Wednesday, July 31, 2019

History of Database Essay

Storing data and files is an important aspect of business for various industries of the world. The storage of data in computers or database system is proven to be cost effective. Large or small database needs a system which will control the processes in the databases. Such applications are called database management systems (DBMS). From the time it was designed, the need for a good DBMS has increased because of the escalating number of data stored in the database. There are many available DBMS that private corporations use today. Indeed, database management systems have evolved due to the demand for the services that these systems provide. Database Management System A database management system is a collection of programs which enables the user or a network of users to mange files and data inside the database. The management includes storing, deleting, modifying, and extracting information from the database. It manages the request of the user and other programs installed in the computer or in the network. The DBMS ensures the integrity and reliability of the data. Some DBMS also provide security to the database (Tatum, 2003). There are many different forms of database management systems available in the market today because of the different private and public organizations or corporations which require different kinds of DBMS. However, there are four important elements that every DBMS have. These are the modeling language, data structures, data query language and mechanism that allows transactions (Tatum, 2003). The modeling language is the element that pertains to the approach used by the DBMS to communicate with the database. There are several approaches available today including hierarchical, relational, network and object-oriented (Christiansen, 2005). The hierarchical model makes use of pointers to navigate between stored data which is stored hierarchically in a downward tree. The structure is very inflexible in changing data and access requirements. The data is accessed by navigating from the root data to the data on the lower part of the hierarchy. In addition, the user should know the structure of the system before he or she can make an inquiry (Hsior, n. d. ). The network model is like the hierarchical model. It uses pointers to navigate through the data but it does not use a downward tree structure. It has limited flexibility in changing data and accessing requirements. Access to the data is accomplished by navigating through the structure and issuing specific statements to find specific data types in relation to the starting point of the structure (Hsior, n. d. ). In relational model, the data is stored in the two-dimensional tables. The data in the relational method is manipulated based on the relational theory of mathematics. The data types in this model are assigned with a symbolic primary key or foreign key construction. The referential integrity of the model is supported by the relational theory of mathematics. This model is very flexible to the data changes and access requirements. And the access to data types is based on relational algebra and relational calculus statements (Hsior, n. d. ). And lastly, the object-oriented model stores data as objects. This model is more direct than its predecessors since the design is very close to the real world model. The object-oriented model allows an easier way to maintain the database. The identification of objects is assigned by the system which protects the consistency of the data; while in the relational systems, it is assigned by the user. The database does not only store data but a whole application as well. Moreover, it can be executed inside the database. The concept of inheritance in this model makes code easily reusable. Furthermore, the object-oriented model is more practical and more economical (Hsior, n. d. ). The data structures are the elements that a DBMS manages inside the database. Different databases require different data structures which different DBMS manage. Data structures include individual records, files, fields and objects such as media files. DBMS need to define data structures to ensure the integrity of the data while it is being accessed. The data query language is the element which takes care of the security of the database. It monitors login data, assigns access rights and privileges, and defines the criteria for the add data function in the data base (Tatum, 2003). History The origin of database can be traced back to libraries, governments and other institutions that require storage of data. The DBMS was designed to ensure the integrity, security and accessibility of data. The design of the DBMS constantly evolves through time. It aims to create a design of which has better reliability and performance (Mann, 2003). In the 1800, Jose Marie Jacquard had created a machine, Jacquard Loom, which produced fabric from stored design from a punch card. The data of the design is stored in punch cards where holes represent the details in the design. In this way, the Jacquard Loom automatically designs the loom depending on the punch card in use (Tatum, 2003). Similar technology was used in the 1890 as Herman Hollerith created a mechanism that recorded information in a punch card which was coded numerically. The idea is that the data can punch in specific locations in the card, and then it can be counted and sorted automatically. This design was used by the US government to perform the census. Hollerith’s company solely produces the machine that records the data in the punch card and another machine that tabulates and sorts the cards. This company is renamed to IBM. The company prospered as it was able to produce machines that can record data for business and government institutions during 1910 towards 1960. The systems have records of every household and other data needed for the analysis of the society (Tatum, 2003). By 1955, many business and government institutions have floors dedicated for the storage of punched cards and floors for the machines. The machines work with punch-board which control accumulator registers that could reproduce punched cards or put data on paper. Some very large companies accumulate tons of data everyday that costs millions on storage. Thus, the need for a new technology has become very imminent (Tatum, 2003). In the 1960s, private organizations and corporations needed computers that have better storage capabilities and computers are proven to be cost effective against ordinary punch cards. In line with this, database administrators needed database management systems to cope with the increasing data storage capacity of computers and the increasing number of data being stored. The hierarchical and network model are the two main data models developed which were used in database management systems during the earlier years. They made use of pointers which was used to navigate through records. In these models, there were difficulties in adding another field in the higher level since it will require rewriting the scheme for access in the lower level data. In this system, the emphasis of the model was placed on the type of data to be processed and not the over all structure of the system. In addition, the user who will need access to the data should know the structure of the database before he can make a query for information (Vaughn, 2003). In the early 1970s, the Edgar F. Codd proposed a relational approach in manipulating data in the database. He published an article entitled ‘A relational model of data for large shared data banks’ which became the foundation in the development of the relational database. The article showed a theory of how to store data in a rectangular or in two-dimensional tables and then use the theory of mathematical sets to operate on it. The relational databases represent the first implementation of the real database management system. Since then, the relation model had been the most popular or standard approach for database management systems (Vaughn, 2003). In the mid-70s, the theory of Codd on relational databases was put into research projects by several competing camps. During this time, the term Relational Database Management System or the RDBMS was coined. During these times, there are two main prototypes based on the relational were developed. These are the System R developed by the IBM and Ingres developed by the University of California at Berkeley. These two prototypes led to different kinds of DBMS. The two lines of DBMS created by the two prototypes used different query languages. IBM’s System R uses the Structured Query Language (SQL) and the UCB’s Ingres uses QUEL short for query language. Also in mid-1970s, Peter P. Chen proposed the Entity-Relationship Model for the database design which gave a new insight in the conceptual models of a database management system. This model gives the designer of the database management system a way to concentrate more on the use of data instead of its logical structure like other method does (Vaughn, 2003). In the early 1980s, the commercialization of the Relational Database Management System began to intensify due to the increasing demand of databases in corporations around the world. The higher demand was caused by the emerging business in the United States and other countries around the world. Another reason is that organizations and corporations had increasing number of data needed to be stored. Businesses rely on computers for their data storage thus a better database management system is needed to manage large databases that these businesses have. At the same time, many companies made some products which give individual users to maintain a small database in their own computer (Vaughn, 2003). In the rest of the 1980s, SQL had become the standard query language for many databases which was caused by the emergence of the local area network. The Oracle Corporation made the first commercial relational database. Moreover, the network and hierarchical models faded to the background. However, there are still others that use the network and hierarchical models (Vaughn, 2003). It was during the early 1990s when the industry of databases had a shakeout and there are only a few companies that survived for offering better products. The most important development on the computer industry was on application builders and programming languages. During these times, the prototype of the object-oriented database management system was introduced. The object-oriented DBMS is conceptualized to handle big and complex data that relational database management systems had a hard time to handle (Vaughn, 2003). In the mid-1990s, the influx of internet use revived the need for database industry. This demand came from internet servers in order to manipulate the large amounts of data which must be made accessible to internet users. Better security and reliability is also needed to protect the client-users and the information itself from corruption and tamper. As such, only a good database management system can provide this. In addition, the database industry during these times has reached the desktop computers in the users’ own homes. This provides desktop computer users to manage their own small database or access the large databases on the internet (Vaughn, 2003). In the late 1990s, the industry prospered in terms of internet sales and database tools. The e-commerce industry boomed since business transactions have been done online. The Online Transaction Processing and the Online Analytical Processing emerged (Vaughn, 2003). However, in the early 21st century, there has been a decline in the internet industry. Nonetheless, the database industry is still growing because the demand for a larger database and better DBMS is steadily growing. There are other interactive applications that emerged during these times. Three companies have dominated the database industry including Microsoft, Oracle and IBM (Vaughn, 2003). Nowadays, huge systems require a good way to manage and analyze data. These databases’ storage capacity for the data now reaches the terrabyte level. Such databases are science databases which hold genome projects, national security, and space exploration data. Shopping online is also one of the common practices today. Millions of buyers participate on this application, thus requiring a larger database and good handling abilities. There are researches today that is said to surpass the capabilities of the SQL. This development will ensure another significant growth in the database industry (Vaughn, 2003). Future Trends Mobile database is now emerging in various ways. This technology will secure a more remote access to database. Additionally, more and more people will access a single database at a time. As such, proper management is needed to ensure the continuous service and to prevent a system crush (Vaughn, 2003). Object-oriented database management system is predicted to dominate the database market as well as other computer markets. The emergence of the use of this model threatens to wipe other database models (Vaughn, 2003). As time goes by, there are certain issues that have risen alongside the creation of larger databases. Ethical issue is one of them; the larger the database is, the harder that people can efficiently manage it. Consequently, it is easier for perpetrators to subtly penetrate a system without being known by the administrators. In addition, some databases use automatic analyzing application which is sometimes unethical to use (Vaughn, 2003). Evidently, the database evolved from simple punched cards to huge mainframes. The advances in database technology have propelled the growing need for large data storage and management tools to access and analyze it. The database management system evolved as billions of information are generated by large business and government institutions everyday. The demand still grows as the internet community is still continuously growing. The future of database industry is very clear – it will continue to prosper and advance as the world continuously develops. References Christiansen, S. (2005). Database Management System. Retrieved April 10, 2009, from http://searchsqlserver. techtarget. com/sDefinition/0,,sid87_gci213669,00. html Hsior, J. (n. d. ). Evolution of Database Systems. Retrieved April 12, 2009, from http://w3. ocit. edu. tw/ben/foxpro6/article/english/ch01/page04. htm Mann, M. (2006). History and Comparison of Relational Database Management Systems. TechnoCircle HVB Information Services. Retrieved April 11, 2009, from http://www. guug. de/lokal/muenchen/2007-05-14/rdbmsc. pdf Tatum, M. (2003). What is DBMS? Retrieved April 10, 2009, from http://www. wisegeek. com/what-is-dbms. htm Vaughn, J. (2003). A short Database History. Hobart and William Smith Colleges. Retrieved April 12, 2009, from http://math. hws. edu/vaughn/cpsc/343/2003/history. html

Tuesday, July 30, 2019

Marketing to the Bottom of the Pyramid

The concept of the Bottom of the Pyramid (BOP) market was originally developed by C.K. Prahalad in â€Å"The Fortune at the Bottom of the Pyramid† to highlight a large potential market made up of a large segment of the world’s population that has, until recently, been an ignored market segment among multinational companies. In an age of increasing global competition and near-saturation for some products in more mature markets, this multi-cultural segment, made up of people from all parts of the world that earn less than two dollars a day, can generate significant revenues and be profitable for companies who have developed appropriate strategies for reaching this market segment. Among the issues related to BOPMs are establishing appropriate distribution channels, developing and pricing products that have value for those in these markets, and finding creative ways for financing. In terms of financing, this would include not only that related to the purchase of a product for those with relatively low incomes, but would also include strategies for financing business initiatives on the local level. Perspectives Stakeholder would include the local populations that make up the BOPMs. Cultural considerations must be a key component of product development and advertising. Care must be given that products will not harm those to whom they are marketed. Also, companies are stakeholders in that new strategies including BOPMs may be important ways for a company to grow organically. In extension, many large multinational firms are public-traded companies. As such, shareholders are the owners and increasing shareholder value is a goal. Discussion †¢ Ethics of marketing certain products to people in the BOPM. †¢ Issues related to distribution channels. It seems that companies marketing to BOPMs must think beyond the traditionally accepted distribution channels. Many people in BOPMs live in remote, harder to reach, areas. †¢ Issues related to advertising. Television and radio advertising are one approach, but may not be the best way to reach the target market. Action/Recommendation Distributions Channels A successful strategy for marketing to these segments would include more direct marketing, with people getting paid on commissions. For retailers, marketing efforts should be geared toward lower volume sales in smaller stores. In contrast to what we are accustomed to in our domestic market in which we shop in large retails stores where the prices per unit decreases as the product size increases, BOPMs would require a different approach. These markets would require smaller, possibly individual-size products that could be purchased for a relatively small amount of money for people that probably do not have credit and do not have a significant amount of money on any given day. Product Development In addition to the size of products offered, other important factors need to be considered. In terms of packaging, climate is important—products may be offered in small, more or less open-air stores in hot climates, for example. More important for products that have a technical component, consideration also needs to be given to the level of features available. Whereas some features ,such as battery capacity—important as noted in the case for those without reliable sources of electricity—may be critical for product success, others may not be useful and my unnecessarily increase the price or the complexity of the product.

The Social Theory of Du Bois

Karl Marx, Max Weber, and Emile Durkheim are widely recognized as the trinity of sociological theory. While these three sociologists were trailblazing social theorists who enhanced the study of human behavior and its relationship to social institutions, other, more contemporary scholars were just as innovative – one of those scholars being W. E. B. Du Bois. W. E. B. Du Bois was a political and literary giant of the 20th century, publishing over twenty books and thousand of essays and articles throughout his life. W. E. B Du Bois is arguably one of the most imaginative, perceptive, and prolific founders of the sociological discipline. In addition to leading the Pan-African movement and being an activist for civil rights for African Americans, Du Bois was a pioneer of urban sociology, an innovator of rural sociology, a leader in criminology, the first American sociologist of religion, and most notably the first great social theorist of race. The work of W. E. B. Du Bois (1868-19 63) has recently become recognized for its significant contributions to sociological theory. Although Du Bois himself was overwhelmingly concerned with the scientific perspective of â€Å"value free† sociological research, later social theorists have found his thoughts on race to offer one of the first instances of the articulation of standpoint theory. This theoretical perspective is anything but value free, because of the self-conscious efforts of the researcher to look at the social world from the vantage point of minority groups. Feminists, multiculturalists, and even postmodernists have come to recognize the importance of the black point of view found in Du Bois's work. They have also come to appreciate Du Bois for his focus on local knowledge and practices. W. E. B. Du Bois was an important American thinker. Poet, philosopher, economic historian, sociologist, and social critic, Du Bois’ work resists easy classification. Du Bois is more than a philosopher; he is, for many, a great social leader. His extensive efforts all bend toward a common goal, the equality of colored people. His philosophy is significant today because it addresses what many would argue is the real world problem of white domination. So long as racist white privilege exists, and suppresses the dreams and the freedoms of human beings, so long will Du Bois be relevant as a thinker, for he, more than almost any other, employed thought in the service of exposing this privilege, and worked to eliminate it in the service of a greater humanity. Du Bois was a prolific author. His collection of essays, The Souls of Black Folk, was a seminal work in African-American literature; and his 1935 magnum opus Black Reconstruction in America challenged the prevailing orthodoxy that blacks were responsible for the failures of the Reconstruction era. He wrote the first scientific treatise in the field of sociology; and he published three autobiographies, each of which contains insightful essays on sociology, politics and history. In his role as editor of the NAACP's journal The Crisis, he published many influential pieces. Du Bois believed that capitalism was a primary cause of racism, and he was generally sympathetic to socialist causes throughout his life. He was an ardent peace activist and advocated nuclear disarmament. The United States' Civil Rights Act, embodying many of the reforms for which Du Bois had campaigned his entire life, was enacted a year after his death. Early in his career Du Bois claimed that the â€Å"race idea† was the central thought of all history and that the primary â€Å"problem of the twentieth century was the problem of the colour line. † Du Bois viewed the goal of African Americans not as one of integration or absorption into white America, but one of advancing â€Å"Pan-Negroism. † Critical of the excessive materialism of white America, Du Bois believed that black culture could temper the self-interested pursuit of profit. Du Bois called on blacks to organize and unite around their race, and although he was not opposed to segregation per se, he did come to realize that discrimination stifled the development of â€Å"separate but equal† facilities and institutions. The concepts of the Veil and double consciousness occupy an important place in Du Bois's theory on race. Du Bois discusses both in his work The Souls of Black Folk. The Veil is an imaginary barrier that separates whites and blacks. Du Bois hoped his work would allow whites to glimpse behind the Veil, so they could begin to understand the black experience in America. Perhaps the most fundamental component of the black experience in America was living with what Du Bois called double consciousness. Blacks are simultaneously both inside and outside of the dominant white society and live with a feeling of â€Å"twoness. † By trying to cultivate and preserve a racial identity, blacks come into conflict with trying to fit into white society. According to Du Bois, the tension of being both black and American can manifest itself in pathologies within the black community and discrimination in white America. Whatever turns out to be the best general account of Du Bois’ philosophy, it seems the significance of his thought only really shows up in the specific details of his works themselves, especially in The Souls of Black Folk. It is here that he first develops his central philosophical concept, the concept of double consciousness, and spells out its full implications. The aim of Souls of Black Folk is to show the spirit of black people in the United States: to show their humanity and the predicament that has confronted their humanity. Du Bois asserts that â€Å"the color line† divides people in the States, causes massive harm to its inhabitants, and ruins its own pretensions to democracy. He shows, in particular, how a veil has come to be put over African-Americans, so that others do not see them as they are; African-Americans are obscured in America; they cannot be seen clearly, but only through the lens of race prejudice. African-Americans feel this alien perception upon them but at the same time feel themselves as themselves, as their own with their own legitimate feelings and traditions. This dual self-perception is known as â€Å"double consciousness. Du Bois’ aim in Souls is to explain this concept in more specific detail and to show how it adversely affects African-Americans. In the background of Souls is always also the moral import of its message, to the effect that the insertion of a veil on human beings is wrong and must be condemned on the grounds that it divides what otherwise would be a unique and coherent identity. Souls thus aims to make the reader understand, in effect, that African-Americans have a distinct cultural identity, one that must be acknowledged, respected, and enabled to flourish. Du Bois’ other major philosophical concept is that of â€Å"second sight. † This is a concept he develops most precisely in Darkwater, a work, as we have seen, in which Du Bois changes his approach and takes up a stauncher stance against white culture. Du Bois holds that due to their double consciousness, African-Americans possess a privileged epistemological perspective. Both inside the white world and outside of it, African-Americans are able to understand the white world, while yet perceiving it from a different perspective, namely that of an outsider as well. The white person in America, by contrast, contains but a single consciousness and perspective, for he or she is a member of a dominant culture, with its own racial and cultural norms asserted as absolute. The white person looks out from themselves and sees only their own world reflected back upon them—a kind of blindness or singular sight possesses them. Luckily, as Du Bois makes clear, the dual perspective of African-Americans can be used to grasp the essence of whiteness and to expose it, in the multiple senses of the word â€Å"expose. That is to say, second sight allows an African-American to bring the white view out into the open, to lay it bare, and to let it wither for the problematic and wrong-headed concept that it is. The destruction of â€Å"whiteness† in this way leaves whites open to the experience of African-Americans, as a privileged perspective, and hence it also leaves African-Americans with a breach in the culture through which they could enter with t heir legitimate, and legitimating, perspectives. Later in life, Du Bois turned to communism as the means to achieve equality. Du Bois came to believe that the economic condition of Africans and African-Americans was one of the primary modes of their oppression, and that a more equitable distribution of wealth, as advanced by Marx, was the remedy to the situation. ( John J. Macionis: Sociology 14th edition) Du Bois was not simply a follower of Marx, however. He also added keen insights to the communist tradition himself. One of his contributions is his insistence that communism contains no explicit means of liberating Africans and African-Americans, but that it ought to focus its attentions here and work toward this end. â€Å"The darker races,† to use Du Bois’ language, amount to the majority of the world’s proletariat. In Black Folk, Then and Now, Du Bois writes: â€Å"the dark workers of Asia, Africa, the islands of the sea, and South and Central America†¦these are the one who are supporting a superstructure of wealth, luxury, and extravagance. It is the rise of these people that is the rise of the world† (Black Folk,). A further contribution Du Bois makes is to show how Utopian politics such as communism is possible in the first place. Building on Engle’s claim that freedom lies in the acknowledgment of necessity, as Maynard Solomon argues (Solomon, â€Å"Introduction† 258), (because in grasping necessity we accurately perceive what areas of life are open to free action), Du Bois insists on the power of dreams. Admitting our bound nature (bound to our bellies, bound to material conditions), even stressing it, he nonetheless emphasizes our range of powers within these constraints. Although difficult to characterize in general terms, Du Bois’ philosophy amounts to a programmatic shift away from abstraction and toward engaged, social criticism. In affecting this change in philosophy, especially on behalf of African-Americans and pertaining to the issue of race, Du Bois adds concrete significance and urgent application to American Pragmatism, as Cornel West maintains, a philosophy that is about social criticism, not about grasping absolute timeless truth. Above all, however, Du Bois’ philosophy is significant today because it addresses what many would argue is the real world problem of white domination. So long as racist white privilege exists, and suppresses the dreams and the freedoms of human beings, so long will Du Bois be relevant as a thinker, for he, more than almost any other, employed thought in the service of exposing this privilege, and worked to eliminate it in the service of a greater humanity. References: Du Bois, W. E. B. Black Folk, Then and Now (Millwood, N.Y.: Kraus-Thomson Organization Limited, 1975). Du Bois, W. E. B. Darkwater: Voices From Within the Veil (Mineola, N. Y. Dover Publications, 1999). http://en.wikipedia.org/wiki/W._E._B._Du_Bois http://highered.mcgraw-hill.com/sites/0072824301/student_view0/chapter10/chapter_summary.html Sociology: 14th edition (John J Macionis; Prentice Hall, 2011)

Monday, July 29, 2019

Comprehending As Well As Critiquing and Valuing Evidence Article

Comprehending As Well As Critiquing and Valuing Evidence - Article Example For proper creation of digital stories, Choi indicates some principles that should be followed. These includes thinking about the purpose of using digital storytelling, analyzing the reading content, making a storyboard, and finding the best image to provide visual background information (Choi, 2012). Key problems of digital story telling includes lack of assessing the computers, lack of technical expertise for teachers and students, and long time spent in creating stories. Choi concludes that ESL/EFL teachers who want to incorporate digital storytelling in classrooms should have the ability to develop appropriate and context digital stories. One of the positive aspects of this article is that Dongseok Choi clearly describes the importance of using the latest technology in storytelling. The author uses literature from other sources such as Jessica, Beatham, and Roney among other to show comparison. However, the comparison among the major contributors could be done in a better way by use of graphs which lacks in the article. This article provides clear picture of how teachers should be computer literate for them to be productive especially when dealing with students. In order for teachers to prepare their ESL/EFL students to appropriately communicate, it is vital to be prepared just as the way the teachers require the scheme of work for any other lesson. The article Web 2.0-Assisted Language Learning: Using Technology to Enhance Reading Comprehension, by Fatemeh Behjat, Mohammad Sadegh Bagheri, Mortaza Yamini was written in Islamic Azad University. The article that involved 113 male and female participants majoring in English in Islamic Azad University, indicates the extent to which web 2.0 is useful to improve EFL students’ reading comprehension (Fatemeh, Mohammad and Mortaza, 2012). The article research question was which of the web2.0 tools, weblogs or wikis

Sunday, July 28, 2019

Project managment Essay Example | Topics and Well Written Essays - 2500 words

Project managment - Essay Example Organization â€Å"Y† is a small company with 15 employees working in the financial sector and providing financial services to organizations, businesses, and individual customers. The company was established in 1999 and since then has been gradually expanding its presence in the financial services market. The organization constantly increases the range of available financial services and provides its financial advisors with additional workplace opportunities. The company seeks to increase job satisfaction among its employees and considers job satisfaction as the critical component of its business success. The topic of job satisfaction is not new. In the current system of organization studies, job satisfaction occupies one of the central positions. Job satisfaction is defined as â€Å"feelings or affective responses to facets of the situation† (Fichter & Cipolla, 2010). Here, facets of the situation imply the workplace situation and environment in which employees are bound to perform, while feelings and affective responses may vary from the quality of workplace performance to the emotional and cognitive balance that result of the workplace pressures and overloads. The â€Å"facets† of job imply intrinsic and extrinsic features of particular jobs and the extent to which they influence the level of job satisfaction across various professions. Since the end of 2006, the organization adopted a new strategy, aimed to expand its market presence, to change its approaches to brand management, and to attract new customers. The strategy has become the determining feature of the organization’s success, and more and more customers came to develop cooperative relations with the professional financial advisors working for the company. Since that time, however, the company management noticed that financial advisors displayed lower motivation to work and did not always cope with their basic workplace obligations. Work absenteeism rose dramatically,

Saturday, July 27, 2019

Dissertation Proposal Essay Example | Topics and Well Written Essays - 1750 words

Dissertation Proposal - Essay Example High- leveraged firms in the EU do not respond to economic crises in the same way that low-leveraged firms do. The former responds by adopting a more debt more repayment policy while the latter responds by adopting a less debt more equity policy. This strategic policy dichotomy underlies the very nature of EU corporate culture too. Invariably strategic policy responses of this nature are characterized by paradigm shifts that both primarily and immediately presume corporate governance and sustainability issues. EU companies operate in a highly regulated competitive environment that gives them little, if any, freedom to achieve organizational goals, both short term and long term (Spedding, 2004). In this backdrop leveraging decisions of firms are basically determined by long term organizational goals related outcomes as much as they are determined by theoretical conceptual frameworks. A set of endogenous and exogenous variables that impact on these outcomes has been studied with greater emphasis on organizational outcomes related to leverage in general (DeMarzo and Duffie, 1991). However a series of questions as to what, why, when, where and how have not been properly answered concerning the significance of more debt and less equity in order to settle existing debt against the backdrop of the current economic downturn (Cooper, 2008). Strategic finance policy shifts in the EU corporate sector against the backdrop of the current global economic downturn have been marked by more debt to pay existing debt (Pettit, 2007). This kind of leveraging practice has a very far reaching impact on the overall capital structure of the firm as well (Lele, 1992). Issuing more debt in order to settle existing debt is a strategic financial initiative adopted by EU firms thus obviating the need for issuing equity (O’Conner and Jen, 2002). However the strategic financial policy on leveraging in the EU corporate sector has acquired a new dimension, i.e. while exiting debt might

Friday, July 26, 2019

Organization public health slp 1 Essay Example | Topics and Well Written Essays - 500 words

Organization public health slp 1 - Essay Example (NCI, 2008) The estimated 2007 US colon cancer patient is roughly 112,340 men and 55,290 women. (American Cancer Society, 2007) In general, more 28,180 women have died from colon cancer as compared to 26,000 men. (Centers for Disease Control and Prevention, 2006) On the contrary, more men with 26,991 have died from the disease as compared to women with 26,669 back in 2004. (Centers for Disease Control and Prevention, 2004) In general, the survival rate of the American White and African American is 66% and 54% respectively. (National Cancer Institute, 2006) A person’s age, family history, personal medical history, diet, polyps or non-cancerous cells, ulcerative colitis, and lifestyle such as excessive smoking and alcohol consumption are the common risk factors related to the development of colon cancer. (NIH Senior Health, 2007; Zeller et al., 2006; Giovannucci & Brigham, 2001; Halvorsen et al., 1999) Lifestyle and diet significantly triggers the possibility of developing colon cancer. In line with this matter, a past study shows that there is a significant relationship between the reduction of folate intake and the increase in alcohol consumption with the increase risk for colon cancer. (Giovannucci et al., 1995) This is because of the fact that folate acts as the regulator of oncogene and tumor suppressor gene expression through the DNA methylation. Aside from allowing causing a free radical damage to the colon cells, excessive alcohol consumption reduces the folate that is store in the human body. (Wheeler, 2003) When colon cancer is detected, colorectal cancer care is treated with the use of chemotherapy, surgery or radiation therapy. (Dominitz et al., 1998) To minimize the number of death, there is a need for health care workers to assess the risk factors such as age in order to provide the patients with necessary treatment and care. (Seifeldin & Hantsch, 1999) The problem with

Thursday, July 25, 2019

Smoking Research Paper Example | Topics and Well Written Essays - 500 words

Smoking - Research Paper Example A person who smokes subtracts and average of 14 years from their lives and significantly lowers the quality of life in all the years they continue the habit. The country’s economy loses as well, $75 billion in health care costs and $82 billion in productivity each year. â€Å"Smoking is the leading preventable cause of death and disease, costing us too many lives, too many dollars and too many tears. If we are going to be serious about improving health and preventing disease we must continue to drive down tobacco use.† (â€Å"New Surgeon,† 2004) Smoking causes many negative health issues. Many were identified in 1964. A partial list includes lung, throat, mouth and bladder cancers, heart disease and chronic bronchitis. A 2004 report added stomach, kidney and pancreatic cancer, pneumonia and periodontitis among others. Statistics show that since 1964 more than 12 million Americans have died and another 25 million living today will likely die due to illnesses assoc iated with smoking. (â€Å"Smoking†, 2004) COPD, Chronic obstructive pulmonary disease, affects smokers almost exclusively. It cause severe breathing problems, slowing choking the sufferer until they finally succumb and die by asphyxiation. Cigarettes that are marketed as low tar and nicotine do not reduce the harmful effects of smoking. According to former Health and Human Services Secretary Tommy G. Thompson, â€Å"There is no safe cigarette, whether it is called ‘light,’ ‘ultra–light,’ or any other name.† (â€Å"New Surgeon,† 2004) Secondhand smoke (SHS), that which is inhaled by a non-smoker unlucky enough to be in the close vicinity of a smoker, has been shown to be a cancer causing agent and affects the non-smoker to at least the same degree as the smoker. Cigarette smoke has more than 4,000 chemicals and, maybe surprisingly, SHS contains 7,000, 250 of which have been found to be harmful and more

Wednesday, July 24, 2019

V for Vendetta Essay Example | Topics and Well Written Essays - 2500 words

V for Vendetta - Essay Example However, Creedy kills Sutler and attempts to kill V through shooting him multiple times. Creedy does this to seize power and control though he is killed by V on the encounter. Through Evey, the girl V saves whom happens to helped him in the process, the Parliament and Big Ben are devastated through sending a train full of explosives. Even though V is killed in the event of struggling against the oppressive totalitarian government, he is efficacious in making the citizens of Britain realize that they need to stand up for their own voices and hold their own freedom in their own country. Social awareness and collective power are generated in the process. Even though the mysterious vigilant behind the masked is killed, he is able to bring down the government who should be listening and serving the voices of its people instead of repressively controlling the people. Analysis: Even though the film V for Vendetta is just short, it is able to clearly illustrate what a government structure sh ould be is and what functions must it play. A government must listen to its people and not just put total control on them. A government must be a democratic one and not a totalitarian one. By totalitarianism, Conquest defines it as a political system in which the state holds full control and goes all out on its regulation of both the public and private aspects of life if at all possible (74). The movie is able to exemplify not just what a totalitarian system means but also capable of showing the fears of the people having a totalitarian government. The fascist government of that sort affects all the aspects of the lives of the British populace. The power of such totalitarian ruling state is undeniably strong enough to limit people in their rights to... Even though the film V for Vendetta is just short, it is able to clearly illustrate what a government structure should be is and what functions must it play. A government must listen to its people and not just put total control on them. A government must be a democratic one and not a totalitarian one. By totalitarianism, Conquest defines it as a political system in which the state holds full control and goes all out on its regulation of both the public and private aspects of life if at all possible. The movie is able to exemplify not just what a totalitarian system means but also capable of showing the fears of the people having a totalitarian government. The fascist government of that sort affects all the aspects of the lives of the British populace. The power of such totalitarian ruling state is undeniably strong enough to limit people in their rights to freedom of speech, freedom of being their own selves and identity, and even their rights to privacy. No public opinion can be exp ressed in this kind of government because of the fear to get terminated. The government even blinds the people of knowing the truth and strongly influences them over how to deal and perceive the socio – economic and political issues. The movie also exhibits how the media can function as a tool as of the government to influence, control and maintain power. As part of the totalitarian rule, the regime does all this kind of tactics to hold the political power. Also, even the widespread of terror is made by Sutler’s administration to maintain its control.

Biology (medical botany) Essay Example | Topics and Well Written Essays - 2500 words

Biology (medical botany) - Essay Example Several findings and implications of the same are established in this study. It concluded that an inhibition was exhibited in the migration of the endothelial cells of the human umbilical cord, in vitro, due to the use of both drugs. Subsequently, the researchers noted that the result of the migration as synergistically inhibited was due to the combination of the two drugs; thus, implying that the drugs were synergestically related. In another perspective, the drugs indicated independent action modes given that artesunate, in XTT assay, repressed HUVEC growth, while captopril in XTT array did not in the entire range of the dose. In establishing the quail egg CAN assay, the study established that a significant reduction in the surface area of the vascular chorioallantoic membranes was noted. The artesunate is shown to have an impact on the growth and structure of the blood cells as witnessed in the veins of the eggs that did not turn red. However, the formation of the blood vessels was inhibited by both drugs, significantly, as compared to the DMSO, which was the negative control. In another finding that analysed the branching of the blood vessels in quail CAM assay, measurements made revealed that the branches fractions and lengths in quail eggs treated by both artesunate and captopril significantly differed from the DMSO with the P Consequently, in testing for the synergism between the captopril and artesunate in vivo, the IC50 values for both drugs were determined for single doses. The effect of this was that a substance that was not affected by the drug, its obtained vascular area was to be 50% of the negative control. If lower than 50%, then the substances acted antagonistically, while if higher than 50%, then the substances acted synergistically. In

Tuesday, July 23, 2019

Leadership Theories, Methods, and Tols Essay Example | Topics and Well Written Essays - 1000 words

Leadership Theories, Methods, and Tols - Essay Example This requires that an employee has to work hard in the organization and create more hours especially in the evening or during weekends to improve his work rating and increase the chance of earning bonuses. Employee 1 has been working on weekends and late in the evening to ensure that work is accurate and complete. The manager of the organization encourages the employees to possibly work for more than 40 hours per week as they would receive a huge bonus and this reveal that the manager uses bonus as an incentive to motivate workers to upgrade the performance of the company. Power based on rewards entails equality without favoritism and thus employees work hard to achieve desirable results and thus raising performance for the company. In the second scenario, the base of power applied involves expert power. Expert power is based on the fact that knowledge is power, where a person who possesses special expertise in a certain field is regarded as important in the organization (Turner, 2010). Such people are extremely valued by the organization in problem solving and decision making processes. Employee 2 is a professional accountant in his organization and has negotiated four–day work week and he is the only worker who is allowed to compress working time in his department which reveals that his knowledge and expertise grants him power over other employees. The accounting manager agrees on his request as he is the only expert in accounting who can prepare the company’s financial statements. This fact shows that the employee is an expert and is granted his wishes unlike other employee because he can perform duties which no other person in the organization can perform. The opinions, ideas and decisions of experts in a company are highly regarded and they enjoy privileges than other employees due to their exceptional skills and expertise. A person may have ability to influence others using his personality traits or

Monday, July 22, 2019

Cross-content Lessons Essay Example for Free

Cross-content Lessons Essay Instructional design is very important towards the success or failure of children to understand the lessons that are thought by teachers. This essay will look at the instructional design of lessons for children ages 5 to 7, who have difficulty reading and studying mathematics. Designing a lesson has to do with a number of target related issues such as the level of the children, target practices and novel ways of ensuring that learning is top priority. Teachers have to be skilled enough to deal with children that bring to the classroom different learning habits and backgrounds; two factors that might impinge on their learning paces and study habits. READING LESSON: Standards – The standards set for the understanding of reading has to do with the importance of it. Mainly, the lesson should help to ensure that children by age 7 years can read fluently even in front of audiences. Their articulation habits and ways of pronunciation should be consistent with a child who has learnt how to read properly. Objectives By the end of this lesson, students should be able to: a) Pronounce words and read fluently. b) Learn how to spell words. c) Notice punctuation and learn how to use it. d) Make reading on of their pastimes. Lesson Plan and Practice – One hour of reading time is recommended after lunch or first session in the morning when children have been settled. Session 1: Learning about vowel sounds and other sounds. Intended to use the IBG Phonics tapes and voice over for children. For example, simple words like apple. Children need to understand that words are broken up into syllables. Rhyming sounds and simple sentence reading. Interestingly approaches to making out words and pronouncing them. Session 3: Spelling and recognition of words. Encouraging them to read out loudly, practice with parents or even do choral speaking sessions. Assessment – Allow children the opportunity to opportunity to engage in reading efforts and Spelling Bee competitions. a) Give the children a story to write and ask them to read it aloud in class. b) For written exams, test them on breaking words into syllables and spelling. Reflection – There are advantages and disadvantages of productive integrated instructional design. One major advantage is that the lesson structure is easy to follow and that one step leads to the other. There is supposed to be a natural progression even in the student’s mind. A disadvantage of this form of design is that sometimes the assessments are not a true indication of whether the student has learnt the art of reading. MATHEMATICS LESSON: Standards – Students should be able to do simple mathematical practices. It is important that they understand that mathematics is about knowing the principle behind formulas and practicing. Objectives – By the end of the lessons the students should be able to: a) Realize the different mathematical signs b) Understand the principle behind each of them and begin to practice working out sums. Lesson Plan and Practice – Children should at least spend quality time with the practice of mathematics. Following the lesson plan is important, but more interestingly is encouraging the student to practice the sums on their own. Session 1: Understanding the power of sums. Teaching simple adding and subtracting practices for example: If you have 10 marbles and John takes 3 marbles but puts back one marbles, how many marbles are you left with? Session 2: Understanding tables and learning them. Starting with the two times tables. Session 3: Division is tricky, so the student needs to know their tables properly first. Objects can be used to ensure that children can actually visualize the equation. Assessment Simple sums, for an end of term examination. For take home assignments, practicing sessions with parents. Reflection – This lesson design is easy to use and to follow. I believe that the best and most successful approach to learning is that the teacher spends time with each student or attempt to work in groups, so that the children can voice their challenges in grasping the formulas. A disadvantage to it is that a teacher must have a keen eye to know that the student does not understand the sum of the principle behind it. Reference Butt, Graham. 2006. Lesson Planning. Great Britain, Continuum International Publishing.

Sunday, July 21, 2019

Analysis of Attack Tree Methodology

Analysis of Attack Tree Methodology Information technology (IT) Security has become more and more important today when as e-commerce is becoming increasingly popular. People in developed countries like America and throughout European countries have been exposed to online trading for a long time; this trend is also taking off in developing countries in other parts of the world. Besides its importance toward business activities, IT security also plays a pivotal role in protecting individuals, organizations assets, which are actually parts of the business operations. Variety methods of securing business have been developed and implemented successfully. Attack Trees is one of those. Not only in Information Technology, Attack Trees is also applicable to security problems in a wide range of fields including: telecommunications, health care, finance, critical infrastructure, aerospace, intelligence and defense. To secure your business against impending risks, you first need to define all kinds of possible risks and pathways that those risks might be realized. Acknowledging risks and how they might happen, you will be able to develop measures to fight against or mitigate them. This is also what Attack Trees helps clarify. Attack Trees is a formal, convenient way to methodically categorize the different ways (how the risks happen) in which a system can be attacked[1] (risks). Attack trees are a graphical and mathematical construct used to Identify potential hostile activities that pose the greatest risk to the defender; Determine effective (and cost effective) strategies for reducing the defenders risk to an acceptable level; Describe the potential interactions between the adversary and the defender; Provide a communication mechanism for security analysts; Capture what is known (facts) and believed (assumptions) about the system and its adversaries, and store the information in a form that can subsequently be retrieved and understood by others[2] Attack tree models are graphical diagrams representing the choices and goals available to an attacker. They are represented in a tree structure, in which the root node of the tree is the global goal of an attacker and leaf nodes are different ways of achieving that goal. In an attack tree, children of the root node are refinements of the global goal, and leaf nodes represent attacks that can no longer be refined. A refinement can be conjunctive (AND) or disjunctive (OR). Figure 1 shows an example of an attack tree with the goal of the attacker is to obtain a free lunch[3]. The tree lists three possible ways to reach this goal. Lower levels in the tree explain how these sub-goals are refined. The arc connecting the children nodes expresses that this is a conjunctive (AND) refinement, which means that all sub-goals have to be fulfilled. Refinements without such a connecting arc are disjunctive (OR), expressing that satisfying one sub-goal suffices The strength of the attack tree methodology lies in the fact that its graphical, structured tree notation is easy to understand to practitioners, yet also promising for tool builders and theoreticians attempting to partially automate the threat analysis process. More and more research papers have been used attack trees in modeling security threat of information system. Over the last year, over 15,000 articles on GoogleÂÂ ® Scholar[4] have been used the attack tree technique in some way. The way this technique is used now is usually by assigning different kinds of values to the leaf nodes (for example, possible and impossible, expansive and inexpensive, cost to attack, probability of success of a given attack, etc.) then propagating node values up the tree following some rules. Based on that calculation, people can make some statements about attacks, for example, what is the cheapest low-risk attack or most likely non-intrusive attack[5]. In retrospect personal experiences, we notice that what we have done in the past and until now are closely related to what is presented in Attack Trees model, although back by that time, we were not exposed to concept of Attack Trees, but the approach is basically the same. It was when we worked on a project and had to define all possible risks/threats that might happen and how we can take mitigate actions against those risks. The only thing that we had not paid enough attention to, and was actually very important thing, was how all those risks might happen. Failing to do this costs us a lot later on when the risk did happen in a way that we had not thought of, so did not develop appropriate cause of actions and we were passively react to it. It was when we were developing an online testing system to help students prepare for entrance exam to universities[6]. We would have a strong team of excellent teachers from many famous schools build the test content; and have a team of people t o import those tests, including answers (multiple choice format), into the system. We conducted training for importing team. (Also, the importing work did take a lot of time so we could not talk all the teachers into it). Things went well until the day we actually launched the Beta version. We had volunteers, who were actual pupils, do the test; it was nothing better for them to take free tests and receive free feedbacks. But when it came to result announce and feedbacks were given to those pupils, everything was just totally wrong; many of student answers, which were actually correct, were marked incorrect and the must-be-correct answers given by the system were actually incorrect. Recalling that single day, it was a BIG shame on us, the team who worked on the project. We had a person head of quality control who would make sure that all the tests designed, including questions and answers, are without mistakes. We were very strict on that. We also had a head of training department w ho will make sure that our collaborators, who performed importing job, do their job carefully and without mistakes. Random test were taken before we launched the first version and things were all going very well. We developed risk monitoring blocks and figure 2 is shown as an example. For a risk that the test is invalidate, we clarified three possible reasons: design problem, importing problem and system problem. The reasons are then tracked further along blocks which are colored accordingly. So to prevent or mitigate the risk, we only need to make sure that our teacher quality is excellent, our training and importing job are done beautifully and our system will not malfunction. But we only did to the extent that, for example, as long as our collaborators work diligently and carefully, mistakes would largely be avoided. Later on, we found out the root of the problem was that one of our collaborator was person from our main competitor and he purposely destroyed our system by changing all correct answers just a night before the free testing event. This was the thing that we had never thought of. We did not think that we had problem right from the collaborators recruitment and that this might had been one of many possible ways that can invalidate our test bank. Until then did we know that what we called in general collaborators quality is not limited to the fact that whether they were capable of understanding and doing the job, but also including their working ethic. Consequently, we were left with everything beginning from scratch; all teachers work was carefully rechecked because we did not know right away what exactly caused the problem. Almost all the imported work was deleted and restarted. If we had been able to clarify this possibility, though small, we would have developed action appropriate enough to prevent it, such as lock the system and deny any access before we launched the first version, this would have saved us money and time and prestige as well. We finally were able to offer a running version but it surely had cost us much more resources.[7] From our personal experience, we see that Attack Trees model is a very useful tool to help organizations in threat detection and appropriate mitigating action development. The model will have important and positive impact on organization business operation in that it help name all possible risks and specific pathways that those risks might become real. From that, it helps determine effective and cost effective strategies to reduce risks to an acceptable level. Organizations should adopt Attack Trees model to secure themselves from any uncertainties that may happen. References Attack trees: Modeling security threats. Dr. Dobbs journal; Schneider (2005). Attack Trees Analysis, Terrance Ingoldsby on January 16, 2009 http://redteamjournal.com/2009/01/attack-tree-analysis/ Mauw, S., Oostdijk, M. (2005) Foundations of Attack Trees Information Security and Cryptology-ICISC 2005 Springer http://scholar.google.com/scholar?hl=enq=attack+trees+information+systemas_sdt=2000as_ylo=2009as_vis=0 Edge, K. (2007) The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. HICSS 07: Proceedings of the 40th Annual Hawaii International Conference on System Sciences. This is how universities in my country recruit prospective students, they do not base on applications but base on result of actual tests, which are held by the Ministry of Education annually for all participants Our initial project result to date http://hocmai.vn/

Saturday, July 20, 2019

Facebook Ceo Mark Zuckerberg Media Essay

Facebook Ceo Mark Zuckerberg Media Essay Facebook has only been in existence since 2004 and its CEO and co-founder, Mark Zuckerberg, an ordinary people who is just only 26 years old, dropped out from Harvard to pursue his dream of growing his company. The events surrounding Facebooks founding have already become the common and popular social networking in nowadays usage. It has been reported that the film will not paint Zuckerberg in the best of light. But if the life of any 18-20 year-old were chronicled, it would likely be full of missteps. Lets remember that Zuckerberg has also done many things well. To follow are a few leadership nuggets that may get lost amongst the criticism. (http://www.timesonline.co.uk/tol/news/uk/article7127721.ece) 1.  Believe in the vision In 2006,  Yahoo`s company attempted to buy Facebook for $1 billion. Regarding of majority of population of students, yahoo is very interested to buy over the company. Facebook, which allows users to put up profiles of themselves, recently signed an advertising deal with Microsoft. This allows yahoo to be able to beneficial their advertising and commercial to get more exposure towards public awareness. (http://news.bbc.co.uk/2/hi/business/5367120.stm) At the time, CEO and co-founder Mark Zuckerberg was just only 22 years old, and he rejected the offer. With the volatility in the dot com market, most felt  he made a huge mistake. This raise out an issue, Why did he turn the offer down? When Mark Zuckerberg showed up in Palo Alto three years ago, he had no car, no house, and no job. Today, hes at the helm of a smokin-hot social-networking site, Facebook, and turning down billion-dollar offers. Im just lucky to be alive. Mark Zuckerberg, the 22-year-old founder and CEO of social-networking site Facebook, is talking about the time he came face-to-face with the barrel of a gun. It was the spring of 2005, and he was driving from Palo Alto to Berkeley. Just a few hours earlier, he had signed documents that secured a heady $12.7 million in venture capital to finance his fledgling business. It was a coming-of-age moment, and he was on his way to celebrate with friends in the East Bay. Zuckerbergs life so far is like a movie script. An intelligent kid come from a normal well family, who has the capability to invents a tech phenomenon while attending an Ivy League school. Harvard, one of the fundamental history places where he launches facesmash to rave reviews. He had developed the experimental, rudimentary social networking website. Big shots circle his dorm to make his acquaintance to overcome his boring time, he drops out of college to grow his baby and change the world as we know it now. Just three years in, what started as a networking site for college students has become a go-to tool for 19 million registered users, including employees of government agencies and  Fortune 500  companies. More than half of the users visit every day. When a poorly explained new feature brought howls of protests from userssome 700,000the media old and new jumped to cover the backlash. But Facebook emerged stronger than ever. According to comScore Media Metrix, which tracks Web activity, it is now the sixth most-trafficked site in the United States1% of all Internet time is spent on Facebook. ComScore also rates it the number-one photo-sharing site on the Web, with 6 million pictures uploaded daily. There`s many rumour claimed that it is starting to compete with  Google  and other tech titans as a destination for top young engineering talent in Silicon Valley. Debra Aho Williamson, a senior analyst at eMarketer, says it is on track to bring in $100 million in revenue this yearserious money indeed. TechCrunch posted documents said to be a part of an internal valuation of Facebook byYahoo. The documents projected that Facebook would generate $969 million in revenue, with 48 million users, by 2010.  The New York Times  and others reported that Yahoo had made a $1 billion offer to buy Facebookand Zuckerberg and his partners had turned it down. This followed an earlier rumor of a $750 million offer from  Viacom. Yahoo, Viacom, and Facebook would not comment on the deal talk (and they still wont). But Silicon Valley has been abuzz ever since. (http://www.fastcompany.com/magazine/115/open_features-hacker-dropout-ceo.html) At the time he claimed he was here to build something for the long term. In a recent interview with Diane Sawyer, Zuckerberg was amazingly consistent, and he expanded on that same sentiment, saying, we really just believe in what were doing. And what theyre doing is simple: they connect people and then empower them to share what they want. Zuckerbergs college-kid style reinforces the doubts of those who see the decision to keep Facebook independent as a lapse in judgment. In less than two years, the two reigning Web 2.0 titans have sold out to major corporations: MySpace accepted $580 million to join  News Corp., and YouTube took $1.5 billion from Google. Surely any smart entrepreneur would jump at a chance to piggyback on those deals. Facebook CEO Mark Zuckerberg Talks to Diane Sawyer as Website Gets 500-Millionth Member He stated that It is really the people themselves who have gotten us to this state. I mean, weve built a lot of products that we think are good, and will help people share photos and share videos and write messages to each other. But its really all about how people are spreading Facebook around the world in all these different countries. And thats whats so amazing about the scale that it is at today, it is the users who deserve all the credit. Zuckerberg told  ABC News  Diane Sawyer. When he started the site with some classmates six years ago, the site, then called The Face Book, was only intended to connect students on one college campus. Since then, its grown into a global force that is redefining relationships of every kind from the aspect of personal to the political to the commercial and beyond. Well, what I think its doing is giving everyone a voice, right? he said. So, back, you know, a few generations ago, people didnt have a way to share information and express their opinions efficiently to a lot of people. But now they do. Right now, with social networks and other tools on the Internet, all of these 500 million people have a way to say what theyre thinking and have their voice be heard. (http://abcnews.go.com/WN/zuckerberg-calls-movie-fiction-disputes-signing-contract-giving/story?id=11217015) 2.  Execution can trump innovation MySpace,  Shutterfly  and instant messaging platforms likeAIM  and  ICQ  all predate Facebooks founding in 2004. While Facebook didnt invent the concept of social networking, they were able to aggregate numerous social networking concepts into a simple platform. Facebooks merging of these technologies has been a huge success and the  number of Facebook users has grown exponentially  as a result. Sometimes, executing on a vision is much more important than being the first. Facebook  is more than 500 million users for nowadays view, making it the biggest information network on the Internet in a meteoric rise that has connected the world into an online statehood of status updates, fan pages and picture exchanges. In its six-year history, the site has become ritualized in our daily lives. It has even attracted the unwilling who join for fear of being cut out of the social fabric. It has connected old friends and family. It has helped make and break political campaigns and careers. It has turned many of us into daily communicators of one-line missives on the profound and mundane. And it has tested the limits of what we care to share and keep private. (http://voices.washingtonpost.com/posttech/2010/07/facebook_hits_500_million_user.html) 3.  Mistakes become mistakes when you let them As a young leader, co-founder Mark Zuckerberg has admitted to his share of mistakes.  And despite Zuckerbergs well-chronicled follies, Facebook continues to grow. Perhaps this growth is directly related to how Zuckerberg responds to his mistakes. For example, Facebook famously bungled the introduction of its first news feed. Essentially, every post a member made on their wall was shared with their entire network. One member, Ben Parr, started a group called Students against Facebook news feed, and its membership swelled to 750,000 users within a week. Instead of digging his heels in,  Zuckerberg sent Parr an email asking for his advice  on what Facebook could do better when introducing new products. Instead of creating an enemy, Zuckerberg developed an ally. 4.  The devil is in the details At the time of the dot com bubble, many Silicon Valley offices were filled with games, foosball tables and other distractions and the reasons were never very clear. Likewise, Facebook  has its own laundry room along with multiple cafes that serve great food. The office is also designed in a very open fashion. But the Facebook leadership team thought strategically about these perks. They want to make it a place where people can simply focus on building things and removing the distractions of laundry and where to go to lunch allow employees to do just that. The open floor plan enables their 1,600 employees to know whats going on throughout the buildings. Giving thought to these seemingly minor issues has the potential to drastically improve the working environment and employee engagement. 5.  Ownership matters Facebook has been estimated to be  worth as much as $35 billion. Recently, a New York man has come forward to claim that Zuckerberg signed an agreement that gives him an  84% ownership stake in the company. While Facebook lawyers  suggest that the contract was forged, it does raise the question of ownership. Up until this point, Facebook has refrained from issuing an IPO, which would make all of the funding venture companies, along with Facebook founders and employees, incredibly wealthy. But while Zuckerberg has indicated that Facebook will have an IPO when it makes sense, ownership of the company matters. Although  reportedly profitable, Facebook has been  assisted by continual venture funding. Once the IPO occurs, Zuckerberg will have a lot of people to answer to, and his leadership style will need to change accordingly. Criticism often accompanies success. But for a 26 year-old whos worth a  reported $4 billion, Zuckerberg seems to be handling his leadership role well, and he continues to mature. Lets hope that continues. Why facebook so popular? Since 2004, Facebook has introduced throughout the world, especially, youngsters are the main factors that contributes significant results to stay in touch with each others. Nowadays, if you do not have own Facebook account, you are consider as pretty much a social pariah. The usefulness of Facebook is to merge businesses and entrepreneurs in with individuals in something that other social networks like what MySpace did previous years and received unsatisfied result. On Facebook, it has the potential application for commercial and advertisement to capture user`s perception. (http://ezinearticles.com/?Why-is-Facebook-So-Popular?id=4130894) Diversification Chamath, Facebooks vice president of user growth, mobile and international, is getting ready for Mobile World Congress in Barcelona emphasize on, we want as many people as possible to be able to access Facebook all the time, regardless of where they live or what device they carry. Today, we hit another milestone toward that goal, with more than 100 million people actively using Facebook from their mobile devices every month. This usage happens on almost every carrier in the world and comes less than six months after we announced 65 million people on Facebook Mobile. Through this growth, the team has continued to try to improve the experience of these mobile products. We work with every major device manufacturer and many operators to ensure that we can provide the best possible mobile experience across the thousands of different devices, mobile operating systems and carriers you rely on. With every new feature or product we bring to mobile, our goal is to offer the same value and user experience that people know on Facebook. Here are some of the recent mobile products weve launched with that goal in mind: http://photos-h.ak.fbcdn.net/hphotos-ak-ash1/20659_338979091728_20531316728_4667716_6793902_a.jpg touch.facebook.com Mobile websites: Our mobile sites m.facebook.com and touch.facebook.com have been redesigned, enabling people to access Facebook from any mobile browser in more than 70 languages. With the explosion of smart phones, we want to make sure people have a great Facebook experience that scales with their device especially as people have begun to upgrade their devices more frequently. Text messages: More than 80 operators in 32 countries enable millions of people around the world to stay connected and communicate with their friends on Facebook using SMS text messages. Recently we also launched a URL-shortening service called FB.ME that makes it even easier for people to share content. With FB.ME, you can share and access more through services like SMS that limit the number of characters in messages. Applications: Facebook is already one of the most requested services on mobile, and we work with every major device maker and mobile operating system to bring applications and integrations to all platforms. Were always improving these applications and have recently released updates for our applications on Android, Blackberry, iPhone, Nokia and Samsung. We also support a broad range of new Facebook experiences on devices from HTC, INQ, LG Electronics, Palm, Sony Ericsson and Microsofts Windows Mobile. No matter which mobile device you own, as long your mobile have the ability to capture internet access, you can always stay connected through Facebook using our mobile applications, sites or SMS. Find the right Facebook Mobile product for you at www.facebook.com/mobile. This system allows more people to have the opportunities to stay in touch or keep up to dates with the new feeds with friends and families. Team of management Facebook Applications Regards as Facebook applications, the management team often develop a new way of strategy by strengthen up their service by interact with the customers in an indirect manner. Through Facebook applications, users can have the access and ability to connect both sustain and develop customer relationships. Branded Facebook application act means engaging customers aware of brand loyalty Interactive application connects with consumers to interact around, making new friends. As user, you can aware of various marketing advertisement through the Facebook applications. Provide opportunities of what you seek for. Generate traffic by  creating awareness among non-users through newsfeeds and updates by existing users. (http://www.avenuesocial.com/fb-app.php) Role playing games RPGs are one way to take customers into an imaginary world and engage them, generating revenue in a new way. Trivia Applications Let users compete for status, leader board rankings or just for fun. Gifting Applications Let users send branded virtual gifts to their friends directly from your Facebook Fan Page. Utility Applications Enable users to perform their daily activities, such as sharing with their friends, using utilities like Bumper Sticker and Big Photo. Multimedia Applications Give users the ability to submit, view and rate user-generated media with the protection of brand-controlled moderation.   No really annoying ads.  Many of the ads on Facebook are repetitive, but theyre not repulsive like the advertisements you see at MySpace. Theyre also targeted, so many times you will find things you really are interested, and this can lead to new hobbies and good and relevant finds. Its all about the games and apps.  Facebook has a wildly extensive library of addictive games and add-ons that keep people coming back to the site. Many of the social games available reward their players for spending lots of time online, or coming back online at regular times to complete game objectives. Many people will spend countless hours on these online games, and periodically check their News Feed to see if anything interesting is happening. It plays to peoples vanity.  People like to talk about themselves, especially when they think they have an audience. Many people post many updates every day on how their day is going. If they have 100 or more friends they may feel that all of their friends are keeping up to date with them, when in fact chances are theyve all hidden that person from their News Feed. People are social animals.  There will always be a social network available for people to use online. Right now its Facebook. In two or there years it might be something new or it could still be Facebook. The future is unclear, but what is known is that Facebook has carved its place in history as the preeminent social network at the time of this writing. (http://ezinearticles.com/?Why-is-Facebook-So-Popular?id=4130894) Facebook Fan pages One of the common Fan pages that users adoptin. Facebook page provide valuable opportunity to interact with your friends and family. Fan pages are not just interactive: they can also be fun, provided they accurately represent your customer profile. The opportunities that a fan page can offer you as for business purpose, this include as: Reaching your customers: Interact with your customers and educate them about your latest developments. Attract new customers and retain the existing ones. Marketing yourself: With social media, sky is the limit! Now you can easily market your products and services on a more interactive and engaging platform. Tracking, measuring and analysis: Now you can access key information about your fans, including age, gender, social affiliations and most importantly likes and interests! Entertainment: Fan pages for celebrities, cartoons, movies and musical groups can be developed to interact directly with fans and provide them with regular updates on whats new and happening. (http://www.avenuesocial.com/fb-fan-page.php) There are four reason why Facebook can be Internet enthusiasts? Upload unlimited photos. Facebook is the most popular website for its uploading photos. In fact, there are more than 14 million photos can be daily. Not only can users upload unlimited photos, users can also add tags or commenting on user`s friend`s photos. By the attachment of the photo, user will know where or when your friends captured. Besides that, users can embed and upload unlimited of videos through the web or through mobile phone with connection of Facebook Mobile. Sharing memorabilia has never been this fun and easy. Be in the know.  Do you always want to know what your friends are doing without using instant messaging softwares like Yahoo! Messenger or MSN? With the help of Facebooks STATUS feature, you can see and knowing what your friends are up to without having webcam or texting message to know what they up to? With the feature that provided by Facebook, this can definitely save a lot of time and effort. This also works vice versa because Facebook users can also update their friends on what they are up to. In addition, you can let your friends know if there are upcoming events like parties, conferences or social gatherings in your community. You can put all tons of kind details and send mass invitations. Interact with friends through games and other applications.  Like I mentioned earlier, Facebook changed the way people use applications for social networking websites. Applications like games and tests (Poker, Trivia Games, Get-to-know-yourself tests, What does your birthday mean? test, Are you Normal? test, etc) are being used to encourage more social interaction through the Internet. You dont have to meet each other face to face to be able to play poker. Send gifts!   A gift! With Facebooks Gift feature, you can select from hundreds of icons from Facebooks virtual gift shop and add a message to send to your friends based on how you felt on that particular day. You can send flowers, shoes or even a bone to your friends virtual pet. If its a more personal gift, you have the option to give it privately so others wouldnt know. This will allow users to have sufficient personal space to interact each other without get outsider interface. (http://ezinearticles.com/?Top-Reasons-Why-Facebook-is-So-Popularid=1089087) Is Facebook the only major internet company with a dedicated team focused on growth? Twitter has an Onboarding team, which has very similar goals to the Growth team at Facebook, just with a different name. Google has a very professional sales team around the globe. I would certainly say theyre focused on growth. Overall performance of Facebook, C:UsersuserDesktop20090201fbdemopie.png C:UsersuserDesktop20090201fbdemogrowth.png C:UsersuserDesktop20090201fbdemobar.png Based on the graph and chart above, we can notice the latest demographic data on US Facebook users of February 1, 2009. Before jumping into the details below, here are the highlights. Facebook reporting nearly 45.3 million active US users in the last 30 days. Facebook growing in every age/gender demographic. Fastest growing segment: Women over 55, up 175.3% in the last 120 days. Facebook growing faster with women than men in almost every age group. Women comprise 56.2% of Facebooks audience, up from 54.3% late last year. 45% of Facebooks US audience is now 26 years old or older. Facebook US Audience Growth by Age and Gender Facebooks US audience has continued to grow in recent months, fueled by expansion primarily in users 26 and older. Facebook has been growing rapidly amongst people over 45 in the US, as the charts show below: over 165% amongst both men and women 45-54 over the last 4 months. Meanwhile, the fastest growing age group by total users is still 26-34, the number of women over 55 on Facebook grew by an astounding 175.3% since the end of September.   Their male counterparts, however, werent able to keep up growing by only 137.8%.   The number of women over 55 on Facebook almost double the number of men over 55 on Facebook today. Facebook US Audience by Age and Gender Overall, women now outnumber men in every age group on Facebook. In total, women now make up about 56.2% of Facebooks US audience, up from 54.3% late last year. Women most outnumber men in the 18-25 and 26-34 age groups, where there are 1.4 females for every 1 male on Facebook. Facebook US Audience by Age Overall, 45% of Facebooks 45.3 million active users in the US is now 26 years old or older. Nearly a quarter of all Facebook users are over 35 today quite a change from Facebooks roots as a social networking tool for college students just a few years ago. Teenagers now make up about 12% of the overall Facebook audience. Facebook does not publish any data on users under 13, because the terms of service requires all users be at least 13 years old to join. (http://www.insidefacebook.com/2009/02/02/fastest-growing-demographic-on-facebook-women-over-55/) Facebook mulls $1 billion employee share sale: report Facebook may have let its employees to sell up to $1 billion of their shares to institutional investors at a price that values the company at around $60 billion. Mark Zuckerberg is questioning issue after entertaining approaches from a number of major institutions interested in investing in the worlds largest social network, claimed by the All Things Digital technology blog cited sources. That valuation would surpass previous measures. During years founded by Mark Zuckerberg in a Harvard dorm room raised $1.5 billion of financing in a round led by Goldman Sachs, which valued it at $50 billion. Facebook, whose online service counts more than a half a billion users worldwide, is expected to possibly go public around 2012. A Facebook spokesman declined to comment. Investors have been eager to buy shares of Facebook before then and have gone to private exchanges, where shareholders like venture capitalists and former employees have put some of their stock up for sale. Facebook tightly restricts current employees from selling their shares on private exchanges, making it difficult for them to cash in on the companys success. In 2009, Facebook arranged for Russian investment firm Digital Sky Technologies (DST) to purchase at least $100 million of common shares from its employees. DST was also part of the deal led by Goldman Sachs. Last year, which is 2009, Facebook overtook Google Inc to become the most visited website in the United States, according to online analytics firm Experian Hitwise. The company is generating profits at a faster-than-expected rate, according to a document distributed by Goldman Sachs last month. Facebook is among several fast-growing privately held Web companies, including Twitter, Zynga and Groupon, that investors have been anxious to buy into ahead of potential public listings. But liquidity on private exchanges has been low and since Facebook so far has not been forced to publicly report its earnings there is little transparency for investors. (http://www.reuters.com/article/2011/02/10/us-facebook-idUSTRE7196W320110210) Copyright 2011 Thomson Reuters, SAN FRANCISCO | Thu Feb 10, 2011 6:22pm EST Fulfillment of responsibilities towards customers and suppliers A friendly user, Steven Grimm claimed that Facebook became his day and day routine, he had quite satisfied with the service he adopted with. I had worked with Facebook vice president Jeff Rothschild at a different company in the mid-1990s, so when he called me in 2005 and asked me to do some contract work for Facebook, I was intrigued. Once I started, two things really impressed me. First, the brainpower of Facebook employees was very high. It was one of the highest concentrations of smart people that Id ever seen. Second, the site was growing so fast, and touching so many people, that anything good you did would reach a wide audience just about instantly. Steven still added in, day to day working with Facebook has its own limit of freedom. Direct management here can be invisible, and not in an opposite bad way. You can always tend to manage the people who need a lot of inspection. But, there`s always engineers that can be left alone, and thats who we try hard to hire. Its more of a research-scientist model. The managers role is to make sure people can work effectively and show a proper guide to accomplish an objective without being impeded by anything. Facebook lets that happen. As a top manager, we are also encouraged to work on open-source projects wherever its appropriate. All the work I did on men power was contributed back to the public code base, and if were working on something brand new thats a good candidate for opening up, theres no problem taking the extra time to get it packaged and announced to the world. As a top leadership in a company Like Our CEO, Mark Zuckerberg, he can be a very tough guy. But he has his own spots of thinking and always allows others to approach him with various ideas. On the internationalization project, for example, we met with him to review the user interface before we launched. He looked at it and said: Thats reasonable. We had the freedom to go ahead with what we thought was the best approach. I think his insights have proven generally right. The success of our site speaks for itself. How Facebook satisfied its customers? Steven stated that, we are not in a situation where we have made promises to external customers, the main objective is we have to go on death marches to get things done on time. It is pretty reasonable here. We are trying to deliver great products to our end users, usually without having told them ahead of time what is coming. So we can adjust completion schedules or even change the specs if it is obvious thats the right thing to do. We have more flexible time to control. Provision of a certain standard or level of service Steve expresses his feeling say that, I am not the only one that doing the job. Probably a quarter of the engineers have as much experience as I do. Our engineers have all kinds of backgrounds; some are fairly recent graduates while others have been working for 15 years or more. We try hard to keep the environment egalitarian, if you can make a solid technical case for something, youll convince your peers, whether youve worked at 10 previous jobs or none. (http://www.facebook.com/careers/story.php?story=2) List of Referencing Althea Marie Tan, Facebook social ads, Why Facebook is so popular (http://ezinearticles.com/?Top-Reasons-Why-Facebook-is-So-Popularid=1089087) Viewed on 20th March 2011 BBC (  21 September 2006, ) Yahoo to buy Facebook for $1billion (http://news.bbc.co.uk/2/hi/business/5367120.stm), viewed on 18th March 2011 ELLEN MCGIRT (May 1, 2007) Facebooks Mark Zuckerberg: Hacker. Dropout. CEO. (http://www.fastcompany.com/magazine/115/open_features-hacker-dropout-ceo.html), viewed on19th March 2011 Facebook application, Services Dynamic Tiers of Work, (http://www.avenuesocial.com/fb-app.php), viewed on 20th March 2011 Facebook Fan, Services Dynamic Tiers of Work, (http://www.avenuesocial.com/fb-fan-page.php, on 20th March 2011 Joe Frontiera.  ( July 25, 2010) Facebooks leadership: Dissecting Mark Zuckerberg (http://views.washingtonpost.com/leadership/leadership_playlist/2010/07/facebooks-leadership-dissecting-mark-zuckerberg.html) The Washington Post Company, viewed on 21th March 2011 John Harlow. (May 16, 2010) Movie depicts seamy life of Facebook boss , (http://www.timesonline.co.uk/tol/news/uk/article7127721.ece), viewed on 18th March 2011. Justin Smith (February 2nd, 2009)Fastest Growing Demographic on Facebook(http://www.insidefacebook.com/2009/02/02/fastest-growing-demographic-on-facebook-women-over-55/), viewed on 21th March 2011 KI MAE HEUSSNER. (July 21, 2010) Facebook CEO Mark Zuckerberg Talks to Diane Sawyer as Website Gets 500-Millionth Member (http://abcnews.go.com/WN/zuckerberg-calls-movie-fiction-disputes-signing-contract-giving/story?id=11217015), viewed on 19th March 2011. Nic Lino, (2011) EzineArticles.com Why Facebook so popular ((http://ezinearticles.com/?Why-is-Facebook-So-Popular?id=4130894), viewed on 19th March 2011 Steven Grimm, Education B.A. computer science, UC-Santa Cruz, Prior jobs, Sun Microsystems, Enterprise Integration Technologies, HearMe, etc (http://www.facebook.com/careers/story.php?story=2), viewed on 21th March 2011 Thomson Reuters, SAN FRANCISCO (1996-2011) Facebook mulls $1 billion employee share sale: report (http://www.reuters.com/article/2011/02/10/us-facebook-idUSTRE7196W32011021

Ensuring Truth Within Creative Nonfiction Essay -- Literary Analysis

The difference between creative nonfiction and fiction is unassuming: fiction is derived from the fabrications of an author’s imagination, whereas creative nonfiction is contingent on facts. A novelist has the freedom to create scenes which never existed, whereas an author of creative nonfiction must convey a truthful story. However, the line between creative nonfiction and fiction, fact and falsehood, has become ever so thin as â€Å"writers of memoir [have been] revealed to be frauds and fiction writers masquerade as memoirists in order to sell books† (Bradley 203). Recent events have revealed authors such as James Frey and Tim Barrus to have combined elements of fiction and nonfiction within their creative nonfiction books (Buck 56), further blurring this line. Overlooked embellishments and whole fabrications were found to exist within their alleged creative nonfiction works – stirring angst within the nonfiction community (Bradley 208). Allegations arose and investigations ensued, all revolving around the question: who is to blame? As a result, the entire creative nonfiction genre received negative publicity and harsh criticism (Bradley 203). For creative nonfiction to restore its legitimacy and veracity as a genre, authors, and not publishers, are to be held responsible for ensuring their creative nonfiction books are truthful. Creative nonfiction, often labeled the â€Å"fourth genre† (Bradley 203), requires the depiction of factual events and happenings through past memories, with a literary touch. Books under this genre include memoirs, biographies, and autobiographies. However, memory is malleable and fades. Hence, authors are given leeway in this respect and to be â€Å"truthful† is defined as an author recollecting and portraying p... ...ate to. For authors to deceive readers knowingly through a creative nonfiction medium is to rob readers of the intrinsic connection and empathy felt towards the story. The story becomes significantly less powerful and not as personally important to the reader. It is then dismissed as fiction, an untrue fairy tale once lost in the nonfiction realm. Writers of creative nonfiction books must then write truthfully to ensure creative nonfiction books are truthful. This is the only practical approach for the creation of true creative nonfiction books. Fact-checking is too onerous a practice when applied to the book publishing industry and avoids the inherent issue at hand: deceitful authors. For the fiction itself created by these authors is not the issue, but the deception, the robbing of unsuspecting readers, which has created this entire mess in the first place.

Friday, July 19, 2019

Models of God, Humanity, and Nature My Experiences, Thoughts, and Criti

Models of God, Humanity, and Nature My Experiences, Thoughts, and Critical Analyses I ask a lot of questions; I’m a curious person. I once asked my mom why people die, why there are bad things in the world if God is so good and all-powerful. Her response was that we just couldn’t really understand why God does anything because we can’t comprehend God’s â€Å"master plan.† I’m sure that she was right, but that response is not very satisfying to a curious little boy. I saw an inconsistency in my understanding of reality, and I wanted to get things straight. I guess this little anecdote begins to illustrate a couple of my basic life principles. A concise explanation of how I look at the world is just this: We humans, as finite beings, use models to understand complex things – God, Nature, Humanity – and in doing so must simplify things. There’s nothing wrong with this simplification, as long as we know we are doing so and why. Our models of these complex things can be based on a number of things – usually logic, evidence, and our experiences (I’m probably exluding a powerful one, namely tradition). These varying models of reality, however, must be internally and externally consistent – that is, with themselves and with other models used by a single person. When the models used by a person are internally or externally inconsistent with themselves or with logic, evidence, or experiences, the first reaction is probably confusion (or maybe anxiety), but in the continued search for consistency, one can arrive at further insight and a desired level of comfort in oneself and the way one views reality. I guess this is sometimes called the search for the meaning of life, although that’s a rather grand phrase for ... ... Humanity, and Nature are inter-connected internally and externally, I must work to understand these relationships, and in doing so, I must work to maximize the enjoyment and well-being of all things related to me, directly and indirectly, consciously and unconsciously. Additionally, I must treat all manner of things (entities perhaps) as subjects, rather than objects, recognizing that each has a level of being and enjoyment that it can attain, with the help of me and the rest of the world. I must work to avoid and eliminate violence of all forms by using memory, empathy, imagination, and true forgiveness to short-circuit the cycle. If I live my life in a continual state of change, using creative, responsive, and responsible love persuasively to acheive a higher level of good, then I will be living in a way that’s consistent with process theology’s Christianity.

Thursday, July 18, 2019

Naukri.Com Essay

COM Industry- eBusiness is the integration of a company’s business including products, procedures, and services over the Internet. [pic] †¢ You turn your company from a business into an eBusiness when you integrate your sales, marketing, accounting, manufacturing, and operations with your web site activities. †¢ An eBusiness uses the Internet as a center for all business activities. †¢ eCommerce is the online component of an eBusiness. †¢ E-business may be defined as the conduct of industry,trade,and commerce using the computer networks. †¢ Naukri. om is an Indian job search engine operating in India founded by Sanjeev Bikhchandani in March1997. †¢ This employment site allows businesses to place job announcements and look through resumes. People looking for employement can post their resumes, ad links to their home page and browse the ads and look at potential employer’s home pages as well. †¢ The site was established in 1997 by Info E dge (India) Ltd. Info Edge is a listed company on the Bombay Stock Exchange and National Stock Exchange. It went public in November 2006. As of March 31, 2011 Naukri. om had a database of about 25 million registered job seekers and over 80,000 live job listings from Corporate Customers. During the Fiscal year 2010-11 Naukri. com serviced approximately 42,000 Corporate Customers, an average of about 12,000 resumes were added while about 72,000 were modified daily in the Naukri. com database in Fiscal year 2010-11. Overview †¢ In India Naukri. com has been ranked at 22nd spot as per Alexa traffic rankings. It has a global ranking of 452. 2,480 sites share their links in the job portal. Usually almost 9 minutes is spent by each viewer in the site nd every page is viewed almost 42 second approximately. Naukri is the leading job site in India and is the premier brand of Info Edge. It has single-handedly given a new dimension to the concept of employment in the country. †¢ After it was found the company has left behind every competitor. Naukri. com as a recruitment agency offers employment related services to both regular job seekers and leading placement agencies and recruiters and corporate houses. Its services are available in both India as well as outside the country. The jobsite offers a wide range of services such as Response Management Tools and Resume Database Access. Among its major services is recruiter branding solutions, Naukri PayCheck, Naukri. com Magazine, Resdex, Naukri on Mobile and Chat and job postings. The site has, at any time, 200,000 jobs and serves almost 35,500 corporate houses. It also publishes a useful report named Naukri JobSpeak, which is brought out on a monthly basis. Corporate strategy Vision †¢ Vision is to create a platform where, in 20 years time, every Indian who is looking for a job can find one. Mission †¢ Every person looking for a Job should get one. Initial Strategy (1997-2000) †¢ The initial marketing strategy was geared towards fulfilling two objectives. The first objective was to get the companies and placement consultants to list their jobs on the web site and the second one was to get job seekers to visit the site. Towards achieving the first objective, an intensive search exercise was carried out. The team went through the previous issues of several newspapers and magazines, went to libraries, scanned Yellow Pages and built a mailing list that contained names and addresses of approximately twenty four thousand companies and placement consultants who had placed an advertisement for jobs in the last five years. Letters were mailed out to them with information about the service. At the same time, another list of newspapers and magazines was compiled. Letters were also sent to these newspapers and magazines informing them of the introduction of this unique service. Advertising was also done but on a very small scale. It was restricted to small-classified displays in newspapers. In effect, initially, the marketing strategy of Naukri. com was based on direct mailing and it was actually a very low cost one. Current Strategy (2001-2004) †¢ The marketing strategy currently being followed by Naukri. om is â€Å"two pronged† one, in the words of their marketing manager Ayesha Kapur. Naukri. com reaches out to two segments primarily – the job seekers and the employers. To reach out to recruiters, Naukri. com has a 130-140 strong sales force across the country that go around and meet the clients face to face, introduce them to the products and explain them. The mechanism adopted to reach out to the other segment, that is, the job seekers, is aggressive advertising. The aggressive advertising has kept momentum only during the last year (2003-2004). Naukri. om has been advertising on television and the print media and is now exploring radio as a medium for advertising its services and products. Advertisement on television has included promotion during the India–Australia cricket game series telecast on the national T. V. network, Doordarshan, in the year 2001. Environmental factors †¢ The major external forces are: †¢ SUPPLY AND DEMAND †¢ If the company has a demand for more professionals and there is limited supply in the market for the professionals demanded by the company, then the company will have to depend upon internal sources by providing them special training and development programs. Attributes and Characteristics †¢ Faster search †¢ Secured access †¢ Personalized data †¢ Customization of data †¢ Privacy protocol †¢ Huge records for recruiter and applicant to search from †¢ Cost effective †¢ Global reach †¢ Reduction in recruitment time by 60% Usability from stakeholder points of view For job hunters †¢ Ease of access to millions of jobs. †¢ Personalized format †¢ Secure login †¢ Global reach †¢ Application time is reduced †¢ Resume developments For employers †¢ Connectivity to millions of job hunters †¢ Real time information updates †¢ Relevant search †¢ E apps to manage resonses †¢ Ease in passing information For government †¢ Increase in GDP †¢ Increase in tax revenues Low unemployable rate IT Infrastructure requirement [pic] 5 layer model of naukri. com infrastructure [pic] Firewall It is a software application mounted on a server at the point where a company is connected to the internet. Its purpose is to prevent unauthorized access into the company from outsiders Demiliterized zone In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the internet. One or more computers also run outside the firewall in the DMZ. Cost benefit analysis They made the market more efficient by reducing ‘search cost’ and ‘transaction cost’ thus making it attractive to get into this market. It is important to understand the reasons for naukri. com and other similar websites registering excellent growth. The job market existed before but naukri. com and other similar websites took initiatives to facilitate certain activities performed in this market. They made the market more efficient by reducing ‘search cost’ and ‘transaction cost’ thus making it attractive to get into this market. In this case, the efficiency in the market also brings in effectiveness as the cycle time to close the transaction becomes short leading to increased satisfaction. That is, when market becomes more efficient, ‘trapped value’ is released which means a new revenue stream for the business organization. Trapped value is also released when a ‘new value system’ gets created, for example, the value of a new found ‘community’ of recruiters and job seekers—they existed earlier but as standalone entities. This leads to savings in cost to search the talent. For recruiters the cost advantage comes from reducing the cost of print ads and other traditional methods. Also they get the great talent quickly so that they can hire the person for the position and continue their operations. For job hunters it saves their cost of running around for hunting down the required jobs. Challenges in Naukri. com business [pic] People- Convenience and connectivity ensures people are just click away to get the right kind of job. The ease of accessing the database for application for the jobs has made it easier for people to search the jobs which suit them. However with increasing number of applicants the increasing database makes it difficult to manage the large pool of offers. Moreover some co-success factors support both efficiency and effectiveness: communities as parts of e-customer relationship management programs improve customer retention , thus avoiding high costs of acquiring new customers. Implementation It’s easy to describe e-commerce and the benefits resulting from its implementation. It’s not so easy to develop and deploy e-commerce systems. Companies have faced significant hurdles in these efforts: Cost. E-commerce requires sophisticated, distributed systems based on new technologies that can touch many of a company’s core business processes. As with all major business systems, e-commerce systems require significant investments in hardware, software, staffing, and training. Businesses need comprehensive solutions that are easy to use and thus help enable cost-effective deployment. Value. Businesses want to know that their investments in e-commerce systems will produce a return. They deploy e-commerce systems to achieve business objectives such as lead generation, business process automation, and cost reduction. They want to ensure that these objectives are met. Businesses also need flexible solutions so that they can easily adapt a system to meet changing business conditions. Security. Because the Internet provides almost universal access, a company’s assets must be protected against misuse, whether accidental or malicious. At the same time, that protection should not compromise a site’s usability or performance nor make its development too complex. There is an additional security issue: Because e-commerce systems enable the collection and usage of sensitive information about individual customers, companies also need to protect the privacy of their customers. Existing Systems. Companies need to be able to harness the functionality of existing applications into e-commerce systems. Most companies new to e-commerce already use information technology to conduct business in non-Internet environments— in existing marketing, order management, billing, inventory, distribution, and customer service systems. The Internet represents an alternative and complementary way to do business. It’s imperative that Internet e-commerce systems integrate existing systems in a manner that avoids duplicate function and maintains usability, performance, and reliability. Interoperability. Interoperability here means the linking of trading partners’ applications in order to exchange business documents. These systems must work together well in order to achieve business objectives. For example, the order-management application of a business partner must interoperate with the inventory applications of its suppliers. Interoperation between businesses reduces costs and improves performance. It enables the implementation of more dynamic value chains. Business partners Brijj- professional networking Merination- study material Jeevansaathi- Indian matrimonial site Allcheck deals- real estate in india Zomato- food guide 99 acres- real estate in india Shiksha- education and career Mydala. com- deal offering site PEST Analysis POLITICAL: 1. Government support for increasing Internet penetration in India. 2. Tax benefits to corporate. 3. Government policy to increase jobs 4. Pumping money in the infrastructure ECONOMICAL 1. Booming Indian economy. 2. Increase in Indian GDP 3. Increase in ratio of Employed to unemployed people 4. Base of internet users multiplied by 10 to 11 times in last 6 years. SOCIAL 1. People spend more time on internet 2. Rise of social networking site 3. High priority on time and convenience. 4. Improving usage of Broadband and high computer literacy. TECHNOLOGICAL 1. increase in broadband services 2. Increasing penetration rate of broadband and wireless internet. 3. Better managed E business site for ease, privacy and advancements in net banking. SWOT Analysis †¢ naukri. com has the first mover advantage. It is still paying off till date with naukri having the best brand recall in terms of job portals. The site design has received great acceptance among Indians. (better than monster and timesjobs) †¢ It has the experience of being in the market for almost a decade. †¢ It has a large market share while monsterindia and Timesjobs are far behind. †¢ It ranked as India’s number one job site on all parameters — page view, reach, and traffic. †¢ It has the advantage of a clear revenue model since its inception. While it has a few services that are free to both job seekers and job providers, the majority of their services are paid for by the recruiters. †¢ It has a very committed team. This is clear from the visits made by them to establish contact. It is known to have one of the best work atmospheres. Weaknesses †¢ It has a large number of employees and hence the company incurs a high cost for managing salesforce. †¢ There is a high level of attrition. †¢ Employer Branding on Naukri. com is hardly visible which is a major product flaw on the portal Opportunities †¢ Internet users are increasing day by day. Approximately, 7. 5 million urban Indians are using the net. †¢ Further, with broadband infrastructure being rolled out, there are more opportunities on the net. †¢ The scope of online recruitment is, therefore, increasing. Like any other o nline recruitment company, it has the advantage of being a low cost medium of recruitment.