Wednesday, October 30, 2019

Targets of Anti-metastatic Drug Development Essay

Targets of Anti-metastatic Drug Development - Essay Example Therefore, in this literature review, the paper describes some of the candidate targets for the anti-metastatic drugs development and the progress that has been made, so far, in developing effective drugs. It is clear that driving oncogenic mutations are necessary for metastasis. A number of the oncogenic mutations so far identified affect cell fate regulation, genomic maintenance and cell survival (Glinsky and Raz, 2010, p. 1788). . These initiating and resultant progression events may also turn out indispensable for metastases establishment at a secondary site. Patient analysis has shown that agents targeting oncogenic mutations or amplifications, such as mutant BRAF in melanoma, amplified HER2 in breast-cancer, have demonstrated substantial effects controlling metastatic disease (Platt and Raz, 1992, P. 438),. Nonetheless, metastasis disease treatment might be sophisticated by the differential demonstration, activity or a combination of oncogenes in metastases during metastatic recurrence (McGarty and Block, 2006, p. 151). For instance, HER2 expression is high in estrogen receptor (ER)+HER2- of luminal breast cancer cells via tumour necrosis factor fantasticfamily member 11-RABKL signalling in the microenvironment of bones. The effectiveness of targeted therapies concerning metastatic environments is presently limited through the drug resistance that often happens in metastatic relapse. Resistance of this nature is always because of the coming up of de novo mutations. Furthermore, the adaptive ability of oncogenic signalling networks for overcoming monotherapy attract new drug targets as well as strategies for inhibiting feedback-regulated pathways. Therefore, constant efforts to maximize target therapies for such oncogenic drivers and to defeat drug resistance will be essential for treat ing metastatic disease. It has been found that tumour cells augment their intrinsic mobility through adopting cellular programs that

Monday, October 28, 2019

Predictive Policing Essay Example for Free

Predictive Policing Essay Information Technology, or IT, is the study, design, creation, utilization, support, and management of computer-based information systems, especially software applications and computer hardware. Information technology is not limited solely to computers, but other devices such as mobile phones, PDAs and other handheld devices. The field of IT is quickly moving from compartmentalized computer-focused areas to other forms of mobile technology. (Information Technology, 2011) Over the last decade, computer and telecommunications technologies have developed at a surprising rate. Increased computing power, advances in data transmission, smart and user-friendly graphic interfaces present law enforcement agencies with unprecedented capacity to collect, store, analyze and share data with stakeholders inside and outside of government. Ultimately, information technology represents a tool to help local law enforcement achieve its broadened and increasingly complex missions. (Reichert, 2001) Using information technology to fight crime by the police officers is becoming increasingly effective in apprehending the crime perpetrators. Historically, technological innovation has served as the substance for intense changes in the organization of police work and has presented both opportunities and challenges to police and other criminal justice practitioners, according to Janet Chan, a social scientist who has studied how information technology affects the way police do their jobs. 1 Noting that . information is the stock-in- trade of policing,. Chan has identified three general imperatives driving law enforcement’s evening investment in information technology. Using information technology in policing has add that more efficiency to the police department. Comparing the old-fashioned way of patrolling the streets to combat crime to then use them of using technology to predict the crime area and patrolling in advance deters crimes from happening. There are many advantages associated with using information technology in policing. Comparative analysis shows that using information technology (IT) to combat crime has save lot of resources and time in the police department. There are a number of other advantages that can be associated with the use of information technology in the police department. For instance they use of Automated Field Reporting System by the police department has eradicated the use of hand writing of reports at the field by the Police Officers. Officers completed handwritten incident reports in the field and submitted them at the end of a shift to a field supervisor. After reviewing and approving reports, field supervisors would send them to a central repository for filing, usually in the department’s records section. Personnel in the records section were responsible for distributing copies to other units in the department, such as the appropriate investigative unit, and entering information from the incident reports into a database. Depending on the specific system at a police department, the incident report process could take days, or even weeks, from the time the report was written to its availability in a database. The AFRS had saved Polices from going through all these processes. Even the time of going back to the office to submit the report has been saved by the police officers. The use of information technology makes the police officers to be able to know where a crime may potentiality happen, and their presence ahead of time help prevent the crime. Whereas random patrolling has the potential of missing the crimes area and that give criminals the leeway to perpetrate their criminal act. Using technology by the police helps them to arrive at the crime scene as early as practicable; this helps the offices to trace the criminals and apprehend them. Its called Predictive Policing a program which Capt. Sean Malinowski says puts officers on the scene before crimes occur. Sixty-five percent of our crimes are burglary, grand theft auto and burglary from a motor vehicle Malinowski said. And thats what these boxes represent. The real measure of this is not how many people you catch it is how much crime you prevent, said Beck. I love catching people its what I live for but what Id rather do is live in a place and work in a place where crime didnt happen. These include inputs, processing, output, and feedback. Inputs are collected in a form of data. The departments of the Police depends upon police incident and arrest reports for their crime data, but they also used computer-aided dispatch (CAD) data to aid identify geographic hot spots. In Minneapolis, officer debriefings of suspects were an additional feature of the information/data-gathering process. The Compstat process began when an officer filled out an incident/arrest report that he or she then hands to a commanding officer for approval. Once approved, a data clerk, who is located in the district, or in headquarters, enters crime information from the reports into a records management system (RMS). At this point the analysts in the Crime Analysis Unit (CAU) selected the data on the crimes that were regularly presented at Compstat meetings and entered them into a computer database. using a data management program, either MS Excel or MS Access. The main field research techniques we used were participation, observation, and formal interviews with city officials and police at various levels in the chain of command. At each site, researchers observed weekly or biweekly Compstat meetings and interviewed city and police department personnel. These included the mayor, city manager, chief, civilian staff, middle managers or district commanders, captains, lieutenants, detectives, first-line supervisors or sergeants, and patrol officers. District commanders previously relied heavily upon reading daily crime reports to identify problems and patterns, and they supplemented this information with personal experience and subjective evidence. The data is then analyzed and processed to make more meaningful. In conducting intensive field research, the police officers are especially interested in attaining detailed information on the role of Compstat-generated data and in learning about the â€Å"scanning† part of the problem-identification process. How were problems analyzed, and how were tactics reviewed and selected? What was the scope of the treatment developed to deal with a Compstat identified problem, in terms of the resources mobilized to deal with it? Was there a reorganization or mobilization of resources to address the problem, or was it handled merely by the routines of individuals or units already assigned to these duties? How were rank-and file officers involved in this process, if at all? Were specific officers or patrol units made accountable for addressing problems? How much follow-through was there on these initiatives? Data-driven problem identification and assessment: Compstat has significantly enhanced management and analysis of data. Examining crime maps and reviewing summary statistics was not essential to this process. Crime data helped inform but did not drive decision making.

Saturday, October 26, 2019

Electoral College Essay -- Political Science

According to critics, the Electoral College is a faulty system that should be abolished and replaced by direct election. Supporters of the Electoral College system make convincing arguments that it is the best system to decide the Presidential election in a complex society such as the United States. Many scholars place the Electoral College into a historical context by discussing its evolution and sustenance throughout the history of the United States. This paper will discuss the main arguments made by supporters of the Electoral College System. I will first provide a description of the Electoral College and offer justifications as to why it was conceived by the Founding Fathers. Next, I will present major arguments from the critics of the Electoral College. In the third section, I will present the findings from proponents of the Electoral College. Finally I will conclude by synthesizing the arguments made by both opponents and proponents; I also will present research questions that were raised while working on the paper; and finally, I will stress the importance of the Electoral College and explain why I think it is the best system we have to elect the President. The Electoral College system is a body of electors who formally elect the United States president and vice president. It was one of the most difficult agenda items in the 1787 Convention, where delegates were trying to create a fair and equitable way of selecting our President. As we would expect, there were numerous suggestions. For example, some delegates urged that the President should be selected by the Legislature while opposing delegates, in favor of direct election, believed that the Presidents loyalty would be to the Legislature instead of being independent in... ...ring Constitutional Conflicts. Web. 29 Apr. 2012. . 9. Haas, Karen L. "2010 Election Results and Vote Counts." Office of the Clerk of the U.S. House of Representatives. 3 June 2011. Web. 29 Apr. 2012. . 10. Reed, Lawrence W. "Keep the Electoral College!" [Mackinac Center]. 6 Mar. 2001. Web. 29 Apr. 2012. . 11. Vita, Matthew, and Helen Dewar. "The Framers, Federalism, and One Person, One Vote." JSTOR. 17 Nov. 2000. Web. 29 Apr. 2012. . 12. Longley, Robert. "Why Keep the Electoral College?" About.com US Government Info. US Government Info. Web. 29 Apr. 2012. .

Thursday, October 24, 2019

I Am the Grass Essay Essay

Am the Grass is a short story written by Daly Walker, who has also written other short stories for The Sewanee Review and The Sycamore Review. Born in Winchester, Indiana in 1924, Daly Walker is a surgeon by trade and started to write after he was forty. Daly also served in the Vietnam War from 1967-1968, it serves as an inspiration for I Am the Grass. The story details a mans struggle of life after the war in Vietnam, and returning to Vietnam. This includes painful psychological trauma, the feeling of guilt for his actions, and finally his attempt to redeem himself in his own eyes. At the start of the story we read about assorted atrocities committed during the Vietnam War by a nameless man, who is the main character. They include raping a thirteen-year old girl, decapitating a man with a machete, and throwing defenseless prisoners off of a helicopter. Along with the atrocities, the reader sees a battered past and something that haunts the main character . The story also goes on to explain how after the war, the main character goes on to medical school where he becomes a successful plastic surgeon. The main character also describes the fear that comes back to him when anti-war protestors blow up a classroom while he’s asleep. It takes him back to the attacks done on his base while he was in Vietnam, he goes on to explain that even though the he has left the war, â€Å"the war has followed him home† (316). The main character shows how he tries to redeem himself for the bad he has done. This includes going to impoverished countries to repair deformities on people who can’t afford plastic surgery. He explains â€Å"how it makes me feel like a decent man, a healer† (317). This shows how it feels good for him to heal people as opposed to feeling good killing them when he was younger. After the minor back-story and introduction to his past and inner-demons, the main character is on a plane headed to Vietnam. Ironically, this time to help the people he once did horrible things to. He is taken around the countryside, where he recognizes many of the nicknames of the roads soldiers gave. Then he is introduced to another surgeon, one who he would have originally called an enemy, to take him to those in need of the surgery. In nother twist of irony, the Vietnamese â€Å"surgeon† is missing his thumbs. This prevents him from performing surgery unlike the main character. They both talk about fighting each other in the war and then go forth to perform the surgeries on the people who needed them. As the story continues, the narrator, has been successful in 18 surgeries and feels good. Until he has to â€Å"make a difficult decision†(320) when the thumbless Vietnamese surgeon asks him to perform a â€Å"difficult surgery†(321) on him. A surgery where the big toe of the foot is transplanted to where the thumb once was. Despite the risk and lack of any more advanced medical tools, the narrator decides to go forward with it. This shows that the narrator is willing to do an extremely difficult surgery without the proper tools, so that perhaps he may find some peace in himself. Yet the dreams of the man he decapitated still haunt him, even on the eve of the big surgery. While he prepares himself, the narrator explains the feeling as â€Å"a sense of power that has been in no other place but surgery, except when my finger was on the trigger of an M60† (324). He starts and is meticulous in using the primitive medical instruments provided to him. He feels as if he has done a good job and even forms a steady friendship with the Vietnamese surgeon. However, the day he has to leave, it goes south. The main character goes to unwrap the bandages and finds that the transplant has failed, as the implanted big toe has rotted. Furious at himself, he removes it before he leaves. In an attempt to make himself feel better, it is shown how the main character hopes to see the thumbless surgeon at the airport. Perhaps saying bye to him and thanking him for his efforts. However there is no one there, on the flight home though, he realizes that the risk involved with Vietnam made him feel like a part of the country. He comes to see that he embraces the risk and everything that comes with it. I Am the Grass is presented as a story that is simple to understand, but also has an emotional effect. Walker gives us a character with a detailed past, a very good storyline, and the setting and theme of redemption which is present throughout the whole story. The theme of redemption is supported throughout the story. The main character tries to redeem himself in his own yes by doing surgeries for free in impoverished nations. Also, when he takes on the risky task of the toe transplant. It leaves the reader wondering, what if it would have worked? Would he have calmed his conscience of reminding him about the past atrocities he committed? The story, which begins by describing very graphic atrocities, turns into a story of more peace than war. One where the narrator has lost himself in the scourge of war, but is trying to find himself by using his talents for good. Trying to find inner-peace from his personal demons. It comes together near the end of the story. When he finds out the transplant didn’t work and he wants to leave immediately. But contrary to his expected reaction, the Vietnamese surgeon calmly tells him to remove it, which the main character does. In a way he faced his own inner demons despite the disappointment. Walker’s decision to make the setting a run down dirty hospital isn’t one that a lot of people can relate to. However, the message of redemption is one that a lot of people can. The conflict he delivers is one that is present in others, just not in the form of war crimes and surgeries. That’s something that a lot can relate to. In this story, Walker has shown a veteran who is haunted by his past and tries to redeem himself. It delivers a powerful message on how the road to the inner-peace of a person is faced with many challenges and setbacks. Ironically, amidst the moment of disappointment, the character realizes that he has come to accept the risks he took in life, along with the consequences. There he finds at that moment of redemption that he had long been looking for.

Wednesday, October 23, 2019

John Berger Ways of Seeing Essay

In John Berger’s article, ’Ways of Seeing’, it explains European eighteenth century art and how it relates to many of todays cultural transitions. Before Berger begins explaining the art itself, he tells us about the cultural constructions that exist today. These cultural constructions are enforced and were highlighted through European eighteenth century art. He began by explaining the difference between a man and a woman’s presence. Men’s presence depends how much power he is able to successfully portray. This power can be social, economical, sexual, etc. A woman’s presence expresses her attitude toward herself and in turn how she will allow other to treat her. This explains why women are so critical of them and critique their actions no matter what the situation may be. Berger begins to explain how the art ties into this when he says, â€Å"men act, women appear.† He further explains how men look at women, while women watch themselves being looked at. Thus, a woman is turned into an object. He even provides an interesting example of how women supposedly became subservient to men. In the book of Genesis Eve gave Adam an apple they weren’t supposed to eat. After they ate the apple they became aware and self-conscious of the fact they were naked, so they made clothes for themselves. Eve was punished for eating the apple and giving one to Adam by being made subservient to the man. This relates to art because, in Berger’s words, â€Å"women in paintings are there to feed an appetite, not to have any of their own.† He also explains the nude women in paintings appeal to the men’s sexuality. In European oil paintings the painter is never painted, yet is always assumed to be male. The women in these paintings were treated and/or portrayed as objects, and this view still exists today. It is an unequal relationship that in Berger’s words, â€Å"still structures the consciousness of many women.† The insecurities women feel in a large part comes from the way they have been viewed as object, always needing to be perfect. This is proven through the European eighteenth century art as the way the women are portrayed in the paintings. These views still exist in the media today. Commercials show seductive women gazing into a camera with an equally attractive man staring at them.

Tuesday, October 22, 2019

The Job Interviews 7 Deadly Sins

The Job Interviews 7 Deadly Sins Think you know exactly what it takes to land your dream job? Maybe you do. But do you also know what it will take to wind up eliminated from consideration? Unfortunately, even the most qualified candidates can sometimes make the wrong impression †¦ .and cost themselves a job in the process. Don’t fall prey to these seven deadly job hunting â€Å"sins.† 1. The Mass EmailBlindly sending out resume after resume to every job you see not only reeks of desperation, but is also a waste of your time. Sure, versatility is an admirable trait, but so is the ability to play to your strength. Hiring managers value flexibility, but they also prize focus. Not to mention: casting a wide net hauls up as many old fisherman’s boots as it does treasure.The more refined your job search and targeted your resume and cover letter, the more likely you are to hit on the keywords recruiters are looking for in order to advance to the next round.2. Stretching the TruthYes, your resume s hould present you in your very best light. However, it should also present your skills, experience and interests accurately. Even worse than a shoddy or incomplete resume for a hiring manager? One that misrepresents a candidate.Avoid exaggerating your background and/or skill set. Even if you make it past the recruiter, the longer-term consequences of fudging the truth on your resume can be dire if your employee finds out.3. Carelessness CountsIf you think being a few minutes late is no big deal, think again. Not only does showing up late for an interview convey disrespect for the interviewer, but it also demonstrates poor time management. If possible, do a test run before an interview to find out how long transit, parking, walking, etc. will take.Carelessness in appearance is also a deal-breaker for many employers. Keep the old adage in mind: â€Å"Dress for the job you want, not the job you have.† Select your interview outfit at least a day in advance. Is it clean? Pressed? Appropriate? As much as you might like to think that appearance doesn’t matter as much as skill, you will be judged on your appearance. Make sure to take a quick look in the mirror before you walk out the door.4. Lack of PreparationThe internet puts a wealth of information at the fingers of the average job searcher. Failure to use this information is an enormous and often unforgivable oversight. Take time in advance to research the company, industry, and even your interviewer. And be prepared to ask questions. Knowledge and curiosity both demonstrate the above-and-beyond qualities sought by today’s employers.5. Failure to Follow UpThe job interview doesn’t end when you walk out the door. Even if your interview was a slam dunk, you might end up fouling out of the game if you don’t send a thank you note. In fact, 59 percent of HR managers believe that it’s â€Å"very helpful† for promising job candidates to follow up with a thank you note afte r an interview.While a handwritten note on a piece of monogrammed stationery has timeless appeal, 87 percent of hiring managers now believe that email is an acceptable means of expressing your gratitude.How long do you have to send your thank you? Today’s job cycle can move quickly: within 24 hours is ideal.6. No NetworkingNetworking remains an essential part of the job hunt, but it’s an active process, not a passive one. if you attend networking events, make time for one-on-one interactions; these are far more meaningful than group settings.With the rise of social networking, job seekers have 24/7 opportunities for networking. Make sure your social media presence is appropriate and appealing. A quick Google search on your own name can turn up any areas of concern.If you don’t yet have a LinkedIn profile, get one: approximately 93 percent of hiring managers check out LinkedIn when looking for qualified candidates.7. A Single-Pronged ApproachToday’s job hu nt is anything but the linear process it was 20 years ago. There are many channels through which job seekers can interact with recruiting managers. A multi-pronged approach incorporating everything from networking at industry meetings to job boards.

Monday, October 21, 2019

International Dimensions of Business Essays

International Dimensions of Business Essays International Dimensions of Business Paper International Dimensions of Business Paper For the final task of this unit, I will be critically appraising the advantages and disadvantages of the growth and influence of a MNC (multi-national company) of my choice. With this, I will be examining the strategic reasons for expansion whilst examining the impact it would have/has on a developing host country in terms of factors such as consumers choice, employment rates, individuals/citizens, other businesses (competition), etc. Finally, I will also be assessing the impact it has on developed host countries and the impact it would have on their governments. The business I have decided to choose is Ryan Air because as I have been working on it throughout this unit, I believe I will find it easier to relate certain to topics and theories to it. Strategic Reasons why RyanAir Expanded For the first part of this task, I will be giving strategic reasons why RyanAir decided to expand internationally. First and foremost, most basic reason why RyanAir must have wanted to expand internationally is because that is the concept of what flight services are, going from one country to another consistently and safely and as this is RyanAirs service there was basically no other choice but to expand. However. Below are some other basic strategic reasons as to why they may have decided to expand. Geographic Diversion (RyanAir) Geographic diversion is a situation where businesses purposefully aim to spread their risks by moving into overseas markers and could very well have been a factor in RyanAirs decision to act as a international company. Geographic decisions is used in particular cases where a business has saturated their home market just like RyanAir seem have done with the UK and so therefore use large markets overseas in which they would be able to build a competitive market. So for example, if RyanAirs sales and number of passengers started to fall in the UK, the success being enjoyed in other countries would banish the risk being held to RyanAir as a company. Pursing a Global Logic (RyanAir) The second strategic reason why RyanAir may have decided to expand is to pursue a global logic this meaning to identify a condition in the market that requires a company to adopt a global strategy. This means that because of the nature of the market, that expanding is the only sensible thing to do and that definitely applies to RyanAir because air flights are a global service and so by expanding across Europe RyanAir were able to spread their costs over millions of more customers. The Temptations of Overseas Markets (RyanAir) Despite the UK having quite a large and very well structured market, the temptations of larger markets such as Germany and Russia may have been what tempted RyanAir to expand across European waters and even though these countries may not be as economically advanced as the UK nor is the average wage as high, RyanAirs low fares are likely to stop this being a problem. To increase Profits (RyanAir) Moving abroad to make best use of existing resources is probably one of the best decisions a business today can make because for example, a company that spends a great deal of money on research and development will find that they can actually spread the cost over a much larger output by selling in a wider market which would eventually lead to higher profits which is one of the main aims of any business and most definitely appeals to RyanAir. Advantages of Becoming a MNC There are many advantages to come from being a one-country business into a multi-nation corporation, for this part of the task I will now be explaining in great detail some of the advantages that benefited or that will benefit RyanAir in the future from becoming an MNC. Below is a table of some = of the advantages that come from being an MNC related to RyanAir. By becoming an MNC, RyanAir have given themselves the opportunity to benefit from them the growing world market for goods and services. This is part of the process of globalisation which is the rapid growth of similar goods services produced and distributed by MNEs on a world scale and despite RyanAir only being a European company, their flights and air service still has a big part to play and this and so the company would definitely benefit. Another benefit that would come from being an MNC to RyanAir is that they are giving themselves a higher chance of the basic risks and uncertainties of the free trade cycle that they face from within their own economy. This is because the more they spread their influence of other nations through their service just like they have done on the UK, they are then able to spread their risks along the way. One of the biggest benefits is that operating abroad provides RyanAir with the perfect opportunity to respond to the increased foreign competition that is continuously rising and protect their own European market share. When other foreign multi-national companies (airlines) begin to compete in a particular MNE market that RyanAir is involved in, this gives them the incentive to expand into new markets. Being an MNC also allows RyanAir to overcome tariff walls from within the United Kingdom. Of course, being an MNC gives RyanAir a wider range of customers to target and choose from as they give nearly everyone around Europe the options of using their service as opposed to just restricting themselves to the UK which gives them a higher chance of obtaining a larger customer base year after year. Above are just some of the advantages and benefits that RyanAir would have been able to enjoy from operating as a multi-national co-operation that would have given the company itself a greater chance of success and more international recognition. How RyanAir becoming an MNC affects less developed/developing Countries I will now be discussing how RyanAir becoming a multi-national company would affect less developed countries or developing countries in which they operate and what impact it would create on them. Because RyanAir only operate in Europe, it would be very difficult to say how they affect less developed countries (3rd world countries) because near to none of these exist in Europe however I can say what impact they would have on developing countries (2nd world countries) because many of these exist in Eastern Europe, countries such as Bosnia, Serbia, Poland, Belarus, Ukraine, Romania, Russia, etc and RyanAir operate in all of them. The elements in which I will be discussing how RyanAir affect these nations will be broken down into factors such as customer choice, employment, competition and the environment. Consumer Choice/Individuals No matter the state of the economy or government, having a wide choice available is always a benefit to the citizens of that nation, but possible particularly more so for people in developing countries than in higher developed countries. Nearly all of Western Europe is filled more economically developed countries such as Spain, Portugal, England, France, etc. however having a wider choice available (in this case of flights) would definitely be more valuable to those living in Eastern Europe and I will now explain why. Many things can be determined in different countries by the state of their economies and whether they belong to the first, second or third world category these factors include things such as standard of living and average wage. When there is a wider choice of options available regardless of the field of product or service, more often than not this results in lower pricing because all the businesses try to compete and gain the largest customer base and the largest market share so prices fall considerable in order for this to be achieved. Along with this, people living in Eastern Europe live in developing countries such as Bosnia and Serbia (2nd world countries) and so the average wage of the population would be considerably lower than that of those living in Eastern Europe and so because of this an increase in customer choice which is what RyanAir would bring in terms of flights would increase the likelihood of prices of flights falling because it is increased competition and so this would be more valuable to those with lower average wages Eastern Europeans especially with a business like RyanAir who already offer cheap flights naturally. So to summarise, RyanAir operating in developing countries such as these would definitely be hugely beneficial to the people because not only do they get a wider choice to choose from, but this would also result in lower flights for them which is great all round and could not have been achieved had RyanAir never became an MNC. Employment Employment is another factor that would definitely be affected by RyanAir operating in developing European countries and in a very positive way. One of the factors that possibly block developing countries from reaching their full potential is unemployment levels. Put very simply, RyanAir operating in countries like these would not only benefit RyanAir but also the countries themselves because with their introduction and existence across parts of the countries, then this opens up a whole new range of jobs which can only be taken by citizens of those countries without harming the position of anyone elses jobs. So in conclusion, RyanAir working in developing countries in no doubt benefits them in terms of employment simply because without threatening the jobs of those already working, it opens up positions for those who arent which brings down employment levels with that country(s). Other Businesses/Competition In terms of the developing countries as a whole, RyanAirs operations definitely do much to improve their economy and economies of scales in terms of flights, however their work in these countries would probably bring some worry to the existing airlines in these countries. A business that operates in a monopoly market has a much greater chance of success because as they are the only business that provides that certain product/service, then they have no risk of losing customers or a change in demand however as competition increases and similar businesses in the same field begin to enter that market, than a business moves further and further away from the monopoly market they crave to be involved in. For example, Poland is a developing European nation and one of the countries in which RyanAir carries out its operations so for a polish airline such as LOT which has been one of Polands leading airlines for many years, this brings much negative news and disadvantages because now they have the added pressure/threat of holding off Europes leading low fare airline to retain their strong customer base. However, in turn this may cause them to act in a more efficient and productive manner in order to ensure that all customers are tempted to remain with them and if this is the effect that RyanAir will cause on developing countries airlines than that it is extremely positive for those countries and their economies however very negative for already existing airlines within that country. However, in turn I believe that this is more valuable to developing countries as opposed to already developed countries because the sign of a strong economy/country is healthy business competition which would help any country in terms of development so the existence of RyanAir within Eastern European developing nations can definitely help contribute towards this. The Environment As organisations enter other countries they may have a significant effect on the environment. Some multi-nationals have been heavily criticised for the social cost of their activities. A particular criticism that has come from MNCs entering is that multi-nationals employ double standards in their activities/operations which is a big concern to RyanAir because it could potentially damage the good image it has build for itself across Europe over the years. A concern is that MNCs may transfer or pass some of their manufacturing operations to economies that do not have such strict environmental rules and standards and so see it as an opportunity to effectively export pollution (in the case of RyanAir) from richer countries onto poorer countries, e. . Germany to Macedonia. This would be an idea used to possibly avoid the complications and protests that would come from polluting richer countries as this is where it would be much more noticed by environmentalists and so if RyanAir were to be caught being involved activities such as these. It would not only completely tarnish their image as a friendly airline but it would also completely destroy the trust built up by passengers, especially those in the environments which have been affected. Assessing the Impact on Developed Host Countries (RyanAir) Just like I did so whilst explaining the impact that RyanAir has on less developed/developing countries, I will now do the same but instead explain the impact it has on already highly developed countries. RyanAir limits its operations to all of Europe and because of this they work in many developed countries (1st World countries) mainly coming from Western Europe such as England, Spain, France, Portugal, Germany, Italy and of course their parent country The Republic of Ireland and so I will now discuss how the existence of RyanAir working in these parent countries affects them. Employment Unemployment is a situation that arises everyone despite and will always exist, in some countries more so than others but nevertheless it will also be a global problem. As I described earlier, the existence of RyanAir in developing countries is probably more important and valuable to them than it is to developed countries in terms of employment because even though RyanAir operating in both creates jobs in both sets of countries, fuller employment in developing countries would contribute to them developing quicker which of course is more of a priority to them then already developed countries. However, after completing some secondary research I found that most of the higher unemployment levels throughout Europe come from the more developed countries and so in the sense of helping to banish this problem, RyanAir would definitely contribute maybe not much but their need for workers would be high.

Sunday, October 20, 2019

High Crimes and Misdemeanors in Impeachment

High Crimes and Misdemeanors in Impeachment â€Å"High Crimes and Misdemeanors† is the rather ambiguous phrase most often cited as grounds for the impeachment of U.S. federal government officials, including the President of the United States. What are High Crimes and Misdemeanors? Background Article II, Section 4 of the U.S. Constitution provides that, â€Å"The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors.† The Constitution also provides the steps of the impeachment process leading to the possible removal from office of the president, vice president, federal judges, and other federal officials. Briefly, the impeachment process is initiated in the House of Representatives and follows these steps: The House Judiciary Committee considers evidence, holds hearings, and if necessary, prepares articles of impeachment – the actual charges against the official.If a majority of the Judiciary Committee votes to approve the articles of impeachment, the full House debates and votes on them.If a simple majority of the House votes to impeach the official on any or all of the articles of impeachment, then the official must then stand trial in the Senate.If a two-thirds supermajority of the Senate votes to convict the official, the official is immediately removed from office. In addition, the Senate may also vote to forbid the official from holding any federal office in the future. While Congress has no power to impose criminal penalties, such as prison or fines, impeached and convicted officials may subsequently be tried and punished in the courts if they have committed criminal acts. The specific grounds for impeachment set by the Constitution are, â€Å"treason, bribery, and other high crimes and misdemeanors.† In order to be impeached and removed from office, the House and Senate must find that the official had committed at least one of these acts. What are Treason and Bribery? The crime of treason is clearly defined by the Constitution in Article 3, Section 3, Clause 1: Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.†The Congress shall have Power to declare the Punishment of Treason, but no Attainder of Treason shall work Corruption of Blood, or Forfeiture except during the Life of the Person attainted. In these two paragraphs, the Constitution empowers the United States Congress to specifically create the crime of treason. As a result, treason is prohibited by legislation passed by Congress as codified in the United States Code at 18 U.S.C.  § 2381, which states: Whoever, owing allegiance to the United States, levies war against them or adheres to their enemies, giving them aid and comfort within the United States or elsewhere, is guilty of treason and shall suffer death, or shall be imprisoned not less than five years and fined under this title but not less than $10,000; and shall be incapable of holding any office under the United States. The Constitution’s requirement that a conviction for treason requires the supporting testimony of two witnesses comes from the British Treason Act 1695. Bribery is not defined in the Constitution. However, bribery has long been recognized in English and American common law as an act in which a person gives any official of the government money, gifts, or services to influence that official’s behavior in office. To date, no federal official has faced impeachment based on grounds of treason. While one federal judge was impeached and removed from the bench for advocating  in favor of succession and serving as a judge for the Confederacy during the Civil War, the impeachment was based on charges of refusing to hold court as sworn, rather than treason. Only two officials- both federal judges- have faced impeachment based on charges that specifically involved bribery or accepting gifts from litigants and both were removed from office. All of the other impeachment proceedings held against all federal officials to date have been based on charges of â€Å"high crimes and misdemeanors.† What are High Crimes and Misdemeanors? The term â€Å"high crimes† is often assumed to mean â€Å"felonies.† However, felonies are major crimes, while misdemeanors are less serious crimes. So under this interpretation, â€Å"high crimes and misdemeanors† would refer to any crime, which is not the case. Where Did the Term Come From? At the Constitutional Convention in 1787, the framers of the Constitution viewed impeachment to be an essential part of the system of separation of powers providing each of the three branches of government ways to check the powers of the other branches. Impeachment, they reasoned, would give the legislative branch one means of checking the power of the executive branch. Many of the framers considered Congress’ power to impeach federal judges to be of great importance since they would be appointed for life. However, some of the framers opposed providing for the impeachment of executive branch officials, because the power of the president could be checked every four years by the American people through the electoral process. In the end, James Madison of Virginia convinced a majority of the delegates that being able to replace a president only once every four years did not adequately check the powers of a president who became physically unable to serve or abused the executive powers. As Madison argued, â€Å"loss of capacity, or corruption . . . might be fatal to the republic† if the president could be replaced only through an election. The delegates then considered the grounds for impeachment. A select committee of delegates recommended â€Å"treason or bribery† as the only grounds. However, George Mason of Virginia, feeling that bribery and treason were only two of the many ways a president could willfully harm the republic, proposed adding â€Å"maladministration† to the list of impeachable offenses. James Madison argued that â€Å"maladministration† was so vague that it might allow Congress to remove presidents based purely on a political or ideological bias. This, argued Madison, would violate the separation of powers by giving the legislative branch total power over the executive branch. George Mason agreed with Madison and proposed â€Å"high crimes and misdemeanors against the state.† In the end, the convention reached a compromise and adopted â€Å"treason, bribery, or other high crimes and misdemeanors† as it appears in the Constitution today. In the Federalist Papers, Alexander Hamilton explained the concept of impeachment to the people, defining impeachable offenses as â€Å"those offences which proceed from the misconduct of public men, or in other words from the abuse or violation of some public trust. They are of a nature which may with peculiar propriety be denominated political, as they relate chiefly to injuries done immediately to the society itself.† According to the History, Arts, and Archives of the House of Representatives, impeachment proceedings against federal officials have been initiated more than 60 times since the Constitution was ratified in 1792. Of those, fewer than 20 have resulted in actual impeachment and only eight – all federal judges – have been convicted by the Senate and removed from office. The â€Å"high crimes and misdemeanors† alleged to have been  committed by the impeached judges have included using their position for financial gain, showing overt favoritism to litigants, income tax evasion, the disclosure of confidential information, unlawfully charging people with contempt of court, filing false expense reports, and habitual drunkenness. To date, only three cases of impeachment have involved presidents: Andrew  Johnson in 1868, Richard Nixon in 1974, and Bill Clinton in 1998. While none of them were convicted in the Senate and removed from office through impeachment, their cases help reveal Congress’ likely interpretation of â€Å"high crimes and misdemeanors.† Andrew Johnson As the lone U.S. Senator from a Southern state to remain loyal to the Union during the Civil War, Andrew Johnson was chosen by President Abraham Lincoln to be his vice-presidential running mate in the 1864 election. Lincoln had believed Johnson, as vice president, would help in negotiating with the South. However, shortly after taking over the presidency due to  Lincoln’s assassination in 1865, Johnson, a Democrat, ran into trouble with the Republican-dominated Congress over the Reconstruction of the South. As fast as Congress passed Reconstruction legislation, Johnson would veto it. Just as quickly, Congress would override his veto. The growing political friction came to a head when Congress, over Johnson’s veto, passed the long ago repealed Tenure of Office Act, which required the president to get the approval  of Congress to fire any executive branch appointee that had been confirmed by Congress. Never one to back down to Congress, Johnson immediately fried Republican secretary of war, Edwin Stanton. Though Stanton’s firing clearly violated the Tenure of Office Act, Johnson simply stated that the considered the act to be unconstitutional. In response, the House passed 11 articles of impeachment against Johnson as follows: Eight for violations of the Tenure of Office Act;One for using improper channels to send orders to executive branch officers;One for conspiring against Congress by publicly stating that Congress did not truly represent the Southern states; andOne for failure to enforce various provisions of the Reconstruction Acts. The Senate, however, voted on only three of the charges, finding Johnson not guilty by a single vote in each case. While the charges against Johnson are considered to have been politically motivated and not worthy of impeachment today, they serve as an example of actions that have been interpreted as â€Å"high crimes and misdemeanors.† Richard Nixon Shortly after Republican President Richard Nixon had easily won re-election to a second term in 1972, it was revealed that during the election, persons with ties to the Nixon campaign had broken into the Democratic Party national headquarters at the Watergate Hotel in Washington, D.C. While it was never proven that Nixon had known about or ordered the Watergate burglary, the famed Watergate tapes – voice recordings of Oval Office conversations – would confirm that Nixon had personally attempted to obstruct the Justice Department’s Watergate investigation. On the tapes, Nixon is heard suggesting paying the burglars â€Å"hush money† and ordering the FBI and CIA to influence the investigation in his favor. On July 27, 1974, the House Judiciary Committee passed three articles of impeachment charging Nixon with obstruction of justice, abuse of power, and contempt of Congress by his refusal to honor the committee’s requests to produce related documents. While never admitting having a role in either the burglary or the cover-up, Nixon resigned on August 8, 1974, before the full House voted on the articles of impeachment against him. â€Å"By taking this action,† he said in a televised address from the Oval Office, â€Å"I hope that I will have hastened the start of the process of healing which is so desperately needed in America.† Nixon’s vice president and successor, President Gerald Ford eventually pardoned Nixon for any crimes he may have committed while in office. Interestingly, the Judiciary Committee had refused to vote on a proposed article of impeachment charging Nixon with tax evasion because the members did not consider it to be an impeachable offense. The committee based its opinion of a special House staff report titled, Constitutional Grounds for Presidential Impeachment, which concluded, â€Å"Not all presidential misconduct is sufficient to constitute grounds for impeachment. . . . Because impeachment of a President is a grave step for the nation, it is predicated only upon conduct seriously incompatible with either the constitutional form and principles of our government or the proper performance of constitutional duties of the presidential office.† Bill Clinton First elected in 1992, President Bill Clinton was reelected in 1996. Scandal in Clinton’s administration began during his first term when the Justice Department appointed an independent counsel to investigate the president’s involvement in â€Å"Whitewater,† a failed land development investment deal that had taken place in Arkansas some 20 years earlier.   The Whitewater investigation blossomed to include scandals including Clinton’s questionable firing of members of the White House travel office, referred to as â€Å"Travelgate,† the misuse of confidential FBI records, and of course, Clinton’s infamous illicit affair with White House intern Monica Lewinsky. In 1998, a report to the House Judiciary Committee from Independent Counsel Kenneth Starr listed 11  potentially impeachable offenses, all related only to the Lewinsky scandal. The Judiciary Committee passed four articles of impeachment accusing Clinton of: Perjury in his testimony before a grand jury assembled by Starr;Providing â€Å"perjurious, false and misleading testimony† in a separate lawsuit related to the Lewinsky affair;Obstruction of justice in an attempt to â€Å"delay, impede, cover up and conceal the existence† of evidence; andAbuse and misuse of presidential powers by lying to the public, misinforming his cabinet and White House staff to gain their public support, wrongly claiming executive privilege, and refusing to respond to the committee’s questions. Legal and constitutional experts who testified at the Judiciary Committee hearing gave differing opinions of what â€Å"high crimes and misdemeanors† might be. Experts called by congressional Democrats testified that none of Clinton’s alleged acts amounted to â€Å"high crimes and misdemeanors† as envisioned by the framers of the Constitution. These experts cited Yale Law School professor Charles L. Black’s 1974 book, Impeachment: A Handbook, in which he argued that impeaching a president effectively overturns an election and thus the will of the people. As a result, Black reasoned, presidents should be impeached and removed from office only if proven guilty of â€Å"serious assaults on the integrity of the processes of government,† or for â€Å"such crimes as would so stain a president as to make his continuance in office dangerous to public order.† Black’s book cites two examples of acts that, while federal crimes, would not warrant the impeachment of a president: transporting a minor across state lines for â€Å"immoral purposes† and obstructing justice by helping a White House staff member conceal marijuana. On the other hand, experts called by congressional Republicans argued that in his acts related to the Lewinsky affair, President Clinton had violated his oath to uphold the laws and failed to faithfully carry out his duties as the government’s chief law enforcement officer. In the Senate trial, where 67 votes are required to remove an impeached official from office, only 50 Senators voted to remove Clinton on charges of obstruction of justice and only 45 Senators voted to remove him on the charge of perjury. Like Andrew Johnson a century before him, Clinton was acquitted by the Senate. Last Thoughts on ‘High Crimes and Misdemeanors’ In 1970, then-Representative Gerald Ford, who would become president after the resignation of Richard Nixon in 1974, made a notable statement about the charges of â€Å"high crimes and misdemeanors† in impeachment. After several failed attempts to convince the House to impeach a liberal Supreme Court justice, Ford stated that â€Å"an impeachable offense is whatever a majority of the House of Representatives considers it to be at a given moment in history.† Ford reasoned that â€Å"there are few fixed principles among the handful of precedents.† According to constitutional lawyers, Ford was both right and wrong. He was right in the sense that the Constitution does give the House the exclusive power to initiate impeachment. The vote of the House to issue articles of impeachment cannot be challenged in the courts. However, the Constitution does not give Congress the power to remove officials from office due to political or ideological disagreements. In order to ensure the integrity of the separation of powers, the framers of the Constitution intended that Congress should use its impeachment powers only when executive officials had committed â€Å"treason, bribery, or other high crimes and misdemeanors† which substantially damaged the integrity and effectiveness of government.

Saturday, October 19, 2019

Fight or flight Essay Example | Topics and Well Written Essays - 250 words

Fight or flight - Essay Example In the case of Coleen Colombo and colleagues resisting mortgage fraud, it is a fight response. Colombo and his colleagues have perceived a threat in the form of mortgage fraud. The appropriate mode through which they have chosen to deal with this threat is through defending their interest. Resisting mortgage fraud is a fighting mechanism employed by Colombo and his colleague with the intention of going face to face with the exposed stress. The fight response has been enhanced by the fact that Colombo and his colleagues are aware of ways through mortgage fraud can be managed (Arnetz & Ekman, 2006). It was appropriate for Colombo and his colleagues to choose a fight response over a flight response. Mortgage fraud is an act that goes against normal, ethical practices. If Colombo and his Colleagues would have chosen the flight response, which would have meant that they are afraid of standing up for their rights. The decision to resist fraud has come as a result of Colombo and his colleagues ready to take the required measures in combating fraud. The measures, that they can use in this case as a fight response is demanding a refund from the mortgage company or reporting the matter to the police who will follow up with arrests (Kottler & Chen,

Friday, October 18, 2019

Was Hitler a Weak Dictator between 1934-1939 Essay

Was Hitler a Weak Dictator between 1934-1939 - Essay Example If there was a weakness to be found in Hitler's dictatorship then it would have had to be his own greed and desire to conquer the entire world, which was an impossible feat, yet Hitler failed to see the reality of his circumstances. However, with regard to his iron rule over his people and the control he had over other countries, he was by no means weak but rather he was an extremely powerful and suffocating force, making all the necessary decisions concerning his homeland. The conclusion will show that the reign of Hitler still haunts the memories of many due to the delirious atrocities he placed upon thousands, which inevitably brings the validity needed to prove he was cruel and vindictive but never could he be classified as weak. Hitler's role was much too central in Germany for him to have ever been considered a weak dictator. Furthermore, in order to validate the point being made that Hitler was indeed not weak during these years it can be pointed out that he had a hefty amount of control over all areas of socialization and political governance during this time. This was through his tyranny on the people themselves and his say so in how the educational system worked, his persecution of the minorities in the country, the development of propaganda and censorship, and his overall pull in the maturing belief of Nazism (Jackson & Spielvogel 1996, pg. 12). Hitler pretty much controlled every activity that people participated in on a daily basis, from leisure activities to their quality of life at work and home as well. This is basically why there have been statements made about him of how he ruled Germany through his threatening presence alone (Klaus & Fischer 1997, pg. 110). Just for an example, Hitler had more control over the people than what has ever actually been realized. He forced German citizens and his military to pledge an oath to his allegiance and those who did not were dismissed and later executed. In fact, during these very year's history has shown that Hitler was at the rise of his popularity within Germany and in other regions of which he had conquered so there is no logical way to assume he was in any way weak at all but rather, as was stated previously, a very serious extremist and unrelenting dictator (Jackel 1972, pg. 55). The Rule of Hitler The question of if Hitler was able to be a strong dictator lays in the arguments of functional and intentionalists. A functional argument is the belief that Hitler didn't have a plan but used what was in front of him to his advantage, and an Intentional view is that Hitler had a plan and stuck by his plan therefore leading us to the question, 'was Hitler strong enough to have a plan and succeed it' Hitler knew how to abuse the chaotic government and he knew how to use the circumstances (Mitchell 1990, pg. 89). He knew exactly what the people wanted and what the military wanted. All of these aspects could have made Hitler strong. From the end of the 1st world war the military wanted rearmament and the people wanted revenge. These two circumstances assisted Hitler in having his voice heard more clearly and defined him as being a very strong leader throughout the years that he was gaining his control of the country. The weak government and the

How to use a Rubber in Mobile Phones Essay Example | Topics and Well Written Essays - 1250 words - 1

How to use a Rubber in Mobile Phones - Essay Example This paper focuses on mobile technology. Some of the factors to consider when choosing materials for developing a mobile device will include, weight, girth, flexibility of the material and its fitness for the intended purpose. The mobile device market has over the past years evolved to unimaginable extents. There has been the development of space age smartphones with unimaginable capabilities and processing speeds. There has also been vast improvement in the display of such devices in both clarity and size. Many mobile devices have been unveiled by different manufacturers such as Nokia, Samsung, HTC, Apple, Motorola and many more competing for the consumers available. One thing that has been an issue is the safety of such expensive devices when they get to fall or submerge in water. To solve this problem, we focus on Nokia’s N9 and the use of rubber by Nokia to act as a protector to this flagship device. Then Nokia n9 uses an 8 megapixel rear camera that is used for photography. The type of lenses used is Carl Zeiss by Nokia with autofocus and image stabilization property. This camera also comes with a dual led flash light to assist in photography in dark conditions. It is one of the most crucial parts of the phone. The battery in the Nokia n9 is what sustains the life in it. It a lithium ion battery that is internal to the mobile phone. It has a large capacity so that it can power up the large display and the processor together with other auxiliary components. This is the N9’s AMOLED gorilla glass curved screen that covers the whole of the N9 front face. This is a touch screen used for both input and output in this system. It not delicate as such since it is curved hence can resist a little bit of damage. The N9 case is made of polycarbonate that is well brushed. This is where all the components of the phone are housed and firmly head. It is the chassis of the whole device therefore providing the shape and character of this marvelous

Thursday, October 17, 2019

Principles of Marketing Essay Example | Topics and Well Written Essays - 750 words

Principles of Marketing - Essay Example The main reason behind market segmentation is to help a company understand the needs of a particular segment (Beane & Ennis, 1997, p. 31). Mass marketing mainly assumes that all customers have the same interests and consumption behaviour. Segmenting the market can also serve in identifying smaller groups of consumers who make their own subsets an aspect that improve the overall efficiency of the company’s marketing efforts (Dibb, Simpkin, Pride & Ferrell, 2001). Market segmentation enables the marketer to compare different marketing opportunities of different marketing segments through studying consumer needs and potential, their level of satisfaction etc. This helps the company in coming up with appropriate strategies to satisfy the needs of these different segments. There are different forms of segmentation. These include geographical segmentation, demographic segmentation, psychographic segmentation and behavioural segmentation. Geographical segmentation This is segmenting the market based on the location of the customers. Demand of goods can vary according to geographic location of the customers. Geographical segmentation therefore, focuses on prospective markets’ location and different attributes that are associated with each location. The marketer can therefore, focus on either a single location or many depending on the varying requirements of each region and the cost of serving these locations. Demographic segmentation This is division of the market according to demographic variables such as age, gender, individual occupation, education or even family size. The marketer uses these variables in making decisions and identifying the target market. In an example, a company may decide to segment the market according to age of the people. As a result, it can develop different products that meet different requirements of customers that belong to various age groups (Hunt and Arnett, 2004, p.23). Psychographic and behavioural segmentation Psychograp hic segmentation divides the market into different segments which have similar lifestyles. Lifestyle is an individual mode of living and mainly describes how a person conducts his/her daily activities. On the other hand, behavioural segmentation divides the market according to behavioural characteristics of the customers. Different customers have different behaviours which are used by a marketer to market the produce (Kotler & Armstrong, 2011). Market targeting Marketing targeting is a process of identifying different groups of consumers that exist in a market who are likely to purchase a certain good or service. Target marketing makes it easier to price, promote and distribute the product or service at a cost that is effective. When targeting the market, a marketer should ensure that the firm has adequate resources to meet the requirement of the target market. Targeting plays an important role of reducing market ambiguity as marketers are able to have an in-depth knowledge concerni ng the target consumers. There are different forms of targeting. One of the methods is referred to as broad or undifferentiated targeting. The concept that underlies this method is that a product or service has a broad appeal to all customers irrespective of their age, gender and location. Second method is referred to as selective or differentiated method. With this

The Life of Pi book review Essay Example | Topics and Well Written Essays - 1000 words

The Life of Pi book review - Essay Example The story is basically about a boy who is on a boat that is sinking, and escapes to a lifeboat with several zoo animals, who eventually all get eaten by a tiger. I think that one of the main reasons that I liked this book so much is that for a long time I identified with the main character, and felt that I was like him. I think the fact that I enjoyed this book so much, and read it several times in a few month span tells me several things about myself. First I think it tells me that I felt lonely, because I could identify with the main character, and that main character spends most of the book alone on a raft with only a vicious tiger for company, and possibly because the book is also a story about immigration, about leaving a home you know to go to a home that you do not, and that is something that I enjoy thinking about. But I think that this book also indicates that I am thinking too much on the past, and am feeling sorry for myself, and should move on to something else. I do not think that I have fully put this book in the past, but I hope to soon. I hope to put the part of me that it represents in the past as well. One of the most important ideas to this book is probably the idea of loneliness, and of feeling alone when you are not in a place that you are used to. When I first came to this country, I felt very alone because I did not know very many people, and my move to this country had put a large amount of strain on my relationship with my family. There are a few lines from The Life of Pi that I have underlined more than the rest as I read them. On page 163, the main character is starting to think about what he must do to survive, and says these words: â€Å"There was so much I had to do. I looked out at the empty Horizon. There was so much water. And I was all alone. All alone. I burst into hot tears. I buried my face in my crossed arms and sobbed. My situation was patently hopeless† (Martel, 163). I believe that these lines are probably the mos t important of the book in some ways, and are probably the reason that I enjoyed the book so much and why I have read it so many different times. There are many ideas in this lines that I can understand and identify with, and that make me see now that I was probably not doing the things that were best for me when I first came to this country from my homeland, away from my friends and family. I think that, when I first was arriving at this country, there were many things that I felt that I had to do all at the same time. I had to start preparing for school, had to find place to live, had to find friends, had to meet new people, had to start learning where everything is, where to get groceries, where to have dinner, where to have fun. But I also think that I could not do these things. I always had some excuse, and I was so tired, and everything was so hard, so much harder than it probably actually was. And now, reading these lines, I think everything was hard because I felt alone, str anded away from everything I knew. In The Life of Pi, the main character is not actually hopeless here, he can survive for a very long time afterwards, and does survive for such a long time, â€Å"227 days† at sea, and then decades and decades more once he gets back to land (205). But he feels hopeless, because there is no one to share his burden, no one to distract him, no one to help

Wednesday, October 16, 2019

Principles of Marketing Essay Example | Topics and Well Written Essays - 750 words

Principles of Marketing - Essay Example The main reason behind market segmentation is to help a company understand the needs of a particular segment (Beane & Ennis, 1997, p. 31). Mass marketing mainly assumes that all customers have the same interests and consumption behaviour. Segmenting the market can also serve in identifying smaller groups of consumers who make their own subsets an aspect that improve the overall efficiency of the company’s marketing efforts (Dibb, Simpkin, Pride & Ferrell, 2001). Market segmentation enables the marketer to compare different marketing opportunities of different marketing segments through studying consumer needs and potential, their level of satisfaction etc. This helps the company in coming up with appropriate strategies to satisfy the needs of these different segments. There are different forms of segmentation. These include geographical segmentation, demographic segmentation, psychographic segmentation and behavioural segmentation. Geographical segmentation This is segmenting the market based on the location of the customers. Demand of goods can vary according to geographic location of the customers. Geographical segmentation therefore, focuses on prospective markets’ location and different attributes that are associated with each location. The marketer can therefore, focus on either a single location or many depending on the varying requirements of each region and the cost of serving these locations. Demographic segmentation This is division of the market according to demographic variables such as age, gender, individual occupation, education or even family size. The marketer uses these variables in making decisions and identifying the target market. In an example, a company may decide to segment the market according to age of the people. As a result, it can develop different products that meet different requirements of customers that belong to various age groups (Hunt and Arnett, 2004, p.23). Psychographic and behavioural segmentation Psychograp hic segmentation divides the market into different segments which have similar lifestyles. Lifestyle is an individual mode of living and mainly describes how a person conducts his/her daily activities. On the other hand, behavioural segmentation divides the market according to behavioural characteristics of the customers. Different customers have different behaviours which are used by a marketer to market the produce (Kotler & Armstrong, 2011). Market targeting Marketing targeting is a process of identifying different groups of consumers that exist in a market who are likely to purchase a certain good or service. Target marketing makes it easier to price, promote and distribute the product or service at a cost that is effective. When targeting the market, a marketer should ensure that the firm has adequate resources to meet the requirement of the target market. Targeting plays an important role of reducing market ambiguity as marketers are able to have an in-depth knowledge concerni ng the target consumers. There are different forms of targeting. One of the methods is referred to as broad or undifferentiated targeting. The concept that underlies this method is that a product or service has a broad appeal to all customers irrespective of their age, gender and location. Second method is referred to as selective or differentiated method. With this

Tuesday, October 15, 2019

Holocaust Theology Essay Example | Topics and Well Written Essays - 1000 words

Holocaust Theology - Essay Example Thus, if one reads the text by Berenbaum, one will be able to see the general picture of the time. Indeed, the Nazi Germany was a young state that desperately needed recognition of its is new ways. At first it seized the power legally when Adolf Hitler was appointed a Chancellor. However, in the course of a series of attacks on the opponents, the NSDAP became the only real power in the country. There could be no resistance to them as otherwise people will be eliminated. It is quite understandable that under such conditions the Germans who knew about the final solution could not express their views freely as they were afraid for their life as well. Berenbaum was one of the researchers who tried to draw a connection between Christianity and the mass killings that took place. He noted that the Nazi acted in the Christian social environment and, therefore, had to align their actions with the dominating moral framework. Keeping in mind the scope of the Holocaust, one might suggest that th ey succeeded in doing so. Some scholars, like Heinsohn, put emphasis on a different aspect of Holocaust. He argues that the modern people are simply not able to understand the event that took place in the middle of the previous century: our contemporaries live in a completely different set of conditions. Indeed, the citizens of the Nazi Germany faced other problems. The government thought that the best way to ensure the survival of their state is to perform the following steps: get rid of the weak that hold the state back; re-conquer the territories to gain more space for the growing population; get rid of the Jewish principles that largely guided the development of the German society. Further more, this scholar points out that the Holocaust should not be seen as simple military operation: it is an ideological war that sent a particular message not only to the Jews, but to the Germans as well as to

Monday, October 14, 2019

Machine Essay Example for Free

Machine Essay Society is in all shapes and forms a lie. Consumerism drives our economy, our government, and our lives. As a people we are amazed and enthralled by the new technology that has become available to us in recent years. From smart phones to 3-d televisions we have it all, technology may as well be an extention of our bodies at this rate, it is creeping in. The speed at which technology has developped is impressive to say the least, we are able to make the blind see, the def hear, or the mute able speak. Computers have connected the world, opening a wealth of information to anyone witch access. With the annoucement of a new wearable computer called Google Glass we have taken a step forward into the cyborg age, not only that but we have taken a step into the what will be known as Surveillance States. We have given the oppurtunity to the government to control us even further. There are many positive and negative developments that come with the age of information, like the ease of accesing information from anywhere, to constantly being watched by our government or even to the militirization of these technologies. How could this affect our lives today, and more importantly tomorrow? Mann is an innovator, a man who excels in the field of technology. He had created a portable CD player before they were officially marketed, in time he began working on a portable computer that would allow him to access any of the information he needed. He even created a program that would replace ads on bilboards with things he felt were more important, and that he wanted to see. Some may wonder when this technology may be available but the fact of the matter is, it is available. It is all around us, Mann began experimenting with portability and computer in 1987. It is now the year 2013, and the technology has developped at an exponential rate, with the release of Google Glass we will be able to live the way Mann lived, replacing ads we dont want to see with other things that interest us. Another thing this technology will allow us to accomplish is having a better understanding of dissabilities, and how we can correct them; that is to say giving a blind individual the ability of sight. Weve had the technologies to accomplish these feats for some time, but is only until now that we have seen them begin to surface. Not everything about these technological advancements are good, although they may seem that way we must always think about the way this tech can change our lives, potentially for the worst. With the route government is taking these technologies might end up being used against us, inventions like Google Glass will permit the government to have 24/7 surveillance of everything we do. Countries have slowly been turning into Surveillance states, all illusions of privacy are slowly being taken away and we are doing nothing to change this. The population has been made docile, we sit at home on computers and walk around with phone in hand while the world around us closes in; slowly suffocating us until we can no longer catch our breath. Soon enough all of this technology will be implemented into our bodies, turning us into, basically, cyborgs. Can we expect to live life like Mr. Roboto, becoming the modern man. Imagine seeing Robocop prowling the streets for miscreants while we all access our own personal HUD the song that is playing. These are the things we can come to expect, along with a number of severe problems; cyber terrorism, iruss, trojan horses, key stroke programs (that is to say, in this context, a program able to acces your mind and watch everything you do). How will these issues be resolved is a mystery as it is nearly impossible to eradicate and keep up with the number of programs that are being made even today. Will the human race become more machine than man? Can we still consider ourselves human if we are made up of more computer and metal then we are of flesh? How will we experience life differenty? Do we really want to take this direction with technologie, considering the repercussions of such an act and the sacrifice involved? It may be safe to say that we may be going too far. Although the technological advancements we are creating are phenomenal we cannot expect them to be used to only improve our lives; it is a well known fact that the human race is a self-destructive creature, and seems to be addicted to finding new and more efficient ways to kill eachother. That being said the technological era we are moving into brings a great many benefits to society, and to the army. The militirization of these innovations will be inevitable. This can be both seen as good and bad, depending on your point of view. War often incites change and pumps up the economy, although with these technologies we will be experiencing a different kind of war, one that could quite possibly affect us all. What will happen to these technologies in the coming years is somewhat of a mystery, perhaps Johny Mnemonic will be the world of tomorrow, those who chose to augment themselves versus those who did not. This technology brings a number of opportunities to better our lives, we will be able to improve our life span and cure more illness and disease, amputees will be able to live normally and those with ental dissabilities may be cured with the use of microchips. With the direction we are taking concerning technology we will have to come to expect that the government will take advantage of these technologies, with profit in mind, and it is very likelly that the uneven distribution of wealth and power will be easily distinguishable in the world of tomorrow. It is impossible to know exactly what the future holds and so we must simply do what we can today, to ensure that tomorrow is the way we want it too be. With that said, how far away are we from being able to see into the future?

Sunday, October 13, 2019

Network Physical Topology of ISP TechnMaster

Network Physical Topology of ISP TechnMaster Network Physical Topology of ISP TechnMaster ISP Infrastructure Physical Topology ThechMaster is the Uk leading virtual ISP (Interner and Services Provider), with it HQ in London where all main services and infrastuture and resource are located, the main secondary branche are locate in Scotland and have similar inftrasture as in london with some others branches around the country, in Wales and in NorthIreland that represent small branches and provide some on the server provided by HQ. Internet Backbone (external) Infrastructure Diagram Internet Backbone is a part of computer network located at the back-end connection between two different networks, strategically interconnect networks and core routers on the Internet, used for the large high speed and capacity between networks that are located remotely and transport very high volume of data. As the Internet high speed links it require high-speed bandwidth connections and high-performance servers/routers devices. As one of the main service provided by ISP is the internet service, so prior to outline all the infrastuture network, the main backbone newtork of ISP are connected with other provider from diferentes continent by undersea fiber optic cable (Figure-3), as well as connection to other sub-region, inter-branches plus DC or transmition station that are related to ISP (Figure-2). Moreover are the responsabilite of each ISP enterprise to take care or troubleshoot and more important reassure the operational of its termination part of fiber optic connection cable, even do some risck and threads are present independently of the location. [1]As an Internet Provider Services that provide differente type of services (Cloud, Broadband, Telefone, VoIP, P2P Caching, IPTV, etc) the funtion and role of the bacbone is very crucial as it is the infrastuture that interconnects various segments of network, mainly in this case it provide all the principal data routes (Figure-3), between large, strategically and interconnected networks from different ISP (intercontinental) to and from our ISP core routers and internal infrastructure and vice versa. ISP Internal Infrastructure Diagram A robust and concise internal network and server infrastructures as the base and spine of all services is highly required to support ISP internal, external and remote services as well to provide at the highest level standards quality of all advertised type of service to the customers and business partner. As the business high requirement and demand the network spinal infrastructures (Netwwork, Server, CCTV, Access Control, Power Source and UPS, Phisical DR System and all subsystem) was designed with highly availability, elasticity and reliability in mind to overcame mainly 75-95% of any considered possible incident that could happen based on a preview and periodic Risk Assessment and Strategic Planning Processes delivery as one of the main police of ISP enterprice to assure its business continuity. More over if have a look at spine network topology we can verify that at the bacbone device and after it for each connection more them one fiber cable sink is used to avoid fail, as well for realibility and better traffic troughput, this police and strategy is followed for the rest of the network as well on secondary inftrastuture system. Altought is not describet but it is clear from (figure 4) that for each infrastuture layer was takem is consideration all advice from report of RASP (Risck Assessiment Stratgey Planning) team related of a list of Risk (natural or artificial) prior to design the all ISP infrastuture, to prevent lack of redundacny, avalibility, reliability or even elasticity, the RASP Risk Handling Decision Points guidince was takem in hight consideration. Risk Assessments/Management Strategy Planning Techmaster ISP, as telecon enterprise that operate in highly demanding national and international market providing variety of tech service need to relay on its infrastuture as well on its human resource team capacity to deal and overcame all the possible threats and risck present daily and the RASP team is responsably to investigate and help creat or provide safe environment and soluction to help the company achive the point. RASP help on the process to identifying, assessing and managing risks and uncertainties, affected by internal and external events or scenarios, that could restrain the ISP capacity to accomplish its methodology and key targets with a definitive objective of making and securing company and custumes value. The RASP team conduct periodic and ocasional whem necessary the risk analysis involving risk identification, assessing the likelihood of the event occurring, and defining the severity of the events consequences. As well are they reponsability to conduct a interanl and external vulnerability assessment, which helps identify situations in which the enterprise may be putting itself at increased risk by not performing certain level of Security police. As any other researche or assessiment the RASP as well condut with final comclusion and recomendadction based on the risk analysis results are summarized in a report to management, with recommended mitigation activities, some of the riscks, threats and vulnerability found and take in consideration by team are: Risks, Threats and vulnerability associate to Internet Backbone infrastructure. As any other infrasturure the backbone area and device are not immune to riscks and threats, are they natural as earthquake, tsunami, or even human as theaf, intentional damange by undersea investigation veicule or other nachine, and deep sea fisher ships all those riscks mast be take in consideration, some of the risck and threts are: Undersea animal can bite and damage the fiber optic cable (figure-6). Rusting of the cover or protective layer of the fiber optic cable, because of the poor quality manifature (figure-6). Acidental or intentional cuting or damange of fiber cable by fish shipping or any other undersea machine. Acidental or intentional damange of infrastuture at the border end cable connection (sea-earth location), by criminal, curious, hacker, etc when not well safeguarded. Risks, Threats and vulnerability associate to internal spine infrastructure and services. The ability to anticipate opportunities and effectively respond to any risk or threats is critical for any company infrastructures, as it is no longer isolated by type of industry or geography location. Although it becoming more complex in nature and global in consequence, the rapidly capacity response to managing as well as mitigating risk and threats are a requirement to survival for company business continuity, driving a companys into success of fail. To assure the confidentiality, integrity, and availability of all the spine infrastuture, system and services components in the company the RASP, identiy and listed some of the main risk, threats and vulnerability that should be aware of : People awarnese (any one that can have access in to company are, guest, cusntumes or even trusted employees, etc) Access violation into restrited area (by unaoutorized persons) Natural Incidentes (earthquike, flooding, humidity, hight temperature, fire, air (dust) etc..) Absence or insuficient source of quality resource (Electricity, wather, fuel.) Hight restintion to all service provided and accessible by custumer even for roaming employee. All knowing and unknow cyber threat and attack, (DDoS Attacks, Direct SQL attack, Session Hijacking, Buffer Overflow, Port Scan, etcà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..) Remote exploits (RAT, Trojan Horse, Bakdor, Worms, Trojans, Bots), Device Firmware and OS vulnerability, system out update, system and services missconfigured.. Sniffing, spoofing, phishing, Social engieering, Port Scaning on border or any infrastuture devices, system Inadequately trained IT staff Intrusion, Hackers, theft (electronically and physically), Backup operators, etc. Security Police to manage and mitigate any incident related to spine infrastructures. As always, The confidentiality, integrity and availability of information, in all its forms, are critical to the on-going functioning and good governance of LSE. Failure to adequately secure information increases the risk of financial and reputational losses from which it may be difficult for LSE to recover. Disaster Recovery plan to manage and mitigate any incident any incident related to spine infrastructures. Cloud Citrix Infrastructure We have Citrix Infrastructure in two collocations, Xen-Server 1 in Site 1 (Headquarter) and Xen-Server 2 in Site 2 (Secondary Data Centre). Both Xen Server infrastructure is running under DMZ network as we have deployed Xen service for in house use only. We have two major running service from XenApp and XenDesktop. The following architecture will elaborate each components of Xen server and how we have deployed it in our infrastructure. XenApp and XenDesktop Architecture We have seven major components studios, director, store front console, pvs console, hypervisor console, license administrator console and machine service console to run Xen App and Xen Desktop in our infrastructure. To have access over the citrix environment users will require Thin Client or Thick Client Machine with citrix receiver. Studios: Citrix Studio it is the main management console that enable us to manage, configure, deploy, eliminate the service. We have delivered application and desktop according to the application, processing, numbers of people associated and policy to the specific departments. We have hosted Windows Server 2012 R2, DataCenter Editions to each department so when they are getting citrix desktop session from windows server itself as it work on the shared environment. Example: In Support Department: We have hosted applications like putty, open ssh as the employee working in Support Department have to deal with the customer to check their internet connectivity and access other networking device and servers. In Account Department: We have not delivered them putty and other networking application as they dont use and it is not required for they. For the people working under account department we have delivered them accounting application like tally, excel. Citrix Director: It is one of the major important components in the Citrix Xen application and desktop. Citrix Director is basically a web-based tool that helps the IP Support and Help Desk team to monitor and troubleshoot. We have provisioned Administrative Privileged in each department Head of Department(HOD) where s/he can administrator each activity that the employee is performing. Even they can have the real time monitoring when the employees are dealing with the customer with some specified trouble ticket. We can even modify the role for the administrative user on monitoring using Citrix Group Policy. The best thing on deploying Citrix Director is that if any of the customer is having problem with accessing certain portal or need help on dealing with some stuff then the person do not need to be physically there to solve the problem. Example: One of the employee from the Account Department have problem opening the web Brower and he call the IT Support Department for help. Back then before we deployed citrix in our environment one of the employee from IT Support Department had to be in the Account Department physically and try to solve the problem resulting high time consumption and delay in work as the employee must travel whereas using Citrix Director the IT Support Engineer and take shadow (Remote Desktop Connection) within the browser and start assisting. Even there are many different way of assisting user i.e text only mode where the IT Support Engineer will not be able to view the user desktop but will be able to assist him using text communication in order to maintain user privacy, next one is Shadowing in citrix technical term which is similar to remote desktop connection in two way one without write permission where the Support Engineer can view the user desktop and assist with the issue and the next one is IT Sup port Engineer and ask keyboard, mouse controller where the support engineer itself and take over and work on the issue. Hypervisor: To share a resorudes of a device with multiple virtual machine for XenApp and XenDesktop we have Citrix XenServer using Citrix XenCenter to manage all servers. Store Front: User will access to the specific web page which is hosted in IIS using store front according to the department on the browser where the users will be able to access to the specific delivered site using citrix reciver. In the above figure we can see how user can access to citrix infrastructure. Here in the above figure a user is trying to access to provisioning services i.e. VDI or HSA first the user get to in the store front from NetScaler which is firewall that we have defined for Citrix Infrastructure the user will use Citrix Gateway then once he will get through the storefront which is basically URL the user will pass his username and password over the browser then the request will move other to the XenDesktop Deliver Controller where it will provide specific provisioned department then the request will further move to ADDS to check the user account name and password over the SQL to check weather it have the permission or not then finally it will check the citrix license server to check the license avalibality for the user if its form the machine it will check Device License and if its a user request than it will check the User License and then the user will get the session from the provisionin g server. Figure: Pool of Xen Server 1 and Xen Server 2 with its components We have deployed all these seven components individually; we could even deploy all seven components with in one singe Windows Server but at the end It will generate a lot of CUP utilization with the risk of single failure so we have deployed each component in each individual windows server so we have better performance and easy to manage. For Citrix Infrastructure on top of Windows Server Data Centre Edition 2012 and Mysql Server 2010 for managing database. For users to access citrix we have deployed Atrust Thin Client device where, users will get login using Citrix Store Front on web browser where they will be required to pass their username and password. All the username and password will be managed by Active Directory in windows server. Figure: Atrust T60 Model Thin Client: User can have their Hosted Shared Desktop (HSD), Virtual Desktop Infrastructure(VDI), Hosted Shared Application (HSA) using thin client device like Atrust t60. Thick Client: User can even access to the Hosted Shared Desktop (HSD), Virtual Desktop Infrastructure(VDI), Hosted Shared Application (HSA) using their own laptop machine or any end device like tables, cell phone. Citrix Cloud Redundancy: For Citrix Cloud Redundancy, Whole Citrix Infrastructure have been deployed in two major Sites Site1 (Headquarter) and Site2 (Data Centre) Figure: HP Blade Server Generation 9 with chasis Xen Server 1 and Xen Server 2 have been deployed in two blade servers in heart beat mode Both Xen Servers are in different colocation zone so if one goes down the service is provided from another source site 2 KDC all the license associated with the Citrix and Windows services are within the Key Distribution Center in cloud so there is no change of getting access over the key physically or change the key. All the licensing service are monitored through Microsoft License Management Console All user or device license are monitored by the team of System Engineers where if anyone from the organization leaves or enrol they will update the license where the missuse of licensing is minimal Xen Server 1 and Xen Server 2 both service Xen App and Xen Desktop service license is only accessed by the Chef Technical Officer (CTO) hence, no other employee and stop the server license and if so there is always another license that can we up on from Citrix itself upon urgent request Disaster Recovery Plan: Both Xen Server 1 and Xen Server 2 works in heart beat mode so if one goes down there is another server as a backup As blade server runs with in the chassis in case of any failure citrix service can be migrated immediately with zero data loss Figure: HP MSA SAN 2040 SAN storage have been configured with two controllers within itself Controller A and Controller B where if any array of SAS Drives goes down it will recover from another array. We have deployed dedicated SAN in each individual Site1 and Site2 where all the configuration and user data are stored. So, in this case even if one SAN goes down there is always another one so its 99.99% safe. Both SAN storage have been configured in RAID 1+0 mode for higher performance. In case of any disaster we have xen center from where we can manage each Xen App and Xen Desktop components. We have clustered both Xen Servers as a DataHub Pool name where we will be notified within the central management in case of any disaster. Xen Server 1 and Xen Server 2 both have been configured in our monitoring environment as well so if in case of any network failure our outage in the server we have notification in our monitoring application dashboard as well as it will be informed in the email along with the cell phone sms features. So if in case of any disaster in datacentre or if there is any failure in servers the team of system engineers can get into troubleshooting and response quickly. Both of our Data Centre Site1 and Site2 have passed ISO standard for building for data centre so if there is earthquake of 8.5 hector still our data centre will be operational and in case of fire we have advance fire prevention system. Power supply can be one of the biggest result of disaster, in our environment we have two power supply unit PDU A and PDU B (Power Distribution Unit) so there is always power supply to Xen Server Infrastructure if one goes down there is another one for continue power supply. Threats Associated: According to the recent research the internal threat is increasing more than external threat. Citrix have its own threat control mechanisms and one of its components controlling threats is using Citirx Director. Citrix Administrator can monitor and keep log of each individual users, so every activity performed by the users are captured and monitored. As the Virtual Desktop is provided to user using Citrix provisioning service users will only get the access and permission to files and the application. Where the users cannot copy any data or file from anyone as we have defined permission to make change and view only its own file, so this reduce the threat of miss using informations from one another or if any unusual actives are found performed by the user beyond their access then it will be reported by the system automatically hence can reduce threat. Each user activity is monitored using Director, for example if any of the user want to install any suspicious malicious code or application the citrix service will not allow them to do so if found then the Citrix administrator and take over the user session and eliminate the task. No any other application can be install in the Xen App or Xen Desktop other than those applications which are predefined by the citrix administration so there are no any threats associated with in this technology and the user they cannot make any comment on server. We have group of system engineers monitoring citrix infrastructure using Citrix Director so if in case of any unusual traffic or activities are seen it will act in an instant. All the Citrix request must past though Citrix NetScaler which is firewall and gateway for the internet traffic. Policies: Citrix Xen App and Xen Desktop have over more than 3000 policies, where we have defined few from them Users can not access another department other than their own. For Example: Employee working for Account Department cannot access the IT Support Department. User only have read/write/delete policy with in their user account If user make mistake while passing their username password more than 3 times in a day, then it is suspected to threat or any unauthorized access hence the system will block the user itself. Or if its a genuine request then the user can make a request to change the username and password. Users user name and password authentication have been defined within the windows active directory with citrix policy Each department have its own printer so account department and not use IT department printer this policy have been deployed using Citrix UPS (Universal Printer Service) Figure: Defining Citrix Policy for Very High Definition User Experience In the above figure the Citrix Administrator have defined the policy for Legacy graphic mode which will enable user to feel real desktop like a physical desktop graphic. ISP Different Department and Their Role Level 1 (L1) Support Department Sub Category for L1 `Support Department 1. Technical Customer Support Department * Technical Customer Support Department handle all the calls from the customer regarding different services that are provided by the ISP. Example: In our ISP our major business is bandwidth and Cloud Service so the our Support Team deals with all the trouble tickets related with the Cloud Service and Bandwidth i.e. a Customer want to have a VPS service over Vmware Exsi with some specific configuration they take the customer requirement and forward it to Level 2 System Department. 2. Technical On Field Customer Support Department: * Technical Support Engineers will go on site customer end to configure basic router along with the username and password provided by the L1 Customer Support Department for the Internet Connectivity. Level 2 (L2) and Level 3 (L3) Support Department Sub Category for L2 and L3 Support Department 1. L2 System Department * L2 System Engineers are responsible to maintain their internal running services and network that are interconnected along with the servers. To manage the running service we have different cloud platform Openstack, Exsi Vmware, Citrix. These department is more over with the operational task to all they need to take care is make sure all the service is up and running. 2. L3 System IP Engineering Department * All the Research and Development is done in this department. If there is any new technology in the market this team will to research on it and work closely with the porcument and management team to further continue organization with the advance technology and good business. 1. L2 Network Department: * This department is more over like l2 system department. They make sure all the internal and external network is operational and working fine. They are responsiable more in manageing internal network and if there is some basic configuration that is required to be done. 2. L3 Network IP Engineering Department * This department is responsiable for doing research and development on existing top level network like core network. They are responsiable to test the new device and alanyse whether they are reliable and cost efficient or not for the organization. 3. Account Department * Managing Company employee salary, customer billing 4. Project Department * Bidding project brining new project 5. SPI Department * Working with the CMTS network 6. NOC Department * Monitoring Different Data Center network connectivity link and mainting all the servers and networking equipment with the data center 7. Enterprise Customer Department * Dealing with the big size company 6. Retail Customer Department Dealing with the retail home user customers Public Cloud: The Techmaster ISP offers a public cloud to the users where they can pay as you go model. The cloud has several payment options which are provided by the third-party gateway. These payments are Visa/ Mastercard and paypal. There are firewalls and risk management server on the public cloud. The risk management server is provided Viewtrust by Dell to manage the risks ingests all the data and logs. The below diagram explains the way the public cloud is setup: Risk Management on Techmasters Public Cloud The techmaster risk management department uses the ISO 31000 for risk management. The risks are evaluated and reviewed time and again. The below diagram explains how the risks are handled on different stages: Due to the high rate of risk Techmaster has implemented the Risk management server which is used to ingest all the logs from the network and the servers online. There are several risks associated to the cloud. Below are the risks associated: Risk Assessment Table for Public Cloud: Score Rating Definition of risks Risks like-hood for Cloud: Score Like-hood Rating Probability Frequency 5 Expected 90-100% Almost quarterly 4 Highly Likely 70-90% Yearly 3 Likely 50-70% Every 2 to 4 years 2 Not likely 10-50% Every 4 to 6 years 1 Slight Every 7 Years and Beyond Enterprise Risk Management Server: Techmasters has a risk management server which ingest all the logs from the servers and presents it on different level. Viewtrust solution provides a scalable data ingest, collection, storage, processing platform which is currently supporting critical enterprise environments monitoring several devices and processing multitude of data input types from number of sensors as shown below. The Sensor sub-system collects data from multiple legacy and new sensors for collecting Hardware, Software, Vulnerability and Configuration information about assets within the enterprise. The Collectors are centralized and distributed to collect, process data close to the source. The data once processed is then sent to the warehouse for data normalization and transform using the Business Logic component of Viewtrust. This in turn results into a Common Operational View of the data from multiple sensors. The following diagram depicts and describes the Viewtrust Risk Management Analytics with the continuous monitoring dashboard architecture: Disaster recovery plan Disaster recovery plan is one of the most important thing in managing a network. The reason for it is, when a disaster happens, there should be a proper plan in order to recover the network. So, every organization should have a proper disaster recovery plan with them. What is a disaster? Disaster is an event that can make great harms and damages. There are natural disasters and disasters which occurs because of human activities. Natural disasters can be floods, fires, earthquakes and etc. Because of these natural disasters, physical damages can be happened for the network. Non-natural disasters can be happened because of the events such as hacking network and denial of service. Disaster recovery plan is the method which can be used to avoid these types of disasters. Disaster recovery plan helps to restart operations of a network after a disaster. Disaster recovery plan works with three methods to recover a network after a disaster. Those methods are, Restoring Recovering Replications and backups According to the ISO 22301 standard for business continuity plan, the following things should be studied, Users, purpose and the scope :- here, the reasons for the need of the business continuity plan should be discussed and the objectives of it. Refenc