Thursday, October 31, 2019

Cleland Wildlife Park and park values Essay Example | Topics and Well Written Essays - 1500 words

Cleland Wildlife Park and park values - Essay Example his brief essay, this student will discuss and analyze the case of Cleland wildlife Park; located in southern Australia and visited by this author and friends on May 20th, 2014. Comprising fully 10 square kilometres of land in near Adelaide Australia, this particular natural area houses nearly all of the indigenous and well known species of wildlife indigenous to this particular region of Australia (SouthAustralia, 2014). Furthermore, the following analysis will provide a joint discussion; concentric upon the experience that this student had at the wildlife park in question alongside a discussion and analysis of the importance and relevance that parks and natural areas such as this play within the broader economic, environmental, educational, and tourism/recreation goals that society has. It is the further hope of this particular student that through engaging in a broader understanding of these metrics, the reader can come to appreciate how integral parks such as Cleland are within t he current society. Firstly, and perhaps most obviously, parks such as Cleland allow the wildlife within its borders to be protected from the dangers/hazards that might exist for them in an unprotected area. Although it is true that hunting and other such activities are heavily regulated within Australia, the danger posed by vehicles and human expansion into habitat and territory of this wildlife is something that natural areas of protect against. Furthermore, by designating a specific result in which wildlife can exist in its natural form, without the hazards of human interference, and beneficial sanctuaries created in which an unadulterated ecosystem can survive and thrive. Moreover, as the animals within the natural area are reduced from human dependence, the way in which they exhibit natural behaviors of interacting with their ecosystems maximized; once again promoting a more instinctual level of development that could otherwise exist in a situation in which such parks were not

Tuesday, October 29, 2019

Discussion point Essay Example | Topics and Well Written Essays - 250 words - 2

Discussion point - Essay Example The point in this scenario is to make a choice in regard to prioritizing which debt to clear first. Michael needs to understand that it his legal obligation to pay his mother since it was a loan which is legally binding. However, the loan seems to have been unsecured because it was leased and in line with the evidently missing Personal Property Security Act (PPSA). There are two critical legal concepts that Michael need to understand in regard to his mother. It is not indicated if they perfected any collateral towards the loan and this means that in the event he could not raise the loan, the mother cannot claim anything. However, considering the case of Golf, in the event that Michael failed to honor his lease obligation, VW would repossess the Golf. In an attempt to avoid bankruptcy from the debts including the loan he owes the mother, Michael has Bankruptcy and Insolvency Act at his disposal in which he can make a proposal of paying only a portion of the debts e.g. paying back 50 c ents for every dollar

Sunday, October 27, 2019

The Role Of The Chorus In Sophocles English Literature Essay

The Role Of The Chorus In Sophocles English Literature Essay The Chorus plays a crucial role in the overall development of any Greek tragedy; they are responsible for providing the overall background and summary information of the play, alongside they interact with characters to develop the personalities of characters and drive the plot. However, both Sophocles and Aeschylus slightly adjust their attributes and overall significance in their plays. Through the explicit analysis of the function of the chorus, I hope to shed light on the similarities and differences in their duty within the respective plays. Right from the start in Antigone, it is clear that the chorus is composed mainly of male elders [that] represents the point of view of an average section of society, representing the extent of the patriarchal society in which the play is set and Antigone despised. However, it did automatically credit the chorus for the information and words of wisdom passed on because the elders themselves were once warriors and fought in battles in the past however with age they are limited to demonstrating their skills in words. As such, from the start of the play they can be seen to take on the role of advisors to King Creon. Throughout the play, the chorus can be seen responding to Creons actions as seen in line 204 when the Chorus states that No one is such a fool that he is in love with death, explaining to the King that no human would be foolish enough to defy the words of Creon, thus the act of burying must have been the God will. The Chorus is the first to suggest to Creon the religious implications of the dispute in regards to Polyneices and try to moderate between Haemon and Creon, however they are merely ignored and turned away from Creon; it is not only till Creon feels confused and distressed that the Chorus is able to uphold and be taken seriously. As such, the Chorus seems to prefer a cautious, discreet approach to matter, quite in contrast to the individualist, tragic heroism of the main character, Antigone in other words, the chorus has its continuous share in the drama, and has, in one way or another, its contribution to make, due regard being paid to its somewhat indefinite power. Indeed, this approach taken by the Chorus is vital in driving the plot of the play, as In addition, at first glance the chorus in Antigone may be misinterpreted as being fragile and feeble; indeed, it only seem to echo the commands and desires of King Creon, and does not stand up for themselves and take position with the rebellious Antigone. This is not an accident on Sophocles behalf. As observed throughout the play, the purposeful yielding as demonstrated by the chorus further enhances the impression of imperative nature of Creon against Antigone and the rest of the Greek population. From the above, it is clear that the Chorus plays a major role in the overall development of Antigone. Indeed, without the presence of the characteristic catalyst of the Chorus, Creon would never have changed is personality which would have led to the ultimate condemnation and death of Antigone the inevitable tragedy of the heroine. In Aeschylus Agamemnon, the Chorus can be seen to be acting as the narrative pendulum with time, interchanging between the past and present. This is in particular seen in the Parados where the Chorus creates a delaying effect; the storyline heads backwards rather than forwards in time, unlike the Watchmans speech which is substantially set in the present. The chorus in Agamemnon is composed mainly of old men fathers of sons who fought and died at the Battle Troy. The status of having fought in past battles and being able to recall the events bestows them with a form of credibility and ascendancy as old age leaves me fit for bravery only in song, which contracts their physical state physically unable to fight due to age. However, despite this physical disability they remain mentally strong and thus when it comes to advising Agamemnon the Chorus retains their confidence, unlike the Chorus in Antigone. However, quite in contrast, the Chorus in Agamemnon were born to sorrow. Indeed, such feeling of grief originates from the continuous agitation of their king, King Agamemnon. There are numerous reasons for the Chorus sorrow they believe that he has demonstrated disrespect and audacity against the Greek gods, know of the Kings refusal of an offer of alliance from his enemies from Argos and guiltily acknowledge that they themselves suggested adverse thoughts against Agamemnon. From such descriptions one can easily attest and justify the corruption and feebleness of the king. However, the victory in the expedition to Troy acted as a major counterweight against such negative portrayal and can be instead be seen as the agent of Zeus and the leader of a crusade to enforce Zeus justice. With such contradictions, it was inevitable for the chorus to become disarray when allegorizing and illustrating Agamemnon. Indeed, he was, in present, a national hero; his success in Troy has resulted in t he ever-increasing abundance and happiness for the Greek empire, almost as if Zeus himself showed respect to him. However, in his past, the wrongs which he has committed are too severe to be simply disregarded. Thus, the first difference between the role of the chorus appears: in Agamemnon, the chorus seems to, in addition to providing the basic historiography to set the scene, examine the happenings of the past and then make a general statement of the will of the gods as seen in these events in other words, they ponder on throughout the entire play as to whether Agamemnon is a good king or not. In addition, one may argue that their [the Chorus] wisdom seems apparent in their recognition of the justice inherent in the world. Indeed, throughout the novel Aeschylus purposely sets out the scenario such that an act of justice just further adds and enhances the injustice already present, where the narration and interpretation of such events affects the audience, urging them to consider the ethical conflict, engaging them into emotional involvement of the play. Aeschylus uses the Chorus to repeat several key words to help emphasize certain points to reveal the poets intent. As seen through the repetition of Zeus and telos two words which Clytamnestra continuously repeats in her prayers the theme of justice is integrated in the play. This adds to the tension, as to whether the ruling and authority of King Creon overrules that of the Gods. In comparison to Antigone, the Parados in Agamemnon is very long, but Aeschylus makes it vivid by using symbolism, similes and descriptive imagery. He divides the ode into chronological sections to help the audience focus on the narrative of the play, from the setting of the play, especially the abduction of Helen and the anger of the Gods to omens and sacrifice of Iphigenia. In varying the pace and rhythm of these sections Aeschylus highlights the choruss tone and their reaction to certain events; for example the metaphorical abduction of Helen and Zeuss anger over the betrayal of Menelaus hospitality. In conclusion, it is apprehensible that the role of the chorus in Antigone and Agamemnon share some similarities; they play crucial roles in enlightening the audience with the necessary background information thus setting the scene, and also developing the plot of the texts. Furthermore the Chorus in both texts reflects on many important aspects of Greek life Gods, omens, prophecies, sacrifices and justice this legal imagery is important in the play because it relates to Greek society. However, their roles differ in the two plays in such way that whilst in Antigone the chorus cowers from the King which in effect amplifies the tyrannical image of Creon and thus stirs up the audience sympathy with Antigone, whilst in Agamemnon the Chorus seem to analyze the good and bad of Agamemnon and provoke the audience to determine as to whether he is an honourable king.

Friday, October 25, 2019

Indigenous and Global Feminist Perspectives on the Women of Chiapas Ess

Indigenous and Global Feminist Perspectives on the Women of Chiapas Women's reproductive health is a debated and complex issue in today's society. Nowhere is its severity more prevalent than in areas of extreme poverty such as south and Central America. The resolution to these problems is far from simple. Yet, women are increasingly taking control of their lives and forming groups to combat many of the prejudices that hold them back. However highly debated some tactics for resolution may be it is hard to miss the shear urgency with which the issues of women's rights and health call us. The fight for gender equality cannot overlook the importance of equality in health care and control over one's own body. Women's health is an issue that passes along its concerns to another generation every time a child is born. Before being able to discuss women's issues in third world countries, it was important to find an area of study. For this, I chose Chiapas, Mexico. Chiapas is a place where the true effects of capitalism are felt on a daily basis. Upon the signing of the North American Free Trade Agreement (NAFTA), the lives of the indigenous people living in Chiapas changed dramatically. Acorrding to Jeeni Criscenzo, author of Some Personal Observations on the Reasons Behind the Events in Chiapas, "(Mexican leaders) entered into trade agreements with foreign interests (NAFTA) that at US insistence, made changes to their constitution that effectively ended Indian communal land right making it possible for Foreign corporations to take Indian land and resources" (Criscenzo 2). But why did our government, and that of Mexico allow this to happen? Ms. Criscenzo answers that question with the following statement, "In the world of internati... .... (1999): 1-12 "Men's Involvement in Women's Reproductive Health Projects and Programmes in the Philippines: part 1 of 2." Reproductive Health Matters 7. 14. (1999): 1-9 Nazar-Beutelspacher. "Education and Nonuse of Contraceptives Among Poor Women in Chiapas Mexico (Part one)." International Family Planning Perspectives 25. 3. (1999): 1-7 Nazar-Beutelspacher. "Education and Nonuse of Contraceptives Among Poor Women in Chiapas Mexico (Part two)." International Family Planning Perspectives 25. 3. (1999):1-6 "Report from San Cristobal." (1998): 4-9. Online. Internet. 3/28/00 http://www/criscenzo.com/jaguar/report.html Shadows of Tender Fury. Bardacke and LÃ ³pez. New York: Montly Review Press, 1995. 161 "Some Personal Observations on the Reasons Behind the Events in Chiapas." (1998):5. Online. Internet. 3/28/00. http://www.criscenzo.com/jaguar/report.html

Thursday, October 24, 2019

Credit Appraisal Process of Sbi

APJEM Arth  Prabhand:  A  Journal  of  Economics  and  Management  Ã‚  Ã‚   Vol. 2  Issue  1,  January  2013,  ISSN  2278? 0629 CREDIT APPRAISAL PROCESS OF SBI: A CASE STUDY OF BRANCH OF SBI IN HISAR NANCY ARORA*; DR. ARTI GAUR**; MS. BABITA*** *Student, Department of Business Administration, CDLU, Sirsa. **Assistant  Professor, Department of Business Administration, CDLU, Sirsa. **Teaching Associate, Department of Business Administration, CDLU, Sirsa. ABSTRACT Credit risk is a risk related to non repayment of the credit obtained by the customer of a bank. Thus it is necessary to appraise the credibility of the customer in order to mitigate the credit risk.Proper evaluation of the customer is performed this measures the financial condition and the ability of the customer to repay back the loan in future. Credit Appraisal is a process to ascertain the risks associated with the extension of the credit facility. It is generally carried by the financial inst itutions which are involved in providing financial funding to its customers. In this paper, we study the Credit Risk Assessment Model of SBI Bank and to check the commercial, financial & technical viability of the project proposed & its funding pattern.Also to observe the movements to reduce various risk parameters which are broadly categorized into financial risk, business risk, industrial risk and management risk. The scope of the paper is restricted to branch of SBI in Hisar. Pinnacle  Research  Journals  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  10     Ã‚  Ã‚  Ã‚  Ã‚  http://www. pinnaclejournals. com  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   KEYWORDS: Credit Risk Assessment Model, Credit Appraisal, Technical Viability. _____________________________________________________________________________ INTRODUCTION Credit appraisal means an investigation/assessment done by the bank prior before providing any loans & advances/project finance & also checks the commercial, financial & technical viability of the project proposed its funding pattern & further checks the primary & collateral security cover available for recovery of such funds. Credit Appraisal is a process to ascertain the risks associated with the extension of the credit facility. It is generally carried by the financial institutions which are involved in providing financial funding to its customers.BASIC TYPES OF CREDIT There are four basic types of credit. By understanding how each works, you will be able to get the most for your money and avoid paying unnecessary charges. APJEM Arth  Prabhand:  A  Journal  of  Economics  and  Management  Ã‚  Ã‚   Vol. 2  Issue  1,  January  2013,  ISSN  2278? 0629 1. Service credit is monthly payments for utilities such as telephone, gas, electricity, and water. You often have to pay a deposit, and you may pay a late charge if your payment is not on time. 2. Loans let you borrow cash. Loans can be for small or large amounts and for a few days or several years.Money can be repaid in one lump sum or in several regular payments until the amount you borrowed and the finance charges are paid in full. Loans can be secured or unsecured. 3. Installment credit may be described as buying on time, financing through the store or the easy payment plan. The borrower takes the goods home in exchange for a promise to pay later. Cars, major appliances, and furniture are often purchased this way. You usually sign a contract, make a down payment, and agree to pay the balance with a specified number of equal payments called installments. The finance charges are included in the payments.The item yo u purchase may be used as security for the loan. 4. Credit cards are issued by individual retail stores, banks, or businesses. Using a credit card can be the equivalent of an interest-free loan–if you pay for the use of it in full at the end of each month. CREDIT APPRAISAL PROCESS Receipt of application from applicant | Receipt of documents (Balance sheet, KYC papers, Different govt. registration no. , MOA, AOA, and Properties documents) | Pre-sanction visit by bank officers | Check for RBI defaulters list, willful defaulters list, CIBIL data, ECGC caution list, etc. Title clearance reports of the properties to be obtained from empanelled advocates | Valuation reports of the properties to be obtained from empanelled valuer/engineers | Preparation of financial data | Proposal preparation | Assessment of proposal | Sanction/approval of proposal by appropriate sanctioning authority | Documentations, agreements, mortgages | Disbursement of loan Pinnacle  Research  Journals  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  11     Ã‚  Ã‚  Ã‚  Ã‚  http://www. pinnaclejournals. com APJEM Arth  Prabhand:  A  Journal  of  Economics  and  Management  Ã‚  Ã‚   Vol. 2  Issue  1,  January  2013,  ISSN  2278? 0629 Post sanction activities such as receiving stock statements, review of accounts, renew of accounts, etc (On regular basis) REVIEW OF LITERATURE Uwe (2005)13 analysed and further development of the building blocks of modern credit risk management: Definitions of default; Estimation of default probabilities; Exposures; Recovery Rates; Pricing; Concepts of portfolio dependence; Time horizons for risk calculations; Quantification of portfolio risk; Estimation of risk measures; Portfolio analysis and portfolio improvement; Evaluation and comparison of credit risk models; Analytic portfolio loss distributions.Christian (2006)15 focused on the changing intensity of three policies that are commonly associa ted with financial repression, namely interest rate controls, statutory preemption and directed credit as well as the effects these policies had. The main findings are that the degree of financial repression has steadily increased between 1960 and 1980, and then declined somewhat before rising to a new peak at the end of the 1980s. Since the start of the overall economic reforms in 1991, the level of financial repression has steadily declined.Despite the high degree of financial repression, no statistically significant negative effects on savings, capital formation and financial development could be established which is contrary to the predictions of the financial liberalization hypothesis. Arnoud and Anjan (2007)17 study appear as the lead chapter in a readings book on corporate finance, financial intermediation and market micro structure. The unifying theme in the book is optimal design, and various chapters deal with the design of contracts, securities, institutions, market mecha nisms, and regulation from an information-theoretic perspective.Each chapter in the book is an original review article that seeks to synthesize the literature in a given area. Six topics are covered: design of contracts and securities; market microstructure; credit market implications of bank size, scope and structure; bank regulation; and finally the interaction between interbank competition, regulation and banking stability. Gary (2009)28 examined that the ‘shadow banking system' at the heart of the current credit crisis is, in fact, a real banking system – and is vulnerable to a banking panic.Indeed, the events starting in August 2007 are a banking panic. A banking panic is a systemic event because the banking system cannot honor its obligations and is insolvent. Unlike the historical banking panics of the 19th and early 20th centuries, the current banking panic is a wholesale panic, not a retail panic. In the earlier episodes, depositors ran to their banks and deman ded cash in exchange for their checking accounts. Unable to meet those demands, the banking system became insolvent.The current panic involved financial firms ‘running' on other financial firms by not renewing sale and repurchase agreements (repo) or increasing the repo margin (‘haircut'), forcing massive leveraging, and resulting in the banking system being insolvent. RESEARCH METHODOLOGY The present paper is a case study which is restricted to branch of SBI in Hisar. The objective of research paper is to study the Credit Risk Assessment Model of SBI Bank and to check the commercial, financial & technical viability of the project proposed & its funding pattern. To observe the movements to reduce various risk parameters which are broadly categorized intoPinnacle  Research  Journals  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  12 http://www. pinnaclejournals. com APJEM Arth  Prabhand:  A  Journal  of  Economics  and  Managem ent  Ã‚  Ã‚   Vol. 2  Issue  1,  January  2013,  ISSN  2278? 0629 financial risk, business risk, industrial risk & management risk. For the purpose, the secondary data is collected through the Books & magazines, Database at SBI, Websites, E-circulars of SBI. DATA ANALYSIS A) CREDIT RISK ASSESSMENT & APPRAISAL PROCESS OF SBI CREDIT RISK ASSESSMENT RISK: Risk is inability or unwillingness of borrower-customer or counter-party to meet their repayment obligations/ honor their commitments, as per the stipulated terms.LENDER’ TASK †¢ †¢ Identify the risk factors, and Mitigate the risk RISK ARISE IN CREDIT: In the business world, Risk arises out of †¢ †¢ †¢ †¢ Deficiencies / lapses on the part of the management (Internal factor) Uncertainties in the business environment (External factor) Uncertainties in the industrial environment (External factor) Weakness in the financial position (Internal factor) TO PUT IN ANOTHER WAY, SUCCESS FACTORS BEHIND A BUSINESS ARE   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Pinnacle  Research  Journals  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  13     Ã‚  Ã‚  Ã‚  Ã‚  http://www. pinnaclejournals. om  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   †¢ †¢ †¢ †¢ Managerial ability Favorable business environment Favorable industrial environment Adequate financial strength CREDIT & RISK †¢ †¢ †¢ Go hand in hand. They are like twin brothers. They can be compared to two sides of the same coin. APJEM Arth  Prabhand:  A  Journal  of  Economics  and  Management  Ã‚  Ã‚   Vol. 2  Issue  1,  January  2013,  ISSN  2278? 0629 †¢ All credit proposals have some inherent risks, excepting the almost negligible volume of lending against liquid collaterals with adequate margin.LENDING DESPITE RISKS †¢ †¢ †¢ †¢ So, risk should not deter a Banker from lending. A banker’s task is to identify/ assess the risk factors/ parameters & manage / mitigate them on a continuous basis. But it’s always prudent to have some idea about the degree of risk associated with any credit proposal. The banker has to take a calculated risk, based on risk-absorption/ risk-hedging capacity & risk-mitigation techniques of the Bank. CREDIT RISK ASSESSMENT (CRA) – MINIMUM SCORES / HURDLE RATES 1.The CRA models adopted by the Bank take into account all possible factors which go into appraising the risks associated with a loan. These have been categorized broadly into financial, business, industrial & management risks and are rated separately. To arrive at the overall risk rat ing, the factors duly weighted are aggregated & calibrated to arrive at a single point indicator of risk associated with the credit decision. 2. FINANCIAL PARAMETERS: The assessment of financial risk involves appraisal of the financial strength of the borrower based on performance & financial indicators.The overall financial risk is assessed in terms of static ratios, future prospects & risk mitigation (collateral security / financial standing). Pinnacle  Research  Journals  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  14     Ã‚  Ã‚  Ã‚  Ã‚  http://www. pinnaclejournals. com 3. INDUSTRY PARAMETERS: The following characteristics of an industry which pose varying degrees of risk are built into Bank’s CRA model: †¢ †¢ †¢ †¢ Competition Industry outlook Regulatory risk Contemporary issues like WTO etc. 4. MANAGEMENT PARAMETERS: The management of an enterprise / group is rated on the following parameters: †¢ Integrity ( corporate governance) †¢ Track recordAPJEM Arth  Prabhand:  A  Journal  of  Economics  and  Management  Ã‚  Ã‚   Vol. 2  Issue  1,  January  2013,  ISSN  2278? 0629 †¢ Managerial competence / commitment †¢ Expertise †¢ Structure & systems †¢ Experience in the industry †¢ Credibility : ability to meet sales projections †¢ Credibility : ability to meet profit (PAT) projections †¢ Payment record †¢ Strategic initiatives †¢ Length of relationship with the Bank 5. The risk parameters as mentioned above are individually scored to arrive at an aggregate score of 100 (subject to qualitative factors – negative parameters).The overall score thus obtained (out of a max. of 100) is rated on a 8 point scale from SB1/SBTL1 to SB 8 /SBTL8. SALIENT FEATURES OF CRA MODELS (A) TYPE OF MODELS S. No. (i) (ii) Exposure Level (FB + NFB Limits ) Over Rs. 5. 00 crore Rs 0. 25 crore to Rs. 5. 00 crore Non – Trading S ector (C&I , SSI , AGL) Regular Model Simplified Model Trading Sector ( Trade & Services) Regular Model Simplified Model Pinnacle  Research  Journals  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  15     Ã‚  Ã‚  Ã‚  Ã‚  http://www. pinnaclejournals. com

Wednesday, October 23, 2019

The Shawnee Tribe

The Shawnee Tribe Did you know that the Shawnee Indian tribe is a fascinating tribe? I recently have learned that they are nomads. Nomads are people who travel instead of settling in one place. Southern Ohio, West Virginia, and western Pennsylvania were a couple of states they once lived in. Until around 1660 Iroquois drove out the tribe to southern Carolina, Tennessee’s Cumberland basin, eastern Pennsylvania, and southern Illinois. They had tried to return, but again they were forced to leave by American settlers.The settlers pushed them first to Missouri and then to Kansas, but the Shawnee people settled in Oklahoma after the Civil War. The Shawnee survived using various methods of hunting and gathering. Both men and women had responsibilities in providing food. They hunted many animals including deer, squirrel, turkey, raccoon, bear, muskrat, rabbit, and ducks/geese. They set traps for the animals, and they disguised themselves to blend in with their surroundings to get clo se enough to club or shoot them. People never wasted anything; they used all the different parts for different things.In January and February they hunted beaver for their pelts and meat to trade with the settlers. In the summer time they, and during fall, groups of men and women would leave the village and hunt. Small temporary lodges were used. Another way to get food was to plant or gather it. They planted beans, squash, corn, pumpkins, and melons but corn was their main food. They gathered wild berries, nuts, maple, roots, and wild honey. In the springtime women planted crops and summer through fall they gathered wild plants and fruits.Tapping maple trees for sap was another thing they did. Raiding beehives was also popular to get honey. The women were mostly responsible for planting, harvesting, and taking care of crops. Roles for people are very important because the people would know what their job was and what other’s jobs were. Men were very important because they mos tly hunted, carved wood into ladles, bowls, and spoons, were in charge of politics and war, and were warriors. Women had many roles, but some were harder than others. They built homes and fires, dressed the game, cooked, lanted crops, scraped skins and tanned hides, made clothing, wove blankets, and made vessels of clay. They also served as advisors of peace and war. They managed all farming activities and ceremonies in the village. Both men and women took part in storytelling, artwork, music, and traditional medicine. Young girls learned from their mothers how to gather wild foods, plant crops, care for children and perform household duties. Boys were taught to hunt and fight from their fathers. At age nine, boys began special training and self-discipline. Parents were strict, and the children were seldom punished.They were expected to be the judge of their own behavior. However, the parents expected high standards of behavior and responsibility. Special jobs of the Shawnee tribe i ncluded being a chief. Chiefs would handle problems and activities, good or bad and also dealt with problems that could not be resolved by individuals or families. War chiefs protected the tribe from enemy attack and decided when to go to war. They had to prove themselves in battle as leaders and warriors. Chiefs inherited their positions as peace, clan, or war chiefs. Peace chiefs could also call-off a war.The Thawikila and Chalaakaatha divisions were in charge of governing the people and chiefs came from one of the two divisions. Membership for one of the five divisions was inherited by the father’s side. Clothing of the Shawnee was homemade and you had to make your own clothes in order to stay warm. Deerskin clothing was what most Shawnee people wore. During the winter, men and women added loose shirts and leggings and would also wrap themselves in buffalo robes or fur cloaks made of bear or moose skins. Decorations were important to the tribe. They dyed clothing, porcupin e quills; and feathers and points were also used.Men wore headdresses made of animal fur and decorated them with feathers from a bird of prey such as an eagle, hawk, or owl. Men mostly wore shirts and leggings and women wore shirts with leggings or dresses. After contact with the European traders, the Shawnee began to own glass beads which they used on their clothing. Jewelry included silver pins, necklaces, and bracelets for women. Men liked to wear silver nose rings and earrings. Dances, music, and ceremonies were all important to the Shawnee tribe. Spring held a dance named â€Å"Spring Bread Dance† in which they prayed for plentiful crops.In the summer they held the â€Å"Green Corn Dance† in celebration for the growing of corn. Fall held the â€Å"Fall Bread Dance† where they prayed that game would be plentiful also and gave thanks for the harvest. Musical instruments included skin drums, gourd rattles, deer-hoofed rattles and sometimes reed flutes. Many di fferent tools were used by the Shawnee and they needed them to survive. They used hammers made of stone or other hard substance, some had handles and some did not. Knives and saws were made of shells, stone, or other materials. Borers were natural tools used for making holes in soft or hard objects.An axe was another tool made of shells, iron, or copper. The blade could easily turn at a right angle. It was held with your hands or attached in various ways to a handle by a rawhide. Some other weapons are bows and arrows, stone tomahawks, spears, and chipped flint arrow points. Homes and shelters were another item that was needed by the Shawnee. The home they lived in was called a wegiwa which were tree poles covered by bark or animal skin. The frame of the house was made of sapling tied together and covered with bark from elm or birch trees.When bark was not available animal skin was used. There were no windows and there was only one opening in one end for a door and a hole in the mid dle of the roof for the smoke from the cooking fire. In a pit in the middle of the floor is where they burned the fire. Inside walls were lined with raised wooden platforms that were used as beds. Homes were sometimes furnished with shelves, benches, and tables. The Shawnee’s way of life came to an end by splitting into small bands and moving away from others. The Shawnee had many wars with American settlers over land rights.One Native American named Tecumseh, who was an excellent communicator and military strategist, was admired greatly by the Shawnee. They followed his every command. During the Battle of Thames in 1813, Tecumseh was shot and killed. With his death the Shawnee people lost their spirit to fight. They then scattered and drifted in small bands into Missouri, Kansas, Arkansas, Oklahoma, and Texas. Some remained in Ohio. Between 1825 and 1900 the United States Government took more land rights away through various treaties. This led to more movement and most Shawn ee became part of a non-native society.The Shawnee tribe is so interesting and amazing. Shawnee people believe in one female God, Our Grandmother, and she created the earth and made people. When people grew old she scooped them up in nets and brought them to the sky. Also, the most sacred spirits to the Shawnee were Tobacco, Fire, Water, and Eagle. Daniel Boone was one of the most famous prisoners taken in war and was held for several months. During that time he made friends with them and participated in their games. When he went back to the settlers he realized that the Shawnee tribe was a friendly tribe.Another interesting fact about the Shawnee is that parents would plunge their babies into snow or freezing cold water every day for several months because they wanted to make their children tougher. The Shawnee tribe was fun to study and I learned a lot about their way of life and history. BIBLIOGRAPHY Bial, Raymond. The Shawnee. Tarrytown, New York. Benchmark Books, 2004. Flanagan , Alice K. The Shawnee. Canada. Children’s Press, 1998. Mattern, Joanne. The Shawnee Indians. Manakato, Minnesota. Bridgestone Books, 2001. Yacowitz, Caryn. Shawnee Indians. Chicago, Illinois. Heinemann Library, 2003. Additional research includes many websites

Tuesday, October 22, 2019

Free Essays on Music Critique

The first piece I heard was called â€Å"Sati† which literally means: mindfulness, attention, recall, wisdom, to reference to speed agility. It was written by Dana Wilson in 1983 and was performed by four instrumentalists. This was a twentieth century piece. There were three membranophones, one aerophone, two chordophones, and seven idiophones. The membranophones were the bass drum, tom toms, and congas. The aerophone was the alto saxophone which carried the melody throughout most of the piece. The chordophones were the electric cello, and the upright piano which was only used once for one or two phrases. The idiophones were the bells, two marimbas, a crash cymbal, a china symbol, a gong, and chimes. The timbre of the piece was very eerie and suspenseful. â€Å"Sati† was written in additive meter. Throughout the piece there were many crescendos and decrescendos ranging from pp to fff. There were many tempo changes as well with ranged from the original tempo o f largo to the climactic presto tempo and back to the largo tempo in the end of the piece. The alto saxophone starts off, very high in its register, and the cello and percussion then follow with accompaniment. Once in the piece the cello gets the melody, then the cello and saxophone play a homophonic melody together. When this concludes, there is a keyboard percussion solo. Following the solo, the saxophone comes back in with the melody. The piece concludes itself with a decrescendo into a single sustained monophonic note. The next piece was from the piece entitled â€Å"Partita,† written by William H. Bates in 1943. Mr. Bates himself was playing the piece unaccompanied. â€Å"Partita† was originally composed of seven pieces, but only five of them were played. The pipe organ, aerophone, was the only instrument used. The first movement was hard to describe only that there was little dynamic change with only one part with a distinguishable crescendo and decrescendo... Free Essays on Music Critique Free Essays on Music Critique The first piece I heard was called â€Å"Sati† which literally means: mindfulness, attention, recall, wisdom, to reference to speed agility. It was written by Dana Wilson in 1983 and was performed by four instrumentalists. This was a twentieth century piece. There were three membranophones, one aerophone, two chordophones, and seven idiophones. The membranophones were the bass drum, tom toms, and congas. The aerophone was the alto saxophone which carried the melody throughout most of the piece. The chordophones were the electric cello, and the upright piano which was only used once for one or two phrases. The idiophones were the bells, two marimbas, a crash cymbal, a china symbol, a gong, and chimes. The timbre of the piece was very eerie and suspenseful. â€Å"Sati† was written in additive meter. Throughout the piece there were many crescendos and decrescendos ranging from pp to fff. There were many tempo changes as well with ranged from the original tempo o f largo to the climactic presto tempo and back to the largo tempo in the end of the piece. The alto saxophone starts off, very high in its register, and the cello and percussion then follow with accompaniment. Once in the piece the cello gets the melody, then the cello and saxophone play a homophonic melody together. When this concludes, there is a keyboard percussion solo. Following the solo, the saxophone comes back in with the melody. The piece concludes itself with a decrescendo into a single sustained monophonic note. The next piece was from the piece entitled â€Å"Partita,† written by William H. Bates in 1943. Mr. Bates himself was playing the piece unaccompanied. â€Å"Partita† was originally composed of seven pieces, but only five of them were played. The pipe organ, aerophone, was the only instrument used. The first movement was hard to describe only that there was little dynamic change with only one part with a distinguishable crescendo and decrescendo...

Monday, October 21, 2019

How to Avoid Burying the Lede of Your News Story

How to Avoid Burying the Lede of Your News Story Every semester I give students a news writing exercise from my book about a doctor who is giving a speech about fad diets and physical fitness to a group of local businesspeople. Midway through his speech, the good doctor collapses of a heart attack. He dies en route to the hospital. The news of the story may seem obvious, but a few of my students will invariably write a lede that goes something like this: Dr. Wiley Perkins gave a speech to a group of businesspeople yesterday about the problems with fad diets. Whats the problem? The writer has left the most important and newsworthy aspect of the story - the fact that the doctor died of a heart attack - out of the lede. Typically the student who does this will put the heart attack somewhere near the end of the story. Thats called burying the lede, and its something that beginning journalists have done for eons. Its something that drives editors absolutely nuts. So how can you avoid burying the lede of your next news story? Here are some tips: Think about whats most important and newsworthy: When you cover an event, think about what part of it, whether its a press conference, lecture, legislative hearing or city council meeting, is likely to be the most newsworthy. What happened that will affect the greatest number of your readers? Chances are thats what should be in the lede.Think about what you find most interesting: If youre hard-pressed to figure out whats most newsworthy, think about what YOU found most interesting. Experienced reporters know that all people are basically the same, meaning we generally find the same things interesting. (Example: Who doesnt slow down to gawk at a car wreck on the highway?) If you find something interesting, chances are your readers will as well, meaning it should be in your lede.Forget chronology: Too many beginning reporters write about events in the order in which they occurred. So if theyre covering a school board meeting, theyll start their story with the fact that the board began by reciting the pledge of allegiance. But no one cares about that; people reading your story want to know what the board did. So dont worry about the order of events; put the most newsworthy parts of the meeting at the top of your story, even if they occurred midway through or at the end. Focus on actions: If youre covering a meeting, such as a city council or school board hearing, youre going to hear lots of talks. Thats what elected officials do. But think about what actions were taken during the meeting. What concrete resolutions or measures were passed that will affect your readers? Remember the old saying: Actions speak louder than words. And in a news story, actions generally should go in the lede.Remember the inverted pyramid: The inverted pyramid, the format for news stories, represents the idea that the heaviest, or most important, news in a story goes at the very top, while the most lightweight, or least important news, goes at the bottom. Apply that to the event youre covering and itll probably help you find your lede.Look for the unexpected: Remember that news by its very nature is usually the unexpected occurrence, the deviation from the norm. (Example: Its not news if a plane lands safely at the airport, but its definitely news if it crashes on the tarma c.) So apply that to the event youre covering. Did anything happen that those present didnt expect or plan on? What came as a surprise or even a shock? Chances are, if something out of the ordinary happened, it should be in your lede. Like when a doctor has a heart attack in the middle of a speech.

Sunday, October 20, 2019

3 Sentences with Flawed Parallel Construction

3 Sentences with Flawed Parallel Construction 3 Sentences with Flawed Parallel Construction 3 Sentences with Flawed Parallel Construction By Mark Nichol In each of the following sentences, an attempt to make a list within a sentence has gone awry. Discussion after each example explains the problem, and one or two revisions suggest solutions. 1. We have specific plans about what we are going to do, how and when. This sentence implies a list consisting of â€Å"what we are going to do, how we are going to do them, and when we are going to do them,† but it elides one word too many: â€Å"We have specific plans about what we are going to do, and how and when.† 2. He holds various roles, from celebrated guest, martial arts envoy, unofficial chargà © d’affaires, and even close confidant. If what appears to be a list of associated nouns or noun phrases is preceded by from, it is not a list, but a range that includes one or more intermediate parameters, so from should be complemented by to, and the sentence must be further revised so that parameters are connected with conjunctions, thereby combining to be clearly associated with either to or from: â€Å"He holds various roles, from celebrated guest to martial arts envoy and unofficial chargà © d’affaires, and even close confidant. Alternatively, revise the sentence slightly to avoid the range construction altogether: â€Å"He holds various roles, including celebrated guest, martial arts envoy, unofficial chargà © d’affaires, and even close confidant.† 3. The company has embarked on the initiative with the objectives of process improvement, increased automation, compliance with internal and public company requirements, and to support future growth. The grammatical structure of the final list item is inconsistent with those preceding it- it alone includes an infinitive phrase (â€Å"to support†)- so revise it to match the others by shifting support from a verb to a noun: â€Å"The company has embarked on the initiative with the objectives of process improvement, increased automation, compliance with internal and public company requirements, and support of future growth.† Alternatively, convert the third item to a final item by inserting a conjunction before it, then make what was the final item a distinct phrase by inserting an of before it to make it parallel with the list (which is preceded by of) and changing the form of the verb: â€Å"The company has embarked on the initiative with the objectives of process improvement, increased automation, and compliance with internal and public company requirements and of supporting future growth.† Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:50 Incorrect Pronunciations That You Should AvoidHomonyms, Homophones, Homographs and HeteronymsPunctuation Is Powerful

Saturday, October 19, 2019

Analyzing Arguments Essay Example | Topics and Well Written Essays - 250 words

Analyzing Arguments - Essay Example As such students dont necessarily take critical thinking. Based on this reasoning I believe the argument is invalid This is an example of a deductive argument because it products a â€Å"right or wrong answer. The logic is sound in this example insofar as all the premises seem to be true (Or at least seem to be true). Although I would make the argument that there is a degree of a non sequitur. The reasoning behind this is that although supposedly â€Å"All college students study† one could argue that this is not true and it is for this reason that many college students are expelled. So based on this premise and information provided in chapter ten of our book the argument is invalid. This again is an example of deductive reasoning because it does not pull on some degree of probability. However there is a problem with all of the assumptions in that one could argue that all college students do not necessarily attend class (For example distance education students). In the second premise, although it is the case that John attends class he does not necessarily attend college class. Based on these premises being weak I believe that the conclusion is weak and as such the argument is valid but very weak. Chaffee, J. (2009) Thinking Critically, 9th Edition. City University of New York. Chapter 10 & 11 online reading resources available at http://college.cengage.com/english/chaffee/thinking_critically/9e/chapters/chapter10.htm and http://college.cengage.com/english/chaffee/thinking_critically/9e/chapters/chapter11.html Accessed on August 13th

Friday, October 18, 2019

Finance and Accounting for MacLeish Nurseries Essay - 9

Finance and Accounting for MacLeish Nurseries - Essay Example By decreasing the selling price, MacLeish will be in a position to increase the number of profits that it would report in the financial statements hence increase their ability to increase the amounts of their loans and be in a position to make the repayments. I, therefore, recommend that MacLeish increase their investment on advertisement and lower their prices to benefit from the elastic demand nature of their products. Bedford property management just like any other company must undertake variance analysis as a way of managing their costs and ensuring efficiency. In the calculation below, it is evident that the company has recorded adverse variance in all areas and the management must, therefore, move with speed to control to take corrective actions. In the case of labor cost variance, Ms. Kim should ensure that close supervision is conducted to eradicate the inefficiency. At the same time, Kim has to reduce the rate per hour rewarded to the workers. The variances with regard to the number of respondents must also be corrected to increase the turnover. Management has to increase their marketing strategies to ensure the number of customers served increase to remove the adverse variance. The rates charged to the clients should also be as per the standards to eliminate the rate variance. Finally, the management has to control their overhead costs by reducing the expenses like rent, maintenance, and insurance to eliminate over expenditure. In conclusion, variance analysis should be carefully done to ensure profitability and success.

Technology Essay Example | Topics and Well Written Essays - 1250 words

Technology - Essay Example Ideas such as the "bigger is better" now became meaningless. And this transform paved the way for the development of smaller, faster and more reliable machines. In its initial stages, the computer was distant from the American public. Most of the American thought that computers were a sort of alien systems for which they had no use in daily life. Computer developers tried to change that idea by making their systems smaller and easy to find. As a result of this approach, computer technology became well attached to the roots of the American lifestyle by the early eighties of the 21st century. Computers were now sufficiently developed and available to satisfy customer's requirements. Ideas for computer applications were also developed and introduced new banking, entertainment and shopping practices. The development of the integrated circuit in the early 1960's made possible the design and construction of affordable computers that were very accurate and were also small enough to be deployed in an office or a classroom. The video display terminal and the multi-tasking abilities of those new computers made them a popular choice. As a result, ATM machines were introduced for the first time. The early ATM machines were not dependent on a centralized computer network; however, their popularity was on the rise. By the early 1980's, the ATM security was increased, and the machine became a public necessity in the United States. The ATM machine began to appear in different shops and stores. And by the mid eighties, 40 percent of the customers completed about 50 percent of their banking transactions using ATMs. The video game development serves as the best example of how the American entertainment routine was transformed. Steve Russell's "space war" was the first such game developed in 1962. At that time, Russell was MIT graduate student. In his game, a spacecraft was represented by two dots. The dots were controlled by two separate switches. This game became very popular all over the United States, especially among students, and it makes the beginning of the video game industry. In early 1968, "Odyssey", the first home video game system was introduced by Ralph Baer. Crude graphic lines were created by deploying 40 diodes in the system. In 1972, The Odyssey system appeared in the market and thus opened the way for competition in the field. In the same year, Nolan Bushnell announced the foundation of Atari that created the first commercially flourishing coin-based "pong". This was a simple ping-pong video game where large number scores are possible. It was first displayed in California at a club in Sunnyvale. The public was amazed. In 1977, Atari decided to enter the video entertainment market after pong's astonishing success. Their experience was not initially successful, however, the VCS or video computer system designed by Atari sold about 15 million units and thus Atari was now one of the building blocks of the American home entertainment industry. In addition to the home systems, other public consoles were designed by the company and by early 1980's over a million such systems were spread over the entire country. The American lifestyle and video games were now integrated. Computer technology also transformed the music industry. Robert Moog, a Cornell University PhD student, created the first

Scholarship Registration and give back to society Essay

Scholarship Registration and give back to society - Essay Example In fact by being developing my competencies, I will be furthering my goal of leaving my legacy to this world by giving my best in the tasks that I will be handling. Being a student of business management, I believe that I will be contributing most of my knowledge and skills in the business organization which I will be joining. Since my inclination is in leading and directing the organization in the attainment of its goal, I know that I will be a great catalyst who can influence not just the company but all its stakeholders. In its internal operation, I will use the skills and knowledge I'd acquire to maximize the efficiency of company and minimizing wastage of resources. Through this, the whole society will be benefited as the excess resources will be allocated to more efficient means. I will also lead in the creation of products which are more helpful to consumers through quality improvements. It is also my devotion to motivate workers, emphasize their value to the company, and ensu re the best working conditions for them.

Thursday, October 17, 2019

Needs Assessment for Quality Improvement Assignment

Needs Assessment for Quality Improvement - Assignment Example However, school board's authority is limited to official meetings. Before discussing the quality and need for improving it in Tulsa Public School District, it is important to see its significant strategic plan factors. "We will provide quality learning experiences for every student, every day, without exception with the essential skills needed for academic growth, lifelong learning and personal character." (Official Website) Vision of this school system is very simple and clear. "The District of Choice, by providing quality education through high expectations for ALL"; this clearly shows that the top level management of this organization strives hard and makes policies which may make this school as everyone's only choice in the coming future. School makes appropriate policies to achieve its above stated vision for the future in order to gain a distinct advantage over its competitive forces. Each school community will demonstrate exceptional parent/guardian involvement and support through 100% membership in its parent/guardian association, and the District will triple its Partner-In-Education agreement with community, businesses, institutions, organizations and agencies. For Tulsa Public School District, values govern th... Each school will have 100% membership in its parent/guardian association, and the district will have 1,350 Partners-In-Education agreements. Each school community will demonstrate exceptional parent/guardian involvement and support through 100% membership in its parent/guardian association, and the District will triple its Partner-In-Education agreement with community, businesses, institutions, organizations and agencies. All employees will be highly qualified and choose to work for TPS. All employees will be highly qualified in their positions and CHOOSE to remain with Tulsa Public Schools. TPS will win the Malcolm Baldrige National Quality Award. These above stated goals have been defined by the top level management i.e. board members of the school system to successfully address their vision of 2010. Strategic Objectives: Build a connected learning community& broaden productive partnerships, services, & student outreach in order to meet the needs of existing & incoming students Integrate key learning programs across curriculum Empower & affirm staff as they provide dedicated service & enhance teaching & learning opportunities for the 21st century student Maintain & deploy quality management system, campus upgrades, safety requirements & aligned structure Develop new or expanded funding opportunities, including endowments, in order to meet fiscal responsibilities and budget goals Values: For Tulsa Public School District, values govern the function of its dealing and its demeanor or associations with Oklahoma's society at great level, internal and external customers, employees, local community and other stakeholders. Management by Fact: "within a

Wednesday, October 16, 2019

Collaboration Technologies Essay Example | Topics and Well Written Essays - 500 words

Collaboration Technologies - Essay Example Groupware minimises interference by technology while maximising interaction among several persons. Laudon and Laudon (2007, p. 287) indicates that groupware provides the required capabilities for collaborative work and communication across an enterprise of between persons and groups. It is used to write and comment on group projects, share important ideas and documents, conducting meetings electronically, tracking projects, scheduling activities and sending e-mails. WordiQ,com (2010) indicates that there are three levels of collaboration and by so doing makes collaboration technologies synonymous with groupware. The three levels of groupware which are dependent on the level of collaboration are communication tools, conferencing tools and collaborative management tools. Electronic communication tools transmit messages, files, data and documents between persons in order to facilitate information sharing. These tools include: email, web publishing and voice mail. Electronic conferencing tools facilitate interaction between persons in the transmission of information. These tools include video conferencing systems, voice conferencing, video conferencing, discussion forums, chat rooms and electronic meeting systems. Collaborative management tools both facilitate as well as manage group activities. They include project management systems workflow systems, electronic calendars and knowledge management systems.

Needs Assessment for Quality Improvement Assignment

Needs Assessment for Quality Improvement - Assignment Example However, school board's authority is limited to official meetings. Before discussing the quality and need for improving it in Tulsa Public School District, it is important to see its significant strategic plan factors. "We will provide quality learning experiences for every student, every day, without exception with the essential skills needed for academic growth, lifelong learning and personal character." (Official Website) Vision of this school system is very simple and clear. "The District of Choice, by providing quality education through high expectations for ALL"; this clearly shows that the top level management of this organization strives hard and makes policies which may make this school as everyone's only choice in the coming future. School makes appropriate policies to achieve its above stated vision for the future in order to gain a distinct advantage over its competitive forces. Each school community will demonstrate exceptional parent/guardian involvement and support through 100% membership in its parent/guardian association, and the District will triple its Partner-In-Education agreement with community, businesses, institutions, organizations and agencies. For Tulsa Public School District, values govern th... Each school will have 100% membership in its parent/guardian association, and the district will have 1,350 Partners-In-Education agreements. Each school community will demonstrate exceptional parent/guardian involvement and support through 100% membership in its parent/guardian association, and the District will triple its Partner-In-Education agreement with community, businesses, institutions, organizations and agencies. All employees will be highly qualified and choose to work for TPS. All employees will be highly qualified in their positions and CHOOSE to remain with Tulsa Public Schools. TPS will win the Malcolm Baldrige National Quality Award. These above stated goals have been defined by the top level management i.e. board members of the school system to successfully address their vision of 2010. Strategic Objectives: Build a connected learning community& broaden productive partnerships, services, & student outreach in order to meet the needs of existing & incoming students Integrate key learning programs across curriculum Empower & affirm staff as they provide dedicated service & enhance teaching & learning opportunities for the 21st century student Maintain & deploy quality management system, campus upgrades, safety requirements & aligned structure Develop new or expanded funding opportunities, including endowments, in order to meet fiscal responsibilities and budget goals Values: For Tulsa Public School District, values govern the function of its dealing and its demeanor or associations with Oklahoma's society at great level, internal and external customers, employees, local community and other stakeholders. Management by Fact: "within a

Tuesday, October 15, 2019

Cultural Anthropology Social Organization Essay Example for Free

Cultural Anthropology Social Organization Essay In the United States the practice of serial monogamy, where one goes through a series of marriages then divorce; and unwed parenthood seem to have replaced the cultural traditional marriage. (Nowak Laird, 2010) Single parent families and the accompanying socioeconomic circumstances usually warrant social intervention from state agencies and that places a strain on public funds. The fact is, every single parent household is unbalanced. In the household where both parents are present the children usually benefit because each parent brings; not only a gender based perspective to the relationship and child rearing cultural traditional practices; but he/she also brings a level of stability that is not easily quantified. Stable marriages are usually founded upon the couple’s religious beliefs, kinship traditions of stable relationships, friendship, trust, similar backgrounds, traditional values as well as kindred cultural practices that include gender role expectations. Persons in stable marriages tend to understand each other’s moods and idiosyncrasies; so they are able to co-exist and live as friends. In the film, people adhere to the traditions of their kindred, they hold them sacred and they marry their own kind. It might seem bizarre to the outsider but it is normal behavior for their kinship. Arranged marriages are basically bilateral agreements between two families. The groom’s family gives the bride’s family a bride wealth of livestock, jewelry land and other valuables depending on the traditional culture of the tribe. The bride wealth forms a part of the wealth of the bride’s kinship. The groom basically has to pay the bride’s family for the loss of her labor. (Nowak Laird, 2010). The women accept and submit themselves to the cultural traditions of their kinship. They have no choice in the arrangements. In the film, the women are hard workers. They take care of the men, children, fields, livestock wash the clothes, cook but the most bizarre was the Indian polyandrous family; the woman was married to three brothers. The children in this family do not know their biological father; and it is normal behavior so nobody really cares about a DNA match. It is also interesting to note that the wife in the feature film is illiterate and she knows no other way of life. The family is stable and the brothers look out for each other. This arrangement is economical as all the wealth is kept in the groom’s kinship. As strange as it may sound, this marriage seem to be more successful than the marriages of choice; in that the wives know there roles and stick to their list of duties. On the other hand, in marriages of choice, after a few years have passed, the wives tend to place pressure on the husbands to change into their likeness and to be what they, and their families want them to be. Arranged marriages are basically bilateral agreements between two families. The gang/crime family is a rather incredible one. I prefer to consider it as a social group with its own set of operational tenets but not a family. Rference Nowak, B., Laird, P. (2010). Cultural Anthropolgy, San Diego, CA: Bridgepoint Education Inc.

Monday, October 14, 2019

Concepts of Corporate Strategy | SWOT Analysis of Apple

Concepts of Corporate Strategy | SWOT Analysis of Apple Corporate Strategy Introduction â€Å"Marketing strategists term this a harvest strategy and consider it a no-brainer† (Hamel Prahalad, 1994:125). â€Å"Few current business concepts are more prone to oversimplification than the growth/share model, with its labelling of products or divisions or whole companies as ‘dogs’, ‘question marks’, ‘stars’ or ‘cash cows’† (Seeger, 1984:94). â€Å"An apparent disadvantage of the matrix was that it assumed that market share was reliable indicator of future profitability† (Calandro Lane, 2007:30). The above three quotations all criticise the BCG growth/share matrix and its practicality as a competitive tool. This paper discusses the advantages and limitations of the matrix and its application for Apple Inc. as a competitive tool. It concludes that the BCG matrix does have some advantages but is not appropriate for all businesses industries and should not be used as a sole analysis model. In the fast pace d competitive modern business world using just the BCG matrix for evaluating a company’s portfolio can have disastrous consequences. The paper is divided into five parts. Starting with an introduction, it moves on to the concepts of corporate strategy, portfolio analysis and the portfolio models. The third part discusses some of the advantages and limitations of the BCG matrix. The fourth deals with the implications of the BCG matrix when applied to Apple Inc. ending with the conclusion. Corporate Strategy, Portfolio Analysis and Portfolio Matrix Models â€Å"Always to be best, and to be distinguished above the rest†. This quote from Homer the 8th Century Greek Poet epitomizes the aim of all organizations. This is where strategy comes in. â€Å"Strategy is the direction and scope of an organisation over the long term, which achieves advantage in a changing environment through its configuration of resources and competences with the aim of fulfilling stakeholder expectations† (Johnson, Scholes Whittington, 2005:9). One of the ways of achieving this is through competitive strategy. According to Porter â€Å"competitive strategy involves positioning a business to maximize the value of the capabilities that distinguish it from its competitors† (1980: 47). To achieve this, careful analysis of the external and internal environment is required. PESTLE and Porter’s Five Forces Model can be used for external analysis. For internal analysis the most commonly used is the seven S framework as well as SWOT analysis, v alue chain, value chain (supply) analysis and portfolio analysis. The result is greater understanding of the environment in which the business operates. Organizations operate under three levels of strategy. Corporate-level strategy, business-level strategy and operational or functional strategy. Corporate strategies deal with the organization as a whole while business strategy â€Å"focuses on how to compete in a particular industry or product-market segment† (Hofer Schendel, 1978 cited in: Beard Dess, 1981:667). Operational strategy is how the organization accomplishes the strategies set out in the first two using its various resources. For an organization to be profitable it is important to have effective strategies on all levels but a successful corporate strategy is crucial to the success of business and operational strategy. The late 1960’s and early 1970’s saw many conglomerates diversifying into different fields. New divisions or (Strategic Business Units) were evolving. The problem management faced was of effectively managing all these diversified units. One strategy could not work for all SBUs as they all experience different competitor threats, market growth rates and market shares. This problem was solved by the creation of the portfolio analysis. â€Å"Portfolio strategy pertains to the mix of business units and product lines that fit together in a logical way to provide synergy and competitive advantage for the corporation† (Daft, 2008:249). The aim of the corporation is to have a balanced corporate portfolio, so that they can decide which activities or products to expand,introduce and which businesses to acquire or dispose off. Thus, â€Å"diversified company portfolios are the normal and natural business form for efficiently channelling investment into the most productive use† (Henderson, 1977:203). The most common form of evaluating the corporate portfolios is the portfolio matrix models. Igor Ansoff, developed his Product-Market Growth Matrix in the 1950’s. He believed that â€Å"just to retain its relative position, a business firm must go through continuous growth and change† (Ansoff, 1957:113). He used four possible combinations of market penetration, product development, market development and diversification and plotted them on a 22 model. McKinsey Co developed a matrix where the variables were market strength and competitive position. Bruce Henderson in the mid 70’s using the same matrix principle developed his BCG growth/share matrix model. It had the same 22 matrix but was based on relative market share and market growth and used cash flow and the experience curve as a criterion. Arthur D. Little developed another model which used the product life cycle. â€Å"These [latter] three matrices form the basis of the various portfolio models that have been widely used to structure the strategic planning process of the firm in the 1970’s† (Coate, 1983:47). Since then there have been many matrices developed e.g. the GE model which uses ROI for assessing an investment opportunity and Shell which used a similar refined matrix evaluating business prospects along with the competitive position of the company. However, the most commonly used matrix by organizations is still Henderson’s BCG Growth/Share Matrix. It has to be taken into consideration however that â€Å"it is important to see these models as aids to decision making, not a replacement for management choice† (Hooley, Saunders Piercy, 2004:64). BCG Matrix – Advantages and Limitations The BCG matrix plots SBUs by looking at the relationship between market growth and market share. Henderson divided the matrix into cash cows, stars, question marks and dogs and asserted that â€Å"only a diversified company with a well balanced portfolio can use its strengths to truly capitalize on its growth opportunities† (Henderson, 1970:37). To show the relative significance of the SBU, size is shown in circles which can be calculated either from assets employed or sale turnover. The growth/share matrix gained immense popularity among large organizations with many SBUs. They could now use the matrix and decide which units to nurture, invest or divest. Its main advantage was its attractive presentation and easy to remember terms. Using only two variables it was easy and quick to make as well as being versatile enough to be applied to different brands, products, customers and distribution channels. The matrix became popular with managers who preferred the idea of cash flow implications rather than profits which are more in the accounts domain. The PIMS database which was developed at the General Electric in the 60’s and further developed by the Management Science Institute at Harvard in the early 70’s also supported this view. Another reason for the BCGs popularity was fashion. â€Å"It is an idea that is well understood and liked by many mangers and therefore one that allows communication between headquarters and strategic business units (SBUs). It has become part of the common business vocabulary† (Hooley et al, 2004:71). Undoubtedly, the simplicity of the matrix was its major advantage but it had its limitations as well. One of the major problems of the BCG matrix were the claims made by the developers that â€Å"such a single chart with a projected position five years out is sufficient alone to tell a company’s profitability, debt capacity, growth potential, dividend potential and competitive strength† (BCG, 2008:3). According to them the matrix would provide the complete solution but this is an erroneous belief. It does not provide the perfect solution for evaluating a company’s portfolio. This is also affirmed by Hooley et al who say that â€Å"if it is used it should be audited carefully to ensure its validity rather than followed blindly† (2004:2). Furthermore, there is no set definition of what an SBU is or what the definition of a market is e.g. a product might be a leader in a local market niche but at the same time a small player in the global market. The matrix is also difficult to plot accurately using market share and market growth. Organizational strength cannot be measured by market share alone, it has to take into consideration other strengths e.g. financial strength, brand equity, exclusive distribution channels or unique product features etc. In the same way market growth is only one aspect of market attractiveness. Using the cash flow resources for evaluation can also be perceived as a flaw. â€Å"In times of high inflation, cash flow may indeed be the major constraint on a company’s action range, but other capabilities such as appropriate managerial talent, expertise, know how, skilled labor and organizational flexibility are also important† (Derkinderen Crum, 1984:132). Also, according to Henderson â€Å"we should kick the dogs, cloister the cows and throw our money at stars. Only the question mark category demands management thought† (Seeger, 1984:94). This assumption can be criticised as being over simplistic. Dogs, should not be divested off without thought. They can retain that important portion of market share keeping competitors at bay, and also an organization who has a dominant product may deliberately introduce a dog into its portfolio for the same purpose. Sometimes, â€Å"occasionally it is possible to restore a dog to viability by a creative business segmentation strategy, rationalizing and specializing the business into a small niche which it can dominate† (Hedley cited in Wit Meyer, 2004:322). The human aspects and behavioural implications of the matrix are also overlooked e.g. how managers of SBUs categorized as cash cows react when their hard earned cash is given to other SBUs, or of members within the organization whose brainchild is divested? This can affect the morale of management and may result in quick turnover of disgruntled staff which is not beneficial to the organization. The simplicity of the matrix where an advantage can also be harmful since competitors can easy identify the strategy being used and use it to their advantage. An example of this is the successful infiltration of the Japanese in the UK motorcycle industry. Another limitation as Coate says is that â€Å"independent strategies can’t be defined for all possible business units† (1983:52) i.e. a business unit producing multiple products cannot invest in one profitable product and ignore the others. Either they all get investment of all of them have to be divested. Despite the fact that the matrix’s limitations far outweigh its benefits, it is still frequently used by organizations and in certain situations can be used as an effective competitive tool as well. The important thing is that it should not be used as the sole analysis method for decision making. Even the Boston Consulting Group has in recent years admitted that market share by itself does not necessarily mean competitive strength. â€Å"In a series of articles in the Financial Times in November 1981, Michael Gould of the BCG maintained that it is valuable to be the market leader for branded goods with the advantage of price leadership and the ability to spread marketing and distribution costs over a high volume; but economies of scale may be achieved even by a firm that is not the largest producer in the industry (Johnson et al, 2005:90). It is though, fair to say that â€Å"the simplicity of the Box makes it operationally useful and its ease of understanding makes it a use ful operational tool provided its limitations are kept clearly in mind† (Hooley et al, 2004:87). Apple Inc. The BCG Matrix 1: Profile Strategy: Apple is a global company operating in the technology industry which designs, manufactures and markets personal computers, portable music players and mobile communication devices. It was established in 1977 as Apple Computer Inc. specialising in personal computers. Operating in the ever changing high growth market and extreme competition, Apple began losing its market share to its major competitors including IBM and Hewlett Packard as well as the entry of numerous other PC manufacturing companies determined to enter the highly profitable market. SWOT Analysis (fig 2) Strengths Weaknesses Strong brand image Robust financial performance Media content Declining research and development (RD) investment Opportunities Threats Smart Phones Booming MP3 player markets Growing personal computers and peripherals markets Intense competition Dependence on specific suppliers Patent infringement Apple was faced with a weakening Mac line, stiff competition and demand for better value by the shareholders. There was need for a drastic change in strategy and product diversification was chosen as a mean of entering other consumer electronic market segments. In the Swot Analysis (fig 2) carried out by DataMonitor, we can clearly see their opportunities in the smart phones and MP3 player markets. In January 2007, the company changed its name to Apple Inc. as they diversified into other products. Currently, Apple Inc. in its portfolio owns three SBUs. The first is the Mac range which comprises of desktop and notebook computers along with their accessories. Secondly, it offers music products and services which include ipod, itunes etc. The third SBU consist of the mobile communication devices i.e. iphone. 2. BCG Matrix and Apple’s Product Portfolio: In the current competitive industry using the BCG matrix offers some benefits for Apple but there are disadvantages too. The flexibility that the matrix offers i.e. it can be used for plotting product portfolio of a firm can be beneficial to Apple. To introduce new products and revamp current ones a company needs vast amounts for investment. Apple needed money for RD which is a major expenditure for companies operating in the technology industry. â€Å"The Company believes continual investment in research and development is critical to the development and enhancement of innovative products and technologies† (Apple Investor Relations, 2007:1). Between 2005 and 2007, Apple spent $535 million dollars on RD. Part of this money was obtained by withholding dividend payments for two years between 2006 and 2007. The rest was from divesting within the Mac range. Using the BCG matrix, the decision of which products to invest in and which to divest would have been pretty straigtforward. Market growth for technological products very rarely slows long enough for a product to be classified as a cash cow. Therefore, most of these products would be classified either as a star, question mark or dog. At the time when Apple changed its strategy it had a large number of computers in its product range which it needed to reduce. The whole of the Mac Range would have been plotted with a few top selling products as stars which would have been carrying the whole load of the company with its profits. A few question marks which had low market share but were still making a profit which was being again utilized internally, but had low chances of becoming a star and quite a large number of products and their associated accessories and software would have been plotted in the dogs quadrant. By divesting in the dogs, Apple would have undoubtedly lost some market share but in introducing new products their aim was to attain market share in other markets. Spending huge amounts on RD, Apple updated and introduced fewer but better computers like ibook and imac into its product line in direct competition with their competitors. At the same time as updating its product line for the Mac range the ipod range can also be plotted on the matrix. The ipod currently holds 77% of the global market share , but to keep up with the current high demand Apple almost every year introduces a new version with more features and divest the oldest version which by that time has moved to the dog quadrant. It also uses the same strategy for the iphone range. Even though iphone is a relative new offering from Apple, it is already facing competition and to maintain and increase its market share Apple keeps introducing newer versions. Therfore, even though the BCG matrix does offer Apple benefits for managing its product portfolio, it negates one of the main declarations of Hendrix that â€Å"only a diversified company with a well balanced portfolio can use its strengths to truly capitalize on its growth opportunities† (1970:37). For a well balanced portfolio, a company must have cash cows, however, with Apple and its products, the market growth rate never slows enough for a product to become a cash cow. Most of its products are in the star or question mark quadrants, and some are dogs which are then divested. Apple however sometimes does tend to retain some dogs, even though Henderson believed that â€Å"pets are not necessary† (1970:37), and should be divested off, Apple keeps some of its older versions of products because they retain a small share of the market which might be vital to the companies overall market share. 3. BCG Matrix and Apple’s SBU Portfolio: However using the BCG matrix with Apple’s corporate portfolio poses quite a few problems. First of all the developers claims that â€Å"such a single chart with a projected position five years out is sufficient alone to tell a company’s profitability, debt capacity, growth potential, dividend potential and competitive strength† (BCG, 2008:3), cannot be applied to Apple Inc. Apple operates in a fast changing environment where the introduction of one product can radically change the competitive strength and market share of a company. An example is Dell Computers who in 2007 lost its market leader title to HP. Within one year HPs market share increased dramatically to 17.6% while Dells managed only 13.9%. Apple comes third with a global market share of 2.6%, but that can change rapidly. Also for Apples iphone the current market share is only 6.5% compared to Blackberry which holds 41% and Palm at 9%, but the iphone is relatively new. It was introduced in July 2007 a nd immediately took over 28% market share of the US smart phone industry showing competitive strength of the product. Apple with iphone is challenging the market leaders and its market share is increasing every quarter. Therefore, a five year forecast cannot be accurate for analysing its future position. Also, however, if we plot the Mac computer range using market share and market growth rates, it would be positioned in the question mark quadrant. But that would make analysis difficult since two products of the mac range i.e. the ibook and imac are stars but as a SBU plotted in question marks. To manage all the products together would be difficult since some products require investment and some do not, according to the matrix you plan a unit strategy not an individual one. Once again Henderson’s criteria of having a balanced portfolio for success would not be applicable in the SBU matrix either. Currently, Apple’s ipod business unit is a market leader with majority market share and high market growth and would be plotted as a star, and the iphone and mac ranges would be placed in the question mark quadrant. It does not have any cash cows or dogs. A successful organization has to have cash cows from where cash flow is diverted into stars and question marks. The ipod sales at present is generating enough cashflow, not only to sustain itself but the other SBUs as well. If we blindly believe Henderson’s assumption then logically Apple should be in dire trouble whereas it is actually increasing its market share and cash flow with all three units. Another drawback of using the BCG matrix would be giving its competitors easier understanding of its strategy. With the company’s annual reports and market shares available publically, if competitors like HP and Blackberry know that Apple is using the BCG matrix as the sole analysis method they can easily construct a matrix for Apple and figure out its future strategies. Therefore, even though the BCG matrix could be useful to Apple Inc. for analysing its products strength and could be used as a decision tool, it would not be useful for future decision concerning its SBUs. It has to be admitted though that the BCG in its simplicity maybe can be more effective in another industry. It can be used as an internal analysis method but using it as the sole decisions making analysis method could be hazardous for the company. This is further confirmed by Seeger who says that â€Å"no management model can safely substitute for analysis and common sense† (1984:97). Apple would benefit using the SID techniques, risk analysis e.g. the monte carlo risk analysis model as well as personal experience and judgement before making any future decisions for its strategic business units. Conclusion We have thus seen how as a competitive tool the BCG matrix has its advantages and disadvantages. The main advantage being its simplicity and ease of plotting, â€Å"but elegance and simplicity in a theory’s presentation cannot guarantee sanity in its use† (Seeger, 1984:93). At the same time the matrix has its disadvantages in not having clear boundaries of what a market is and the criterion for market share and growth and the effect of external factors on it. To gain a competitive advantage a company aims towards â€Å"making an outlay of cash now in the expectation of extra cash coming in the future† (Dixon, 1994:21). For that they need to be in a competitive position and know which units to invest in and which to divest. BCG matrix makes this decision easier for managers but it has to be utilized in a carefully evaluated way. The matrix does give an indication of SBUs performance in the current market but it is not a model that should be followed without use of other methods of analysis and use of judgment by managers. This can be summarized in the words of Porter who affirms this by saying that â€Å"the growth/share matrix can be one component of a competitor analysis when combined with other kinds of analysis† (Porter, 1980:364) or Hooley et al who say that â€Å"it is clearly inadequate as a complete solution, but is of undisputed value as a starting point in many analyse† (2004:72). Therefore, not begrudging BCG matrix the benefits it offers mangers; it is defective as a sole analysis model for competitive strategy and still needs careful evaluation before any decision can be finalized. Bibliography Ansoff, H. I. (1957) Strategies for Diversification. Harvard Business Review, 35(5):113-124, Online available at: http://web.ebscohost.com/ehost/detail?vid=4hid=106sid=2bad248a-b6cb-4c13-81c2-74db4080bfda%40sessionmgr102 (Accessed 15th June 2008) BCG: The Boston Consulting Group, (2008). The Experience Curve Reviewed. IV. The Growth Share Matrix or The Product Portfolio. Online available at: http://www.bcg.com/publications/files/Experience_Curve_IV_Growth_Share_Matrix_1973.pdf (Accessed 12th July 2008) Beard, D. W. Dess, G.G. (1981) Corporate-Level Strategy, Business-Level Strategy, and Firm Performance. The Academy of Management Journal, 24(4):663-688, Online available at: http://www.jstor.org/stable/256169?Search=yesterm=corporate-levelterm=performanceterm=firmterm=strategyterm=business-levellist=hidesearchUri=%2Faction%2FdoBasicSearch%3FQuery%3DCorporate-Level%2BStrategy%252C%2BBusiness-Level%2BStrategy%252C%2Band%2BFirm%2BPerformance%26dc%3DAll%2BDisciplinesitem=1ttl=194returnArticleService=showArticle (Accessed 22nd May 2008) Calandro Jr, J Lane, S. (2007) Special Section: Winning in your industry: new tools and strategies. A new competitive analysis tool: the relative profitability and growth matrix. Strategy and Leadership, 35(2):30-38, Online Available at: http://www.emeraldinsight.com/Insight/viewContentItem.do?contentType=ArticlecontentId=1596528 (Accessed 2nd May 2008) Coate, M.B. (1983) Pitfalls in Portfolio Planning. Long Range Planning, 16(3): 47-56, Online available at : http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6V6K-45PMPYS-14_user=10_coverDate=06%2F30%2F1983_alid=760368145_rdoc=3_fmt=high_orig=search_cdi=5817_sort=d_docanchor=view=c_ct=3_acct=C000050221_version=1_urlVersion=0_userid=10md5=f8879374940c70491a7e8906d1bc6068 (Accessed 24th June, 2008) Daft, R. L. (2008) New Era of Management, 2nd ed. Mason: Thomson Higher Education. Derkinderen, F. G. J. Crum, R. L. (1984) Pitfalls in Using Portfolio Techniques – Assessing Risk and Potential. Long Range Planning, 17(2): 129-136. Online available at: http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6V6K-45K4GRJ-9P_user=6649953_coverDate=04%2F30%2F1984_alid=760368145_rdoc=2_fmt=high_orig=search_cdi=5817_sort=d_docanchor=view=c_ct=3_acct=C000010181_version=1_urlVersion=0_userid=6649953md5=4eb70387aca6a81b0bed14dab76607ae (Accessed 24th June, 2008) Dixon, R. (1994) Investment Appraisal. CIMA, rev.ed. London: Kogan Page Hamel, G. Prahalad, C. K. (1994) Competing for the Future. Harvard Business Review. 72(4): 122-128, Online Available at: http://web.ebscohost.com/ehost/detail?vid=5hid=107sid=728905ba-dc97-471c-a829-b8c61346578f%40sessionmgr108 (Accessed 23rd April 2008) Henderson, B.D. (1970). The Product Portfolio. Reprinted in Stern, C.W. (ed.) and Stalk, G. (ed.) (1998). Perspectives on Strategy From The Boston Consulting Group, pp. 35-37, John Wiley and Sons, New York. Henderson, B.D. (1977) The Corporate Portfolio. Reprinted in Stern, C.W.  and Stalk, G. (eds.) (1998). Perspectives on Strategy From The Boston Consulting Group, pp. 203-205, New York: John Wiley and Sons Hooley, G. Saunders, J. Piercy, N. (2004) Marketing Strategy and Competitive Positioning. 3rd Ed. Essex: Prentice Hall. Apple Investor Relations, (2007) Apple Inc. 10-K Annual Report. Available from http://phx.corporate-ir.net/phoenix.zhtml?c=107357p=irol-reports (Accessed 17th May 2008) Johnson, G. Scholes, K Whittington, R. (2005) Exploring Corporate Strategy. 7th Ed. London : Prentice Hall. Porter, M. E. (1980) Competitive Strategy. New York : The Free Press. Thompson Jr, A.A, Strickland III, A.J. Gamble, J. E. (2007) Crafting and Executing Strategy. 15th Ed. New York : McGraw-Hill Irwin. Wit, B.D. Meyer, R. (2004) STRATEGY-Process, Content, Context. 3rd Ed. London : Thompson Learning. XML Database: An Introduction and Analysis XML Database: An Introduction and Analysis XML, mnemonic of eXtensible Markup Language is one of the most extensively used data format and is used as a standard for exchange of data over the internet. As large amount of data is represented as XML documents, techniques like RDMS have to be used to store and query these XML documents. There are two well known approaches for parsing an XML document to convert into relational DBMS: SAX and DOM parsing. In this research, both these methods are studied and then the performance is compared. Some alternative ways of data structuring and tagging from tables of RDBMS as a hierarchical XML document has been studied. As a final result, the best alternative which will provide with the best and effective performance for capturing and querying XML data using RDBMS can be found out. When a large amount of data is to be loaded into an XML document, it becomes important to execute the request query and save the process at XML document. One way is to use XML native data base system. This has two weaknesses 1. eXtended Markup Language resident database system is not ample to save data and it cannot contain the complicated query at relational DBMS. 2. It is impossible for the users to access XML documents and data that are stored in a relational DBMS. To overcome the above mentioned weaknesses, querying and storing XML data techniques using RDBMS are used. The steps for this approach are- 1. Data or an XML document is saved by making relational table design. 2. XML data is divided by separating them into columns in the presented table. 3. SQL Queries are used to get access to the XML document format obtained in RDBMS dta format. To transfer data from XML to data base, the strategy is to use C# as middleware. This research can be done by parsing technique with the help of SAX parser or by using XML Tree Class. To do the vice versa, the present format of XML document from relational SQL SERVER 2008 database supported by C# script, used as middleware; is converted with the help of tagging and structure. All alternatives (outside engine) done by tagging and structuring process implies that a part of the task was done outside the relational database engine. For comparing the XML document and RDBMS from the point of speed in loading the process in the browser following tasks were performed:- Searching of the data in the XML document is done with the help of DATA binding technique. Presentation of the XML data from RDBMS is done by searching data from XML document which was saved into SQL database, than with the help of DOM Tree method the result of the query is saved as a XML Document Database problems in XML They are hard to update. We cannot implement the constraints. Its difficult to optimize the xml database. Hard to maintain the consistency Data Storage and Data Transmission: These two are different concepts. In data storage we store data and while storing it we need to check the validity of the data. In Data Transmission we simple transfer the data from one system to the other. XML are generally used for the Data Transmission purpose. COMPARISON Relational Database XML Database META DATA Definition CREATE TABLE DEFINE XML SCHEMA Persistence of DATA INSERT,UPDATE CREATE XML DOCUMENT QUERY SELECT XPath ,XQuery 1.2 BENEFITS AND LIMITATIONS OF DIFFERENT DATABASE TECHNOLOGIES: Speed is the major advantage of creating database with objects. In OODBMS (Object oriented Database Management System) data is stored as objects but not in the form relational rows and columns such as in relational DBMS that is why OODBMS is faster than relational DBMS. OODBMS is more applicable than relational DBMS (RDBMS) for some tasks. This is because OODBMS performs many operations using navigational interfaces where as RDBMS uses declarative interfaces. OODBMS follows pointers to implement navigational access to data in an efficient manner. One disadvantage of RDBMS s is we need relational mapping layer to map the entire model for application objects to the database object model, whereas in OODBMS there is no need to match those layers. In RDBMS due to this mapping there may be an impedance mismatch and there is no such problem in OODBMS and it also increases the performance. OODBMS has some drawbacks like:- As it is said above OODBMS uses pointers to implement navigational access to data this is one of the drawback as in general purpose queries this will lead to delay the output and also becomes complicated than relational One more drawback is that there is no mathematical foundation for OODBMS, unlike RDBMS. This makes OODBMS weaker than RDBMS in supporting queries. The difference between data-base centric thinking and oop is in the way it views the world. The first one views the world through a viewpoint which is declarative and attribute-driven. The latter one views through a viewpoint which is behavioural. This is one of the major differences between databases and OOP. Many consider database technology as a failure. Hence attempt are being made in research and industrially to closely integrate database functionality into object programming languages. 1.3 DIFFERENT APPROACHES FOR THE DATABASE DESGIGN Different approaches for the database design includes data model approach design approach and so on. Starting with the data model approach: For effective project implementation database design is most important aspect thats why should be completed within given time line to give economical approach in project developing phase. Data model construction and updating on change of data deign in necessary as every application will need data storage. It is one of the most crucial parts of an application for developer and user as well. The different normal forms are:- 1st Normal Form Similar group should be stored in different table and tables should be provided by primary key to identify columns. 2nd Normal Form To protect data redundancy foreign key must be introduced. 3rd Normal Form Primary key plays a prominent role making every column in the table related. This makes every column a dependent of the primary key of the table. Those fields not satisfying above property should be stored in a new table with a new key. 4th Normal Form: Independent relationship should be removed from the relation database. 5th Normal Form Many to many relationships can be related logically thats why its also known as Exists in never-never land. Followed by the data model approach is the design approach which is explained as below: 2nd and 3rd form designs should be used for large application having enhancement scope. Scalability should be kept in mind during designing phase of application. Third form can ask you to make host of tables with less number of entity which reduces data replication across tables. While talking to a fellow developer i came to know that they used 3rd form as they were quite sure that it would not create dependency problem for their application as they used comma to differentiate primary values in a defined field of a table. Classes that can be used as data object which contain properties, actually a description and quality of entity element and these properties are introduced by getter and setter, should be designed at the time of creating class diagram for an application. Both object and property shows real life entity. For creating the database tables we need following constraints and relationships to be there in that table so that final database developed will be more effective and understandable. These are explained in the Constrains section under the database design part with the help of query tools. LO2 DEsign and implementation: 2.1 Requirement: This assignment is to understand the database design concepts, implement the database designed and execute the queries to obtain the required result with the help of SQL Server database. It also helps in developing Client side application to modify, update and view the results through C#. Net. Deeveedeezee, the online DVD shop records the customer details, DVD details which includes title, genres, Studio, classification, actors, directors and other information. It provides the users to rate a DVD using star scaling ranging from 1 to 5 and also allows them to create their own wish list. Our objective is to understand how the database of this DEEVEEDEEZEE is maintained, practically implementing it with the help of SQL Server and develop an client end application that interacts with SQL Server and provides the user the authority to view and add details. The WindowsFormApplication1 is the project tile and the client application can be run by opening the solution in MS Visual studio and Debugging the Code. It can be done by clicking on Build->Start Debugging. Function: Deeveedeezee.com as mentioned above provides the online customers various details about the DVDs, their reviews, ratings, synopsis and also allows them to create their own wish list. To maintain such a database, it has to be well designed and effectively handled by the administrator or the team of database continuously monitoring and assessing the required information. Every user is provided with unique user-id and password with which they can login and access the required information about the DVDs. They can even provide their comments, reviews and ratings as well which are again recorded under their user-id and are provided when ever required or asked for. Also deeveedeezee handling such large information from the website requires an Administrator or a team working on databases so that it is well managed and maintained. Thus every administrator and the team member again have got their own user-ids and passwords so that they can login into the databases and do their assigned tasks. These discussed details are presumed to be handled and the rest of the discussion focuses on the database designing, implementation and development of a client application which interacts with SQL server to provide them the easier access to add and view data from the database. Thus the backend database has got various data rules, definitions and constraints to be handled. Recording distinct information and accessed by different types of users, database has got different tables and views with appropriate fields and attributes. The database design diagram shown below shows the clear picture of how the database is designed, the various tables it maintains, attributes it holds and their properties. DATABASE DESIGN DIAGRAM ERD The diagram shown below depicts the various tables and its attributes. This design is modified and improved further with the help of Entity Relationship Diagram. The Entity Relationship diagram of the report is as below. The rectangle boxes are considered as entities The ovals are treated as attributes. Rhombus represents relationship between the entities. The diagram represents all entities, attributes and also the relations between the entities. It is a graphical representation of the relations. The ER diagram is a good means of understanding the relationships between the entities and attributes. In the below diagram, different users can be uniquely determined by its attributes like userId, email, firstName etc. User entity is related to DVD by Reviews. The ratings given to the movie by viewers are recorded through Ratings. Comments are the reviews of viewers. DVD on the other hand can be uniquely determined by its attributes like dvdId, title, studio etc. Role connects DVD and People. Role can be various tasks of people like actors, producer, and director. People have attributes of peopleId and peopleName. dvdDetails dvdId title retailPrice releaseDate runningTime synopsis genres studio users userId initials firstName surname dateOfBirth address email mobileNo telephoneNo password timestamp studio Fig: Database Design Add view Users Add roles id peopleId dvdId role wishlist id email userId wishlist Customers view dvdClassification id dvdId classification description people peopleId peopleFirstName review reviewId userId email dvdId review rating timestamp Entity Relationship Diagram (ERD) peopleName peopleId people Role dvdId title retailPrice releaseDate runningTime synopsis genres studio DVD RatingComment Review userId dateOfBirth surName firstName initials User telephoneNo mobileNo email address password 2.2 4.3 DOCUMENTATION AND Implementation OF THE DATABASE: Database Implementation and Datatype Usage The designed database discussed with the help of database design diagram and entity relationship diagram are implemented in SQL with the help of MS visual studio. All the attribute and tablenames are in used as per the conventions like using camel case, singular table name and so on. The output tables, conents nd query results are recorded with the help of screenshots and are shown as below: Table1: user table Comments: The details of the users like firstName,email, DOB, address, contact details are recoderd. In this table Primary key contraint,Not Null constraints are present. Datatypes of each attribute as per the given data rules are being implemented as shown above. Table2: dvdDetail table Comments: It stores the all details of DVD like running time ,release date,title and creates an unique dvd id. In this table Primary key contraint,Not Null constraints are present Datatypes of each attribute as per the given data rules are being implemented as shown above. Table3: review table Comments: It stores the reviews and the rating i.e No. Of stars given to the DVD by the user. It has not null contraints ,check constraints which checks that the rating field have value greater than 0 and less than 5,foreign key contrains.email is the foreign key which is refrencing to the primary key of the users table. userId and dvdId the combination of these two is used as a primary key. Table4: people table Comment : It stores the name of the people involved in the movie or DVD and gives a unique id to each of them that is peopleId. Table5: role table Comment: It stores the role of the each people involved in the movie like director,producer,actor etc. It has a foreign key dvdId which refrences to the dvdDetails dvdId.id is the primary key which is a identity with a seed 1. Table6: wishlist table Comment: It stores the wishlist of each user in comma seprated form. In this table id is the identity with seed 1 and userId is the primary key and email is the foreign key. Table7: dvdClassification table Comment: It stores the classification of the dvd with a little description about the dvd. dvdId is the foreign key and id primary key and also a identity with seed 1. Constraints NOT NULL Constraint: This is a constraint which restricts the user from entering the null value or leaving it blank. The user needs to provide the details for that field. It becomes necessary for the user to enter. Fig: NOT NULL CONSTRAINT In the given example id,email,userId fields can not be left empty. User need to provide these details otherwise it will through error.wishlist can be left empty. Query for this constraint CREATE TABLE wishList ( id int NOT NULL, email varchar(100) NOT NULL , userId int , wishList varchar(MAX) NOT NULL) Primary key constraints: This constraint is used to uniquely identify the row in the table. This field is not repeated in any of the other row. Primary key of one table can be used as the reference or foreign key of the other table. Fig: PRIMARY KEY Constraint In the above example userId is the primary key. All the rows in this table will have different userId. Fig: Showing the implication of Primary Key constraint In the above figure it is clealy shown that the userId is different for different rows. Unique constraint: This is the constraint used for uniquely identifying a particular column. All the values in a particular column are different. Fig: UNIQUE CONSTAINT In the above figure userId field has a unique constraint.It is a identity with a seed of 1.Every time a new row is inserted is automatically increments the value of the userId which ensures that in userId column no value is repeated. Fig: Showing the implication of Unique constraint In the above figure in userId column no value is repeated . userId has a unique constraint. Foreign key constraint: This constraint ensures that the database has a refrential integrity. Foreign key is works on the refrence of the primary key of some other table. Query: CREATE TABLE wishList (id int , userId int PRIMARY KEY, email varchar (100) references users(email) wishList varchar(MAX) ); Fig: Foreign Key Constraints In the above figure email is the foreign key which refrences the email i.e the primary key of the users table. Check constraint: This constraint makes sure that all values in a column satisfy certain specific criteria. Query: CREATE TABLE review ( reviewId int NOT NULL, userId int NOT NULL, dvdId int NOT NULL, review varchar(200) NOT NULL, rating float CHECK (rating0) timestamp timestamp) This check constraint helps in validation of ensuring the star rating to be between 0 and 5. Or CREATE TABLE dvdDetail ( dvdId int NOT NULL primary key identity(1,1), retailPrice int NOT NULL, title varchar NOT NULL, synopsis varchar NOT NULL, runningTime int CHECK (runningTime>10 AND rating genres varchar NOT NULL studio varchar NOT NULL) This check constraint ensures that the running time to be between 10 and 5000. LO3 Use of Manipulation and Query tools 3.1 Benefits of Manipulation and Query Tools in Database Manipulation and Query tools in database include those commands and statements that on execution would help in data manipulation. SQL maintains certain standards which includes DML or Data Manipulation Language. The major SQL commands that include in this DML are INSERT, UPDATE, ALTER and so on. These tools or query commands help in modification of tha data and constant updates that have to be made. SQL Server 2008 offers a very good platform that provides access to database and also it provides the query window for executing various commands that include in the Data Manipulation Language. They are very much useful in making it easier for the user to modify the data and update some information. A fine picture of these tools and their functioning can be understood in the sections below: 3.2 Implementation Query tools: Query for viewing all DVDs belonging to the Romantic Comedy genre in order of price. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = Romantic Comedy) ORDER BY retailPrice The query when executed would result into the table as shown below: Table: Result of the query Query for viewing all DVDs belonging to the Universal Pictures UK studio. Table:Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (studio = Universal Pictures UK Studio) Table: Result of the query Query for viewing all DVDs in which Johnny Depp or De Caprio have acted. Table: Initial data in dvdDetails table Query:- SELECT dvdDetails.dvdId, dvdDetails.title, dvdDetails.retailPrice, dvdDetails.releaseDate, dvdDetails.runningTime, dvdDetails.synopsis, dvdDetails.genres, dvdDetails.studio, choose.dvdId AS Expr1 FROM dvdDetails INNER JOIN (SELECT DISTINCT [NATURAL].dvdId FROM roles AS [NATURAL] INNER JOIN people ON people.peopleId = [NATURAL].peopleId WHERE (people.peopleFirstName = Shahrukh) OR (people.peopleFirstName = Amir khan)) AS choose ON choose.dvdId = dvdDetails.dvdId Table: Result of the query View all the DVDs which Steven Spielberg has directed. Table:Initial data in dvdDetails table Query:- SELECT dvdDetails.dvdId, dvdDetails.title, dvdDetails.retailPrice, dvdDetails.releaseDate, dvdDetails.runningTime, dvdDetails.synopsis, dvdDetails.genres, dvdDetails.studio, choose.dvdId AS Expr1 FROM dvdDetails INNER JOIN (SELECT DISTINCT [NATURAL].dvdId FROM roles AS [NATURAL] INNER JOIN people ON people.peopleId = [NATURAL].peopleId WHERE ([NATURAL].role = Director) OR (people.peopleFirstName = Farah Khan)) AS choose ON choose.dvdId = dvdDetails.dvdId Table: Result of the query View of all the DVDs suitable for a Valentines Gift. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = Romantic) Table: Result of the query View of all the DVDs suitable for children (under 10s) to watch. Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails WHERE (genres = under 10) Table: Result of the query DVDs on the wishlist for a specified customer Table:Initial data in wishlist table Query:- SELECT wishList FROM wishlist WHERE (userId = 1) Table: Result of the query DVDs in order of release date Table: Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails ORDER BY releaseDate Table: Result of the query DVDs belonging to a specified studio in order. Table:Initial data in dvdDetails table Query:- SELECT dvdId, title, retailPrice, releaseDate, runningTime, synopsis, genres, studio FROM dvdDetails ORDER BY studio Table:Result of the query To add a sample DVD. Table: Initial data in dvdDetails table Query:- INSERT INTO dvdDetails (retailPrice, releaseDate, genres, studio, runningTime, title) VALUES (99, CONVERT(DATETIME, 1990-05-02 00:00:00, 102), under10, Coke Studio, 1100, Tom) Table: Result of the query Table:Data in dvdDetails table after executing query An update query to change the review star rating assigned by a customer to a DVD. Table: Initial data in review table Query:- UPDATE review SET rating = 3.5 WHERE (userId = 1) Table:Result of the query Table:Data in review table after executing query 3.3 EVALUATION OF QUERY TOOLS: Queries can be simple and complex. For the complex queries we make the stored procedures, views and trigger which we can use later in our code and for the simple query we can directly embed in the code. Stored procedures contain more than one query and the stored procedure is pre compiled method for accessing the data from the database. Queries including select, insert, update etc are written in the procedures. After committing the query if any error occurs then we roll back and ignore the result of that query. If the correct relationship is present between the tables than only we can get the correct result from the data LO4 Use, documenting and implementing of Relational Database Management System 4.1 4.2 TESTING OF THE RELATIONAL DATABASE AND ITs IMPLEMENTATION Queries in the section 3.2 produce the result correctly i.e. the output of different queries are correct and as we know that queries will give the correct output only when the relation between the tables are correct i.e. the relational database is correctly made. Queries in the view section and the also in the client application desired view produce a correct result which shows that the implementation of the relational database is correct. Client Application: Microsoft Visual Studio has been used for developing the client application in C#.NET. Our main objective was to provide the user with the facility to add and view the data from the database so that proper updating can be done and relevant information can be provided to the user through the online website of deeveedeezee.com. The prerequisites for this application are: MS Visual Studio installed in the computer system with C#.NET and SQL server. The MDF file or the database has to be loaded into the application through MS Studio by Data-> Add new datasources-> Database. Once the database is loaded, the SqlConnection string path has to be modified to the path where the database is located. Every user of this client application is provided with unique username and password through which he can log in into the application. The application only highlights the required and mentioned features in the assignment of VIEW and ADD. The figure below represents the Client Application as it looks after logging in successfully. afterlogin client app.JPG Fig: Client Application The user allowed viewing and adding the data, on clicking the respective buttons would be directed to the forms as shown below: view and add.jpg Fig: View and Add forms One can view the details of DVDs, Reviews posted by the customers through online website, Ratings provided by them, their wish lists and the user data. One can add up details to be displayed about DVD to the customer, roles played by various actors, actress and other working staff for that particular product, rating as per the reviews and rating awarded by the customers and also new users data. The following sets of figures describe how the data and various details are added to through the client application into the database: add dvddetails.JPG Fig: Add dvdDetails On clicking the submit button, in the coding section the query to insert the details of DVD which includes dvd Name or title, Price, Genres, Date of Release of the DVD, Studio and synopsis is executed and the table of dvdDetails is updated as shown above in the query section. add ratings.JPG Fig: Add DVD Ratings Viewing the details of review and rating provided by the customers through online, the user of this client application can rate the dvd accordingly. He has to identify the dvd ID and based on the information he has got he can provide the rating on a scale of 1 to 5. As explained above similarly on clicking the submit button, the query gets exected in the back and the table of concerned gets updated as shown above in the query section. add roles1.JPG Fig: Add Role Details This helps in providing the customer regarding the cast details of the product. add users.JPG Fig: Add Users Details This helps in validating the user by adding them into the database. Similarly viewing would allow the user with the following output: Fig: View of dvdDetails dvdDetails includes title, price, date of relase and such other features that described the dvd. dvdID is uniquely and automatically generated and is considered as the primary key. From the data available in this table dvds can be classified based on their genre and studio as per requirement. Fig: View of Roles This table helps in updating the online site with the roles played by various persons involved in making this product. The persons can be identified by their unique ids. Fig: View of Wishlist As provided online by the customers their wishlist gets updated in the database ad can be viewed for knowing required information about the user and his preferences for future use. Fig: View of Users data Users or customers using deeveedeezee.com online and th staff using this application, all the details are provided in this table from which one can know about their personal details and contact information to be used for various purposes. Fig: View of Reviews Based on the data provided in the reviews by online viewers, the users of this application can add the modified rating based on data collected from many sources. 2.3 Application of a range of database tools to enhance user interface In all the above view forms, GRIDVIEW t