present tense† of the best politics& detective story of the passed century.Even though the authors do not make any deep analysis either about the power structures they touch, or about the consequences of their investigation, it remains a grand dissertation-scenario of the changing nature of political actions and the particular framework of the state powers during the time of Nixon and beyond. References: Bernstein, Carl; Woodward, Bob. â€Å"All the Preside nt`s Men†. New York: Simon & Schuster, 2006. Von Drehle, David. â€Å"FBI's No. 2 Was ‘Deep Throat'†. June 1, 2005; Page A01. Washington Post. 8 Sept. 2007 < http://www. washingtonpost. com/wp-dyn/content/article/2005/05/31/AR2005053100655. html >

Globbing a Directory in Perl

Globbing a Directory in Perl Its very simple to print a list of all files in a directory using the built-in Perl glob function. Lets look over a short script that globs and prints a list of all files, in the directory containing the script itself. Examples of the Perl Glob Function #!/usr/bin/perl -w files *; foreach $file (files) {   Ã‚  print $file . \n; } When you run the program, youll see it output the filenames of all files in the directory, one per line. The glob is happening on the first line, as the * characters pulls the filenames into the files array. files *; Then you simply use a foreach loop to print out the files in the array. You can include any path in your filesystem between the marks. For example, say your website is in the /var/www/htdocs/ directory and you want a list of all the files: files /var/www/htdocs/*; Or if you just want a list of the files with the extension .html: files /var/www/htdocs/*.html;

Sunday, October 20, 2019

Free Essays on One Flew Over The Cuckoos Nest- Chief Bromdens Journey To Freedom And Sanity

Page 1 One Flew Over the Cuckoo’s Nest Chief Bromden’s Journey to Freedom and Sanity In the novel One Flew Over the Cuckoo’s Nest by Ken Kesey, the narrator, Chief Bromden, is set out on a journey to achieve sanity. The effects of patient McMurphy’s strong-willed personality helped the Chief to overcome the harsh emotional treatment that has been laid on him in the past, and exposes him to the truth behind Nurse Ratched and the â€Å"Combine.† Kesey portrays McMurphy as a Christ like figure throughout the novel, giving Chief the strength and hope he posses. McMurphy helps Chief grow into a strong, self-reliant character. In most of the novel, Chief is extremely paranoid and fearful of everything. Even though in actuality Chief is over six and a half feet tall, he considers himself small and weak. One night, when he first begins to speak to McMurphy about how he isn’t big, he says, â€Å"I’m way too little. I used to be big, but no more. You’re twice the size of me.† (Page 186.) Chief’s lack of self-esteem is due to his mother, an overbearing white woman who contributed to ruining his father and making him into a powerless alcoholic. She, and others throughout the book (for example, the government who took away his father’s land), forced Chief into invisibility. Chief witnessed his father waste away, as he was robbed of things he once was passionate about. On page 187, Chief talks about his father: â€Å"But he was too little anymore. And he was too drunk, too. The Combine has whipped him. It beats everybody. It’ll beat you too. They can’t have somebody as big as Papa running around unless he’s one of them. You can see that.† Chief is scared that Nurse Ratched and the Combine will soon destroy him, as the government and mother did his father. McMurphy takes it upon himself to make Chief â€Å"big† again by bringing to Chief’s attention the way he has â€Å"grown.† For instance, on page 225, â€Å"’By God... Free Essays on One Flew Over The Cuckoo's Nest- Chief Bromdens Journey To Freedom And Sanity Free Essays on One Flew Over The Cuckoo's Nest- Chief Bromdens Journey To Freedom And Sanity Page 1 One Flew Over the Cuckoo’s Nest Chief Bromden’s Journey to Freedom and Sanity In the novel One Flew Over the Cuckoo’s Nest by Ken Kesey, the narrator, Chief Bromden, is set out on a journey to achieve sanity. The effects of patient McMurphy’s strong-willed personality helped the Chief to overcome the harsh emotional treatment that has been laid on him in the past, and exposes him to the truth behind Nurse Ratched and the â€Å"Combine.† Kesey portrays McMurphy as a Christ like figure throughout the novel, giving Chief the strength and hope he posses. McMurphy helps Chief grow into a strong, self-reliant character. In most of the novel, Chief is extremely paranoid and fearful of everything. Even though in actuality Chief is over six and a half feet tall, he considers himself small and weak. One night, when he first begins to speak to McMurphy about how he isn’t big, he says, â€Å"I’m way too little. I used to be big, but no more. You’re twice the size of me.† (Page 186.) Chief’s lack of self-esteem is due to his mother, an overbearing white woman who contributed to ruining his father and making him into a powerless alcoholic. She, and others throughout the book (for example, the government who took away his father’s land), forced Chief into invisibility. Chief witnessed his father waste away, as he was robbed of things he once was passionate about. On page 187, Chief talks about his father: â€Å"But he was too little anymore. And he was too drunk, too. The Combine has whipped him. It beats everybody. It’ll beat you too. They can’t have somebody as big as Papa running around unless he’s one of them. You can see that.† Chief is scared that Nurse Ratched and the Combine will soon destroy him, as the government and mother did his father. McMurphy takes it upon himself to make Chief â€Å"big† again by bringing to Chief’s attention the way he has â€Å"grown.† For instance, on page 225, â€Å"’By God...

Saturday, October 19, 2019

Technology Management Term Paper Example | Topics and Well Written Essays - 1250 words

Technology Management - Term Paper Example In this paper, the impacts of technology on; cost of business, human resources and customer satisfaction will be examined with the intention of establishing its import in the aforementioned sectors. Many organizations are to a large extent dependent on computers to handle their administrative tasks such as inventories bookkeeping and other clerical tasks which were traditionally handled exclusively by personnel. The advent of the internet as well as growth in the diversity and capacity of computing hard and soft ware has significantly reduced the cost of doing business; computer are increasingly becoming more powerful and cheaper to run due to the exponential growth in innovation. In addition, business owners and other entrepreneurs are better able to understand the cash flow and manage their storage and other running costs better ultimately saving time and money. For instance, today with only a laptop, one can open a business or even run a company without requiring to rent office sp ace or hiring employees, the computer can store all the information they need and they can use it to communicate with customers, suppliers as well as carrying out product promotion. The availability of online marketing and sales means one can order and ship goods from point A to point B in the comfort of their home. Furthermore, technology reduces the need for human resource since a computer can carry out tasks that were traditionally done by employees thus further reducing the cost of starting and running a business. The use of bookkeeping software such as QuickBooks and automated sales functions such as sales force allows business owners and managers to focus of strategy by cutting down the running costs and labour expenses. Technology also provides means through which to cut indirect costs, these include cost of commuting which can be scaled down since with the option of telecommuting , one can work from home. Ergo, they will not only save on fuel costs but also reduce the amount of time they spend getting ready to go to office as well as traffic jam which at times cost both employees and their employer’s valuable time which could be used profitably. Technology has helped to reduce the cost of storage by eliminating the need for double or triple entry systems as well as amounts of paperwork that needs to be filed arranged and stored, customer data, contracts and any relevant information can be stored on online or hardware databases and accessed in seconds. Information and advertisement cost can also be scaled down significantly through technology, for example instead of costly TV ads, many firms are opting for online advertising through social media such as Facebook which can reach more people transcending geopolitical borders and which is either low cost or free. According to Jeff Wourio, a manager at Microsoft co-operations, inculcating technology solutions in business is crucial owing to the fact that with technology one can have among other thing s an online presence and that way they can cut down the costs of advertising significantly and transfer the resources to improving product quality. Online marketing provides a fairly affordable and at times even free avenue through which a company can, not only reach millions of consumers globally but also create a following of (fans/follower/friends) which serve to enhance

Friday, October 18, 2019

Crimes Against Property Assignment Example | Topics and Well Written Essays - 1000 words

Crimes Against Property - Assignment Example Women carried purses of various sizes, wore outfits with long voluminous skirts, and were decked out in shawls, gloves and muffs. The social class of these offenders in the period immediately following the Civil War was mostly lower. Perpetrators were usually part of the lower class who engaged in much petty criminal behavior, of which shoplifting was just one facet. Although there is no economic theory of shoplifting, the decision to commit this crime is one that is taken rationally, weighing up the implications and advantages of this choice now and in the future. In order to alleviate the prevalence of shoplifting, goods are often not on open display. In order for a customer to see that good which has caught their eye, the customer has to ask the attendant who will retrieve it from behind a counter or barrier of some kind. Also, most businesses have designed their retail stores to funnel all customers to and through the main exits. These changes have dramatically altered the preval ence, practice, and perception of shoplifting (Bamfield, 2012). Furthermore, in order to reduce the prevalence of shoplifting, private security officers possess authority which is a mixture of their powers as civilians and certain special requirements which were added by a special law or ordinance. Majority of the private security officers possess only citizen powers, hence they often function as agents of their employers. These security officers are trained to protect self and property from harm (Button, 2007). As a result, a private security officer working for that business or owner has the same authority, no more-no less. The private security officers have special skills that would enable them to detect the presence of a shoplifter within the premises. In other cases, these security officers have been granted special police powers by a local, state or federal government authority. However, even though the security officer has been granted this type of power, it is limited to the grounds and buildings of the employer. Nearly all the private security officers who work for retail stores have arrest powers for shoplifting incidents. These powers exist because the security officer is working for a shopkeeper. As part of their training, the private security officers have the right to detain a person when there are levelheaded grounds to believe that the person has shoplifted (Arrington, 2006). Home invasion robbery differs from similar crimes, such as burglary or breaking and entering, in how the crime is defined. According to the Illinois Criminal Code, home invasion is an unlawful entering of a dwelling by a person who knows someone was present therein, and armed with a dangerous weapon either uses or threatens use of force or injures someone inside the home. In some states, this difference means that a defendant can be convicted of both home invasion and another crime, such as armed violence during residential burglary based on one unlawful entry. On the othe r hand, other states hold that conviction of home invasion bars conviction of related crimes such as residential burglary based on one unlawful entry. Home invasion is often classified as a separate offense because of the brutal intent to commit various crimes such as robbery, rape, assault or murder against people in the home. Nonetheless, home invasion is not a legally defined crime federally and is only such

Case of Vasiliy Gorshkov and Alexey Ivano Essay

Case of Vasiliy Gorshkov and Alexey Ivano - Essay Example There are readily available hacker tools that can be used by unskilled people to wreak havoc for financial gain or just for fun. The disturbing reality is that many people are not aware they are actually committing a crime until it is too late. This has been a serious problem for teachers, parents, governments and businesses trying to work hard to protect children and the general public from online threats. The best way to protect people from computer crime is by letting them understand what computer crime is all about. Computer crime can be viewed in three ways. The first one is attacking computers of other people by spreading malicious viruses. The second one is using a computer as a weapon to commit crime like illegal gambling or fraud. The third one is storing information in a computer illegally. Introduction In this case study of Vasiliy Gorshkov and Alexey Ivanov we are going to examine whether the FBI investigative techniques went too far in apprehending the two Russian cyber criminals. In addition to this, we will also investigate how the FBI used the law to apprehend the cyber criminals and whether their actions should stand scrutiny under the current U.S. cyber law. Furthermore, more case studies will be examined and the impact of cybercrime investigations of non-U.S. citizens will be discussed and analyzed. The overview has looked at what computer crime is all about and the definition can summarize computer crime as attacking computers of other people by spreading malicious viruses, using a computer to commit crime, and storing illegal information on a computer. Case study Ivanov a 20 year old computer programmer from Russia flew to Seattle in November 2000 to apply for a job in a company called Invita Security. He was promised a dream job and took with him Vasiliy Gorshkov, a fellow programmer. After their arrival in Seattle airport they were given interviews of hacking other networks which they proved to be very successful. They were later arrested by the FBI. In Washington on October 10, 2001, a jury found Vasiliy of Russia guilty on 20 counts of conspiracy on fraud and computer crimes. The targets of the computer crime include Nara Bank, Speakeasy Network, PayPal, National Bank of Waco, and many other companies. He faced a maximum prison term of five years on each count, and a possible prison sentence of 100 years and a fine of $250,000 on each count, although he was sentenced to three years in prison. Ivanov was also charged with conspiracy, hacking, extortion and computer fraud and was given a prison term of eight months and owes in excess of $800,000. Analysis of case study The Federal Bureau of Investigation in the case study did not follow any International Law in their pursuit of the two cyber criminals however the deceit to get them into America is commendable because it allowed the FBI to exercise the right legal justice system in apprehending them. This was done by using a fictional company called Invita that lured the two Russians and their success in hacking into Invita proved they were guilty of cyber crime. According to the United States law the right way in obtaining evidence is not by deceiving computer criminals into committing a crime rather it should be to catch criminals in the act of committing a crime

Case report (The subject of Strategic integration, Marketing) Essay

Case report (The subject of Strategic integration, Marketing) - Essay Example Followed by this review, the company’s initiatives to achieve organic growth in mature markets are also discussed and explained in detail. Nestle’s strategies to achieve this was supported by launching operational efficiency programs worldwide. Including these programs, Nestle’s most important milestone is GLOBE, a program which aims to integrate the widespread manufacturing, accounting and operational activities of business units worldwide is explained along with its applications on the company’s overall objective to achieve internal growth though companywide synergies and integrations. Nestle’s strategic marketing decisions of bringing products under a few strategic brands are also discussed in detail and its implications on the company’s expenditures and strategic long-term objectives are also explained. Besides this, all the challenges which were faced by Nestle in pursuing its strife for achieving internal growth are also discussed in de tail. How Nestle tackled them with its unique approach, are also discussed. Along with the challenges, how Nestle plans to survive in mature markets by incorporating innovation in a sustainable manner in its product and brand portfolio for long-term sustainability is also illuminated in detail. 2. Introduction When Brabeck took over in 1997 from his predecessor Maucher, Nestle had its presence in almost 19 food categories, predominantly in food, pet food, milk, coffee, confectionary, clinical nutrition etc. However, despite such massive growth initiatives taken by Maucher, Nestle lagged behind in some categories and it can be owing to bad investments which were made during Maucher’s period in office. Brabech’s focus on organic growth directed the company towards discontinuing allocation of resources towards unprofitable channels. (Maucher, 1994). Being one of the leading global food companies, Nestle has established its strategic brands in various segments throughout t he world as one of its effective initiatives to boost internal growth, also known as organic growth. Nestle’s CEO Helmet Maucher from 1982 till 1997 had led the corporation from being just a European based company with strong footing as a manufacturer of milk and coffee to being a comprehensive and diversified global corporation dealing in a wide range of food products. Maucher’s main strategy for growth was to rely heavily on external sources and inorganic growth channels. Conglomerate mergers and takeovers were the major focus of Nestle’s growth strategy during Maucher’s tenure as CEO of the company. This did steer the company towards being the global leader in the food and beverage industry however, this was being done at the expense of not saving money through those channels which otherwise could have done so by not investing in unprofitable mergers and acquisitions. Brabeck however, did realize this fact and was determined to steer Nestle towards a m ore internalized approach to growth, with which he believed that the company will save a lot more capital and the resources could then be channelized into more profitable ventures. Brabeck took some important steps to promote organic growth by launching various programs and campaigns followed by setting up of special Business Units with various objectives (Maucher, 1994, Bell et al, 2009). 3. Organic Growth Programs In order to make Nestle’s operational activity more efficient, Brabech had to make some

Thursday, October 17, 2019

Evidence of the GM Food Unsafely Essay Example | Topics and Well Written Essays - 250 words

Evidence of the GM Food Unsafely - Essay Example These are the same animals that humans consume, despite the fact that they are reared using GM crops. From a food chain perspective, it should be noted that every single GM food in the food chain will eventually reach the consumer. Advocates for GM food argue that they will enhance global food security, but this should be taken with caution since a food regulating and testing body should be established first before approving GM foods.Food allergies are a primary concern when it comes to GM food since 6% of children and 2% of children suffer from severe food allergies. GM foods can instigate a more severe allergy since they are reared to resist some conditions (Dona 164-175). Environmental risk is another factor that makes GM foods unacceptable for human consumption. These foods mean that foreign genes will be introduced into the wild population. It will, therefore, require those handling such foods to be adequately trained to avoid contaminating natural foods. Other environmental fac tors include reduction of plant’s spectrum, though GM foods have not been in the ecosystem for long. It can, therefore, be stated with utmost conviction that lack of evidence GM foods safety is not proof that they are safe.

Project Risk Management Essay Example | Topics and Well Written Essays - 2000 words

Project Risk Management - Essay Example A co-operation considered less informal in terms of risk management results in a number of gains. This requires a long term relationship or co-operation among actors of project network. For example, a risk management engagement considered less informal, results in a reduced transaction costs since, it limits the need for rather, expensive contractual engagement. In addition, a risk management process that engages co-operation minimizes dyadic relationships and introduces a network-level engagement. A co-operative means of managing risks results in efficiency and at the same time, pinpoints ineffective and expensive practices resulting into risks. In the construction field today, risk management for projects is gaining recognition as a result of the critical procedures involved. Shortfalls witnessed in construction projects results from the complex nature of various implemented projects. The idea of subcontracting is taking precedence as a result of construction companies concentratin g on their main businesses. This creates a situation where, involvement in projects becomes complex due to many project participants. Uncertainty related to implementing successful projects is caused by various sources. Effective risk management for projects is tenable by developing an understanding of the relationship manifesting between risks and project networks. The stakeholders responsible for implementing a project need to recognize risks attributable to each participant in the project. This provides a reliable mechanism for risk allocation; on the other hand, risks within construction projects often arise because of the involvement of various sources. Construction projects often involve a continuous process in relation to decision making. This results from the existence of many sources that create uncertainty and risks. In most cases, such decisions are beyond the control of the bonafide project participants. Further, most construction projects fail in terms of meeting cost t argets and stipulated timeline (Abdou 7). As a result, it is crucial for contractors to recognize risk sources earlier. For example, in regions such as the Far-East, delays often results from, interference by the owner, lack of experience on part of the contractor, poor planning and financial constraints. Such risks are often network-related, in order to execute a successful project, there is need for guarantee in terms of project participant’s experience and skills. Other factors to consider involve the network undertaking the project (Abdou 8). As a good practice, risk management within projects requires improvements for contracts, providing incentives for quality and recognizing capabilities. According to Baloi and Price, there are two categories of risks related to construction projects (262); this is illustrated in the tables below. Table 1: Typical Risks Technical Social Construction Economic Legal Financial Natural Commercial Logistics Political Table 2: Risks by Impac t Dynamic vs Static Corporate vs Individual Internal vs External Positive vs Negative Acceptable vs Unacceptable Insurable vs Non insurable As suggested in both tables, the major source of risks for construction projects, are networks, this occurs either directly or indirectly. On another note, risks attributed to constructio

Wednesday, October 16, 2019

Case report (The subject of Strategic integration, Marketing) Essay

Case report (The subject of Strategic integration, Marketing) - Essay Example Followed by this review, the company’s initiatives to achieve organic growth in mature markets are also discussed and explained in detail. Nestle’s strategies to achieve this was supported by launching operational efficiency programs worldwide. Including these programs, Nestle’s most important milestone is GLOBE, a program which aims to integrate the widespread manufacturing, accounting and operational activities of business units worldwide is explained along with its applications on the company’s overall objective to achieve internal growth though companywide synergies and integrations. Nestle’s strategic marketing decisions of bringing products under a few strategic brands are also discussed in detail and its implications on the company’s expenditures and strategic long-term objectives are also explained. Besides this, all the challenges which were faced by Nestle in pursuing its strife for achieving internal growth are also discussed in de tail. How Nestle tackled them with its unique approach, are also discussed. Along with the challenges, how Nestle plans to survive in mature markets by incorporating innovation in a sustainable manner in its product and brand portfolio for long-term sustainability is also illuminated in detail. 2. Introduction When Brabeck took over in 1997 from his predecessor Maucher, Nestle had its presence in almost 19 food categories, predominantly in food, pet food, milk, coffee, confectionary, clinical nutrition etc. However, despite such massive growth initiatives taken by Maucher, Nestle lagged behind in some categories and it can be owing to bad investments which were made during Maucher’s period in office. Brabech’s focus on organic growth directed the company towards discontinuing allocation of resources towards unprofitable channels. (Maucher, 1994). Being one of the leading global food companies, Nestle has established its strategic brands in various segments throughout t he world as one of its effective initiatives to boost internal growth, also known as organic growth. Nestle’s CEO Helmet Maucher from 1982 till 1997 had led the corporation from being just a European based company with strong footing as a manufacturer of milk and coffee to being a comprehensive and diversified global corporation dealing in a wide range of food products. Maucher’s main strategy for growth was to rely heavily on external sources and inorganic growth channels. Conglomerate mergers and takeovers were the major focus of Nestle’s growth strategy during Maucher’s tenure as CEO of the company. This did steer the company towards being the global leader in the food and beverage industry however, this was being done at the expense of not saving money through those channels which otherwise could have done so by not investing in unprofitable mergers and acquisitions. Brabeck however, did realize this fact and was determined to steer Nestle towards a m ore internalized approach to growth, with which he believed that the company will save a lot more capital and the resources could then be channelized into more profitable ventures. Brabeck took some important steps to promote organic growth by launching various programs and campaigns followed by setting up of special Business Units with various objectives (Maucher, 1994, Bell et al, 2009). 3. Organic Growth Programs In order to make Nestle’s operational activity more efficient, Brabech had to make some

Tuesday, October 15, 2019

Project Risk Management Essay Example | Topics and Well Written Essays - 2000 words

Project Risk Management - Essay Example A co-operation considered less informal in terms of risk management results in a number of gains. This requires a long term relationship or co-operation among actors of project network. For example, a risk management engagement considered less informal, results in a reduced transaction costs since, it limits the need for rather, expensive contractual engagement. In addition, a risk management process that engages co-operation minimizes dyadic relationships and introduces a network-level engagement. A co-operative means of managing risks results in efficiency and at the same time, pinpoints ineffective and expensive practices resulting into risks. In the construction field today, risk management for projects is gaining recognition as a result of the critical procedures involved. Shortfalls witnessed in construction projects results from the complex nature of various implemented projects. The idea of subcontracting is taking precedence as a result of construction companies concentratin g on their main businesses. This creates a situation where, involvement in projects becomes complex due to many project participants. Uncertainty related to implementing successful projects is caused by various sources. Effective risk management for projects is tenable by developing an understanding of the relationship manifesting between risks and project networks. The stakeholders responsible for implementing a project need to recognize risks attributable to each participant in the project. This provides a reliable mechanism for risk allocation; on the other hand, risks within construction projects often arise because of the involvement of various sources. Construction projects often involve a continuous process in relation to decision making. This results from the existence of many sources that create uncertainty and risks. In most cases, such decisions are beyond the control of the bonafide project participants. Further, most construction projects fail in terms of meeting cost t argets and stipulated timeline (Abdou 7). As a result, it is crucial for contractors to recognize risk sources earlier. For example, in regions such as the Far-East, delays often results from, interference by the owner, lack of experience on part of the contractor, poor planning and financial constraints. Such risks are often network-related, in order to execute a successful project, there is need for guarantee in terms of project participant’s experience and skills. Other factors to consider involve the network undertaking the project (Abdou 8). As a good practice, risk management within projects requires improvements for contracts, providing incentives for quality and recognizing capabilities. According to Baloi and Price, there are two categories of risks related to construction projects (262); this is illustrated in the tables below. Table 1: Typical Risks Technical Social Construction Economic Legal Financial Natural Commercial Logistics Political Table 2: Risks by Impac t Dynamic vs Static Corporate vs Individual Internal vs External Positive vs Negative Acceptable vs Unacceptable Insurable vs Non insurable As suggested in both tables, the major source of risks for construction projects, are networks, this occurs either directly or indirectly. On another note, risks attributed to constructio

Network Typologies Essay Example for Free

Network Typologies Essay A network is a system of two or more computers that are connected in some manner. Each computer on the network has access to the files and peripheral equipment (such as printers or modems) on all the other computers on the network. The origin of local area networks can be traced, in part, to IBM terminal equipment introduced in 1974. At that time, IBM introduced a series of terminal devices designed for use in transaction-processing applications for banking and retailing. What was unique about those terminals was their method of connection: a common cable that formed a loop provided a communications path within a localized geographical area. Unfortunately, limitations in the data transfer rate, incompatibility between individual IBM loop systems, and other problems precluded the widespread adoption of this method of networking. The economics of media sharing and the ability to provide common access to a centralized resource were, however, key advantages, and they resulted in IBM and other vendors investigating the use of different techniques to provide a localized communications capability between different devices. However, Datapoint Corporation began selling its Attached Resource Computer Network (ARCNet), considered by most people to be the first commercial local area networking product. Since then, hundreds of companies have developed local area networking products, and the installed base of terminal devices connected to such networks has increased exponentially. They now number in the hundreds of millions. Designing a manageable network One of the most important considerations in designing a network to be manageable is deciding how and where to connect the network-management equipment. Is there a separate network-management center to accommodate? Do nonoperational staff members like the network designer sit in a different area? Do they require access to the network-management centers equipment through the network? In general, the design should include a separate virtual local area network (VLAN) just for network-management equipment. The management VLAN was used to access management functions on remote network equipment. This network management-equipment VLAN houses servers and workstations used to manage the network. Design Types A large-scale network design is composed of several common building blocks. Every LAN, of whatever size, has to have an access system by which the end stations connect to the network. There are several inexpensive options for LAN connections, such as Ethernet and Token Ring. As a philosophical principle, the network should be built using basic commonly available technology. The design shouldnt have to reinvent any wheels just to allow the machines to talk to one another. So, just as basic commonly available technologies exist for connecting end stations to LANs, there are common methods for interconnecting LAN segments. Once again, these technologies and methods should involve the most inexpensive yet reliable methods. But in this stage of interconnecting, aggregating, and distributing traffic between these various LAN segments, the designer may run into some serious hidden problems. There may be thousands of ways to connect things, but most of these methods result in some kind of reliability problems. Network topology The topology of a local area network is the structure or geometric layout of the cable used to connect stations on the network. Unlike conventional data communications networks, which can be configured in a variety of ways with the addition of hardware and software, most local area networks are designed to operate based on the interconnection of stations that follow a specific topology. The most common topologies used in LANs include the loop, bus, ring, star, and tree, as illustrated in the figure below Loop As previously mentioned, IBM introduced a series of transaction-processing terminals in 1974 that communicated through the use of a common controller on a cable formed into a loop. This type of topology is illustrated at the top of Figure below. Local area network topology. The five most common geometric layouts of LAN cabling form a loop, bus, ring, star, or tree structure. Because the controller employed a poll-and-select access method, terminal devices connected to the loop require a minimum of intelligence. Although this reduced the cost of terminals connected to the loop, the controller lacked the intelligence to distribute the data flow evenly among terminals. A lengthy exchange between two terminal devices or between the controller and a terminal would thus tend to weigh down this type of network structure. A second problem associated with this network structure was the centralized placement of network control in the controller. If the controller failed, the entire network would become inoperative. Due to these problems, the use of loop systems is restricted to several niche areas, and they are essentially considered a derivative of a local area network. Bus In a bus topology structure, a cable is usually laid out as one long branch, onto which o ther branches are used to connect each station on the network to the main data highway. Although this type of structure permits any station on the network to talk to any other station, rules are required for recovering from such situations as when two stations attempt to communicate at the same time. Ring In a ring topology, a single cable that forms the main data highway is shaped into a ring. As with the bus topology, branches are used to connect stations to one another via the ring. A ring topology can thus be considered to be a looped bus. Typically, the access method employed in a ring topology requires data to circulate around the ring, with a special set of rules governing when each station connected to the network can transmit data. Star The fourth major local area network topology is the star structure, illustrated in the lower portion of Figure 1. In a star network, each station on the network is connected to a network controller. Then, access from any one station on the network to any other station can be accomplished through the network controller. Here, the network controller functions like a telephone switchboard, because access from one station to another station on the network can occur only through the central device. In fact, you can consider a telephone switchboard or PBX as representing a star-structured LAN whose trunks provide connections to the wide area network telephone infrastructure. Tree A tree network structure represents a complex bus. In this topology, the common point of communications at the top of the structure is known as the head-end. From the head-end, feeder cables radiate outward to nodes, which in turn provide workstations with access to the network. There may also be a feeder cable route to additional nodes, from which workstations gain access to the network. One common example of a tree structure topology is the cable TV network many readers use on a daily basis. With the upgrade introduction to networking of many cable TV systems to two-way amplifiers and the support of digital transmission, the local cable TV infrastructure can be considered to represent an evolving type of tree-structured local area network. Mixed Topologies Some networks are a mixture of topologies. For example, a tree structure can be viewed as a series of interconnected buses. Another example of the mixture of topologies is a type of ethernet known as 10BASE-T. 10BASE-T network can actually be considered a star-bus topology, because up to 16 or 24 devices known as stations are first connected to a common device known as a hub, which in turn can be connected to other hubs to expand the network. Transmission Medium Used in LAN. The transmission medium used in a local area network can range in scope from twisted-pair wire, such as is used in conventional telephone lines, to coaxial cable, fiber-optic cable, and electromagnetic waves such as those used by FM radio and infrared. Each transmission medium has a number of advantages and disadvantages. The primary differences between media are their cost and ease of installation; the bandwidth of the cable, which may or may not permit several transmission sessions to occur simultaneously; the maximum speed of communications permitted; and the geographic scope of the network that the medium supports. Twisted-pair wire In addition to being the most inexpensive medium available for LAN installations, twisted-pair wire is very easy to install. Since this wiring uses the same RJ11 and RJ45 modular connectors as a telephone system, once a wire is cut and a connector fastened, the attachment of the connector to network devices is extremely simple. Normally, a screwdriver and perhaps a pocket knife are the only tools required for the installation of twisted-pair wire. Anyone who has hooked up a pair of speakers to a stereo set has the ability to install this transmission medium. Unshielded twisted-pair Although inexpensive and easy to install, unshielded twisted-pair (UTP) wire is very susceptible to noise generated by fluorescent light ballasts and electrical machinery. In addition, a length of twisted-pair wire acts as an antenna; however, the twists serve as a mechanism to partially counteract this antenna effect. Unfortunately, due to the law of physics, the longer the wire length, the greater the noise it gathers. At a certain length, the received noise will obliterate the signal, which attenuates or decreases in strength as it propagates along the length of the wire. This noise can affect the error rate of data transmitted on the network, although lead-shielded twisted-pair (STP) cable can be employed to provide the cable with a high degree of immunity to the line noise and enable extended transmission distances. Examining a building cabling standard and the various categories of twisted-pair that can support different transmission rates which, in turn, enable different types of Ethernet networks to be supported. Because the bandwidth of twisted-pair cable is considerably less than coaxial or fiber-optic cable, normally only one signal is transmitted on this cable at a time. Although a twisted-pair wire system can be used to transmit both voice and data, the data transmission is baseband because only one channel is normally used for data. In comparison, a broadband system on coaxial or fiber-optic cable can be designed to carry voice and several sub channels of data, as well as fax and video transmission. Other constraints of unshielded twisted-pair wire are the rate at which data can flow on the network and the distance it can flow. Although data rates up to 1 gigabit per second (Gbps) can be achieved, normally local area networks employing UTP wiring operate at a lower data rate. In addition, UTP systems normally cover a limited distance, measured in terms of several hundred to a few thousand feet, while coaxial and fiber-optic cable–based systems may be limited in terms of miles. Extending transmission distances over twisted-pair wire requires the periodic insertion of repeaters into the cable. A repeater receives a digital signal and then regenerates it; hence, it is also known as a data regenerator. Coaxial cable At the center of a coaxial cable is a copper wire, which is covered by an insulator known as a dielectric. An overlapping woven copper mesh surrounds the dielectric, and the mesh, in turn, is covered by a protective jacket consisting of polyethylene or aluminum. The figure below illustrates the composition of a typical coaxial cable; however, it should be noted that over 100 types of coaxial cable are currently marketed. The key differences between such cables involve the number of conductors contained in the cable, the dielectric employed, and the type of protective jacket and material used to provide strength to the cable so it can be pulled through conduits without breaking. Two basic types of coaxial cable are used in local area networks. The type of cable used is based on the transmission technique employed: baseband or broadband signaling. Both cable types are much more expensive than twisted-pair wire; however, the greater frequency bandwidth of coaxial cable permits higher data rates for longer distances than you can obtain over twisted-pair wire. Normally, 50-ohm coaxial cable is used in baseband networks, while 75-ohm cable is used in broadband networks. The latter coaxial is identical to that used in cable television (CATV) applications, including the coaxial cable used in a home. Data rates on baseband networks using coaxial cable range from 50 to 100 Mbps. With broadband transmissions, data rates up to and including 400 Mbps are obtainable. A coaxial cable with a polyethylene jacket is normally used for baseband signaling. Data is transmitted from stations on the network to the baseband cable in a digital format, and the connection from each station to the cable is accomplished by the use of a simple coaxial T-connector. Because data on Coaxial cable. baseband network travels in a digital form, those signals can be easily regenerated by the use of a device known as a line driver or data regenerator. The line driver or data regenerator is a low-cost device that is constructed to look for a pulse rise, and upon detecting the occurrence of the rise, it will disregard the entire pulse and regenerate an entirely new pulse. Thus, you can install low-cost line drivers into a baseband coaxial network to extend the distance over which transmission can occur on the cable. Typically, a coaxial cable baseband system can cover an area of several miles, and may contain hundreds to thousands of stations on the network. Obtaining independent sub channels defined by separate frequencies on coaxial cable broadband transmission requires the translation of the digital signals from workstations into appropriate frequencies. This translation process is accomplished by the use of radio-frequency (RF) modems, which modulate the digital data into analog signals and then convert or demodulate received analog signals into digital signals. Because signals are transmitted at one frequency and received at a different frequency, a head-end or frequency translator is also required for broadband transmission on coaxial cable. This device is also known as a demodulator, as it simply converts the signals from one sub channel to another sub channel. Fiber-optic cable Fiber-optic cable is a transmission medium for light energy, and as such, provides a very high bandwidth, permitting data rates ranging up to billions of bits per second. The fiber-optic cable has a thin core of glass or plastic, which is surrounded by a protective shield. Several of these shielded fibers are bundled in a jacket, with a central member of aluminum or steel employed for tensile strength. Digital data represented by electrical energy must be converted into light energy for transmission on a fiber-optic cable. This is normally accomplished by a low-power laser, or through the use of a light-emitting diode and appropriate circuitry. At the receiver, light energy must be reconverted into electrical energy. Normally, a device known as a photo detector, as well as appropriate circuitry to regenerate the digital pulses and an amplifier, are used to convert the received light energy into its original digital format. The figure below provides an illustration of the cross sectio n of a single-strand fiber cable. The cladding that surrounds the core of the fiber can be considered to represent a cylindrical mirror whose job is to ensure light stays in the core as it flows along the fiber. The Kevlar fibers add strength to the cable, while the outer jacket, which is commonly colored orange, represents a polymer-based shield that protects the cable from the elements. There are two key factors that govern the manner by which light flows through a fiber-optic cable. Those factors are the diameter of the core and the light source. The first type of fiber-optic cable developed had a relatively large diameter that ranged from 50 to 140 microns, where a micron is a millionth of a meter. The original light source used to transmit information was a light-emitting diode (LED). Horizontal cross section of a single-strand fiber cable The coupling of an LED to a large-diameter optical fiber results in photons flowing along multiple paths through the optical fiber, resulting in the transmission referred to as multimode, which is also the same name used to reference the type of optical fiber. There are two types of multimode fiber, referred to as step-index and graded index. A step-index fiber has a core with a uniform refractive index, resulting in the different components of a light signal in the form of modes or rays flowing in a non-uniform manner through the optical cable. The top portion of the figure below illustrates the flow of light through a step-index, multimode fiber. In a graded-index multimode fiber, the refractive index is varied from the center to the edge of the core to minimize modal dispersion. The middle portion of the figure below illustrates the flow of light through a graded-index, multimode fiber. This type of fiber minimizes model dispersion and supports higher data rates than a step-index multimode optical fiber. A third type of optical fiber has a relatively small core diameter, typically between 7 and 12 microns (10−6 meters). This type of optical fiber permits only one path for the flow of light due to the small diameter of the core. As a result of the lack of modal dispersion, single mode supports a much higher data rate than multimode fiber. Because of the small diameter of single-mode fiber, lasers are used as the light source instead of LEDs. Both the core thickness and the cladding of an optical fiber are measured in microns. The three major core thicknesses used in optical fiber are 50, 62 and 100 microns. The associated claddings for those core diameters are 125 and 140 microns, respectively. Light flow in multimode and single-mode optical fiber. Computer networks are everywhere; from a simple two-node home setup to the vast number of computers on the internet. However, any computer network includes certain basic components, regardless of which operating system one is running. Network scope refers to the extent to which a network provides coverage. There are two major divisions of network scope; Local Area Networks and Wide Area Networks. †¢ A Local Area Network (LAN) consists of any number of computers that are linked directly together and are housed in a clearly defined geographic area, such as in a single building or campus. A LAN can only be as large as the physical limitations of the cabling you use which also depends on the cabling type. Usually the computers linked together in a LAN are workstations that can access data on computers on the same LAN, and use devices like printers that are connected to the LAN. †¢ A Wide Area Network (WAN) can span large geographic areas like countries and continents. WANs often contain two or more LANs. At least some of the connections used in WAN rely on long distance communications media such satellite links, long distance fiber optic cable, or specialized high speed telephone lines. WAN technology is essentially used to link all the computers in a multi-site or multinational enterprise in a reliable way Note that the key characteristic of a LAN or WAN is not how big it is, but rather the technologies used to connect the computers. There are other more specialized scopes used to describe networks. These include: †¢ Metropolitan Area Networks (MAN): this is a mini-wan or a giant LAN that is confined to a single municipality. A company might use a private MAN to link different offices together within the same compound. Computers on a MAN are linked using high-speed media like fiber optic or dedicated digital lines. This is the typical description of the IITA Ibadan network as will be discussed later. †¢ Storage Area Network (SAN): A specialized LAN linking several network servers that are dedicated to storing large amounts of data in a centralized secure repository. †¢ Personal Area Network (PAN): This is a connection you personally have with the technology that is around you (within your body) e.g. the way your cell phone communicates with your Bluetooth headset and your laptop. Bluetooth and infrared are currently the major types of PAN. Network Topology A network topology refers to the layout of the transmission medium and devices on a network. Topologies use either a point to point or multipoint connection scheme. A connection scheme indicates how many devices are connected to a transmission media segment or an individual cable. An example of point-to-point connection scheme is a printer or modem connected to your computer. Another is two computers connected directly to each other to use file transfer software like windows i.e. the network computer communicates with other network devices via direct cable connection between them. An example of a multi point connection scheme is a star or bus topology network. The entire physical structure of the network is called its physical topology. Star topology: This is a local area network topology where all the nodes are connected individually to a central connecting device called a hub. Signals travel from the nodes to the hub which then sends signals to other nodes on the network. A star topology network is easily scaleable – nodes can be added and removed fairly easily- and if a computer fails, none of the other nodes are affected. However if the hub fails the entire network fails. A hub does not perform any type of filtering or routing of the data. It is simply a junction that joins all the different nodes together.