Monday, September 30, 2019

An ideal family Essay

To create a strong and happy family is a difficult task. Person’s upbringing and education starts in his or her family, even when children grow up and become independent, their parent never stop influencing their lives. From my point of view, parents are our first teachers and most influencing people. The way our parents train and discipline us influence how we act and reason out. Being a parent is one of the most challenging task in the world. Parents should love, protect us and guide their child. As children in many cases take after their parents, the latest should be a good role model. They should bring their kids up in the atmosphere of love, mutual respect. But in some situations they should tell their young ones off. Parents should nurture the most important values in them, such as kindness, compassion, respect, generosity, honesty and responsibility. Teach them to be good critical and creative thinkers in a world that isn’t always friendly with them. Parent should help their kids limp through a crisis and help them to grow useful members of society. Children, in their turn, should try to understand that their parents do their utmost to bring them up correctly. Kids should share their problems with their parents and remember that they can rely on them, not retire into their shells. They shouldn’t use bad language or talk back to their mom and dad, because they may hurt them through the bad words without thinking. Youngsters should look up to their parents, don’t lie to them. They should try not to have their parents worry about them all the time, should act as a grown up. Children should support their parents too, as sometimes they can be bad-tempered or a bit depressed. And, of course, children shouldn’t be shy to show love to their parents, doing it by saying some sweet words, sending gifts, kissing or other ways.

Sunday, September 29, 2019

In Arthur Miller’s play the crucibl Essay

In Arthur Miller’s play the Crucible, Reverend Hale changes as the plot unfolds. When Reverend first arrives in Salem he is certain he will use scientific methods to find witches. As the court hearing begins to unfold, Reverend Hale opposes the actions being taken, thus begins using his own judgments. Hale attempts to save the guiltless when he realizes they were convicting innocent people. The plot takes place in 1619, in a small town named Salem. The town was young; being only 40 years old was very religiously strict. A group of teen girls were caught dancing naked in the woods. They started making accusations of witchcraft across the town. Reverend Hale, who was a witch expert, was called from a near by town to put a stop to the matter. One reason Reverend hale changed as the plot unfolds is because he at first believes that he will be using scientific methods to find witches. Hale firmly follows the law to sustain order. By keeping to his books he prepares himself to pay no heed to conclusions. He trusts his books to keep control over the problems arising in Salem. â€Å"†¦ all the invisible world, caught defined, and calculated. In these no fear now-we shall find him out if he has come among us, and mean to crush him utterly if he has shown his face. † (Miller, 39) One reason Reverend Hale changed as the plot unfolds is because he at first believes that he will be using scientific methods to find witches. Subsequently Reverend starts to evolve his thinking during the trail and starts going by his own judgment. He pleads with the judge to let Proctor return, only to be rejected by him. Hale fought against the judge’s verdict realizing it was unjust. Hale then decided to leave the court. â€Å"I denounce these preceding. I quit the court. † (Miller, 115) Subsequently Reverend starts to evolve his thinking during the court hearing and starts going by his own judgment. Then at the end, Reverend changes even more when he realizes they were accusing every one of witchcraft and tries to save the innocent. Reverend declares he will not take a life of an innocent person â€Å"†¦ I am a minister of the Lord, and I dare not take a life without there be proof so immaculate no slightest qualm of conscious may doubt it. † (Miller, 99) He realizes that it is not the convicted people, but that of a hunt to find a cause for there problems. He encourages Mr. proctor to confess to witchery. Also pleading with Procter’s wife, he protests the foolishness of admitting to something you did not do. Finally Reverend Changes for the better realizing that not everyone is a witch and attempts to save the innocent Hale changes from being in favor of the witch trails to opposing it due to the amount of unnecessary convictions with sentences of death. He finds that, when you stop accusing people every for every incident and mishaps, many of the folks are innocent. It is hard to believe that many innocent people were killed during the Salem witch trials. Certainly nothing like that will ever happen today. Reverend Hale changes as the scheme unfolds in Arthur miller’s play, the crucible. Work Cited Miller, Arthur. The Crucible. New York Penguin, 1952 Jonathan Schneider Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Arthur Miller section.

Saturday, September 28, 2019

Rayong factory of the Simple Shoes Company Essay

Rayong factory of the Simple Shoes Company - Essay Example A Distinguish between basic, ideal and attainable standards and explain how these may be used in the Rayong factory of the Simple Shoes Company. Standard cost is the pre-determined operating cost calculated from Management’s standards of efficient operation and the relevant necessary expenditure. It is used as a basis for price fixation and cost control through variance analysis.Basically, standard cost reflects;oQuantities of material and labor expected to be used;oPrices expected to be paid for materials and labor during the coming year, and,oFactory expenses applicable to production based on efficient performance and practical capacity operation of the factory.Standard costs are used in the following applications:o Planning & Control: Standards provide a benchmark, which serves two purposes – guiding and directing the activities of the firm (planning) and analyzing whether the actual activities are in proper direction (control).oPricing Decisions: Standard cost facil itates decisions as also in decisions involving submission of quotations, replying to tenders etc. Since cost is pre-determined based on acceptable standards efficiency, decision making process is simplified.oVariance Analysis: Identification and measurement of variances from standards is possible with the use of standard costs, with a view to improve performance or to revise standards, whichever is applicable. Management by Exception: By analyzing the variances, the decision maker can focus on significant deviations from standards and take corrective actions. Managers can concentrate on critical areas of activity where variances are reported. Thus, standard costs facilitate control by exception (Accounting Tools 2008). Characteristics of basic standards (AccountingCoach 2008) Particulars Characteristics Period These standards reflect the costs that would have been incurred in a certain past period (i.e. the base period). Change These standards are used for items or costs which are likely to remain constant over a long period. Short run vs. Long run Basic standards are set on a long term basis and are seldom revised. Effect These costs relate to a base year, which is chosen for comparison purposes, like price indices etc. Basic standards do not represent what should be attained in the present period. Suitability Suited only to businesses having a small range of products and long production runs. Comparison of ideal standards and attainable standards (Accountingformanagemt.com 2009) Particulars Ideal Standards Attainable Standards Conditions These represent the level of performance attainable with the ‘best’ or ‘ideal set-up’, i.e. best quality materials at favorable prices, highly skilled labor, best equipments and layout. These represent the level of performance attainable under normal operating conditions, i.e. normal efficiency, normal sales/production volume etc. Efficiency These standards focus on maximum efficiency in utilization of resources, i.e. maximum output with minimum cost These standards focus on the practical attainable efficiency, after considering normal imperfections, i.e. optimization (not minimization) of cost per unit. Attainment These are generally not attainable; hence such standards may not be taken seriously. These are attainable with reasonable effort and hence constitute a good benchmark for control. Disposition o f variances Variances from the ideals would not indicate the extent to which they could have been reasonably and practically avoided. There is no logical method of disposing these variances. Here, variances are deviations from normal expectations. Hence they are disposed on the basis of the policy of the company in this regard. How these may be used in the Rayong factory of the Simple Shoes Company As is obvious from what has been discussed above a basic standard is more of a historical piece of information without much practical relevance for a new set up. Thus, it is advisable that no effort should be spent on setting up basic standards. Instead it would be much more effective if the

Friday, September 27, 2019

Twitter in Diet Pepsi's Commercial Essay Example | Topics and Well Written Essays - 750 words

Twitter in Diet Pepsi's Commercial - Essay Example It is then that she witnesses a lady drinking diet pepsi to refresh herself. The ad is meant specifically for both ladies and men but the emphasis is more on the ladies. This can be seen from the ad when ladies run away from the stall to see David Beckham. However on the other hand men are also targeted through this ad as in the very beginning the huge line at the diet pepsi stall consists of men too. Men and women of younger generation who tend to get tired and exhausted of the heat are targeted through this ad. Methods of reaching the audience The advertisement made by the brand is reaching out to the audience through different means. The use of celebrities is one way through which the brand is reaching out to the consumers. It is creating a value and character amongst the consumers by showing the characters of David Beckham and Sofia Vergara. Both of these celebrities are well known amongst the masses and hence the brand is showing value to the consumers. The consumers may choose the product because of the well known celebrities in some instances. The value created by the brand would be most useful when settling in for the audience as many people try products because of these celebrities. People who are interested in sports would definitely try the drink because of David Beckham. Women have been specifically targeted by the brand by using logic as women are diet conscious (Kotler & Armstrong, 1991). The ad shows Sofia Vergara and other women with a nice body which helps to promote the product. The ad is basically targeting women who want to be fit and are diet conscious. The ad also has some humour in it which attracts the audience through emotions. The audience may get attracted to the humour and urge shown in the ad to get Pepsi. Sofia Vergara uses her techniques to split the line so that she can go and buy Pepsi. In other words the ad urges the audience to drink diet pepsi so that they can check the taste for themselves. Effectiveness of the Ad The ad can be quite effective in reaching out to the audience because of the different methods that it has incorporated into it. Women and people who are exhausted are targeted by the brand and the advertisement quite successfully does that. The advertisement shows that the drink is quite refreshing and one might use different skills to reach out the product. The celebrity uses logic so that she can buy the drink and hence the ad effectively produces a need amongst the audience which needs to be refreshed (Dehlin et al., 2010). Improvements   The ad incorporates several ideas of marketing but it does lack out to reach a larger audience. The ad could be used in a different way so that a broader audience was targeted. Children have not been specifically targeted by the brand and this idea could have been incorporated into the ad. A celebrity which is loved by the younger generation could be used in the ad so that the children ran over to the celebrity. Exhausted children could also be include d in the ad so that children were also made an audience in the ad. Men are shown in the ad but they are not specifically targeted upon and the brand could use methods to include them in the ad. Men could have been shown running for a female celebrity which was supposedly on the pier along with David Beckham. Conclusion The ad done by the brand is endorsed by celebrities and this can help to target a specific audience. Diet Pepsi is not only meant for women but is also meant to be for men so

Thursday, September 26, 2019

Debate Essay Example | Topics and Well Written Essays - 1500 words

Debate - Essay Example Shareholders value refers to the wealth and profits of the shareholders. It is a part of business ethics that company should strive continuously for maximizing the shareholders value (Zairi, 1998). According to the Vermaelen (2008), Professor of Finance at INSEAD, in the consideration of capitalist economy it is assumed that management has the responsibility to maximize the shareholders value. The value maximization should be considered as an implicit contract and in his opinion it is an ethical responsibility of the managers. Hence, the policies of the company that are designed to reduce the application of this implicit contract must be considered as an unethical practice. Until, of course, the Company has clearly stated in the shareholders contract about the different objectives of using the profit for other purposes. For example, a company decided to start a corporate social responsibility practice in the society for the sake of humanity. The application of this practice will be d one by distributing five percent of the company’s profit among the social welfare institutions. ... fessor Vermaelen clearly indicates that the mangers are liable to maximize the shareholders value, if they do so then they are on a right track, and if not, then they are violating the conducts of business ethics. Sometimes it seems that the companies violate the conducts of social ethics in maximizing the shareholders value. Here the question arises, is that ethical to violate the conducts of social ethics to maximize the wealth of shareholders? The profit of shareholders is associated with company’s profit and it has a positive relationship with profit as well. In the consideration of raised question the business ethics are designed to protect the rights of employees, customers, shareholders and the society. And companies are liable to follow the conducts of business ethics. The implementation of business ethics creates the company’s image in the society. The example for violation of business ethics and social ethics is given to understand the importance of considerin g the business and social ethics in the company’s practices. The case of Nokia in china is the perfect example for understanding the consideration of social ethics in the maximization of shareholders value. Everyone is aware with the fact that the China has low labor wage rates when comparing it with wage rates of other countries. China is highly focused on achieving economies of scale and they are getting success in their vision. Nokia is in contract with few Chinese electronic factories for the supply of mobile parts and accessories. But the factories do not supply the finished products. The factory has a great number of female labors. When the survey was conducted in the factory and female labor are asked to give their reviews regarding the application of policy of business ethics then a

Wednesday, September 25, 2019

Interview an agency administrator Essay Example | Topics and Well Written Essays - 500 words

Interview an agency administrator - Essay Example The case record in an agency has several purposes. One of the purposes is to provide information for quality improvement and evaluation of activities. It is also used for purposes of research as it provides a baseline for the research. The case record ensures transparency and accountability of the financial bodies of the agency. The content elements in the case record structure include the problem or diagnose including its cause. Another content element is the interventions which provide the way in which the problem is treated or solved. The outcome is the last content element in the case recording structure. It presents the progress of the case that is, whether it is fairing well or it is worse. Thus the structure is designed in that, the problem appears first followed by the intervention and lastly is the outcomes of the case. There are different purposes of content and structure in case recording. One of the purposes is to provide clear information about the client situation which is the problem. According to Kiser (2007), content and structure provide a clear flow of the assessment that was done on the client. They show the information about the services that are offered to the client hence accountability. They also provide details of case was implemented and also information about the end of the case.

Tuesday, September 24, 2019

Controversy between Safe and Pure Drinking Water Essay

Controversy between Safe and Pure Drinking Water - Essay Example Health impacts of some of the contaminants in drinking water are not clear; however, the availability of contaminants does not always mean that they will harm an individual’s health. The basis for determining safe drinking water is the national or international guideline, with the significant one being the WHO guideline for quality of drinking water. Drinking water can be obtained from two basic sources, which include surface water like reservoirs and rivers, and groundwater. Water has natural contaminants, especially inorganic contaminants from geological strata upon which water flows, and different microorganisms and chemical pollution. Generally, ground water is less susceptible to pollution compared to surface waters that are prone to various sources of fabricated contaminants. Moreover, in case there are no improved water management, the unhealthy residues of substances used in its treatment can lead to pollution, giving rise to presence of deposits in water pipes. In add ition, contamination of drinking water can occur during the distribution of water arising from materials like iron, which corrodes and releases iron oxides into the supply system. Diffusion process taking place in plastic pipes may result in contamination of drinking water; for example, split oil in the surrounding area may result in water problems concerning its taste and smell. Drinking water treatment applied in public water supply includes a series of treatments that vary in accordance with the requirements of supply and nature and susceptibility of the source. Water treatments comprises of systems that coagulate, flocculate, filter and oxidise drinking water. The common oxidative disinfectant is chlorine and it provides effective and robust protection against pathogens. Standards upon which the safety of drinking water is gauged are revised regularly and supported by detailed documents that describe the various aspects of safety (Larason). Pathogen contamination of drinking wat er causes diarrhoea disease and is a significant characteristic of the drinking water quality. This problem is a result of water contamination by faecal substance, particularly human faecal substance comprising of pathogenic organisms. Many regions in developing countries, pathogens remain a significant cause disease. Therefore, breaking the faecal-oral cycle is crucial by preventing the entry of faecal matter into water sources and treating drinking water in order to kill pathogens. Nevertheless, such approach needs to function alongside hygiene practices like hand washing, which helps reduce the chances of person-to-person infection. Detecting and enumerating pathogens in water is not appropriate in many circumstances because of the difficulties and resources necessary; therefore, only two kinds of pathogen are used as indicators for faecal contamination. There is the assumption that once the indicators are detected, pathogens like viruses could be presents; thus, the appropriate action is necessary. Nevertheless, the time taken in analysing the sample means that if there is contamination then, the contaminated water will get to the consumers and probably it will be consumed by the time the analysis results are obtained. Moreover, the small volume of water sample implies that monitoring is not adequate for ensuring safe drinking water (Workshop on Emerging Drinking Water Contaminants, National Research Council 202). The most serious contaminants of water are chemicals that occur naturally and they are found in groundwater. Waterborne contaminants bring about disease in

Monday, September 23, 2019

Report about the aviation bureau Essay Example | Topics and Well Written Essays - 250 words

Report about the aviation bureau - Essay Example It provides air transport summary data, which is summary information about the nonstop segment and on-flight market. This is a report by air carriers on Form 41 and 298C (U.S Department of Transport, 2015). The bureau gives airline on-time performance data. The data accounts for at least one percent of domestic booked passenger revenues, which consist of scheduled and actual arrivals and departure times for flights, and it is reported monthly. Other services offered are as follows. Origin and Destination Survey (DB1B) which includes data of origin, destination, and other itinerary details of carried passenger and at least a sample of 10% airline tickets is taken from reporting carrier. American Travel Survey: it includes national data on the nature and features of long-distance personal travels. Aviation support: It provides comprehensive geographical data and carrier entities. Commodity Flow Survey: It is conducted in every five years and consists of shipment information. Intermodal Passenger Connectivity Database consist of national data table of passenger transportation terminals with information on connectivity among the various scheduled public transportation (U.S Department of Transport, 2015). Small Air Carrier Statistics is information on small carrier performance in booked or non-booked and charter services. Air carrier employees comprise of a number of employees of all major domestic air carriers. Aviation Accid ent Database and Synopses are database of unsafe civil aviation incidents within the state and in global water. Accidents summary is a brief of all annual fatalities, injuries, and accident of all air carriers. Finally, aviation safety reporting system is a collection of data sets relevant to aviation

Sunday, September 22, 2019

Four wheel steering Vs Front wheel Steering Assignment

Four wheel steering Vs Front wheel Steering - Assignment Example The vehicle is symmetrical about the x-z axis; 2. The vehicle’s total mass  is lumped; 3. The vehicle’s roll axis is fixed and ; 4. The road’s surface conditions are consistent throughout the modelling; 5. Small angle approximations apply to the vehicle’s motion. The dynamics of the 4WS vehicle system can be divided broadly into three categories which are: 1. Tyre side forces; 2. Yaw moments; 3. Roll moments. These aspects of the steering system will be investigated separately based on three kinds of steering systems which are the 2WS (two wheel steering) with front wheel steering, 4WS under 40 km/h where the wheels are steered in opposite phases and 4WS over 40 km/h where the wheels are steered in the same phase. The three modes of steering and the relevant dynamics and motion investigation are discussed below. 2. Vehicle Dynamics Where: The variables ,  and  all represent various kinds of disturbances that may affect the lateral, yaw and roll d irections such as drag effects, side wind gusts, braking on ice, modelling uncertainties, loads, a flat tyre, an uneven road etc. These external disturbances may exert a sizeable influence in certain circumstances but for the sake of this investigation these disturbances will be neglected. The longitudinal forces  are related to the wheels’ rotational model and these forces can be described by denoting them as: Where  is the effective rotational inertia that includes all related drive train effects. The lateral forces  are non-linear functions that can be described using the magic formula as below: Where   are six different coefficients that depend on the vehicle load  and the camber angles  and . In order to study the dynamic behaviour of the vehicle model being investigated under the assumptions that the side slip angle is small under regular driving conditions, the equation listed above can be linearized and written as: The tyre slip angles presented in the notation above can be written as: If the roll angle is assumed to be small then  and . In this case the equations listed above can be linearized as below: Similarly: And: If the vehicle is considered to be travelling under constant velocity conditions in a steady state fashion then  = 0 and the longitudinal force  displayed by the wheels can be approximated as: The dynamics of the involved actuator can also be represented as a linear first order lag system that can be described as: Where: And: Using the equations listed above a descriptor system can be obtained that possesses the form listed below: Where: The matrix inverse operation can then easily be used in tandem with the matrices presented above to produce a linear time invariant system that is described as below: The system above can now be easily modelled as a state space system in MATLAB in order to see how the system behaves when subjected to different steering angles and speeds. The parameters of interest are the lateral velocity, the yaw rate and the roll angle. 3. MATLAB Simulation The space state system was simulated as such in MATLAB for a host of combinations. The input steering angles were investigated for two wheel steering (2WS) and four wheel steering (4WS) systems for the yaw rate, the lateral velocity and the roll angle for limits of vehicle speed above and below 40 kilometres per hour. The 2WS system was investigated as such both above and below 4

Saturday, September 21, 2019

Uniform accounting standards produce Essay Example for Free

Uniform accounting standards produce Essay In the last decade, various countries around the globe have shifted towards a uniform accounting standards or the International Financial Reporting Standards (IFRS). The main motive behind this movement is to come up with a global language for accounting which will be comparable and understandable beyond the borders of a nation. As of today about 120 countries require IFRS for domestically listed companies, although only about 90 countries have fully conformed to IFRS . While some argue that it is necessary to have a system of accounting that is clear and transparent to global investors and companies, some others are skeptic about it being efficient. Furthermore, some feel that the costs of implementing IFRS can be too high and hence uniform accounting will not be worth the cost. Hence, critically analyzing IFRS and understanding its impact on accounting principles will help us to recognize the costs and benefits of this system. One of the main objectives of IFRS is to increase the efficiency and transparency in accounting. However, the main tension in the model rests due to the non- uniform nature of firms as well as nations. For instance, countries differ on myriad ways such as capital and labor markets, nature of government, involvement of government in the company and so forth. Similarly, firms differ from each other in various ways including size, growth, types of products, geographical location and technological advancement . Therefore, coming up with a detailed accounting system or a set of principles to fit all of these can be challenging. Thus, IFRS uses a principle based system, rather than a rule based system which wi ll allow the companies to apply IFRS according to their situation and prepare their statements. However, this flexibility can itself be seen as a big down- side of this system. This will provide a way for companies to manipulate the statements which in turn can encourage fraud. Trancy Coenen comparing the fraud under the system of GAAP and IFRS says that, As IFRS is largely based on judgment in applying principles, it only stands to reason that the risk of fraud in the financial statements will increase with the change . For example, Fair Value judgment is one of the corner stones of IFRS system of accounting. However, it is unclear as to who gets to value things and how can these figures checked for reliability. Thus, IFRS, which is created to form a uniform and transparent system of accounting can itself lead to non-uniform accounting practices with very little information about who makes the judgment behind numbers presented in  the financial statements. Furthermore, another crucial concern that rises with the implementation of IFRS is the balance between the capital alloc ation benefit of a uniform accounting standard against the social cost of forcing diverse firms to adhere to the same rigid standard says Korok Ray, a professor of Economics from George Washington University . Hence, for a small company the cost of shifting from its current accounting practice to IFRS might be too high whereas for a big company it might be small. Furthermore, the time in which all the companies will have to shift from their old system to IFRS can decrease the quality of the financial statements. Lack of experience in this new system of accounting can also increase mistakes making the system less accurate . Nevertheless, it is undeniable that in an increasingly more globalized world, a cross-border accounting system will immensely benefit firms and investors. This system will lead to investment comparisons between various countries, making investors better off. In fact, Marc Fogarty, a Certified Public Accountant says that the single set of standards will cut down the costs to which foreign companies investing in the U.S. markets will have to adhere. He also believes that, the U.S. GAAP standards along with other strict accounting regulations have long been deterrent to foreign companies trying to raise money in the U.S. capital markets . Small investors will be benefited from this change, as they will have an access to more financial information which can be easily understood. In short, implementing IFRS will lead to easy to understand, clear and efficient financial data which will be made available to the general public. Just the implementation of IFRS does not mean investors are prot ected against fraud or misrepresentation of a company’s financial statement. In addition, IFRS also has numerous short term problems that can have a huge impact on its initial adaption and implementation. However, company’s and investors can protect themselves against risks by learning IFRS which will increase their understanding of the financial statement. This will not only help them to critically analyze the numbers represented on the statement but also help them to better compare and contrast one statement from the other nationally or internationally.

Friday, September 20, 2019

History Of The Blue Harbour Brand Marketing Essay

History Of The Blue Harbour Brand Marketing Essay In 1884 Michael Marks, a Russian born Polish refugee opened a stall at Leeds Kirkgate market. Since then, Marks and Spencer was born, opening over 300 stores worldwide and also being the UKs largest clothing retailer. In 1999, online shopping was introduced to their website for customers to enjoy in the comfort of their own home. The internet had just started to become known and more and more people were staring to use it, so Marks and Spencer took this opportunity and set this up at the correct time. In 2000, MS brought out their healthy Count on us range, for the healthier people on diets or who were just watching what they ate. Their 1st Simply food stores opened in Surbiton Twickenham in 2001, selling nothing but healthy food, no home furnishing or clothes like the normal stores. They also launched Per Una a brand of clothing specifically targeting the fashion-conscious women. Shortly after in January 2001, Blue Harbour was introduced, a casual wear brand for males. View form and DB07 another brand of clothing was introduced in 2002, View form for sportswear and DB07 for children designed in collaboration with David Beckham. Mission Statement Marks and Spencers mission statement is broken into 3 parts which include: Vision To be the standard against which others are measured Mission To make aspirational quality accessible to all and Values Quality value, service, innovation and trust. This mission statement has been kept up since the start of making it; MS have worked hard to achieve all these factors. Even though there have been ups and downs during the years they have tried hard and have kept to their word. There are many companies which look up to MS and measure themselves against them, helping their company to improve and gain more customers. Marks and Spencers have been known for their quality value, service, innovation and trust to all their customers who as a company they have stuck to very well. They are continuing to attract new customers as well as keeping their old ones, offering them new and improved products all the time. Objectives Every year MS had many objectives which were to be met, they were not really split into long term and short term but just objectives as a whole for each coming year. In 2001, they had many objectives but their main ones were attracting new customers, developing stronger relationships with their suppliers, aim for market leadership and also to restore the heart of MS, stop non-core and profit losing activities and also to keep an effective balance sheet calling these three sectors their fundamental strengths. In 2002, not only did they want to develop stronger relationships with suppliers but also to build on a unique relationship with their customers. They needed to keep rebuilding on their fundamental strengths, continue to regain market leadership with value, quality and also appeal. It was aimed for MS to open their 1st standalone home store in spring 2003, also to improve every aspect of their company, overcome the competition and continue to attract more customers to their stores. Before 2004, the MS fundamental strengths were changed, which included improving the management team, still ensuring the balance sheet was effective and also delivering impactful but low cost improvements. In 2005, MS only wanted to refocus on their core values in their business which is quality, value, service, innovation and trust. Pestel Analysis In this section a PESTEL analysis will take place and will look at the external factors that impact on Mark and Spencers performance. Political According to the Marks and Spencer website there are constraints on out of town shopping has been but in place by the government. This is causing problems for M and S. This is because it is highly expensive for retail stores to be in the centre of large towns and cities with all the business rates and M and S is not selling enough produce to break even with these extra expenses they have to pay for being in the centre. MS is trying to move some of there stores out of the centres but with constraints it is causing problems for them. The UK not having the Euro is working as a disadvantage to MS in relation to there western European store because MS products are too expensive as there are being sold at UK prices. Economical The UK economy and currency is relatively strong compared to other countries so the strength of the pound is working as a disadvantage to Marks and Spencers in the UK and abroad. (www.bitc.org.uk) Current world events have affected global economies, which may result in fluctuations within the industry. This may lead to unpredictable consumer and supplier behaviours. Sociological Market trends are constantly changing and Mark and Spencers have always struggled to keep up with them. For example, Life style changes have made people more aware of their health, which has resulted in higher demand of quality health care related products. People are concerned with value for money. Consumers are concerned with their image, for example; they must have the latest labels. The population in the UK is ageing and with this, more people have a higher disposable income. Technological Internet shopping has lead to international buying opportunities, which means the consumer has an enormous amount of options when it comes to shopping. This means that the competition has also increased, but Marks and Spencers can use it to their advantage to promote new products and help to show that Marks and Spencers is an up to date company. (www.marksandspencers.com) Environmental MS is restricted to where they can build its stores because of the restrictions on Brown field sites and Green field sites. MS can only build on Brown field sites witch restricts them to having to stay in urban areas with competition. Legal The government is constantly redefining trading laws, which enables Marks and Spencers to trade for longer hours, for example; longer shopping hours on a Thursday. Marks and Spencers must follow advertising laws which are put in place to protect the consumer, but also to promote fair competition between companies. SWOT Analysis The Swot analysis looks at a companys strengths, weakness, opportunities and threats which are likely to have an impact on the companys performance. Strengths Marks and Spencers has been running since 1884 and has a good traditional reputation especially with the older generation. Marks and Spencers is also one of the biggest retailers on the high street having stores in most cities and large towns and with thirty other stores across the globe. (www.marksandspencers.com) The brand name is known in nearly every house hold. Marks and Spencers has a diversity of products such as food, underwear, menswear children wear, women wear and furniture. Weaknesses Fashions are constantly changing and Marks and Spencers has an inability to keep up with changes in the retail market. There are also problems with focusing on the right targets markets in terms of products and customers. (www.bitc.org.uk) Many consumers still feel that Mark and Spencers products are old fashioned and out dated compared to competitors. Even though this is some thing that Marks and Spencers is constantly trying to change. Marks and Spencers is now experiencing poor performance across the globe which has resulted in the pull out of foreign operations. Opportunities Marks and Spencers has the opportunity to collaborate with other companies to widen up product range even more. They could also collaborate with designers to help bring new ideas, and help expand on their furniture and beauty products. Threats There is constant competition from competitors such as John Lewis, Debenhams and Next. And especially from younger clothing competitors such as New Look. Ever changing fashions trends which Marks and Spencers struggle to manage is threatening Marks and Spencers performance. Gap analysis and Ratios A gap analysis involves identifying a gap or weakness in a specific company and looking to bridge that gap in order to meet a target objective as to where the company wants to be. The following quote helps to further identify a gap analysis: Gap analysis, consists of defining the present state, the desired or target state and hence the gap between them. In the later stages of problem solving the aim is to look at ways to bridge the gap defined www. Ifm.eng.cam.ac.uk [January 23] An example from Marks and Spencer is there downfall in the womenswear market, which in 2004 fell 0.6% to a 10.4% share of the market. Competition in womenswear has increased dramatically with women demanding style, quality, outstanding value and real choice. In order for Marks and Spencer to reclaim this market share they set out a clear plan, this involved listening to customers better during store visits, focus groups, better use of market data and keeping a closer eye on tracking trends, tracking competitors and also evaluating there own performance. From a purchasing point of view they looked to strengthen there buying teams, giving clearer responsibilities for design, buying and merchandising. The companies buying strategy changed to buy less, more frequently meaning better ranges and fresher lines of stock. It was also vital that Marks and Spencer didnt miss out on key trends like the previously did in 2003 such as with cardigans. In order to further close that gap Marks and Spencer learnt that they have to cater for particular needs and markets. For instance it is estimated that 42 % of womenswear brought is by women under the height of 5ft 3 inches, Marks and Spencer didnt previously cater for these, often producing large, baggy clothing. Now Marks and Spencer have now produced a petite range in 33 of its stores in order to cater for this market. The three ratios that were decided in order to assess Marks and Spencers financial position were the current ratio, gearing ratio and return on capital employed ratio. Firstly the current ratio can be calculated by dividing current assets by current liabilities, this identifies how far a firm can meet its short term liabilities from its current assets without having to raise finance by borrowing, selling fixed assets or issuing more shares. A ratio less than one for a period of time is a cause for concern; Marks and Spencers did have a healthy current ratio until 2003 but in the last couple of years they have dipped below one causing concern, whereas for example a competitive company such as Next has stayed consistent for the last 3-4 years. Secondly the gearing ratio can be calculated by total borrowings x 100 % and then divided by the capital employed. The ratio shows the proportion of capital employed, which is financed by borrowed funds. The relationship between both, ought to be balanced with shareholders funds significantly larger than the long term liabilities in order to have a health gearing ratio. The higher the gearing ratio, the higher the risk to the company is, as high levels of borrowing represent a significant risk to the company. In 2004 Marks and Spencers was sky high, massively bigger than that of competitors Next. The last ratio analysed was the return on capital employed, this can be calculated by Operating profit x 100% and then divided by capital employed. The ratio is an important indicator of how efficiently the business is being managed. As a rule if a company has a low return on capital employed then it is using its resources inefficiently even if the profit margin is high. In the years 2004-2005 both Marks and Spencers and Nets ROCE have been high indicating a healthy return on capital employed. Five force analysis Porters five forces model (below) can be used to help make an analysis of the competitive environment for a company within a certain industry. In this case, it is Marks and Spencer in the food and clothing industry. Source: Adapted from Porter, M, (1998) Competitive strategy, New York, free press QuickMBA, Strategic Management (1999) states that: The strategic business manager seeking to develop an edge over rival firms can use this model to better understand the industry context in which the firm operates. The threat of new entrants There are a variety of major companies in the market such as Next, Debenhams, Sainsburys and Tesco with regards to selling clothing and food products. These are well known companies which are strong in the market so the threat of new entrants is low. A company such as Marks and Spencer (MS) has a strong brand name which therefore creates a barrier to entry for potential new entrants. Companies would probably experience high start up losses in an attempt to try to promote its products in terms of trying to prise loyal customers away from MS. There is the threat however of company take over where one company buys another one out. Examples include Morrisons taking over Safeway and Walmart taking Asda in bids to try and create better companies without having to build many stores around the country. The government is also keen on new businesses starting up in the market to try to discourage a monopoly situation Bargaining power of suppliers MS has over 2000 direct suppliers where 1500 are for clothing and 500 for its food. Marks and Spencers corporate site online (2005) states: 90% of other products are now sourced overseas. Overseas suppliers provide plenty of choice for MS and also cheaper labour. The market that MS is in also makes it easier for the company to bargain with their suppliers because there are many suppliers which provide clothing and food which are relatively undifferentiated so MS can go to another supplier if they feel there are better suppliers to go to as opposed to their current ones. Bargaining power of buyers There are many clothing and food companies to choose from in terms of the consumer so it is the consumers who can dictate the price by demanding quality products at good prices. Clothing and food are not specific items unlike a Ferrari sports car. Food and clothing are readily available to everyone and so therefore it is important for a company like MS to offer quality goods at right prices in order to compete in a very price orientated market. With a Ferrari sports car, it is a very prestigious item and therefore prices are not as important for Ferrari. MS therefore needs to add value to their products such as the Autograph range of clothing launched in 2000 which The threat of substitute products If a product from a different company is cheaper then consumers may switch to that product. If there are low switching costs e.g. substitute products are much cheaper than MS ones then there could be more consumers switching to the cheaper product. For example, a pair of jeans in MS is  £25 but in Primark the jeans are £6. There are many retail stores selling clothes which are competing with MS and therefore could act as substitute products. To counteract the threat of substitutes, MS must concentrate on ensuring absolute product quality and customer service to keep loyal customers. The intensity of rivalry amongst existing competitors There food and (especially) the clothing market has fierce competition and MS must compete with companies such as Next, Debenhams, Tesco and Sainsburys for selling both their food and clothing products. These companies are all trying to obtain the largest market share possible in the retail sector. Conclusion Overall, MS (Marks and Spencer) have established themselves over 120 years as a well known high street name. The mission statement that has been created by MS, highlights that the company aims to be the standard to which other companies look too in terms of retailing. The objectives highlight on continuously improving the company (objectives in 2005 focused on the core values of the business). The SWOT analysis shows that MS is a very well known company although is poor at keeping up with fashion changes and therefore must be wary of changes and regard them as a threat. The five force analysis shows intense competition within the industry with big companies such as Next and Debenhams selling clothes and Tesco and Asda selling clothes and food. MS must be wary of substitute products with stores such as Matalan and Primark offering these products and also MS must recognise that the customer has high buyer power as they have the choice of many retailers at different prices.

Thursday, September 19, 2019

All The Kings Men :: essays research papers

The amount of change people go through in their lives is remarkable. One day, you can be a devious criminal, while the next you could turn a new leaf and become a saint. The change that Jack goes through in All the King’s Men, is comparable to that of the patient who receives a lobotomy. Although Jack undergoes no physical change, the events he witnesses rock his personality, and transforms him into an entirely new man. His metamorphosis from the beginning of the story to the end has as many parallels to the faceless patient’s operation as it does differences. Besides the obvious fact that no one ever operated on Jack, there are still many differences between him and the lobotomy patient. The most significant difference, however, lies in the reason for both men’s change. Adam remarks that the man will have a completely â€Å"new personality†, and when Jack brings up the concept of baptism, Adam adds that a baptismal is different because it does not give you a new personality, it merely gives you a new set of values to exercise your personality in. Here is where Jack and the patient differs. Jack is the complete opposite. While the man will have a new personality, Jack will go on to have the same personality, but exercise it in a different set of values. The man the reader comes to know in the final pages of the novel is still recognizable as Jack. In these final pages, Jack notes that Hugh Miller â€Å"will get back into politics,† and that Jack himself will â€Å"be along to hold his coat.† One will recall Mill er as the Attorney General who resigned to keep â€Å"his hands from getting dirty.† This is a clear example of Jack’s new set of values. Jack will keep doing what he has done for so many years -working in politics - because his personality has not changed. Nevertheless, his new set of values will not allow him to work for someone who is amoral any longer. Although there are such discernible differences as the one previously mentioned, one must also realize that there are prominent similarities between Jack and the anonymous patient. The leading similarity, strangely enough, is connected to the change cited earlier. Jack’s new set of values is what is equivalent to the new values the patient receives along with his new personality. Jack

Wednesday, September 18, 2019

Comparative Character Analysis of Classical Vs. Modern Tragic Protagoni

Comparative Character Analysis of Classical Vs. Modern Tragic Protagonists. A hero/ heroine is described as the principal male/ female character in a literary or dramatic work or the central figure in an event, period, or movement. The classic tragic hero was defined by Aristotle in the fourth century as, â€Å"someone who is highly renowned and prosperous† (LATWP, 639), suggesting that there is a â€Å"natural right ordering and proportion of traits within the human being that if violated, produces calamity† (LATWP, 639). The book goes on to define classical tragedy as one that â€Å"involves the inevitable destruction of a noble person by means of character flaw, usually a disproportionate measure of a specific human attribute such as pride, jealousy or indecision† (LATWP, 639). On the other hand, another type of tragic hero exists, the modern tragic hero. This type of hero is a product of a clash between the individual and the social environment. Arthur Miller, the famous playwright said, â€Å"each person has a chosen image of self and position, tragedy results when the characters environment denies the fulfillment of this self concept.† (LATWP, 640). This is a contrast from Aristotle’s classic tragic hero because the hero is no longer born into nobility but gains stature in the action of pitting self against cosmos, and the tragedy becomes, â€Å"the disaster inherent in being torn away from our chosen image of what and who we are in this world.† (LATWP, 640). In the tragic play named after it...

Tuesday, September 17, 2019

Interracial Adoption Essay -- Social Issues, Foster Care, Racial Relat

Imagine being a child without a family, longing for to be living in place to call home you, and feeling incomplete because you do not have a place where you belong. Many children in foster care or orphanages are faced with similar feelings. Children who live in the United States often wait years to be adopted and in most cases, the minority children wait twice as long to be placed with families of their own ethnic background. One article by Linda Johnson Price, the president and CEO of Ebony magazine and a woman who was also adopted, discussed the fact that there are around 500,000 children in foster care waiting to be placed into a home and that close to 45 percent of those children are black (Rice, 2007). She also specifies that the Department of Health and Human Services has studies that show that African Americans wait longer than any other race and that adoption experts say that black children are deemed special needs children and it does not necessarily have to do with their me ntal or physical capabilities (Rice, 2007). The number of minority children waiting to be adopted will continue to rise unless we come up with a solution. One way to address the issue with the long wait process that these children experience is to consider interracial adoption. This type of adoption refers to potential parents who choose to adopt a child or children of a different race, culture, or ethnicity from their own. In order to address the disproportion of minority children who wait to be adopted, we must first consider the requirements one faces to be able to be a perspective adopting parent. The adoption process starts off by choosing an adoption agency. Next, the agency will send someone to the prospective parents’ home to gather informat... ...ion will say that parents who adopt children of different ethnicities are not capable of caring or educating the child simply because of the cultural differences. The critics opinion has merit in the since that the parents cannot teach the child to be their race but they can provide love and raise them to be responsible adults. In the end we must consider which is more important, being able to find a child a loving family when race is not a factor or waiting for an indefinite time to try to find a family of the same race. If you are thinking about which is more important remember that for every twenty children who are in foster care at least nine of them wait an extended amount of time to be adopted. All children deserve a loving home and although we live in an imperfect society our children should not have to experience the feeling of not being wanted or loved.

Globalization and advancement in technology Essay

Globalization and advancement in technology has resulted in the governments taking a back seat as regards shaping the destiny of its people. The increased capacities of individuals do not seem to provide any point of refuge. The most difficult thing from this situation is the fact that the new political agenda being championed for the millennium is not well documented for. The book China and Globalization presents an in-depth analysis of the political, economic and social transformations that the Chinese society and state went through over the past thirty years. The author argues that the rise of China throughout this period has been propelled through the dynamic geopolitical environment as a result of community building efforts that enhance economic cooperation CITATION Gut09 l 1033 (Guthrie, 2009). A Brief History of Neoliberalism by David Harvey aims to find out the goals of neoliberalism and presents a useful explanation on why neoliberal policies do not always follow neoliberal theory. Harvey simply considers this new form of political economy as a means through which the global economic elite reconstitutes the high class power CITATION Har05 l 1033 (Harvey, 2005). He states that elite power often takes precedence in the event of a conflict with the contemporary neoliberalism economic principles. Harvey’s book is a powerful tool for analyzing the accumulation by deficiency concept. Doug emphasizes that this has been the foundation to the facilitation and eventual institutionalization of China’s economic integration. This argument is quite a challenge of David Harvey’s neo liberal argument that the rises of neo liberal economies like the United States and capitalist China is the cornerstone of an intended project to restore the noble power. According to Doug, the rise of Chinese revolution is â€Å"the result of methodical and careful government policies† (p 8). The fundamental element basis of Doug’s argument lies in her view that the successful revolution of China was because it was gradual and was led by the state. She states that China’s propagation of bilateral PTA’s is a â€Å"necessary intermediate step toward a seamless integration into a pan regional framework† (Guthrie p.15). This argument, though quite an optimistic and bold claim by Doug Guthrie is in contrast to David Harvey who argues that the propag ation of bilateral PTAs is an emasculation to region building in Asia. David Harvey’s sanguine view is that most bilateral PTAs are merely destabilizing to regional cooperation owing to the fact that most bilateral PTAs are strategically or politically driven. The Chinese government led by Deng Xiaoping introduced reforms that allowed the actors of the economy to master the rules of capitalism rather than making assumptions and withdrawing perceptions based on intuitions CITATION Gut09 l 1033 (Guthrie, 2009). Incentives were stimulated by granting autonomy to the local government. Currently, foreign investors in China deal with provincial bureaucracy and build long term alliances rather than the central government. Guthrie points out that the crucial underlying mechanisms that boosted a much freer Chinese environment were the autonomy of individuals at the workplaces and the depletion of monitoring capacity of the Chinese Communist Party (CCP). Individuals no longer had to de pend on their superiors or work units despite the fact that there was a major rise in corruption among local officials. The results of such reforms were the evolution of an independent middle class that was economically secure. High rewards were offered to holders of foreign language skills and university degrees and the access to female education increased. Guthrie advocates for China to engage strongly with the United States in order to acquire grander external motivation as a way to overcome domestic hindrances. However, her assertion that a futurist state can better engineer changes from socialism raises questions as to whether or not developing countries can only grow by enforcing autocratic policies CITATION Gut09 l 1033 (Guthrie, 2009). David Harvey argues that while neoliberal economies may boast of allowing the free market to take its course, government intervention and regulation only comes into place when it is beneficial to economic elites. Thus from a neoliberal perspective, environmental and labor regulations by the government always lead to inefficiency by distorting free market price mechanisms CITATION Har05 l 1033 (Harvey, 2005). In his opinion, the main aim of neoliberalism was not wealth increase but wealth redistribution and uses statistics to explain this phenomenon. Harvey’s argument is supported by the decrease of real wages in the poorer sectors of neoliberal economies like the United States and the massive wealth increases of the economic elite. In his view, Harvey refers to this type of wealth distribution as accumulation by dispossession and goes on to state that this is how neoliberalism has managed to redistribute wealth and considers it a transition to the onset of capitalism. Among th e main aspects of this one sided wealth redistribution are monetization, privatization, state redistributions, commodification and the management by manipulation of crises. Harvey presents a brief history of neoliberalism where he point out that before its existence the political economy was dominated by embedded liberalism which was a form of capitalism. His assumption of neoliberalism is that it is quite extremist in its operation and if unchecked will be unruly because of socialism failure to develop a reliable model. The pretense by socialism as a means of management of the state and its people without any form of intervention of market forces results in social destruction CITATION Har05 l 1033 (Harvey, 2005). He is attached to this political tradition of democratic capitalism. His view is that of economic restructuring for the development of the people in general. To this effect, Harvey fails to understand why the way of doing things in neoliberal economies is more prominent across the globe even though they embrace democratic capitalism. The push and pull between the two ideologies of Guthrie and Harvey could be attributed to economic growth witnessed across the globe in this period. Harvey asserts in his writing that neoliberalism to some extent does not meet up its expectations by the people. The win by embedded neoliberalism according to him was not a stable environment to create a socially stable environment. Both authors present vague points at some point. Doug Guthrie believes that China is taking baby steps to becoming a capitalist nation and therefore the way to remain economically viable is through slow transition from a command to market economy. Guthrie in totality misses the whole idea that democracy and growth in newly industrialized countries have an inverse relationship. David Harvey on the other hand fails to clearly highlight the main economic policies of neoliberalism. From the review of the different aspects of the books by Harvey and Guthrie, it is indeed difficult to exactly point a celebration o f the past century with the misery related to the so many ideologies that have not been successful in the long run. The books depict a situation of melancholy with the authors coming to terms so late in agreeing with the disadvantages related to these ideologies and their lack of appreciation of the one ideology that has revealed the aspirations of human and has been able to change to the different circumstances of life as it is. References   Guthrie, D. (2009). China and Globalization: The Social, Economic and Political Transformation of Chinese Society. New York: Taylor & Francis. Harvey, D. (2005). A Brief History of Neoliberalism. Oxford: Oxford University Press. Source document

Monday, September 16, 2019

IT Strategy and the Overall Business Strategy Essay

I-  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Introduction Business strategies were basically developed as weapons in the competition. However, with the rapid change in business environment, competition roles have changed forcing companies to redefine their way in order to compete. With the evolved role of IT, organizations started to think to use IT as a strategic weapon either as a competitive advantage or even as an enabler for growth. However, unfortunately IT solely was not enough to take that role. So, organizations needed to rethink and reinvent new management or business best practices in order to maximize the obtained IT value. As a result, organizations adopted best practices such as IT business alignment to align IT with their business strategic goals in order to survive and succeed in the competition. The aim of this paper is to determine whether an IT strategy focused on maintaining a cutting-edge position is the most effective way to support any kind of overall business strategy or not. The main hypotheses of the research are that (1) IT strategy focused on maintaining a cutting-edge technology position isn’t enough (or isn’t the most effective way) to support the overall business strategy because (2) it has to be aligned with the overall business strategy. The paper first of all defines the term â€Å"IT business alignment†, then analyzes the current situation, and finally it ends with a conclusion. II-  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Definitions Before analyzing the current situation, it is necessary to define an important term such as â€Å"IT Business Alignment†. Tapia, R. S. (2006) gives a simple straight-to-the-point definition for the term ‘IT Business alignment’ â€Å"the problem of matching services offered by IT with the requirements of the business†. (p.1) III-  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Situation Analysis In order to test the research hypotheses or to prove that an IT strategy focused on maintaining a cutting-edge technology position is not the most effective way to support any kind of overall business strategy, this section will analyze the current situation of IT projects and the relationship with their business strategic goals and requirement. 1.  Ã‚  Ã‚  Ã‚  Ã‚   IT projects fail to deliver a value Research showed that the gap between IT and business strategic goals still significantly exists. A significant percentage of IT projects fail to deliver a value as shown in figure (1). According to Needmuchwala, A. A., [2008], â€Å"41% of IT projects failed to deliver the expected value†. And he presented another interesting fact such as: â€Å"more than  ¼ of IT projects were canceled† (p.3) not to mention that â€Å"only 11% of organizations consider technology as a strategic weapon† (p.3) Figure (1): Failure types of IT projects (Sample size: 800 IT managers in 8 countries) Source: Dynamic Markets Limited (2007). IT Projects: Experience certainty (cited in Needmuchwala, A. A., [2008]. Evolving IT from ‘Running the Business’ to ‘Changing the Business†)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Another survey conducted by Shpilberg, D. & Berez, S. & Puryear, R. & Shah, A. (2007) showed that a hug percentage of IT projects (three-quarters of companies as shown in figure: 2) â€Å"failed to deliver as expected and drifted in the ‘maintenance zone’ where IT projects were disconnected from the overall strategic goals and objectives’. (p.52) Whereas the 11% companies in the alignment trap shown in this survey even failed to deliver results on time or on budget and spent 13% more than the average and had 14% lower revenue growth.† (p.52) Figure (2): IT alignment Survey results (Sample size: more than 500 senior and IT executives worldwide) Source: Shpilberg, D. & Berez, S. & Puryear, R. & Shah, A. (2007). Avoiding the Alignment Trap in Information Technology   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Now, the current situation tells us that IT strategies focused only on maintaining cutting-edge technology position, away from business strategy, are not the effective way to support the overall business strategy. Another way to prove that is to prove that the strategic alignment between IT strategy and business strategy is the effective way to support the overall business strategy and to deliver a business value. 2.  Ã‚  Ã‚  Ã‚  Ã‚   IT Business alignment proved to deliver value 2.1 The Need for Strategic Alignment Before mentioning any facts about IT business alignment, Figure (3) shows levels of relationship between IT and business strategy and the value offered in each alignment level. These development stages were suggested by Wyatt-Haines, R. (2007) and are chosen here to explain the necessity of the engagement between IT and business strategy. Facts show that â€Å"many IT functions fail to deliver even at the first basic level ‘following the business’† (Wyatt-Haines, R., 2007, p.6) and this is obviously happens when IT simply fails to understand ‘business needs’ or in another word, the basic engagement with business strategy. Figure (3): Levels of Relationship Between IT and Business Strategy Relationship with business IT Development Stages (Levels of Alignment) 1. Following 2. Enabling 3. Leading Goals/Functions of IT in each development stage/ alignment level Reacts to business needs Maximizing value  Ã‚   predicting, resourcing priorities    Extremely aligned, a key player in leading thinking and planning Relationship with business strategy    Understanding of business needs Understanding of business strategy Understanding of business environment Business Results/Value (Alignment Impact) Delivering value Strategic success Creating strategic opportunities    Source: Development Stages (Following-Enabling-Leading) were adopted from: Wyatt-Haines, R. (2007). Leadership Impact Through IT    Also, Jahnke, A. (2004) assured that â€Å"the full participation and engagement of the business is the only guarantee to turn IT capabilities into business benefits†. So, the strategic alignment in this case is considered to be a necessity not a luxury. Now, after realizing the fact that IT alignment is a necessity to obtain a business value, it’s time to analyze the IT business alignment current situation. First of all, research findings showed that â€Å"management practices such as strategic alignment contributes to higher levels of IT business value†. (Tallon, P. P. & Kraemer, K. L. & Gurbaxani, V., 2001, p.1: Sample size: 304 business executives worldwide). Also, according to CIO update (2004), â€Å"96% of IT executives predict a positive impact of aligning IT strategy with the corporate strategy†. (As shown in figure: 4) 2.2 The ROI or the value of the Alignment To make sure that IT business alignment is an effective way to support the business strategy, this section also will focus on the situation of the successfully aligned companies to make sure that the strategic alignment enables companies to obtain a value or ROI. First, Holmes, A. (2007) found these companies who succeeded in aligning IT with the business strategy generated â€Å"a new revenue stream more than twice as often as other companies who said they were not aligned†. Figure (4): IT alignment survey results (Impact and Challenges) Source: CIO update (2004). Aligning IT & Business Strategies Still Elusive Also, the survey –mentioned before- conducted by Shpilberg, D. & Berez, S. & Puryear, R. & Shah, A. (2007) showed that the successfully highly aligned highly effective companies (7% of respondents as shown in figure 2) â€Å"recorded a compound annual growth rate –over three years- 35% higher than the survey average†. (p.53) These companies successfully -as the authors described them- â€Å"have put IT where it belongs ‘at the heart of the business processes’ that define organization’s position in business environment or the marketplace†. (p.58) So, IT in these companies didn’t focus on the cutting-edge technology position but it focused on how to support the business strategic position by aligning IT strategy with the overall business strategy. IV-  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Conclusion Now, after analyzing the current situation of IT projects, it is obvious that an IT strategy focused only on maintaining a cutting-edge technology position is not enough (or not the most effective way) to support any kind of overall business strategy, because facts say that IT disconnected and isolated strategies failed to support business overall strategies and even became a heavy burden on their organizations. On the other hand, aligned IT strategies proved to deliver a value and this value differs and are maximized depending on the engagement level with business strategy. In another word, the first success factor is to strategically align IT with the business goals and requirements meaning to support the business strategic position and not the cutting-edge technology position. Finally –upon these findings- the crime –as described by Jahnke, A. (2004) is the lack of alignment because â€Å"the lack of alignment represents a waste of money, a waste of effort, and wasted opportunities.† References CIO update (2004). Aligning IT & Business Strategies Still Elusive. CIO. Retrieved April 29, 2008 from http://www.cioupdate.com/insights/article.php/3328551 Holmes, A. (2007). The ROI of Alignment. CIO. Retrieved April 29, 2008 from http://www.cio.com/article/27969/The_ROI_of_Alignment/ Jahnke, A. (2004). Why is Business-IT alignment So Difficult?. CIO. Retrieved April 29, 2008 from http://www.cio.com/article/32322 Needmuchwala, A. A. [2008]. Evolving IT from ‘Running the Business’ to ‘Changing the Business†. Retrieved April 29, 2008 from http://www.tcs.com/SiteCollectionDocuments/White%20Papers/DEWP_05.pdf Shpilberg, D. & Berez, S. & Puryear, R. & Shah, A. (2007). Avoiding the Alignment Trap in Information Technology. MIT Sloan Management Review, Fall 2007, 49(1) pp. 51-58. Retrieved April 29, 2008 from http://sloanreview.mit.edu/wsj/insight/pdfs/49102.pdf Tallon, P. P. & Kraemer, K. L. & Gurbaxani, V. (2001). Executives’ Perceptions of the Business Value of Information Technology: A process-oriented approach. Journal of Management Information Systems, 16(4), 145-174. Retrieved April 23, 2008 from http://repositories.cdlib.org/cgi/viewcontent.cgi?article=1057&context=crito Tapia, R. S. (2006). A Value-Based Maturity Model for IT Alignment in Networked Businesses, Netherlands. Retrieved April 29, 2008 from http://eprints.eemcs.utwente.nl/2778/01/Subprojectproposal.pdf Wyatt-Haines, R. (2007), Leadership Impact Through IT, Business Leadership Review IV:IV, October 2007. Retrieved April 29, 2008 from  Ã‚   http://mbaguide.mbaworld.com/downloadblrarticle/1047/index.htm

Sunday, September 15, 2019

Charles Babbage

Charles Babbage (1791-1871) To begin with, Charles Babbage, an original innovative thinker and a pioneer of computing from Great Britain, was born on the 26th of December of 1791 in Walworth, Surrey and he died at his home in London on October 18, 1871. He was an incredible mathematician and it is mentioned that he was indisposed as a child so he mainly been educated at home. Babbage made contributions that may assured his fame irrespective of the Difference and Analytical Engines. After his wife’s death he was never again married. not necessary to put) He went at Trinity College, Cambridge in October of 1810. He was very disappointed about the poor variety of the math programs available there so he and some other friends decided to form the Analytical Society. In 1812 he transferred to Peterhouse, Cambridge but he failed to graduate with honours. He received a degree later without even being examined in 1814. After graduation Babbage was hired by the Royal Institution in orde r to lecture on calculus. There, in 1816 he was elected as a member of the Royal Society and found the Astronomical Society.In the meantime (1817) he received MA from Cambridge. Since 1828 and some years after, until 1839 he was named the Lucasian Professor of Mathematics at Cambridge. Charles Babbage also has the nickname â€Å"Father of Computing† due to his detailed plans for mechanical Calculating Engines, both the table-making Difference Engines (1821) and the far more ambitious Analytical Engines (1837), which were flexible and powerful, punched-card controlled general purpose calculators, containing many features which later reappeared in the modern computer.Because of the high error rate in the calculation of mathematical tables, Charles Babbage wanted to find a solution with which the mechanical calculations could be done with less or without errors. He was influenced by three different factors such as a dislike of untidiness; his experience working on logarithmic ta bles; and existing work on calculating machines carried out by Wilhelm Schickard, Blaise Pascal, and Gottfried Leibniz. During 1820, Babbage started the development of his first Difference Engine. It was a mechanical device that could perform simple mathematical calculations.Although he began promising, was unable to complete it due to huge expenses needed. After that,  in the 1830s Babbage began developing his Analytical Engine, which was designed to cope with much complicated calculations, but it was never built. (put what you think in diff. words.. ) Unfortunately because of critical tolerances required by his machines exceeded the level of technology available at the time and, though Babbage’s work was formally recognized by respected scientific institutions, the British government suspended funding for his Difference Engine in 1832.In 1833 Ada Augusta Lovelace met Charles Babbage and was fascinated with both him and his Engines. Later she became a competent student of mathematics, which was unusual for a woman at that time. Under Babbage's careful supervision Ada added extensive notes which constitute the best contemporary description of the Engines, and the best account we have of Babbage's views on the general powers of the Engines. It is often suggested that Ada was the world's first programmer.There remain only fragments of Babbage's prototype Difference Engine, and though he devoted most of his time and large fortune towards construction of his Analytical Engine after 1856, he never succeeded in completing any of his several designs for it. George Scheutz, a Swedish printer, successfully constructed a machine based on the designs for Babbage's Difference Engine in 1854. This machine printed mathematical, astronomical and actuarial tables with extraordinary accuracy.Babbage's work was continued by his son, Henry Prevost Babbage, after his death in 1871, but the Analytical Engine was never successfully completed, and ran only a few â€Å"prog rams† with disappointing results. Summing up, Babbage extent his achievements by writing about the assurance of life as well as breaking mathematical codes. His calculus engine was stayed in history for many years and until today left their mark in our world. It is remarkable that was create a foundation, with the name of Charles Babbage, in order to honor him and to recognize his work and how is connected to the modern computers.

Saturday, September 14, 2019

Kalimunda Hakim Internship Report 2012

1 INTERNSHIP REPORT MTN RWANDA PO BOX 264 BY Kalimunda Hakim Student At RTUC Bachelor In Business Information Technologies _____________________ SUPERVISED BY Aymard Mbonabucya Information & Network Security Administrator _____________________ FROM 26 November, 2012 TO 15 January, 2013 INTERNSHIP REPORT 2 ACKNOWLEDGEMENT I am deeply intended to almighty God who has protected me through the whole period of internship.My special thanks are addressed to the MTN RWANDA administration for giving me such opportunity of passing an internship in their company, My sincere acknowledgement go to the Human resource Director Merry Assimwe for their acceptance of my intern . Thank you for all. I am grateful to my Supervisor Aymard MBONABUCYA for being a best man I have ever known and his modesty, encouragement and understanding s on all my daily questions and answer it because of his spiritual and technical support; I used to became free to ask any question regarding network because he is very goo d at networking, may thanks be given to him.I finally thank all MTN staff in technology department for their good collaboration during this very important internship. INTERNSHIP REPORT 3 PREFACE The purpose of this report is to fulfill the internship requirement for the Bachelor degree in Business Information Technology program at Rwanda Tourism University College ; to till 15 January, 2013) with a private organizations in Rwanda called MTN RWANDA. successes and short. explain what I did achieved and learned during my internship period (26 November, 2012 The report focuses primarily on intern’s duties and responsibilities, internship results, its INTERNSHIP REPORT 4 About MTN RwandaMTN is a global communications company and world-class cellular network. empowerment. As a major communications company, MTN is specifically focused on the Africa and the Middle East. We believe that through access to communication comes economic Serving you since 1998, MTN Rwanda continues to expa nd its network, offer new and innovative packages and services and keep up with the latest trends in communications while maintaining affordability. MTN Mobile Money has transacted over US$36 million Bulk Payment Services. MTN Rwanda has over 2. 9 million subscribers and its network coverage extends to over 98% of the population. ince its launch in 2010. The payment platform is now offering Cash Power Top-up and INTERNSHIP REPORT 5 ACKNOWLEDGEMENT PREFACE. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 BACKGROUND OF COMPANY. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 CHAPTER I. INTRODUCTION†¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. 1. OVERVIEW OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. II. 1. OVERVIEW OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. II. 2. CONCEPTS OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ?II. 2. CONCEPTS OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. TABLE OF CONTENTS TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦3 CHAPTER II. PRESENATION ON SWITCHING AND ROUTING CONCEPTS AND CONFIGURATION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦II. 3. SOME CONFIGURATION OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. II. II. 3. SOME CONFIGURATION OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. NETWORK LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 2. CISCO HIERARCHIAL LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 3. CORE LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 4. DISTRIBUTION LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. 5. ACCESS LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. 1. OVERVIEW OF NETWORK LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. IV. NETWORK DESIGN CONCEPT †¦. II. IV. 1. THEORIES ON NETWORK DESIGN†¦Ã¢â‚¬ ¦ II. IV. 4 SWITCH PASSWORD RECOVERY II. IV. 2. OVERVIEW ON VIRTUAL LOCAL AREA NETWORK (VLAN) II. IV. 5. FIREWALL PASSWORD RECOVERY II. IV. 3. ROUTER PASSWORD RECOVERY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..INTERNSHIP REPORT 6 INTERNSHIP REPORT 7 Chapter 2. Presentation on switching, routing concepts and configuration II. 1. OVERVIEW OF SWITCH What is switching? Networking concept has two basic concepts and they are Switching and Routing . They using one of these methods. are fundamental concepts in Networking ,other topics like network security are based on these concept. Routing and Switching are the base packet or data delivering methods in When we are talking about the switching ,the protocols and concepts are related to the layer 2 and data packets with in this layer that are called frame . re bigger and bigger and also more expensive. 10base5, 10base-T for cabling were used . . Better switches have more choices than 2 condition and because of this capacity, they In Networking there is a long history for switches. At first time the direct connection network and each device like router , switch , hub , firewall , proxy , cash server, modem are As you know the switch refers to the device that can select one condition from 2 or more conditions .For example an electrical switch can select 0 as turn off and select 1 for turn on between to or more computer used to make a network and such technology like 10base2, In those technologies , the base topology was BUS Technology and the most advanced of more devices for sending and receiving data , and when a device wants to send data for figure below we can see a logical view to a hub and the meaning of bus . II. 2. CONCEPTS OF SWITCHING this technology is HUB. A bus or data bus refers to the one link(shared link) between 2 or another device ,this bus should be empty and none of devices should not use the bus . In INTERNSHIP REPORT FIGURE 1: SWITCH II. 3. SOME CONFIGURATION OF SWITCHING Command switch>? switch>enable switch# switch#disable switch>exit switch#show version switch#show flash: switch#show mac-addresstable switch#show running-config switch# show startup-config switch#show vlan switch#show interfaces switch#show interface vlan1 descriptions The ? works here the same as in a router Used to get the list of all available commands User mode, same as a router Privileged mode Leaves privileged mode Leaves user mode Displays information about software and hardware. Displays information about flash memory (will work only for the 2900/2950 series).Displays the current MAC address forwarding table . Displays the current configuration in DRAM. Displays the current configuration in NVRAM. Displays the current VLAN configuration. Displays the interface configuration and status of line: up/up, up/down, admin down. Displays setting of virtual interface VLAN 1, the default VLAN on the switch. INTERNSHIP REPORT 9 II. II. 1. OVERVIEW OF ROUTING is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching technology.R outers switching), electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily with routing in electronic data networks using packet II. II. 2. CONCEPTS OF ROUTING Whereas switches and bridges operate at OSI Layer 2 (the data link layer), routers primarily operate at OSI Layer 3 (the network layer). Like bridging, make the forwarding decisions. Routers make decisions based on network layer protocols such as Internet Protocol (IP) and Novell NetWare Internetwork Packet Exchange (IPX). growing beyond the capability of bridges. Before this popularity, networ he primary act of routing involves moving packets across a network from a source to a destination. The difference involves the information that is used to Routing gained popularity in the mid- to late 1980s as a result of internetworks Figure 2: Image of Router II. II. 3. SOME CONFIGURATION OF ROUTING modes, and the resulting prompts. The prompt helps you identify which mode you are in and, therefore, which commands are available to you: Mode of Operation Usage Mode How to Enter the Prompt The following table describes some of the most commonly used modes, how to enter the INTERNSHIP REPORT 10User EXEC Change terminal settings on a temporary basis, perform basic tests, and list system information. First level accessed. Router> Privileged EXEC Global Config System administration, set operating parameters. Modify configuration that affect the system as a whole. Modify the operation of an interface. Create the initial configuration. From user EXEC mode, enter enable password command Interface Config Setup From privileged EXEC, enter configure terminal. From global mode, enter interface type number. Router# Router(config)# Router(config-if)# Prompted dialog From privileged EXEC mode, enter command setup. User EXEC Mode:When you are connected to the router, you are started in user EXEC mode. The user EXEC commands are a subset of the privileged EXEC commands. P rivileged EXEC Mode: Privileged commands include the following: †¢ Configure – Changes the software configuration. Enter the command disable to exit from the privileged EXEC mode and return to user EXEC mode. †¢ Debug – Display process and hardware event messages. †¢ Setup – Enter configuration information at the prompts. INTERNSHIP REPORT 11 Configuration Mode Configuration mode has a set of submodes that you use for modifying interface settings, routing protocol settings, line settings, and so forth.Use caution with configuration mode because all changes you enter take effect immediately. Note: To enter configuration mode, enter the command configure terminal and exit by pressing Ctrl-Z. Almost every configuration command also has a no form. In general, use the no form to disable a feature or function. Use the command without the keyword no to re-enable a disabled feature or to enable a feature that is disabled by default. For example, IP routin g is enabled by default. To disable IP routing, enter the no ip routing command and enter ip routing to re-enable it.INTERNSHIP REPORT 12 Getting Help In any command mode, you can get a list of available commands by entering a question mark (? ). To obtain a list of commands that begin with a particular character sequence, type in those characters followed immediately by the question mark (? ). Router#co? configure connect copy Router>? To list keywords or arguments, enter a question mark in place of a keyword or argument. Include a space before the question mark. Router#configure ? memory Configure from NV memory network Configure from a TFTP network host terminal Configure from the terminalYou can also abbreviate commands and keywords by entering just enough characters to make the command unique from other commands. For example, you can abbreviate the show command to sh. INTERNSHIP REPORT 13 Configuration Files Any time you make changes to the router configuration, you must save t he changes to memory because if you do not they will be lost if there is a system reload or power outage. There are two types of configuration files: the running (current operating) configuration and the startup configuration. Use the following privileged mode commands to work with configuration files. show running-config – display the running configuration. †¢ show startup-config – display the startup configuration. †¢ configure terminal – modify the running configuration manually from the terminal. †¢ copy running-config startup-config – copy the running configuration to the startup configuration. †¢ copy startup-config running-config – copy the startup configuration to the running configuration. †¢ erase startup-config – erase the startup-configuration in NVRAM. †¢ copy tftp running-config – load a configuration file stored on a Trivial File Transfer Protocol (TFTP) server into the running configuratio n. copy running-config tftp – store the running configuration on a TFTP server. INTERNSHIP REPORT 14 IP Address Configuration Take the following steps to configure the IP address of an interface. Step 1: Enter privileged EXEC mode: Router>enable password Router#config terminal Example: Example, Step 2: Enter the configure terminal command to enter global configuration mode. Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for Cisco 2500 series) to enter the interface configuration mode. Step 4: Enter the IP address and subnet mask of the interface using the ip address ipaddress subnetmask command.Step 5: Exit the configuration mode by pressing Ctrl-Z Router(config-if)#[Ctrl-Z Router (config-if)#ip address 192. 168. 10. 1 255. 255. 255. 0 Router (config)#interface ethernet 0/1 II. III. NETWORK LAYER II. III. 1. OVERVIEW OF NETWORK LAYER INTERNSHIP REPORT II. III. 2. CISCO HIERARCHIAL LAYER 15 Hierarchy has many of the same benefits in network design that it does in other areas of life. When used properly, it makes networks more predictable. It helps us define at which levels of hierarchy we should perform certain functions.Likewise, you can use tools such as access lists at certain levels in hierarchical networks and avoid them at others. large networks can be extremely complicated, with multiple protocols, detailed configurations, and diverse technologies. Hierarchy helps us summarize a complex collection of details into an understandable model. Then, as specific configurations are needed, the model dictates the appropriate manner to apply them. The Cisco hierarchical model can help you design, implement, and maintain a scalable, reliable, cost-effective hierarchical internetwork.The following are the three layers: ? ? ? FIGURE 3 : CISCONHIERARCHIAL Each layer has specific responsibilities. However, that the three layers are logical and are not necessarily physical devices. Consider the OSI model, another logica l hierarchy. The seven layers describe functions but not necessarily protocols. Now, let's take a closer look at each of the layers. II. III. 3. CORE LAYER the core layer is responsible for transporting large amounts of data quickly The Core layer or Backbone The Distribution layer The Access layer and reliably.The designer must ensure that the core layer is designed with fault tolerance, especially because all users in the network can be affected by a failure. The ability to avoid unnecessary delays INTERNSHIP REPORT in network traffic quickly becomes a top priority for the network designer. What Happens at the Core Layer? 16 The core layer is sometimes called the network backbone. Routers and switches at the core layer provide high-speed connectivity. In an enterprise LAN, the core layer, shown in Figure 1-7, may connect multiple buildings or multiple sites, and may provide connectivity to the server farm.Goals of the Core Layer The core layer design enables the efficient, high-sp eed transfer of data between one section of the network and another. The primary design goals at the core layer are as follows: – Provide 100% uptime. -Maximize throughput. -Facilitate network growth. Core Layer Technologies Technologies used at the core layer include the following: – Routers or multilayer switches that combine routing and switching in the same device -Redundancy and load balancing – High-speed and aggregate links II. III. 4. DISTRIBUTION LAYERThe distribution layer is sometimes referred to as the workgroup layer and is the major communication point between the access layer and the core. The primary function of the distribution layer is to provide routing, filtering, and WAN access and to determine how packets can access the core, if needed. The distribution layer must determine the fastest way that network service requests are handled; for example, how a file request is forwarded to a server. After the distribution layer determines the best pat h, it forwards the request to the core layer. The core layer then quickly transports the request to the correct service.II. III. 5. ACCESS LAYER The access layer controls user and workgroup access to internetwork resources. The access layer is sometimes referred to as the desktop layer. The network resources most users need will be available locally. The distribution layer handles any traffic for remote services. INTERNSHIP REPORT The following are some of the functions to be included at the access layer: ? ? ? 17 Technologies such as DDR and Ethernet switching are frequently seen in the access layer. Static routing is seen here as well. As already noted, three separate levels does not imply three separate routers.It could be fewer, or it could be more. Remember, this is a layered approach. II. IV. NETWORK DESIGN CONCEPT My second part of my internship dealt with network design concept. In this I have been able to read different theories of network design from eBooks downloaded from the internet, doing exercises on subnetting, VLSM and VLANs and finally I had opportunity to do some practices on network documentation and laboratories on virtual LAN. II. IV. 1. THEORIES ON NETWORK DESIGN Designing a network for a better performance of data access and resource sharing of any institution is an extremely important thing to consider.I learned different concept of designing a network whether by reading eBooks or discussing it with my supervisor. A good network design is composed of four parts in general: Continued access control and policies Creation of separate collision domains Workgroup connectivity into the distribution layer through layer 2 switching Identification of customer’s needs and goals: In this part you deal with identifying business goals and technical requirements which include the task of characterizing the existing network, analysis of the network traffic. Logical network design: Here, it’s all about developing a network topology.Durin g this phase, you devise a network layer addressing model, and selects switching and routing protocols. It also includes security planning, network management design. Finally you make a study of the service provider on how he can meet your WAN and remote access requirements Physical network design: The physical design phase deals with specific technologies and products to realize the logical design. It starts with the selection of technologies and devices for campus networks that includes cabling, Ethernet switches, wireless access points, wireless bridges, and routers.There is also a selection of technologies and devices for remote-access and WAN needs. INTERNSHIP REPORT Testing, Optimizing and Documentation: The final step is to write and implement a test plan, build a prototype or pilot, optimize the network design, and document your work with a network design proposal. If your test results indicate any performance problems, then during this phase you have to update your design t o include such optimization features. 18 In all this different network design steps, I have been able to do some practices on logical network design where I did exercises on subnetting, VLAN as network management requires it.II. IV. 2. OVERVIEW VIRTUAL LOCAL AREA NETWORK (VLAN) Definition A VLAN (Virtual Local Network) is a logically separate IP subnetwork. VLANs allow multiple IP networks and subnets to exist on the same-switched network. A VLAN is a logical broadcast domain that can span multiple physical LAN segments. It allows an administrator to group together stations by logical function. A VLAN has three major functions: i. Limits the size of broadcast domains ii. Improves network performance ii. Provides a level of securitySecurity – Security of sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches. Advantages of VLAN: Higher performance – Division of Layer 2 networks into multiple logical workgro ups (broadcast domains) reduces unnecessary traffic on the network and boosts performance. Cost reduction – Cost savings result from less need for expensive network upgrades and more on this network. Types of VLAN There are different types of VLANs. The type of network traffic they carry defines a particular type of VLAN and others INTERNSHIP REPORT 9 names due to the type or a specific function the VLAN performs. The following describes common VLAN: Default VLAN At the initial boot up of the switch, All switch ports become a member of the default VLAN, which makes them all part of the same broadcast domain. This allows any network device connected to any of the switch port to communicate with other devices on other switch ports. On Cisco switches the default VLAN is VLAN 1. VLAN 1 has all the features of any VLAN, except that you cannot rename or delete it. Data VLAN A data VLAN that can also be referred to as user VLAN.This is configured to carry only usergenerated traffic. The importance of separating user data from other type of VLAN is proper switch management and control. Native VLAN A native VLAN is assigned to trunk port. An trunk port supports traffic coming from many VLANs as well as traffic that do not come from a VLAN. The trunk port places untagged traffic (traffic that does not come from a VLAN) on the native VLAN. In summary, the native VLAN observes and identifies traffic coming from each end of a trunk link. Management VLAN A management VLAN is any VLAN you configure to access the management capabilities of a switch.Your configured management VLAN is to be assign with an IP address and subnet mask. Any of a switch VLAN could be configured as the management VLAN if you has not configured or define a unique VLAN to serve as the management VLAN. In some cases, a network administrator proactively defines VLAN 1 as the management VLAN; this enables a loophole for an unauthorized connection to a switch. Voice VLAN Voice VLAN is configured to carry voice traffic. Voice VLANs are mostly given transmission priority over other types of network traffic. Communication over the network is not complete without phone calls.More calls are made over the network than other forms of a message transmission. Sending emails and text messages are also forms of inter-relations but listening to a real voice provides legitimacy and assurance. SOME EXAMPLE OF VLAN INTERNSHIP REPORT There I was design a network that are composed with 1 router ,2 switch ,6machine. 20 And each switch have 3 computer . one switch to three machine . on the network we have default vlan ,native vlan ,management vlan. Management vlan can control other machine on network. this network have the vlan and trunk . e have design it by using a outils that called packet tracer FIGURE 4: DESIGN OF A NETWORK Example of same machine i ping Machine ip 196. 168. 40. 105 are pinging a switch3 ip address 196. 168. 40. 106 INTERNSHIP REPORT 21 FIGURE 5 : Command Prompt INTERNSHIP REPORT 22 II. IV. 3. ROUTER PASSWORD RECOVERY 1. Connect the router to the PC using a console cable/port. 2. Open an emulation software (Hyper Terminal or Terra Term or Secure CRT, Putty) + setup (Com port and bits=9600, etc. ) 3. Switch on the router HOLDING DOWN CTRL + BREAK (keys) a. The router will boot and display the ROMMON prompt (Rommon;) 4.Type the CONFREG command to view current status 5. Change the configuration register (this is a hexadecimal number that tells the IOS where to fetch the configuration file. 0x142 bypasses the NVRAM contents, 0x2102 gets the configuration file from the NVRAM) a. Rommon;confreg 0x142 b. Reset (reboot i. e. power-cycle the router) The router will boot in normal but asking for a new configuration. 6. Router; (after saying NO to the configuration wizard) 7. Go to privilege mode (enable) and copy the startup-config to the running-config (Router#copy startup-config running-config).This will load the configuration with an unkown password back to RAM). 8. As you are already in privilege, the unkown password won’t prevent you from changing the configuration. You can now change the privilege password (LAB#config t ; LAB(config)#enable secret cisco). Also change the console and vty passwords. 9. Change the configuration register back to 0x2102 (LAB(config)# config-register 0x2102) then reload (in privilege mode). 10. Save your configuration. (LAB#copy running-config startup-config or write memory ~ wr) INTERNSHIP REPORT