Friday, November 29, 2019

Quiet for the Start free essay sample

â€Å"Quiet for the Start†Finally, after months of detailed training and rigorous practice, my hard work paid off; I had made it to the state championship. Pride welled up in my heart as I walked up to the starting block with my relay team and we got ready to swim our event. Looking out over the pool, memories flashed across my mind; memories of times long gone. I remember waking up at 5:00 am every morning to swim before school. I remember the mental and physical battles during difficult workouts. But now in hindsight all the pain and labor has paid off. Now it is all worth it. Nothing matters but this race right here, right now. Not only was this my last race of the season but it was also the last swim of my high school career. Four years of labor had prepared me for this moment. A hush fell over the stands as the announcer said, â€Å"Quiet for the start. We will write a custom essay sample on Quiet for the Start or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page † For a few brief moments everything was silent, a tension waiting to be broken. Then, as the buzzer sounded, the air exploded with cheers and the race began.The roar of the crowd was immediately silenced as I entered the water and a peaceful calm took its place. Slicing the water as a knife through butter, I led off the relay. I held a key role in influencing the mental state of my teammates. Confidence would be established if I led the pool, uncertainty if I dropped behind. As I approached the surface of the water I knew it would be a great race. I was prepared, mentally and physically, for the swim ahead of me. Desiring to make my team proud, I swam with all my might. Only a mere twenty-three seconds later, I was done. While my teammates dove in and continued the relay, I got out of the pool and checked my split; the last spilt of my high school career. With disbelief I saw that I had just swam a personal best. All of my hard work had paid off. The daily workouts, lack of sleep, and the physical and mental exhaustion of swimming were all worth it. I had done my job, now it was up to my teammates. Nervously, I watched on as they finished the relay. When our final time came up on the board my mind just went blank. We had been disqualified for an early start. Frustration welled up inside me, like lava in a volcano. I could not believe that instead of my last race ending as a personal best, it was to be dismissed entirely. My main issue was not that my fastest split would be negated, but the fact that I had worked so hard to do my best and one of my teammates had ruined it for me. All the time, money, and energy I had invested in the sport had culminated into my final race and it became a bitter memory to end an otherwise wonderful career. Now that I look back on it, however, I see a lesson in my struggles. Nothing I did could determine how other influences would affect me. My investment in swimming prepared me as an individual but it could not protect me from someone else’s shortcomings. All of my time and energy was not wasted just because I had to accept the consequences of someone else’s failure. I swam my best time and accomplished what I wanted. I had reached and achieved my goal. I should not let the mistake of another determine the value of my success. Real reward is in the journey you take to achieve something, not only in the final product. True, as a team we had lost, but individually, I had won.

Monday, November 25, 2019

Learning to Work in Customer Service Professor Ramos Blog

Learning to Work in Customer Service After I graduated from high school, I really didn’t know what to do with my time. I knew that I didn’t want to go back to school just yet. I decided to get a job. I applied at local places around my town, I live in a small community so I didn’t really have much to choose from. My mom told me about a few places hiring. A few of my friends from high school worked at Jensen’s so I decided to apply there. I got hired on the spot and I was so excited. I had never had a job before. Graduating from high school was exciting but also very overwhelming. I’ve never had a job before and I was used to just going to school and having the same routine for so long. I looked online for places hiring near me and it was very nerve-racking, there weren’t many places near where I live that were hiring. I noticed an ad saying that the grocery store I lived near was hiring so I decided to apply there. I thought it would be a good place to work because I live about five minutes from there. I always shop at Jensen’s and I thought it would be a fun place to get my first job at. I walked into the store looked around and thought to myself I could totally see myself working here. I asked one of the employees at the register if the manager was there. She brought me back to the manager’s office and I ended up talking to the manager for over an hour. I told him I had never had a job before and I was eager to see what working in customer service was like. I as ked if they were hiring and he said yes! He interviewed me and hired me right then. I was so nervous and thought it would be so hard to get a job and it only took me one day. When I first started working at Jensen’s, the manager of the store asked me which department I would like to work in. A few of my friends that I knew from my school worked in the Starbucks inside the store. I told him I wanted to work in Starbucks and he told me that’d be great because they have been trying to find people to work there. I was really excited that I got my first job and Starbucks is one of my favorite places to get coffee. On my first day, I had to train for about four to five hours and one of my friends got to train me. She made it so easy to catch on to you how things are done and showed me how to make some of their most popular drinks. I was really grateful for all of her help, I was scared I wasn’t going to be good at working in customer service but she made me feel a lot more confident about it. She showed me how to make Starbucks’ most popular drinks and some of the first drinks I learned how to make were the hibiscus teas which I woul d order all the time before I started working there. At first I thought it was pretty easy and after about two hours of practicing and learning how to make different drinks, my coworker let me take an order for a customer. I was pretty nervous. The customer was a regular at Starbucks and my manager told me that the customer usually ordered the same thing. I took his order, he told me he wanted a Iced Americano with a shot of espresso. I made the drink without any help from my coworkers or manager, handed the customer his drink and he sat down at a table. I noticed the customer kept looking at me while I was practicing other drinks and about 10 minutes later he came up to me and said â€Å"this drink does not taste like it usually does.† I told him what I had put in it and how I made it and he got upset because he wanted a shot of espresso and I put two shots of vanilla in it by accident. I explained to him that it was my first day and I wasn’t 100% familiar with the shots to put in his drink yet. I apologized and made him a new drink. I gave him a large for the inconvenience, when he originally ordered a medium. I could tell he was annoyed so I told my manager what had happened and she explained to me that it happens all the time and I shouldn’t be upset because it is all about the learning process. She said â€Å"you’ll be fine, don’t let this upset you we all mess up sometimes and we just have to shake it off.† I felt better after talking to her and I was excited to continue working there. My manager was always so encouraging and would always tell me how much she appreciates all of my hard work. I worked at Starbucks for a little over a year and working there has taught me so many things about working in the customer service industry. I am very thankful for getting a job I actually really enjoyed the first day I had applied anywhere. I am grateful to have had a manager as nice and encouraging as I did at Starbucks, she is definitely my literacy sponsor. I never would have the experience I did if it weren’t for my boss being so supportive, encouraging and understanding how hard and overwhelming it could be working at your first job. Although it was frustrating at times when I would mess up orders, my manager and other coworkers really helped me get through it. I was so scared to get my first job and thought it would be so hard but with all of the support I had, it was actually really fun and easy.

Thursday, November 21, 2019

Proposal for Resilience Building Event Essay Example | Topics and Well Written Essays - 500 words

Proposal for Resilience Building Event - Essay Example This research is being carried out to present how to build an imaginary environmental disaster management centre called â€Å"Datus Community Relief Centre† (DCRC). The proposed environmental disaster management centre is to be situated at Datus, a community in the outskirts of Warwickshire. It would be noted that Warwickshire is a major disaster zone in the United Kingdom and that Datus is a disaster prone community that needs an urgent intervention of change. On Tuesday, 10 June 2008, it was broadcast on the British Broadcasting Corporation of the environmental disaster threat of Warwickshire and communities around it, which does not exclude Datus. This indeed reveals that for some years that, the people of Datus have had the urgent need for a disaster management relief centre. The following can be identified as the thematic characteristics of beneficiaries.By integrative, the implication is that the organisation works in close collaboration with other agencies who have soci al work as their prime focus. Whereas some of these agencies are private sector participants, others are non governmental institutions whiles the rest are governmental institutions or organisations. The efforts, ideas, and resources of all these bodies are brought together to achieve the common goal of the organisation.The beneficiary organisation is society oriented in the sense that it does not seek for the immediate welfare of its staff or personnel make up. Rather, the organisation has the collective welfare of society as its primary goal and objective.

Wednesday, November 20, 2019

Litarary theory Essay Example | Topics and Well Written Essays - 500 words

Litarary theory - Essay Example Sidney does not agree with Shelley that poetry is an expression of the beauty that has been expressed by the mind or the pet. Sidney says the poet use the creative power to invent a new world while Shelley believes that the impression touches the core of a person who prolongs the experience. Just as a child attempts to express himself through sounds and gestures, a poet tries to express the feelings of joy and happiness he carries as impressions the world has made on his mind. A poet first feels the happiness and then this emotion is expressed through the use of words and language, says Shelley but Sidney contends it is a new creation, new nature when the poet is in harmony with the Creator. What Shelley implies is that the beauty of the world is expressed through a poet. This happens when the poet delves deep within, appreciates the nature and its beauty. What springs forth from the inner self is the feeling when the mind is in harmony with the nature. Both however agree that the poet is in harmony – Shelly refers to it as harmony with the world, with the beauty, harmony with the impressions the world has made on him. Sidney says the when the poet exercises the highest power of humanity, he resembles the Creator. This suggests the poet is in harmony with the creator. Hence, what transpires is that a poet has to be in harmony for poetry to be created – call it the nature, the world, the beauty, the creator, whether it is the imagination or the real world. 2. Compare/contrast the mimetic theories of Pope and Wordsworth. Try to identify areas of agreement and disagreement in their discussions of how works of literature imitate or represent the real world. The mimetic theories of Pope and Wordsworth discuss the rules for the critic or the reader. Pope believes that since nature is unerring and unchanging, one should follow the rules of the nature while Wordsworth’s poems imitate the primary laws of the nature. Poetry has its origin in the orderly

Monday, November 18, 2019

Marketing database Essay Example | Topics and Well Written Essays - 250 words

Marketing database - Essay Example This is because profitability levels of different client differs, and thus being able to detect the most rewarding customers is essential. Based on the number of consumers under investigation, LTV can be carried out on the whole customer base or through segmentation (Hughes, 2014). Although the latter is more demanding, its more effective in analyzing clients. For royalty program, acquisition cost is considered as ‘sunk cost’, and thus not used in the calculation, as the customers are part of the current customer base. To effectively analyze the customers, analysis need to be executed at a group level using the test versus control situation approach. In this case, the tests are used to realize the loyalty program, an aspect not addressed by control. In this regard, for success to be realized, the lifetime value should be higher than the investment costs. Therefore, LPV is an efficient tool in evaluating the worthiness of a future royalty program (Rodgers & Peppers,

Saturday, November 16, 2019

Security Issues Concerned With E Commerce Information Technology Essay

Security Issues Concerned With E Commerce Information Technology Essay Rapid advancements in technology is allowing everyone to send and receive information from anywhere in the world. Initially people used to share information but slowly this technology started emerging to business areas such as marketing, buying and selling, is called E-commerce. In which all the business transactions are made online. E-commerce is providing many comforts to everyone at the same time there is a chance of misusing the technology. In this essay, E-commerce is discussed in detail about the security issues associated with that. Familiarity with securities increases the benefits of E-commerce to a maximum extent.   INTRODUCTION E-commerce is a type of business model for a small or larger business that enables a firm or individual to conduct business using electronic media such as internet. It can be divided into four major areas based on type of business and the parties involved in business. They are business to business, business to consumer, consumer to consumer and consumer to business. This essay explains about E-commerce, importance of E-commerce, latest applications, advantages and draw backs. This is also explains in detail about current security issues, E-commerce threats, risks and privacy issues related to various areas of e commerce. IMPORTANCE OF E-COMMERCE: In e-commerce, time plays a vital role in both the businesses and consumers. From the business point of view, with less time spent during each transaction, more transaction can be attained on the same day. As for the consumer, they will save up more time during their transaction. Because of this, Ecommerce steps in and replaced the traditional commerce method where a single transaction can cost both parties a lot of valuable time. For example, a banking transaction can be completed through the Internet within a few minutes compared to the traditional banking method which may take up to hours. This fact clearly proves that Ecommerce is beneficial to both business and consumer wise as payment and documentations can be completed with greater efficiency. APPLICATIONS OF E-COMMERCE: Now a days development of E-commerce applications is taking place rapidly. This is mainly due to the increased  number of internet users  and awareness of technology in people. Many people using internet to shop online, make bills payment and  money transfers  etc. ADVANTAGES OF E-COMMERCE APPLICATIONS: People paying more attention to do electronic transaction using internet because, they can do these from any place in the world at any time they wish. This is saving lot of time and effort and providing comfort.   The other important advantage of e commerce is the cheapest means of doing business. From the buyers perspective also ecommerce offers a lot of real advantages. Reduction in buyers sorting out time. Better buyer decisions Less time is spent in resolving invoice and order discrepancies. Increased opportunities for buying alternative products. DIS ADVANTAGES OF E-COMMERCE: However there are several benefits of E-commerce applications, there are few limitations and risks involved in using those applications. The main disadvantage of E-commerce is the lack of a business model, lack of trust and key public infrastructure, slow navigation on the Internet, the high risk of buying unsatisfactory products, and most of all lack of security. It has a great impact on traditional business system. For example,  telephone bill payment  in traditional method was expensive and time consuming than the recent online payment. Of course, the recent online payment system is cost effective but, cant provide employment in the transportation system like traditional payment method. So the major disadvantage of E-commerce applications is, it perpetuates unemployment. In some way it can provide employment to few people like  data base administrator,  internet security providers  etc. where as privacy, security, payment, identity, contract comes under drawbacks of the e- commerce. SECURITY ISSUES CONCERNED WITH E-COMMERCE: In spite of its advantages and limitations E-commerce has got some security issues in practical. E-commerce  security is nothing but preventing loss and protecting the areas financially and informational from unauthorized access, use or destruction.   Due the rapid developments in science and technology, risks involved in use of technology and the security measures to avoid the organizational and individual losses are changing day to day.  Ã‚  There are two types of important cryptography we follow for secured E-commerce transactions. Symmetric (private-key) cryptography:  This is an  encryption system  in which sender and receiver possess the same key. The key used to encrypt a message is also used to decrypt the encrypted message from the sender. Asymmetric (public-key) cryptography:  Ã‚  In this method the actual message is encoded and decoded using two different mathematically related keys, one of them is called public key and the other is called private key. To provide the maximum security using cryptography we target the following five areas: 1.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Integrity 2.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Non-repudiation 3.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Authenticity 4.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Confidentiality 5.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Privacy INTEGRITY: Integrity is nothing but message must not be altered or tampered with. There are several chances for damage of  data integrity  in the E-commerce area. Errors could take place when entering data manually. Errors may occur when data is being transmitted from one computer to another. Data could be modified or theft because of software  bugs  or  viruses. Data could be lost due to the unexpected hardware damages like server or disk crashes. There is possibility of data loss due to the  natural disasters  like  fire accidents. There are many ways to minimize these threats to data integrity. We can maintain the  Back up  of our data efficiently by updating regularly.  Ã‚  Modern technology provides us various security mechanisms to controlling access to data.  Ã‚  We can improve the data integrity through designing  user interfaces  that prevent the input of invalid data, for example menu driven applications which allow user to choose particular they are looking for.  Ã‚  We can use the  error detection  and correction software when transmitting data to develop integrity.   NONREPUDIATION: Prevention against any one party from reneging on an agreement after the fact.  For E-commerce and other electronic transactions, including ATMs (cash machines), all parties to a transaction must be confident that the transaction is secure; that the parties are who they say they are (authentication), and that the transaction is verified as final. Systems must ensure that a party cannot subsequently repudiate (reject) a transaction. To protect and ensure digital trust, the parties to such systems may employ  Digital Signatures, which will not only validate the sender, but will also time stamp the transaction, so it cannot be claimed subsequently that the transaction was not authorized or not valid etc. AUTHENTICATION: In E-commerce, authentication is a process through seller validates the information provided by the buyer like credit card information. In this  process verification of both the cardholders identity and the payment cards details are checked. In E-commerce transactions sellers must be very careful and responsible to provide good payment authentication services. A well developed and implemented transaction authentication process will decrease the number of customer disputes and charged-back transactions. If the E-commerce website do not have the good authentication system could lead a great loss of both data and money.     CONFIDENTIALITY: Confidentiality is protecting our data from unauthorized users. That means whatever the data or information shared by the merchant and the customers should be accessed by those two parties only. No other should be able to access such data. To maximize the confidentiality we must follow good  encryption and decryption methods, proper authentication and authorization procedures. We must use good antivirus or software error detections system. PRIVACY: Privacy is a major concern in E-commerce area which tells the E-commerce user how long his or her personal information is going to be stored in web site owners database, how safely they delete such personal information and what are the legal actions will be taken if the ecommerce website is misused. In online transactions, the website owner or service provider will have the ability to keep a record of all the purchases made by a consumer. Each E-commerce website has its own privacy policy, as per the needs of the organization.  Ã‚  So the customers must go through the privacy policy before they utilize E-commerce website for online shopping. Otherwise the customers have to phase big problem as the seller has the legal rights to take an action on customer for misusing their website. To get rid of this problem now a days we are able to use many tools like filtering website with low privacy ratings In the e-commerce security, some of the issues to be considered in this issue they are digital signatures, certificates, secure socket layers, firewalls. I will explain each and every concept with detail explanation. Digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. A digital signature can be used with any kind of message, whether it is encrypted  or not, simply so that the receiver can be sure of the senders identity and that the message arrived intact. Digital certificate is an electronic credit card that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate holders  public key  (used for encrypting messages and  digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Some digital certificates conform to a standard, X.509. Digital certificates can be kept in registries so that authenticating users can look up other users public keys. In Security socket layer, Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. SSL uses PKI and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client agree to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates. Some of the protecting networks are fire wall and proxy servers. Fire wall is to protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees where as proxy servers (proxies) is a  server  (a computer system or an application program) that acts as a go-between for requests from  clients  seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. E-COMMERCE SECURITY THREATS: However we follow security measures, there are is a chance of threats in several ways. We can classify such threats in to four types. 1.  Ã‚  Ã‚  Intellectual property  threats:  Ã‚  Some browsers use the information personally from a website without permission of the website owner. For example, music downloads, software pirating  etc. To get rid of this problem website owners have to use secured authentication system 2.  Ã‚  Client computer threats:  Ã‚  Sometimes client computers may impose for electronic threats like  Trojan horse, viruses. Which enters the client computer without users knowledge, steal the data and destroy or crash the client computer. To avoid these types of threats we need to use good antivirus system which should be updated regularly. The website owners should implement a strong privacy policy.   3.  Ã‚  Communication channel threats: As internet allows anyone to send and receive information through many networks. Data may be stolen, modified by unauthorized users of hackers. Hackers can develop software to steal the user Identification and pass words as well. Spoofing is another major threat while data is being transmitted electronically.  Denial of service  is also one of communication channel threat, where hackers sends unlimited number of requests to the target server, which big number of requests may not be handled by the server. Obviously the genuine user will find websites of that server are always busy.  Ã‚   We can overcome the communication channel threats using public key encryption and private key encryption.  Ã‚  We can also use proper protocols to get rid of communication channel threats. Digital signatures are another way we can follow to minimize these kinds of threats. Where the actual message which we need to send is decrypted and bound with senders private key and a signature is added to that will be send to the receiver. The receiver uses senders public key and signature for decryption to see the actual message. 4.  Ã‚  Server threats: Denial of service is a major threat for the servers, where hackers generate a program which sends many requests from the client side that cannot be handled by the server. Spamming  is another important threat for the servers. To protect our server from the above threats we can use authentication for web access, digital signatures and firewalls. Firewalls check the incoming requests packets and if anything which does not match with the server related data, they simply reject those requests. Some of the tools to achieve the security they are encryption, firewalls, security tools, access controls, proxy systems, authentication and intrusion detection. HOW TO DEVELOP AN E-COMMERCE SECURITY PLAN: Perform a risk assessment Develop a security policy Develop an implementation plan Create a security organization Perform a security audit Firstly, security plan starts with risk assessment which means an assessment of the risks and points of vulnerability. Secondly, security policy is a set of statements prioritizing the information risks, identifying acceptable risk targets and identifying the mechanisms for achieving these targets where as in the implementation plan it will take to achieve the security plan goals. Thirdly, security organization educates and train users, keeps management ware of security threats and breakdown, and maintains the tools chosen to implement security. Lastly, security audit involves the routine review of access logs. MANAGING RISK IN E-COMMERCE: To be able to manage the risk in E-commerce first step is identify the risk factor whether it is intellectual property threat, communication channel threat, client computer threat  Ã‚  Ã‚  or server threat. Then we take a counter action against the relevant risk as explained above. If we dont do this regularly, E-commerce may mislead the customer because of the data stealing of modification. Customers and the website owners may lose valuable account numbers; pass words and other personal information. As E-commerce is worldwide, it could lead for the global loss for both customers and sellers. CONCLUSION E-commerce is a type of business model for a small or larger business that enables a firm or individual to conduct business using electronic media such as internet. In e-commerce, time plays a vital role in both the businesses and consumers. E-commerce  security is nothing but preventing loss and protecting the areas financially and informational from unauthorized access, use or destruction.  Due the rapid developments in science and technology, risks involved in use of technology and the security measures to avoid the organizational and individual losses are changing day to day.  In the e-commerce security, some of the issues to be considered in this issue they are digital signatures, certificates, secure socket layers, firewalls. To develop a security plan five major steps have to be considered they are risk assessment, developing security policy, implementation plan, create a security organization and performing a security audit. To reduce the risk from the Trojans, worms ev ery one should implement the security plan.

Wednesday, November 13, 2019

Technological Innovation Essay -- Technology Technological Papers

Technological Innovation Works Cited Missing Technological innovation makes daily life more convenient and enjoyable for everyone. However, technological breakthroughs also produce social and ethical consequences. Computers are no exception to this rule. These products of modern technology can store massive amounts of information which help us perform at our best. However, they also generate new ethical dilemmas regarding who is able to access that information and how they use it. Thus, the ethical issue of privacy comes to the fore as well as problems associated with privacy like identity theft. The history of computing goes as far back as the 1600s. However, computers didn’t start to look like the ones we know today until the late 1900s. At first, computers were too big and too expensive for personal use. They were only used by businesses and the elite part of society. However, computer manufacturers like Apple and IBM began to refine and upgrade computers until they became practical for personal use. Today’s computers are much more advanced than their predecessors. Nowadays, we use computers for everything from grocery shopping to doing homework. â€Å"Tom Forester and Perry Morrison point out that Computers are the core technology of our times. They are the new paradigm, the new ‘common sense.’ In the comparatively short space of forty years, computers have become central to the operations of industrial societies. Without computers and computer networks, much of manufacturing industry, commerce, transport and distrib ution, government, the military, health services, education, and research would simply grind to a halt.† (1) Our society has become very dependent on this tech... ... They store massive amounts of information and make it easy for us to access. However, they also generate new ethical issues over who can gain access to this information while protecting our privacy. As we have seen, some people can illegally gain access to our private information and steal our identities. Therefore, we need to pass stiffer legislation to severely punish these criminals and keep them away from computers. We need to establish a database code that all companies would be required to follow. There needs to be more security passwords and better firewalls to prevent future attempts to gain access to the computer. Lastly, all information on these computers should be thoroughly encrypted to give citizens more piece of mind and added assurance that their privacy is protected. Thus, the ethical issue of privacy would come to an end.

Monday, November 11, 2019

Maf 640

C)What would you do if you were Datin Timah? * Be innovative, go for incremental & radical innovations, be creative, think out of the box, invent, innovate, imitate. SHOW & TELL US WHAT YOU PLAN TO DO. If we were Datin Timah given the option whether to take up the Guardian’s offer or just sell off the business to the Watson, we will take up the Guardian’s offer rather than sell off to the Watson. This is due to the profit betterment. If we take up Watson’s offer, we can only get the short term profit and we cannot longer be in the industry.However, if we take up the Guardian’s offer, we can have the long term profit and we can sustain in the industry since the Guardian will help us in supplying our product to end customer. Furthermore, Guardian will not interfere in the management of Orang Kampung since their focused only to the product. Beside, they are willing to assist Orang Kampung in Research & Development and also production because they have the exp ertise. We can say that was the golden opportunity for the Orang Kampung to expand their market and target market.To sustain in the market, one product need to move together with the time, therefore, if before this Orang Kampung not concerned about how they package their product, now, they need to concerned since attractive packaging one of the important marketing strategy that able to catch up the customer and able to compete with other competitor’s product. Datin Timah is very conservative and holds to traditional way in making the product, so, she does not believe in revamping traditional medicine into modern pills and capsules, because according to her the purity of the traditional medicine will be contaminated with the toxic-chemicals.From our point of view, we believe that research and development team have a way how to maintain the traditional taste and benefit of the traditional medicine but still can modernized it so that it can compete with other modern medicine. Ho wever, if Datin Timah still doesn’t have faith with the team we suggest that she open an outlet in where she herself serves the product in traditional way where we believe that the traditional way is by boil the herbs and roots.

Friday, November 8, 2019

Moby Dick by Herman Melville Quotes

Moby Dick by Herman Melville Quotes Moby Dick, a famous novel by  Herman Melville, is a classic tale about a ship captains epic quest to find and kill a whale that bit off part of his leg on a previous voyage. The Intercollegiate Studies Institute calls Moby Dick  one of five books every American should read. This novel was first published in 1851 but didnt achieve acclaim until after Melvilles death. Quotes from the epic novel show why it has endured as an American classic. Obsession Ahab, the captain of the ship, is willing to risk everything his ship, his crew, his own life to seek revenge on the elusive whale. These quotes show the depth of his obsessive  ocean quest.  Ã¢â‚¬â€¹The riveting language still seeps into our culture; part of the third quote in this section was mouthed by  Ricardo Montalbn as his character chased Captain Kirk throughout the galaxy in the 1982 move, Star Trek II: The Wrath of Khan. The path to my fixed purpose is laid with iron rails, whereon my soul is grooved to run. Over unsounded gorges, through the rifled hearts of mountains, under torrents’ beds, unerringly I rush! Naught’s an obstacle, naught’s an angle to the iron way!There is a wisdom that is woe; but there is a woe that is madness. And there is a Catskill eagle in some souls that can alike dive down into the blackest gorges, and soar out of them again and become invisible in the sunny spaces. And even if he for ever flies within the gorge, that gorge is in the mountains; so that even in his lowest swoop the mountain eagle is still higher than other birds upon the plain, even though they soar.Towards thee I roll, thou all-destroying but unconquering whale; to the last I grapple with thee; from hell’s heart I stab at thee; for hate’s sake I spit my last breath at thee.​ Madness Ahab implies that he is ordained by God to destroy Moby Dick, the white whale that he believes to be evil incarnate. Of note, as Ahab is explaining his obsession in the first quote here, he refers to his chief mate, Starbuck, who served as the inspiration for the name of the well-known coffee chain. What I’ve dared, I’ve willed; and what I’ve willed, I’ll do! They think me mad Starbuck does; but I’m demoniac, I am madness maddened! That wild madness that’s only calm to comprehend itself! The prophecy was that I should be dismembered; and Aye! I lost this leg. I now prophesy that I will dismember my dismemberer.All that most maddens and torments; all that stirs up the lees of things; all truth with malice in it; all that cracks the sinews and cakes the brain; all the subtle demonisms of life and thought; all evil, to crazy Ahab, were visibly personified, and made practically assailable in Moby Dick. He piled upon the whale’s white hump the sum of all the general rage and hate felt by his whole race from Adam down; and then, as if his chest had been a mortar, he burst his hot heart’s shell upon it.

Wednesday, November 6, 2019

Free Essays on Truman And The Atomic Bomb

President Truman’s decision to attack Japan with atomic bombs changed the world forever. There were many internal and external forces that led him to use such extreme force. This paper will examine the factors that led to President Truman’s decision to attack Nagasaki and Hiroshima, as well as look at the positive and negative factors of the alternatives to answer whether these actions were necessary. There were many different aspects of the war in Japan that led President Truman to use the atomic bombs. After Roosevelt’s death on April 14, 1945, one of Truman’s main concerns was to continue in Roosevelt’s footsteps and follow his example. He wanted Roosevelt’s legacy to continue and end the war as soon as possible with the smallest amounts of American casualties. Truman â€Å"inherited from Roosevelt the strategy of keeping American losses to a minimum, and he was committed to carrying it out for the remainder of the war† (p.9). Not only did Roosevelt’s policies influence him, but his own personal war experience affected him as well. Truman had served in World War I as an artillery captain, and saw all of the gruesome aspects of war, including seeing his comrades being slaughtered by the enemy. This helped Truman empathize with the soldiers and try to get them out of Japan as quickly as possible. Another reason Truman used the atomic bomb was the strong will of the Japanese to continue on with the war. Even once they realized defeat was inevitable, the Japanese planned to continue on until the very end. On June 8, 1945 the Japanese Emperor Hirohito â€Å"agreed to the military’s call for an all-out resistance to an American invasion† (p.31). The Japanese were prepared to face significant losses until they could surrender to less harsh consequences. The main concern of the Japanese was to keep their emperor in power. The Japanese emperor was the most highly regarded figure in Japan, and none of the Japanese were prepa... Free Essays on Truman And The Atomic Bomb Free Essays on Truman And The Atomic Bomb President Truman’s decision to attack Japan with atomic bombs changed the world forever. There were many internal and external forces that led him to use such extreme force. This paper will examine the factors that led to President Truman’s decision to attack Nagasaki and Hiroshima, as well as look at the positive and negative factors of the alternatives to answer whether these actions were necessary. There were many different aspects of the war in Japan that led President Truman to use the atomic bombs. After Roosevelt’s death on April 14, 1945, one of Truman’s main concerns was to continue in Roosevelt’s footsteps and follow his example. He wanted Roosevelt’s legacy to continue and end the war as soon as possible with the smallest amounts of American casualties. Truman â€Å"inherited from Roosevelt the strategy of keeping American losses to a minimum, and he was committed to carrying it out for the remainder of the war† (p.9). Not only did Roosevelt’s policies influence him, but his own personal war experience affected him as well. Truman had served in World War I as an artillery captain, and saw all of the gruesome aspects of war, including seeing his comrades being slaughtered by the enemy. This helped Truman empathize with the soldiers and try to get them out of Japan as quickly as possible. Another reason Truman used the atomic bomb was the strong will of the Japanese to continue on with the war. Even once they realized defeat was inevitable, the Japanese planned to continue on until the very end. On June 8, 1945 the Japanese Emperor Hirohito â€Å"agreed to the military’s call for an all-out resistance to an American invasion† (p.31). The Japanese were prepared to face significant losses until they could surrender to less harsh consequences. The main concern of the Japanese was to keep their emperor in power. The Japanese emperor was the most highly regarded figure in Japan, and none of the Japanese were prepa...

Monday, November 4, 2019

Is the future of the EMU threatened by recent events Discuss Essay

Is the future of the EMU threatened by recent events Discuss - Essay Example World War; the legal, economic and political framework of the EU is rooted in the Franco-German tradition, which has lent itself to EU tensions with the political agendas of certain other member states such as Britain (Lippert, 2001, p.114). This intrinsic conflict at the heart of the European Monetary Union (EMU) has been further underlined by the recent European Union and International Monetary Fund’s Irish and Greek bailout. Additionally, some analytical forecasts suggest that Spain and Portugal bailouts are on the horizon, which not only questions the future of the Euro but also brings renewed attention to the long term sustainability of the EMU. The fragmentation of the single monetary union and the EU agenda with national political agendas has become increasingly prominent in relation to the EU enlargement programme (Lahav, 2004, p.113). Indeed, Artis & Nixon suggest that the EU’s economic objectives in the last decade have reached crisis (Artis & Nixon, 2007, p.1). They further argue that the EU relies on co-ordination and mutual co-operation of states and that the enlargement of the EU and free movement has led to many member states opting out, derogating or suspending certain obligations to address national political agendas (2007). With regard to the latter, the continuation of the sensitivity over Turkey and reality of corruption and political agenda in EU friendly Ukraine clearly fuels the debate as to how far national objectives can successfully operate in conjunction with EU economic policy (Wesley Scott, 2006, p.99). As such, Artis and Nixon argue that the root of the Union and mutual objectives are becoming secondary to national political interests, which in turn risks negating the Union’s objectives of a monetary union (2007). The focus of this paper is to critically evaluate the extent to which the EMU is threatened by recent events and it is submitted that a central consideration in this issue is the extent to which the efficacy of

Saturday, November 2, 2019

Probation and Parole Research Paper Example | Topics and Well Written Essays - 750 words - 1

Probation and Parole - Research Paper Example Community corrections programs offer front and back end alternatives for correctional systems. In reference to front end, alternatives probation has offered a means of limiting further crowding in prisons and jails. On the other hand, parole systems have consistently acted as back end measures that offer release valves on prison populations. The issue of rehabilitative measures for criminal offenders has often elicited much debate in countries such as the United States. To this end, there are several rehabilitation programs that have shown positive results. These, include, Moral Reconation Therapy, probation and parole. Moral Reconation Therapy Moral Reconation Therapy entails a continuous treatment plan that aims at decreasing recidivism among adult and juvenile offenders while at the same time adjusting moral reasoning. To this end, the approach is majorly a cognitive behavior mechanism that combines parameters from various psychological paradigms. These subsequently address positi ve behavior, social, ego and moral growth. Implementation of MRT involves individual and group counseling by use of prescribed homework assignments and structured group exercises. Moreover, there is a workbook that is based on 16 objective units that emphasize on seven basic treatment parameters. These are attitudes, reinforcement of positive habits and behavior; confrontation of beliefs; assessment of current relationships; enhancement of self concept; positive identity formation; development of frustration tolerance and decrease in hedonism; as well as development of higher moral reasoning stages. Probation The application of probation and parole in rehabilitating offenders is guided partly by the philosophies of positivism and classicalism (Carter & Wilkins, 1976). On one hand, positivists imply that offenders are compelled into the choice of committing crime against their own volition and consequently the behavior or conditions that triggered the action need to be rectified. Con versely, classicalists contend that offenders are in control over the choice of their actions and consequently to deter future criminal activities, such offenders need to be punished. To this end, probation is defined as a sanction imposed by court whereby a convicted offender is released back into the community subject to a conditional suspended sentence. Moreover, the probationer is in most situations a non-violent or first time offender who stands the best chance of rehabilitation within the outside community. The suitability and effectiveness of probation is driven by its flexibility in allowing judicial authorities a high extent of discretion when imposing sentences. Consequently, it allows the tailoring of sentences to suit different offenders. Furthermore, its effectiveness is driven by the availability of a supervision that checks on the progress of rehabilitation. The supervision role is provided by probation officers who offer support and guidance to the offender aimed at making him or her law abiding citizen. To this end, probation offers a second chance of reformation to the offender. Evidently, there are several version of probation designed for different types of offenders. This is driven by the need to jails and prisons. These include intensive supervised probation which entails close monitoring of convicts and applies stringent conditions on the release clause. Others include split sentencing