Monday, December 23, 2019

Martin Luther Argumentative Essay - 1370 Words

Reshaping Reality Rotten. Exploitive. Faithless. The Roman Catholic church was seen as corrupt in the late fifteenth century.The populace struggled with the brazen capitalistic Roman Papacy that didnt meet the needs of its congregation. The clergy’s use of indulgences as a way to salvation lacked the piety that disciples desired. Criticism of Catholicism did not cause sweeping changes in the sixteenth century; instead, the Protestant Reformation occurred due to the confluence of events triggered by one priest, Martin Luther. (Schilling) Although some historians allege that Martin Luther’s theology was reactionary due to its roots in medieval Christianity, his beliefs that the hierarchy of the church was unnecessary and that salvation was†¦show more content†¦This fundamental difference from the Catholic dogma that one could buy salvation to Luther’s new ideas as way to Heaven began to transform many people’s beliefs. Supporters of Luther adopted the concept of fait h and knowledge of God as a way to repent their sins, and eventually, it reshaped the Christian culture. As Luther personally struggled to be a â€Å"perfect† monk, he discovered that faith in the gospel was the only way to be â€Å"made righteous by God†(roper 78). In response to his distress for his laity’s desire to buy indulgences, Luther wrote the â€Å"95 Theses on the Power of Indulgences.† He knew he was attacking the pope and the values of the church, but records show that he felt â€Å"...not fully in control of his actions, but handed over responsibility to a higher power†(84 roper). Cleary, Luther felt a spiritual connection with God and indulgences were in direct opposition to faith. His revolutionary claims in the â€Å"95 Theses on the Power of Indulgences† caused a conflict that would eventually be known as the Protestant Reformation. At the time Luther wrote the â€Å"95 Theses on the Power of Indulgences† he presumed that reforms could still be made by the Pope and the churchs hierarchy; however, after Luther received the papal bull excommunicating him, Luther’s ideology became diametrically opposed to the pope and the whole Roman Catholic structure (shilling 142). This break was a defining timeShow MoreRelatedArgumentative Essay On Martin Luther King815 Words   |  4 Pagesobstacles which led up to this. They suffered in different ways, additionally, some of them got killed. When Martin Luther King, the leader, stood up for what he believed in with a group of black people right behind him, he was put in jail and got severely bruised. King did not stop fighting for these rights and equalities and even through thick and thin, he still was determined. Martin Luther King was a black individual who wanted to end segregation and racism to have equality, and though he succeededRead MoreLetter From Birm ingham Jail Analysis1172 Words   |  5 Pageshear the name Martin Luther King Jr., the first thing that comes to mind is probably racism against African Americans. He is famous for his wisdom and persuasive speeches against segregation of African Americans. This statement holds strongly true because today diverse races are integrated all over the united states. For what ever reason, Martin has been an inspiration to many African Americans. He accomplished his success mostly through speeches, but also through his written essays. Although, hisRead MoreIf We Must Die By Claude Mckay1161 Words   |  5 Pagesdream,† by Dr. Martin Luther King Jr (published; 8/28/1963, genre; narrative and argumentative), â€Å"If we must die,† by Claude Mckay (published; 1919, genre; narrative and lyric), â€Å"Harrison Bergeron,† by Kurt Vonnegut Jr. (published; October 1961, genre; satirical dystopian science-fiction short story). In all 3 texts the authors are giving their tou ch on equality. Equality can convey being treated the same when a colored and a white man/woman are next to each other as Dr. Martin Luther King Jr saysRead MoreMartin Luther, And His Concept Of Christianity1644 Words   |  7 Pagesis an essay about Martin Luther, and his concept of Christianity. As a student and a unbiased Christian, I enjoy studying all types of religions, and elements that encompass them. Luther began his religious career as an Augustinian Monk in the Roman Catholic Church. So, Luther was initially loyal to the papacy, and even after many theological conflicts, he attempted to bring about his understanding with the Church. But this was a contradiction not to suffer because in his later years, Luther wagedRead MoreWhy Kings Letter from a Birmingham Jail Resounds throughout American History?926 Words   |  4 PagesStanding the Test of Time: Why Kings Letter from Birmingham Jail Resounds Throughout American History Dr. Martin Luther Kings Letter from Birmingham Jail is a direct response to A Call for Unity, a letter penned by eight Alabama clergymen including one rabbi. In A Call for Unity, the eight clergymen decry the peaceful protests organized by Dr. King and his fellow civil rights activists. The clergymen claim that the protests are unwise and untimely. In his response written from jail,Read MoreSelf-Reflective Paper 838 Words   |  3 Pages20 pages in this course after turning in this paper, and not including citation pages. In paper 1 I was able to write 4 and a half pages and that was due to my interest in the topic, arguing about the significance of paragraphs 14 and 15 of Martin Luther King Jr’s Letter from Birmingham Jail. For paper 2, which was choosing a topic of choice to argue about, it was easier to write more due to the fact that arguing the topic was so engaging to me. My topic was whether or not congress should allowRead MoreLetter From Birmingham Jail Essay Essay1451 Words   |  6 PagesZhuo Liu Lauren Sassenoff English 1P-5 25 September 2016 Letter from Birmingham Jail Essay In 1963 Martin Luther King Jr. wrote a letter while incarcerated in Birmingham jail to eight clergymen in response to their letter known as â€Å"A Call for Unity.†Ã‚  The letter asked for the stop of direct action type protest in Birmingham, Alabama that Martin Luther King was leading.   The letter has become known as one of the greatest works of argument in American history. Part of the reason for the letter’sRead MorePersonal Values For Ethical Behavior1337 Words   |  6 PagesAcademic Integrity Workshop. The short essay that I wrote for that assignment was roughly two pages long. The second writing task the class had to complete was a short paper. This assignment was longer and more strictly graded than the workshop we previously completed not long before. I wrote a total of four pages in the paper I titled â€Å"Emotional Rhetoric in King’s â€Å"Letter from a Birmingham City Jail†Ã¢â‚¬ . The next paper we worked on was an argumentative paper over any topic of our choice. I choseRead MoreA Brief Note On Sociological Factors On Clients1666 Words   |  7 PagesOF SOCIOLOGICAL FACTORS ON CLIENTS IN COMMUNITY WORK AND SERVICES ASSESSMENT A – ARGUMENTATIVE ESSAY ~ Australia’s social inclusion policy and its failure to support all minorities, specifically same-sex couples King (cited in Australian Marriage Equality, 2015) stated â€Å"When any society says that I cannot marry a certain person, that society has cut off a segment of my freedom†. This quote from Martin Luther King Jr is as applicable today to legalising same-sex marriage as it was to the civilRead MoreEssay Questions On Disobedience And Rebellion3173 Words   |  13 PagesDraft for Argumentative Essay Thoughts of disobedience and rebellion have existed for almost as long as the first law or rule that could be broken. These thoughts come naturally to us, being humans we are curious and we wonder, what would happen if we were to do something different, something off the beaten path. This curiosity has fueled, our evolution, our development to the beings that we are now. It has spawned the thoughts of morality and justice that caused the subject of this essay, civil disobedience

Sunday, December 15, 2019

What Should Coca Cola Have Done Free Essays

What should have occurred? What should occur in future situations? It would be a logical inference to suggest that Coca-Cola’s decision to change its formula and market â€Å"New Coke† to the American population was nothing short of a complete failure. â€Å"On 23 April 1985 New Coke was introduced and a few days later the production of original Coke was stopped. This joint decision has since been referred to as ‘the biggest marketing blunder of all time’† (Bhasin, 2010). We will write a custom essay sample on What Should Coca Cola Have Done? or any similar topic only for you Order Now But to completely dismiss the fact that Coca-Cola was losing market share to Pepsi-Cola, as well as other products that they themselves were producing (Diet Coke), would not fairly give justice to the decisions behind Coca-Cola’s marketing blunder. Coca-Cola was in a dilemma. They were going through an identity crisis, and that crisis seemed to lead them to make their one major costly decision. That crisis was quite simple. Coca-Cola had forgotten who they were and grasping for market share, instead of focusing on branding lead them in an ominous direction. In order to avoid an identity crisis, Coca-Cola should have understood that â€Å"a brand is far more than just a logo. Instead, it’s comprised of a complete set of attributes and tools, or â€Å"identity elements,† that give the brand a unique identity† (Forward). The simple fact is that all the time, money, and skill poured into consumer research on the new Coca-Cola could not measure or reveal the deep and abiding emotional attachment to the original Coca-Cola, felt by so many people. The passion for original Coca-Cola was something that caught executives at Coca-Cola by surprise. It was a mystery, an American enigma, and one cannot measure it any more than one can measure love, pride, or patriotism (Bhasin, 2010). Of all of the consumer research and data analyzing Coca-Cola and its executives claim to have performed, it’s a mystery that they forgot one simple rule; ask your customers first! â€Å"Sam Craig, professor of marketing and international business at the Stern School of Business at New York University, pointed to what he and other industry observers have long considered a fatal mistake on Coca-Cola’s part. â€Å"They didn’t ask the critical question of Coke users: Do you want a new Coke? By failing to ask that critical question, they had to backpedal very quickly† (Ross, 2005). Coca-cola should have concentrated on the brands perception. â€Å"Marketing is a battle of perceptions, not products† (Bhasin, 2010). If Coca-Cola had concentrated on brand perception and less on trying to clone or compete with another company’s product, they would have never made the fatal mistake. What Coca-cola learned was to not be afraid to make a mistake. Yet, most importantly they learned to admit those mistakes and not be afraid to â€Å"make a u-turn†. Through the brand failure of New Coke loyalty to ‘the real thing’ intensified. Coca-Cola assimilated that â€Å"by going back on its decision to scrap original Coke, the company ended up creating an even stronger bond between the product and the consumer† (Bhasin, 2010). Consumers began realizing that coke was more than a drink. It was an experience – an enigma. The question then arises: Coca-Cola has recently decided, along with Pepsi-Cola, to change its recipe in order to avoid putting a cancer warning on their cans. Will Coca-Cola have learned anything from â€Å"the biggest marketing blunder of all time†? Bhasin, H. (2010, January 1). Coca Cola Brand Failure. Retrieved April 2012, 26, from Marketing91: http://www. marketing91. com/coca-cola-brand-failure/ Forward, J. (n. d. ). How to Build Your Brand and Avoid an Identity Crisis. Retrieved April 26, 2012, from Beneath The Brand: http://www. talentzoo. com/beneath-the-brand/blog_news. php? articleID=8478 Ross, M. E. (2005, April 22). It seemed like a good idea at the time . Retrieved April 26, 2012, from MSNBC: http://www. msnbc. msn. com/id/7209828/ns/us_news/t/it-seemed-good-idea-time/#. T5mkCuweSSA How to cite What Should Coca Cola Have Done?, Papers

Saturday, December 7, 2019

Scared or Greedy free essay sample

Those Africans who participated in the Atlantic slave trade did so under many different influences and motivations. The reasons to partake in the slave trade differed from the particular class, culture, and geographic region of the African traders. Because the African continent is such a large and diverse area one can see how varied these prerogatives may be.Yet, it is a historical fact that African traders contributed to the Atlantic slave trade, at the very least, for their own protection from European firepower, and at the worst-?for personal power and purely economic gains. Yet, it is not a question of either-or between the aforementioned reasons for involvement in the slave trade-?but where most African traders fell concerning the two levels of engagement. Although the research backing this paper is limited to only three resources and the first five weeks of a Development of Modern Africa class, one must argue that mostAfrican traders captured and sold fellow Africans to the Europeans for personal power and a share of the profits from the lucrative slave trade. We will write a custom essay sample on Scared or Greedy or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Before determining the angle held by African traders, it is pertinent to address related background information before the Atlantic slave trade, to give the argument context. Long before millions of slaves were shipped across the Atlantic Ocean to work the plantations of the United States, sub Sahara African traders enslaved between five and seven thousand other Africans annually, and sold them to Northern Africans and Arabs in what was now as the Trans-Sahara slave trade (Gilbert/Reynolds 186-7).Also, African elite owned slaves as luxury items with no significant economic dependence on their labor (Gilbert/Reynolds 142). However, according to historian John Thornton, the acquisition of slaves in Africa during the 9th century, was to account for the scarce labor and the abundant land capable of harboring vital crops; if only planted (Gilbert/Reynolds 143). So even before Africans saw the potential threat of European firearms (or any firearms), they participated in selling other Afri cans as property.It is also important to note that once Europeans made contact with sub Sahara Africans, their relationship remained on peaceful terms before the Atlantic Slave trade; so no violent coercion from Europeans influenced African traders to sell slaves (Gilbert/Reynolds 151). The prospect that African traders sold fellow Africans may seem like a heinous occurrence but the contemporary pan-African viewpoint was not shared by Africans during that time period. There was as yet little or no idea obeying African. Rather, inhabitants of Africa identified themselves in arms of local, ethnic, political, or religious groups and saw themselves as more or less distinct from other African populations-?just as European ethnic and national groups were more than capable of defining themselves as distinct from other white or European populations (Gilbert/Reynolds 184). Yet there is still considerable evidence that European firepower instilled fear and perpetuated some unwilling African participation in the slave trade. European trading castles on the Gold Coast were heavily armed and fortified, suggesting their use as an intimidating factor to ensure the involvement of African traders in the slave trade (Gilbert/Reynolds 184). Some historians are convinced of this explanation; among them, accomplished professor and scholar of African history, Lansing Saba. Saba argues that regional African rulers had to comply with gun-toting, slave hungry, Europeans because Africans could not face the onslaught of advanced Western weaponry (Saba 8-9). This would be a more substantial argument fifth African people hadnt been able to prove it wrong.In one particular case, the Ga people overtook a Portuguese castle at Sacra in 1578 (Gilbert/Reynolds 185). If anything, Europeans were Wary of traveling into the African mainland because the African people held an innate advantage over the visiting traders-?their immunity to local diseases. Many Europeans brave enough to venture into Africa died of malaria and yellow fev er (Gilbert/Reynolds 185). So if most of the Africans, who took part in the slave trade, did so on their own accord, what prompted them to do so? Well, the slave trade industry an extremely profitable business.Many slave traders were able to name their price when bargaining with European buyers. Slaves were traded for a variety of things including: cowries, textiles, rum, and guns (Gilbert/Reynolds 187). African elites not only made trades based on economic gain, trades could also be used politically. For example, the Boas of Benign typically stayed out of the slave trade unless they held captive prisoners or enemies Of whom they wanted to dispose of permanently (Gilbert/Reynolds 188). In The Two Princes of Calabash, a similar situation takes place.Little Ephraim Robin John and Anaconda Robin Robin John worked as slave traders in Calabash. They were attacked and made slaves because of the harsh competition they created between a rival slave trading town (Sparks 21 The trading with Europeans brought many valuable items to Africa but one of these foreign imports may have changed previous African traders minds concerning the slave trade. The African traders often gained firearms from the European buyers. Guns in the hands of Africans on a continent where everyone still used spears meant immense power.Those who didnt have guns feared those who did. Some Africans realized the only way to have security would be to own a gun of their own; to do this, they had to bargain for guns with people (Gilbert/Reynolds 189). It has been well established that the incentives surrounding most African traders who took part in the slave business did so out their own personal interest. Yet were these traders aware of the unimaginable suffering that awaited their human goods? Further, if they had been aware, did they abandon their lifestyle f or more ethical ways of self sustained?Saba writes, Unlike the investors, the insurers, the shipbuilders, the dealers, and especially the mariners from abroad, the local African providers had little knowledge of the whole Atlantic system (8). This may true, yet there is an abundance of evidence supporting the fact that African slave traders were very aware of the conditions endured during the middle passage. The better question is, why would this information change the minds of the traders who voluntarily took part in a legitimate and common business venture at the time? It would not. A prime example can be found in The Two Princes of Calabash.Sparks writes how Little Ephraim and Anaconda John finally reach their homeland of Calabash after experiencing seven years as slaves abroad, only for Little Ephraim to continue his previous lifestyle as a slave trader because of the businesss economic importance to Old Town (133-34). Other former slaves escaped or were set free to broadcast their dark experiences to the world with similar results. Overall, according to the sources which helped form this paper, it can be concluded that most African traders who took part in the Atlantic slave trade did so knowing the effects of their actions and for their own personal greed.

Friday, November 29, 2019

Eyes of Pride free essay sample

â€Å"How are your eyes?† â€Å"With pride† belts out the group adorned in sequin capes and funny looking hats. A chilly Saturday evening breeze brushes past but does not distract them as they stand at attention. Unlike other high school students, they are not browsing the mall or playing video games at a friend’s house. Rather, they form a six row block in a school parking lot located hours away from their homes. Once again the question is asked, â€Å"Eyes?† â€Å"With pride!† they exclaim even louder. This passion provoking chant is the most important thing I learned from my participation in high school marching band. It is a friendly vocal reminder that eyes can tell a lot about a person, including how confident they are. Marching band demands confidence and a simple rule is followed: always appear â€Å"tall†. Surrounded by this condition, I learned to hold my head up high literally and emotionally. We will write a custom essay sample on Eyes of Pride or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page However, this newly formed sense of pride was put to the test at the last competition of my freshman marching season. The band sizzled with excitement to perform our field show one last time under stadium lights and in front of a packed crowd. Our uniforms and eyes shined alike as they caught every glimpse of light. Feeling secure about the hard work put into our field show, we proudly marched onto the field. With high energy and intensity, we moved from picture to picture as our feet glided across the Astroturf. The audience cheered as we danced and the trumpet solo played. At the end of the last note they stood to their feet with explosive applause, giving us the only standing ovation of the night. Beaming and prouder than ever, we made our way off the field and waited on the track for the judges to tally the scores. After the exhibition band presentation and a few minutes of nervous tension, a narration crept onto the speakers. â€Å"Ladies and gentlemen, the results of tonight’s competition†¦Ã¢â‚¬  The rowdy audience suddenly quieted. â€Å"In fourth place†¦Ã¢â‚¬  A silent cheer sounded inside of me when our name was not announced. â€Å"In third place, in second place†¦Ã¢â‚¬  Now I was certain we had come in first. â€Å"And tonight’s champion†¦Ã¢â‚¬  A name that was not ours. Shock filled the faces of my band mates as we looked to each other for answers. Yet, before anyone could let out a questioning groan, our band director asked the infamous question. â€Å"How are your eyes?† and I had no other choice but to respond, â€Å"With pride† despite our loss. Even though we did not leave that night with a trophy in hand, we left with dignity and pride in our performance. I still believe that night showcased our band at a high level, both during the show and the awards ceremony. Poise can be displayed under any circumstance; even in the wake of disappointment, I can always face the world with eyes of pride.

Monday, November 25, 2019

Gender and Crime essays

Gender and Crime essays Crime and Gender: Does the punishment fit? Before the jury stands the defendant. There is overwhelming evidence in the favor of the prosecution. The verdict comes back from the jury, not guilty. Why? The defendant is a woman. In our era of equal rights and civil liberties women have made great strides in their advancement and role in society, yet it seems that gender segregates when it comes to crime. There have been countless cases where women and men have been tried for the same crime, yet when it comes to verdict and sentencing, the results dont necessarily match. If one commits a crime one should be punished accordingly regardless of gender. In our society we seem to have two separate rules for our criminals, one for men and one for women. The key issue is are men and women treated equally by the criminal justice system. Another issue in gender biased sentencing is in its is its severity. Are women sentenced heavier for certain crimes then men. From the start women who commit violent crimes are all ready in the spot-light. Society has grown quite accustomed to viewing the womens role in violent crimes as that of the victim. When the women is a violator it incites a gross media fascination as a novelty. Convicted women gain more notoriety then men who are found guilty of committing the same crime. In certain cases like Amy Fisher, Loren Bobbit and most recently Louise Woodward the media celebrate the violence of women. If it had been a man who shot his lovers mate in the head or slashed and dismembered their spouse or shook a baby to death things would be different. The media would not give as in depth of coverage to the trial and sentencing would be of a longer time. The media escalates these women to such extremes due to the fact that there are so few women who are tried for criminally violent acts. Society tends to be more sympathet ...

Friday, November 22, 2019

Research in Politics Essay Example | Topics and Well Written Essays - 3500 words

Research in Politics - Essay Example However, according to Toulmin (2003, Pp. 3 – 8), only logically correct and sound argument that is well presented will lead to the right inference and impression. Toulmin (2003, Pp. 8 – 10) goes further to state that a sound argument and a well-grounded and firmly backed claim should be able to stand against criticism, one for which a case can be presented coming up to the standard required if it is to deserve a favourable consideration. Thus, it makes sense for political scientists and other intellectuals to know how to present sound arguments and to examine rigorously the soundness of arguments that interest them. Baggini and Fosl (2010, Pp. 1 – 58) present a discussion about the basic tools for argument, including deduction, induction, validity and soundness, fallacies, etc., which enable individuals to recognise the worth of an argument and to present sound arguments that appeal to reason. However, although the previously mentioned authors have presented a discussion that introduces readers to the most basic tools or ideas that help with arguments, the term ‘relevance’ merits only a brief mention in the whole reading, even though according to Walton (2004, Chapters 1 and 2), relevance in arguments is of profound significance. Thus, it is clear that despite the excellent arguments and the logic of the discussion presented by Baggini and Fosl (2010, Pp. 1 – 58), it is possible to examine this discussion more critically. The discussion presented herein is a thorough, but critical, analysis of the ideas presented by Baggini and Fosl (2010, Pp. 1 – 58) in their discussion about arguments, which should appeal to all those with an interest in politics, philosophy, logic and the force in arguments. Baggini and Fosl (2010, Pp. 1 – 5) commence their discussion by emphasising the worth of philosophy and philosophers as being seriously concerned

Wednesday, November 20, 2019

Technologies in Shipping and Port Management Essay

Technologies in Shipping and Port Management - Essay Example Nowadays, the bulk carriers are the biggest workers of the fleet, transporting raw materials such as iron ore and coal (Shipping Facts, 2010). Tankers are useful in transporting crude oil, potentially hazardous chemicals, and petroleum products. Tankers often look quite the same as bulk carriers, but the deck of the tankers is usually flushed and covered by oil pipe and ventilation systems (Shipping Facts, 2010). In the same period, a further potential design was intended to revolutionize the transfer of cargo on land as well as, on the ocean, and this design was the freight container. The idea, which had been first developed in the United States during the 1950s, was to pack cargo into rectangular metal boxes, which could be transported by road, railway or ship (Overview of Shipping and Navigation history, 2010). Now container ships, which carry most of the worlds manufactured goods and products, are usually done through scheduled liner services (Shipping Facts, 2010). With the exception of the aforementioned ships, there are two other types of ships that are popular in shipping, one of which are ferries, which usually fulfil shorter trips for a mixture of passengers and commercial vehicles. Most of these ships are Ro-Ro (roll on - roll off) ferries, where allow vehicles to drive straight on and off, making it a speedy and easily accessible way to travel. The other type of ship is known as a specialist ship.  

Monday, November 18, 2019

Selected Retailer in Tesco Case Study Example | Topics and Well Written Essays - 4500 words

Selected Retailer in Tesco - Case Study Example Its customer data –base includes not only details about its client’s interests, and but also contains of an assorted variety of other food-associate services and non-food services and products and also the life-style and demographic details of its shoppers which include total dollars expended on food products in its stores and the customer response to its product promotion and allied programs. (Shajahan 2006:205). For the first time in the year 2005, Tesco achieved the thirty percent market share in the grocery market in UK.TESCO is the first retailer in UK to report revenues more than  £ 2 billion. This is really astonishing as this means that every  £8 spent by UK shoppers, about  £1 will be spent in Tesco stores. TESCO during 2008/09 recorded net sales of  £ 1.9 billion and its profit during the year touched a new height of  £ 109 million. TESCO online shopping website is the top five most visited retail websites on the global level, and it attracts about 3.3 million visitors on a weekly basis. TESCO is distributing about 12 million catalogues during a year and receives about 475,000 orders per week. It has the most effective distribution system and has about 2000 home delivery vans and offers employment for more than 20000 individuals. (Wade-Gery 2009). Tesco’s online retail sales are on the increase on an annual basis. Total online sales by adult population were just 17% in 2003, which jumped to a whooping figure of 62 percent in 2010. Though, Tesco’s online sale is only 7% of total retail sales of UK, but there is a still bright prospect for growth potential in this sector. (Wade-Gery 2009). TESCO’s online business is not only large but also rapidly developing. Online business adds more revenue to Tesco, and it has a competitive advantage as a multi-channel offers are being made. TESCO online business is of low capital intensity in nature but with high returns. Further, the  the online grocery market presents plenty of growth to Tesco as Tesco has penetrated about 3% of overall online grocery market in UK but only about 6.7% of Tesco’s grocery sales are made through online.

Saturday, November 16, 2019

Advertising And The Sales Promotional Schemes

Advertising And The Sales Promotional Schemes The advertisement done today is far more different then the old era. Now, the emergence of new technology, the growth in the internet usage, rapidly changing environment, changing way of communications, fragmentation of mass markets, growing economies, and globalization has changed the overall marketing to use different other communication mediums and techniques with the old ones (newspapers, TV and Radio). Every day we are bombarded with different advertising messages whether it is on the radio while were driving to work, on television during our favorite programs, or in magazines and newspapers. Advertising has entered every area of our lives, and many of us choose to ignore it on many occasions. This might cause one to ask, can advertising and promotional efforts still are effective if people are so saturated with information? The answer is yes, advertising and promotions can be effective if used properly for targeting the right consumer. One of the main rules in advertising has always been to keep message simple and consistent and repeat it often. It has been shown that people remember advertising if they see it with great frequency, which explains why while watching hours of television one may see the same advertisement two or even three times even more. That way the message will positioned in ones mind. Integrated Marketing Communication One of the most important aspects of advertising and promoting a product or service is consistency. Companies ensure the consistency of their message by coordinating all of their promotional activities. This coordination of activities into a system or strategic plan is referred as integrated marketing communications (IMC). IMC creates a unified message and enhances the effectiveness of reaching the target consumer. Firms will create one message that will be used consistently throughout a marketing campaign. It is important that the promotional strategy also be in alignment with the organizational goals. There are three major aspects of an IMC plan:- Research Creative Aspects Implementation. Research and analysis are used to find the best way to design the product or service the most effective message and media to use and the best means to distribute the product or service at the optimal price. The creative aspect is the actual advertising, copywriting and designing of promotional materials. Implementation is the act of putting the plan together, creating a strategy and seeing it through. Planning an integrated marketing communications plan also means finding target market determining what is unique about the product offering or service providing constructing a positioning strategy for product or service deciding what the best message would be for product and choosing the optimal marketing mix in relation to allowed marketing budget. Ideally an effective IMC campaign will differentiate the product or service from a competitors generate a flow of leads be consistent with and support the overall branding strategy cause the company to have a more prominent place in the market. Communicate the companys experience and knowledge and help to retain existing customers. The Promotional Mix The promotional mix is the use of different advertising and communication channels in a coordinated way to run an effective marketing campaign. These coordinated campaigns are part of an effective integrated marketing communications plan. The four main methods of promotion within the mix are:- Advertising Sales Promotion Personal Selling Public Relations The most important factor in determining the optimal mix is identifying the target market. This can be determined through extensive market research. Once a company knows its target market it can then research its use of various media outlets in order to come up with the best combination of marketing materials to reach the defined target. For example if the target market is stay-at-home moms, an organization might find that television advertisements during certain daytime television shows are most effective for reaching them. If the target market is a young professional, the marketer might find that using billboards in a downtown commercial district and morning drive time radio advertisements are effective for getting the message to this target market. The size of the promotional budget will greatly influence the chosen mix as well. Television advertising can be very costly and therefore may not be a feasible option for a company with a smaller marketing budget at least not during pri me viewing hours on major networks. Often the amount of money a firm spends on promotional activities will be affected by the product life cycle general economic conditions and the competition. The promotional mix may involve a company coordinating its loyalty program with advertising campaigns and a promotional deal. Advertising Advertising is paid communication brought to audiences through different forms of media such as television, radio, newspapers, magazines and billboards. A company uses advertising to inform, persuade or remind its target market of its products or services. Comparative advertising is used to differentiate a companys products in the marketplace from other similar products. For example The Pepsi Challenge campaign was a form of comparative advertising in which consumers were asked to take blind taste tests to see if they could tell the difference between the products. Coca-Cola uses reminder ads to show us how refreshing the beverage can be on a hot day. 1.4. Different Medium of Advertising and Sales Promotion Advertising Mediums There are advantages and disadvantages to each media type and when selecting the advertising mediums to use companies must understand who their target audience is and which the most effective method for reaching them is. Marketers must be able to divide their budgets among the various media resources in order to stretch them the farthest to reach the most customers. Television Television advertising is the leading medium for reaching Indian audiences. Although a very expensive form of advertising, television ads reach the largest percentage of the Indian population at once and can be very appealing due to their visual nature as well as their sound. TV ads can be classified into national, local, and cable advertisements. The type of network chosen will depend on which audience the marketer is trying to reach. If the advertisement is for a local restaurant the company may choose to advertise only on local stations or in local ad space on cable channels or national networks. The time an advertisement is shown is also an important decision that companies must make in order to reach the target audience. Budgetary constraints will also be a factor in choosing time slots for advertisements. Print Advertisements Advertising in newspapers and magazines is another way of reaching customers with a companys message. Print ads are effective because of their visual quality and can be run in many different types of publications. Marketers selling products or services to consumers may choose national publications such as India Today or local newspapers such as the Times of India and Hindustan Times. Businesses trying to sell products or services to other businesses will often advertise in trade publications of the industries they are trying to reach. Companies may also target specialized publications for example a new computer product may be advertised in PC World or another specialty technology publication. Print ads have a longer life than electronic media ads and are good for telling a story about the value of a product or service. Radio Although lacking the visual appeal radio can be an effective medium for reaching target consumers. The average radio listener tunes in for three hours a day and often on a regular basis. When using radio advertisements in marketing mix it is necessary to make sure that the company and product or service is clearly identified. As with television it is also necessary to find the right station for advertising to the target consumer. If your service is a bar for college students you may choose to advertise in the evenings on a college station or an alternative rock station and if your target audience is senior citizens you may advertise on news stations or a talk show. Internet The Internet has become an important electronic medium and its interactive quality is unique. It permits immediacy of purchase and a high level of convenience. It can be personalized and individualized. The Internet and the World Wide Web are becoming essential tools in an integrated marketing plan and effective tools in sustaining customer loyalty and satisfaction. Direct Mail Mailing advertisements or promotions directly to peoples homes is another commonly used method of reaching consumers. Direct mail campaigns can be expensive due to printing and postage costs but these campaigns can be effective if the mailings reach the right consumers. Often companies will purchase lists of consumers or collect data themselves to build a mailing list. The people on these lists will then be sent targeted mailings. Telemarketing The utilization of telemarketing has been greatly affected in India by the recent implementation of the national Do Not Call registry, where millions of Indians signed up to have their telephone numbers removed from telemarketer lists. Internationally however regulations regarding telemarketing vary and it may still be a very effective method of reaching consumers. The downside of telemarketing is that most people do not like the invasiveness of being called at home though unfortunately many mass marketers find the risk of offending non receptive households is offset by the effective results and benefits from these marketing methods. Outdoor and Out of Home The majority of outdoor advertising rupees are spent on billboards. Billboards are a popular way of reaching commuters and consumers in a single geographic location. Other forms of outdoor advertising known as out of home include sports stadium ads, bus shelter posters, or signage on buses and taxis. Advertising Trends A very popular way of getting a message across is using celebrity endorsements. Advertising companies are willing to pay money in order to hire celebrities to represent their brands. Celebrities are part of an advertising message and campaign. Of course using a celebrity spokesperson can be a risk. When choosing a celebrity to endorse products, it is important to find an appropriate match with the product or service. The relationship should be believable. It is also important that the celebrities endorsing the product be credible. They should either have expertise in the field or be trustworthy characters. Sponsorships This is a well-used form of promotion and advertising that allows the company to buy into a sporting event or activity. The amount of investment in a sponsorship can range from an athletic company supporting a college sports team by providing them with brand-name uniforms in order to promote the brand to a company sponsoring a cricket game. For example Pepsi and Coke use to take sponsorship of cricket time to time. Infomercials Another trend in advertising is the infomercial. This is an extended television advertisement and usually runs at off peak hours or on lower-budget television or cable networks. Infomercials are usually at least a half hour long. Some of the most popular items that are sold through infomercials are fitness videos, skin care products and kitchenware. Often they will feature celebrity endorsements and offer products that cannot be purchased in stores. Their low-budget appearance and late-night showing often characterize infomercials. Once the consumer is convinced to purchase the product he or she will then be able to call and order the product over the telephone generating a direct response to the infomercial. Sales Promotion Sales promotion consists of many activities used to sell products. They are activities that give consumers a short-term incentive to make a purchase. Sales promotions are also activities that change the price and value relationship of a product as perceived by the target audience with the possible effect of generating immediate sales. It is possible that a sales promotion can also alter the long term value of the brand by making what might be a premium product more affordable. Sales promotions are generally time-bound programs that require participation on the part of the consumer through either immediate purchase or some other action. The fundamental goals of sales promotion are tactical, strategic and ultimate. The tactical goals are to combat a competitors increase in market share to combat other competitors promotional efforts and to move brands that are either declining, overstocked, damaged or not selling fast enough. The strategic goals are to motivate consumers to switch from a rival brand to increase product consumption to reinforce the marketing communications efforts for the brand and to motivate brand loyalty. The ultimate goal of a sales promotion is to increase sales, profits and market share. There are different channels for sales promotions which include consumer promotions and trade promotions. Consumer Promotions Consumer promotions are geared toward getting consumers to try a companys products. Some examples of consumer promotion activities include coupons, rebates, sampling, sweepstakes, point-of-purchase displays and special packs. Coupons Whether we cut coupons from newspapers and magazines or getting them in the mail, coupons are a very popular form of sales promotion. They are very effective especially in economic downturns for luring people into restaurants or causing them to make repeat purchases of products. E-coupons are another popular form of sales promotion they are extremely effective for luring in customers and are redeemed by 57 percent of the people who click on them. The most popular uses of e-coupons are for sales of groceries, books and health and music products. The disadvantage of coupons is that they do not encourage brand loyalty most consumers who use coupons regularly are willing to switch brands if there is a better discount available. Rebates Rebates are partial refunds that are offered by the manufacturers. Often manufacturers will use mail-in rebates as incentives for purchasing. The consumer must purchase the product at full price and then fill out paperwork and mail in the receipt in order to receive some money back. Rebate programs allow marketers to promote a companys product at a reduced poster bate price also called MRP offering a substantial savings to its customers but also requiring that a set of conditions be met to qualify. Sampling Companies will often send or hand out samples of products in order to attract customers who may not have purchased their products otherwise. Beverage companies may target college students and hand out soft drinks on campuses, or a food company may set up a stand in a grocery store so that consumers can sample their new chips. You may even receive a trial bottle of shampoo in the mail or you may remember receiving the India Online (IOL) CD in the mail offering 100 free hours of Internet access. These are all examples of sampling, and the intention of these promotions is to introduce a new product or service to a consumer in order to generate brand loyalty. Sampling can be a costly method of attracting customers and it often results in wasted distribution however it can be a very effective method for getting consumers to switch brands. Sweepstakes and Contests Sweepstakes and contests are another strategy of sales promotion. Data will be collected from consumers and they will be entered to win a prize. Companies can use the information that they collect from entrants in order to develop a mailing list for future promotional campaigns. Organizations must be sure to print all the guidelines for their sweepstakes or contests in order to avoid legal entanglements. Some of the guidelines companies should follow in order to put on a successful sweepstakes promotion include the following:- Clarify who is eligible Indicate states where the promotion is not valid Declare the termination date of the promotion Clarify random drawing procedures Companies should also detail the prizes disclose the odds of winning declare a deadline for entry and reserve the right to use winners names and photographs for publicity. Point-of-Purchase Displays Point-of-purchase (POP) promotional materials are displays that are set up in stores in order to prominently display products. At a grocery store a POP is usually placed in front of the store, at the end of an aisle, in the aisle or on the shelf. POP displays are very successful due to the fact that many people make last-minute purchasing decisions. Bundling Sometimes companies bundle products together in order to promote a new product or to encourage consumers to try a complementary product such as a free small conditioner bundled with a shampoo purchase or a free disposable razor with a shaving cream purchase. A company may also offer a bonus pack or a special pack with 20 percent more in order to encourage a customer to purchase a product. Give a ways Another strategy used by companies is that of special promotional items to be given away. These may be hats or T-shirts advertising the company or brand. For example, many times credit card Advertising

Wednesday, November 13, 2019

monuments :: essays research papers

Monuments   Ã‚  Ã‚  Ã‚  Ã‚  Monuments are a symbol of a significant time in history. Monuments represent life, death, success, and struggle just to name a few. They have become as important to society as the events they represent. They bring history alive to new generations and memories to those who experience them firsthand. Monuments create a bridge between generations. Many parents feel a certain indescribable joyfulness when they see the look in their child’s eyes they had went they viewed the same monument.   Ã‚  Ã‚  Ã‚  Ã‚  Many people feel a strong sense of patriotism and nationalism when they view a monument. Pride in one’s country is a great feeling. Monuments help bring out those feelings of nationalism. Homeland monuments such as the Statue of Liberty and Madison Square Garden makes one feel special. Millions of people from all over the world come to where you call home to view something that is special to you. We take such things for granted too often.   Ã‚  Ã‚  Ã‚  Ã‚  I came across many monuments in my research for this paper. I was very intrigued by monuments in New York City. Many people forget about the less talked about monuments. Such as the Flatiron Building and Gracie Mansion. Of course they are those well-known monuments as well. There is the UN building, which has been around since 1949. Penn Station is also another well-known monument. It has been around since the early 1900’s. There are many others including Grand Central Station, the George Washington Bridge, the Cathedral of St. John and Yankee Stadium just to name a few.   Ã‚  Ã‚  Ã‚  Ã‚  I have seen and been to a few monuments in my life. The one that’s sticks out in my mind the most is my visit to the World Trade Center after the first bombing. I remember the first couple of floors were being worked on, and you couldn’t really walk pass the building. Still, it was a magnificent site to see. I must have looked like a tourist because my eyes were constantly focus on all the huge skyscrapers that surrounded me.   Ã‚  Ã‚  Ã‚  Ã‚  Another monument I recently visited is the Reynolda House in North Carolina. The mansion was transformed from a place of living to a thriving monument.

Monday, November 11, 2019

Appearance vs. Reality -Macbeth

‘Fair is foul, and foul is fair’, a phrase that has become synonym with Macbeth. It is also the introduction to one of the most important themes of this tragedy: appearance and reality. Shakespeare uses various characters and situations to emphasize this confusion between the real and the surreal, the authentic and the fake, the act and the sincere. In order to discuss this theme, different characters will be looked at: in the first paragraph, the Witches, in the second, Duncan and in the third, Lady Macbeth.Appearance vs.  reality is also seen in the beginning of the play when the witches introduce the quotation, â€Å"fair is foul, and foul is fair,† or what seems good is really bad—Macbeth; and what seems bad is really good—Malcolm flees Scotland when his father dies and looks guilty, but he is only trying to protect himself. The witches' second set of predictions promise Macbeth a long reign. They tell half-truths to give him a â€Å"false sen se of security. † Though the first prediction is true (â€Å"Beware Macduff†), the other two predictions make Macbeth believe he can't be killed.The appearance of the predictions lures him, and the reality behind them destroys Macbeth. The Witches introduce the theme with the infamous phrase â€Å"Fair is foul, and foul is fair† in the first scene. It’s functional for the Witches to say this in the beginning of the book, as they are the start of all the perplexity. They become the core of confusion when they awaken Macbeth’s ambition and transform his perspective of good and evil, making bad things look good and good things look bad. Ironically in connection with this, Banquo warns Macbeth, â€Å"Win us with honest trifles, to betray’s In deepest consequence†.The Witches continue to speak in contradicting language, such as â€Å"lesser than Macbeth, and greater† and â€Å"Not so happy, yet much happier† that adds to the s ense of moral confusion, by implying that nothing is quite what it seems. Banquo’s warning is fulfilled at the end of the play when the Witches had won Macbeth’s trust with prophecies that became true –‘honest trifles’- and then betray him in the things that really mattered, his life and his country -‘deepest consequence’- to win his spirit for hell.Until his death, King Duncan was misled by Macbeth’s false loyalty. When the Thane of Cawdor had been found guilty of being a traitor and was hanged, King Duncan thought so highly of Macbeth, that he gave the title to him. The Thane then ironically dies with pride while Macbeth dies a foe of Scotland. The King was under the impression that Macbeth was a loyal and brave soldier, calling him â€Å"O worthiest cousin†, but Macbeth was actually already planning to kill the King, â€Å"whose murder yet is but fantastical†.Even when Duncan goes to visit Macbeth, he praises the castle’s pleasant environment and hospitality, â€Å"This castle hath a pleasant seat†, but is totally unaware of Macbeth’s plans to murder him. From the first time we meet Lady Macbeth, we get the impression of a strong-willed and bold person, an ideal wife. As the play evolves, Macbeth grows stronger and Lady Macbeth begins to despair, commits suicide and proves to be the antithesis of an ideal wife.She seems to lack conscience, saying â€Å"A little water clears us of this deed†, but towards the end her conscience drives her mad and she sleepwalks, washing her hands and saying â€Å"Out, damned spot! † refering to the blood she imagines to see on her hands as a result of her plaguy conscience. In conclusion, interestingly Macbeth’s first line in the play is â€Å"So foul and fair a day I have not seen†, suggesting Macbeth as the focus of the play’s moral confusion.Within him the conflict between good and evil continue, in t he end driving him to his death. It’s clear to see that Shakespeare identified in life what he saw as the world’s fatal flaw, the inability to distinguish between appearance and reality, using Macbeth as a tool to communicate this. Throughout the play appearances, which are often deceitful, influence the whole plot of the play. It comes out mainly through the way Macbeth saw Kingship as a form of security and prestige but was then faced with even stronger feelings of insecurity and fear.

Saturday, November 9, 2019

“A Scandal in Bohemia” by Sir Arthur Conan Doyle

The short story, â€Å"A Scandal in Bohemia,† is one of the many stories that Sir Arthur Conan Doyle wrote that starred his most famous character, the master sleuth, Sherlock Holmes.Being that it is a detective story, the type of which most of the later detective stories by lesser known writers were modeled after, the story follows the model for the stages of narrative perfectly, almost strictly. First, the narrator, Dr. Watson, gives the exposition. It is assumed, of course, that the reader is already familiar with the other Sherlock Holmes stories, his friendship with Dr. Watson, their previous adventures together, etc.Dr. Watson starts by introducing the character of Irene Adler; he also makes a quick mention of his previous adventures with Holmes, Holmes’ own odd habits and even odder habits, and even of Watson’s marriage that was introduced in a previous Sherlock Holmes story. Next, the conflict is introduced into the story.As with most detective stories, es pecially one with such an established character as Holmes, the conflict starts with the introduction of the new case to be solved.The rising action stage, then, involves the rest of the story that led up to the climax: the explanation of the king, Holmes’ initial investigation of the Adler house, Irene’s marriage to Norton. Most of the action in the story occurs as Holmes and Watson carried out Holmes’ plan: the organized scuffle, Holmes’ entry into the house, all up to his explanation of the whole plan to Dr. Watson. In the next scene, where Holmes invited the King of Bohemia to join them in retrieving the portrait would have then, naturally, been the part that concludes the entire case.This, however, though not exactly a false climax, was intentionally misleading. The discovery and reading of Irene Norton nee Adler’s letter is the actual climax.This part not only gives a conclusion to the King’s case, but also explains why Sherlock Holmes, and even Watson at the beginning of the narrative, gave such an importance to Irene Adler; she was one of the very few people ever to outwit Holmes and the only woman to do so. The falling action occurs right after they read the letter, as they thought about the implications of its contents. Holmes even admired Irene so much that he asked for her portrait as his only reward, even though he knew he could have had any sum of money from the King, had he asked. Another element included in the story is foreshadowing.The introduction that centered around Holmes’ special perception of Irene Adler above all other women made it very obvious that she was a unique character in some way. Also, Watson’s statement that â€Å"So accustomed was I to his invariable success that the very possibility of his failing had ceased to enter into my head† hinted at Holmes’ pending rare failure.

Wednesday, November 6, 2019

remote system controller Essays

remote system controller Essays remote system controller Essay remote system controller Essay International Journal of Computer and Information Technology (ISSN: 2279 volume 02- Issue 04, July 2013 RSC Remote System Controller Donfack Kana A. F MadadJim Roland Department of Mathematics, Ahmadu Bello University, Zaria, Nigeria. e-mail: donfackkana {at} gmail. com 0764) Abstract- The advancement in mobile technology is fast changing the traditional way of computing. Several tasks which were previously performed only on personal computers are now possible with mobile devices. This paper presents RSC, a remote system controller, which is an application to control a remote computer through Java enabled mobile evices such as mobile phone. Basic computer operations such as rebooting, shutting down a remote computer and file transfer from a computer to a mobile device are implemented. Keywords-Mobile application, Remote Computer control, Java networking. l. INTRODUCTION Since the advent of mobile phone, (the first experimental handheld in 1973 by Dr Martin Cooper and first hand-held to be commercially available in 1983 [12] ) mobile technology has not stopped growing, exploring new dimension. According to [6] mobile phones are no longer mean for only voice data communication, but now-a-days the scenario has changed and oice communication is Just one aspect of a mobile phone. Day to day, new technology are incorporated in mobile phones but are less useful in the hands of the users due to lack of applications that will make use of these resources. Handheld devices such as a mobile phone require certain applications and services for their efficient utilization. Since mobile phones, as the name indicates are mobile in nature [10], it will therefore be one of the most efficient way for real time monitoring of non mobile application that require close monitoring. For example, a video surveillance system ecord can be accessed on the communication and data access between mobile and non-mobile devices. Having a mobile device that can be used to access data from a local system from far distance can be of great additional value to individuals and corporations. wrww. iJcit. om Technological developments have enabled the creation of mobile devices with the technical features which were previously conceived only in personal computer (PC) architecture [2]. Those features can be exploited in order to achieve optimal interaction between the PC and the mobile device. The advancements in 36 technology and wireless ommunication bring the convenience usage of mobile devices on internet [2]. These advancements are being used to add more functionality on mobil e devices. As a result, more applications are developed to feed the ever expanding mobile features. This paper develops a Remote System Controller (RSC), which remotely controls a computer system on the internet or local network. II. RELATED WORKS Several applications have been developed for controlling a PC but limited in the type of service they rendered and in the kind of technology used. They include RDM+, TeamViewer, IrDesktop, PocketDroid, VNC among many others. TeamViewer [1 1] is used for remote control, desktop sharing and file sharing between computers. The software operates with the Microsoft Windows, Mac OS X, Linux, iOS, and Android operating systems. Machine running TeamViewer can be accessed with a web browser. In the default confguration, TeamViewer uses one of the servers of TeamViewer. com to start the connection and the routing traffic between the local client and the remote host machine. However in 70% of the cases after the handshake a direct connection via UDP or TCP is established. Virtual Network Computing (VNC) [7] is a graphical desktop sharing system that uses the RFB protocol (remote framebuffer) to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network. VNC is platform-independent. 767 JAVA for the server side application and Android for the client side application. PocketDroid is used for file sharing between PC and android devices, start and stop the applications installed the target PC. Mobile Phone Client-side RSC Sending command Client GUI jrDesktop [4] is a cross-platform software for remote desktop control, remote assistance and desktop sharing. It is useful for home networking, helpdesk, system administration and collaboration. It supports Java 1. 5 and works only on LAN. It uses UDP instead of RMI/ TCP, share only a specific userdefined region. Server Controller System Manager Remote Desktop for Mobile RDM+ [8], is a communication tool that gives the ability to connect to a remote desktop computer through the mobile device and interact with it remotely. RDM+ enables picturing of the remote desktop on he screen of the mobile device and to perform different usual keyboard and mouse commands. In view of the above applications among many others, the technology and languages used in designing these applications differ from one programmer to another; From android platform to Java platform, C# or Visual Basic. Most of the applications developed using Java platform differed from the RSC in the protocols used and a third party, that is, the web for server hosting was used in those applications. Ill. ARCHITECTURE OF RSC RSC uses Java connection-oriented sockets and system ommands to achieve it functionality. Java socket is used in RSC on both the client and server application to provide compatible and efficient streams for the communication between the client and server. Transmission Control Protocol (TCP), type of socket was chosen to provide reliable, bidirectional, point-to-point, and stream-based connection between hosts. For the implementation of the system in the RSC system. The internal commands are used to manipulate the files while the external commands are used to perform the computer operations such as shutdown and reboot. The RSC system is made up of a client-side RSC, which runs on the mobile device with Java enabled capability, and a serverside RSC that runs on the PC. The communication link between these two parts of the RSC uses TCP. Fig. l describes the relationship and operation of the two parts of the RSC. File Manager -rcp link Operating System File Manager Control System Disk and File Process Management Receiving Response Figure 1: Basic Architecture of RSC A. Client-side of RSC The client-side of the RSC is divided into two modules as shown in fgure2: the file manager module, responsible for files transfer and esponsible for performing some basic system operations of the remote computer. File Manager Module This module is responsible for sending various requests to the server for files transfer. The operations in this module are dependent of each other. Firstly, the list of all disk drives found on the remote computer is requested, followed by subsequent listing of the contents of selected disk drives. Operations such as copying or deleting a file can be performed on the files. System Manager Module This module controls the remote computer itself by accessing its resources. Commands are sent directly to be executed by he PC, they comprise shutting down instructions, rebooting instructions etc 68 International Journal of Computer and Information Technology (ISSN: 2279 0764) Edition 02SE) platform while the client application is designed using Java 2 Micro Edition 02ME). Start The mobile device running an RSC-client can connect to the remote computer through internet. The RSC-client opens a socket connection to pass required information and commands to the server which in turn executes them. It also receives the response from the server, thus acting like a mobile remote contr ol. Enter Computer Name(lP/DNS) No Successfully Connected? Yes The RSC-client needs to connect to the remote PC through its address which can be an IP address or a DNS name. If RSC is used behind a router, port forwarding should be enabled. Menu Option Help About Disconnect Figure 2: Dataflow of client side RSC B. Server-side of RSC This module, which resides on the computer to be controlled. It is responsible for receiving commands and requests from the mobile side RSC and executes them. The results are sent back to the client application. All processing are performed at this module, making RSC a thin-client model. The communication in the RSC uses the TCP/IP. According to [3] TCP is relatively application-oriented in that using its socket facilities provides applications with a bi-directional byte stream between two hosts located at application endpoints. A connection-oriented service is best for applications that require characters to be received in the same order in which they were sent, such as keystrokes typed from a terminal or bytes in an ASCII file transfer [3]. IMPLEMENTATION AND RESULT The RSC system involves communication between a mobile device and a remote computer, which is based on socket rogramming. RSC is implemented using Java. The choice of java is due it features. Java is platform independent. Because of Java flexibility and robustness, it provides the best deal for the development of such applications. Java platform is widely used Cava platform covers more than 1/3 of mobile devices market). Java programs can be deployed on both mobile devices and non mobile devices, independent of host hardware and operation systems. Client-side and server-side Java applications can integrate seamlessly under consistent Application Programming Interface (API) designs. The server pplication of the RSC was designed using the Java 2 Standard wrww. iJcit. com A. Establishing Connection the RSC, when provided with a valid target PC address, a connection is established between the mobile device and the remote computer on the provided address. A port opened on the remote PC will be listening for incoming data, which will be bound to the mobile device port and so enabling communication between them. Listing 1 and Listing 2 show the pseudo-code for the connection phase. pen a connection through IP on a given port create inputstream and outputstream send request on outputstream ead response on inputstream Listing 1: Clients connection pseudo-code create a socket bind to a well-known port place in passive mode while(true){ wait for client connection request establish a connection with client handle client request create an inputstream and outputstream while(client write){ read a client request on inputstream process request send a reply on outputstream close the client socket close passive socket Listing 2: Servers connection pseudo-code. Upon a successful connection to the server, the mobile user is presented a GUI menu of the RSC where the user can fully interact with the system. 69 B. File Manager The implementation of the file manager is to achieve effective file browser which will enable the user to view the remote computer data content and to perform basic manipulation on these data. Fig. shows a view of the file browser interfaces captured from a mobile The pseudo-code in Listing 3 shows the process used by the server-side program in executing the commands of the file manager module of the client-side. It lists and sends the list of all the drives to the mobile device through a port. Java File class is used in accessing the PC resources. Filet] roots File. listRoots(); for( i i

Monday, November 4, 2019

Security Risk Assessment Coursework Example | Topics and Well Written Essays - 1500 words

Security Risk Assessment - Coursework Example There are a variety of risks that a business organization faces when it comes to the implementation of a secure information technology system. This includes loss of information, an attack by internet or computer viruses and malwares, authorized use of data, etc (Vladimirov, Gavrilenko and Michajlowski, 2010). This paper analyzes the various elements that would make the computer system of a business organization to be vulnerable. It also examines the various measures aimed at protecting the computer system of a business organization. A secure computer system must comprise of three major elements, namely recovery, resilience, and contingency (Calder and Watkins, 2010). Under resilience, the critical functions of a business organization and its supporting infrastructure are engineered and designed in a permanent manner. They are designed in a manner that it is impossible for any disruption to affect the functionality of these systems (Bradley and Carvey, 2006). It makes it likely for an organization to maintain its operations in case of a major threat or attack to its computer systems. For instance, a business organization may develop power back up systems, to protect the loss of data or their computer networks from going off, in circumstances where power fails to occur (Harrington, 2005). Business organizations may use solar gadgets and generators to protect their computer systems, in circumstances whereby power may fail. Recovery involves restoring the important features of a computer system or network that failed to function (Bradley and Carvey, 2006). Computer experts may make arrangements aimed at recovering lost data, and making replacements on areas that is needed. This is to ensure that the activities of the business organization are not interrupted in any negative manner (Oppliger, 2000). Contingency involves

Saturday, November 2, 2019

Should Disabled Children Be Mainstreamed In Public Schools Essay

Should Disabled Children Be Mainstreamed In Public Schools - Essay Example From this study it is clear that the supporters of mainstreaming argue that all special children have an equal right to the opportunity of social inclusion. The opponents of mainstreaming do not disagree; no rational minded person can deny the rights of social inclusion of disabled children. But the question is: does mainstreaming ensure social inclusion of the disabled children? The answer is unfortunately, in the negative. In a book titled: ‘Alone in the mainstream: A deaf woman remembers public school’, Olivia shares her experiences as a deaf student in a mainstream environment.. Olivia has shared her experiences of the painful social isolation she felt while being mainstreamed in a school where she was the only deaf child and how the environment and being different from other children made her feel like a solitaire. ‘I was alone among so many people because they were not like me’. The main principle underlying mainstream is social inclusion; what’ s the point in it if the mainstreamed children despite being a part of it, remain isolated in the normal environment? This study outlines that the advocators of mainstreaming also claim that disabled children can be taught is regular public classrooms. This is also not as simple as it appears. The success of a special child in a regular environment depend upon two main factors, one: the type and extent of disability and second is the attitude of teachers. Children with physical handicaps are usually a bit more accepted by regular children and teachers as compared to those who are mentally handicapped.

Thursday, October 31, 2019

Concept Software Systems Essay Example | Topics and Well Written Essays - 2750 words - 1

Concept Software Systems - Essay Example According to the paper the hardcopy of the email was left in a common work area and by chance was read by David. The dilemma is what David should do, because of his knowledge of the matter. Although several unethical situations develop, it is the issue of the confidential email’s contents that is the main problem that calls for a resolution. David is a principled young man raised with strong moral values and a propensity to stand for what is right. However, adverse action on his part may earn him the ire of his superiors and peers and may cost him his job. Furthermore, the manner by which he came upon the email brings to question the validity of his future action on the matter. This report will present the case analysis and discussion of Concept Software Solutions (CSS), which deals with the application of ethical principles and practices in the context of information technology and electronic communication. Based on the theory of utilitarianism which commands the greatest good for the greatest number, workers should be ensured proper working hours, otherwise this situation is reduced to exploitation for the sake of gain of the employer. However, if in a particular jurisdiction a limited number of hours per day is assured the worker by law, then the theory that applies is the Social Contract theory, because the terms of the social contract (which is the law) is enforceable by the government. Â  Angela's chatting online is unethical. Based on the Kantian theory, it is immaterial what Angela wants to do; what should govern is what she ought to do. Implicit in her employment contract is Angela's duty to work for the good of her employer within working time a nd place. Viewed this way, she is also bound by the Social contract theory, because her employment contract has the force of law. She may not use the time and resources according to her own whims.

Tuesday, October 29, 2019

Term “integrity” Essay Example for Free

Term â€Å"integrity† Essay Integrity It is necessary to outline that the term â€Å"integrity† is considered polysemantic meaning it is provided with lots of meanings. Integrity is the most important terms used in virtue ethics, for example. Integrity is used in the scientific and technological fields. Therefore, this term is often puzzling and perplexing. Sometimes people use integrity as a synonym to â€Å"moral† trying to distinguish that person is acting with integrity. However, researchers noted that people of integrity may act immorally, even if they are unaware of their immoral actions. Thus it is necessary to say that a person may be of integrity even if he holds importantly mistaken perspectives on ethics and morality. Firstly, integrity is defined a quality of a person’s character. Then people thinking of integrity of wilderness region or ecosystem, art forms, computerized database, etc. Integrity is applied mostly to the objects and it suggests purity, intactness and wholeness of an object. These meanings are often applied to people. Speaking about regions, integrity means that a region isn’t corrupted by side-effects of development and its advance. Region of integrity suggests wilderness and uncorrupted or virgin. In computer science, integrity means that computer database is able to maintain power and resist to errors, integrity of defense systems suggests that system isn’t breached. In music, for example, musical work has integrity if its musical structure is provided with completeness which is coordinated and has related music ideas. Simply saying integrity in music means that music piece is whole, intact and pure. Integrity is found in many aspects of human’s life. For example, there are ideas of intellectual, professional and artistic integrity. Nevertheless, integrity has found its application mostly in philosophy meaning human’s general character. As it is noted â€Å"philosophers have been particularly concerned to understand what it is for a person to exhibit integrity throughout life†. In philosophy, when a person acts with integrity on a particular occasion it means that integrity is explained as broader feature of person’ character. There is a claim that person should possess integrity. Ordinary discourse about integrity involves two fundamental intuitions: first, that integrity is primarily a formal relation one has to oneself, or between parts or aspects of ones self; and second, that integrity is connected in an important way to acting morally, in other words, there are some substantive or normative constraints on what it is to act with integrity. How these two intuitions can be incorporated into a consistent theory of integrity is not obvious, and most accounts of integrity tend to focus on one of these intuitions to the detriment of the other. Integrity is a matter of persons integrating various parts of their personality into a harmonious, intact whole. Understood in this way, the integrity of persons is analogous to the integrity of things: integrity is primarily a matter of keeping the self intact and uncorrupted. A related approach to integrity is to think of it primarily in terms of a persons holding steadfastly true to their commitments, rather than ordering and endorsing desires. â€Å"Commitment† is used as a broad umbrella term covering many different kinds of intentions, promises, convictions and relationships of trust and expectation. One may be, and usually is, committed in many different ways to many different kinds of thing: people, institutions, traditions, causes, ideals, principles, projects, and so on. The self-integration and identity views of integrity see it as primarily a personal virtue: a quality defined by a persons care of the self. Persons of integrity treat their own endorsements as ones that matter, or ought to matter, to fellow deliberators. Calhouns account of integrity promises to explain why it is that the fanatic lacks integrity. It seems intuitively very plausible to distinguish between fanatical zeal and integrity, but the self-integration and identity views of integrity threaten to make the fanatic a paradigm case of a person of integrity. References Graham, Jody L. (2001). Does Integrity Require Moral Goodness? Ratio 14, 2, 234-251. Harcourt, Edward (1998). Integrity, Practical Deliberation and Utilitarianism. Philosophical Quarterly, 48, 189-198. Herbert, Mark R. (2002). Integrity, Identity and Fanaticism. Contemporary Philosophy 24, 25-29.

Sunday, October 27, 2019

The Strategic Rationale For Outsourcing Decisions

The Strategic Rationale For Outsourcing Decisions By reviewing the relative and risks of making or buying, firms can persuade their expertise and resources for improved profitability. Combining two strategic approaches accurately permit managers to coordinate their companies skills and resources efficiently beyond levels obtainable with other strategies. 1- Concentrate companys possessed resources on its core competencies through which the company can achieve definable incomparability and offer unique value for customers. (Quinn, and Doorley, 1990) 2- Outsourcing strategically other activities of the companies consisting of many conventionally believed primary to a company which are neither special capabilities the firm nor affect critical strategic requirements. (Quinn, 1992) Substantial gains can be achieved from effective combining of the two approaches. Directors leverage their firms resources in four manners. First, they expand returns on in-house resources by focusing investments and energies on the enterprises best jobs. Secondly, if core competencies are well-developed a company can supply astounding barriers for present and forthcoming competitors that look for entering into the companys areas of interest, thus assisting and shielding the strategic advantages of market share. Third, conceivably the utmost leverage of all is the full deployment of external contractors, investments, innovations, and specialized professional capabilities that would be unaffordable or even not possible to replicate internally Fourth, in rapidly shifting marketplaces and technological circumstances, this cooperative strategy reduces risks, shortens discovery and manufacturing cycle times, decrease investments, and generates better responsiveness to customer needs. (Quinn and Hillmer 1995) Earning sustainable competitive advantage through Outsourcing Managers can combine core competency concepts and strategic outsourcing for maximum effectiveness. Managers can analytically select and develop the core competencies that will provide the firms uniqueness, competitive advantage, and basis of value creation for the future. Core competency strategies The basic ideas behind core competencies and strategic outsourcing have been well supported by research extending over a twenty-year period.[4] In 1974, Rumelt noted that neither of the then-favored strategies unrelated diversification or vertical integration yielded consistently high returns.[5] Since then, other carefully structured research has indicated the effectiveness of disaggregation strategies in many industries.[6] Noting the failures of many conglomerates in the 1960s and 1970s, both financial theorists and investors began to support more focused company concepts. Generally this meant sticking to your knitting by cutting back to fewer product lines. Unfortunately, this also meant a concomitant increase in the systematic risk these narrower markets represented. However, some analysts noticed that many highly successful Japanese and American companies had very wide product lines, yet were neither conglomerates nor truly vertically integrated.[7] Japanese companies, like Sony, Mitsubishi, Matsushita, or Yamaha, had extremely diverse product offerings, as did 3M or Hewlett-Packard in the United States. Yet they were not conglomerates in the normal sense. They were termed related conglomerates, redeploying certain key skills from market to market.[8] At the same time, these companies also contracted out significant support activities. Although frequently considered vertically integrated, the Japanese auto Industry, for example, was structured around mother companies that primarily performed design and assembly, with a number of Independent suppliers and alliance partners without ownership bonds to the mother companies feeding into them.[9] Many other Japanese hi-tech companies, particularly the more Innovative ones like Sony and Honda, used comparable strategies leveraging a few core skills against multiple markets through extensive outsourcing. The term core competency strategies was later used to describe these and other less diversified strategies developed around a central set of corporate skills.[10] However, there has been little theory or consistency in the literature about what core really means. Consequently, many executives have been understandably confused about the topic. They need not be if they think in terms of the specific skills the company has or must have to create unique value for customers. However, their analyses must go well beyond looking at traditional product or functional strategies to the fundamentals of what the company can do better than anyone else.[11] For example, after some difficult times, it was easy enough for a beer company like Fosters to decide that it should not be in the finance, forest products, and pastoral businesses into which it had diversified. It has now divested these peripheral businesses and is concentrating on beer. However, even within this concept, Fosters true competencies are in brewing and marketing beer. Many of its distribution, transportation, and can production activities, for example, might actually be more effectively contracted out. Within individual functions like production, Fosters could further extend its competitive advantage by outsourcing selected activities such as maintenance or computing where it has no unique capabilities. The essence of core competencies What then is really core? And [emailprotected] The concept requires that managers think much more carefully about which of the firms activities really do or could create unique value and which activities managers could more effectively buy externally. Careful study of both successful and unsuccessful corporate examples suggests that effective core competencies are: 1. Skill or knowledge sets, not products or functions. Executives need to look beyond the companys products to the intellectual skills or management systems that actually create a maintainable competitive edge. Products, even those with valuable legal protection, can be too easily back-engineered, duplicated, or replaced by substitutes. Nor is a competency typically one of the traditional functions such as production, engineering sales, or finance, around which organizations were formed in the past. Instead, competencies tend to be sets of skills that cut across traditional functions. This interaction allows the organization consistently to perform an activity better than functional competitors and continually to Improve on the activity as markets, technology, and competition evolve. Competencies thus involve activities such as product or service design, technology creation, customer service, or logistics that tend to be based on knowledge rather than on ownership of assets or intellectual property per se. Knowledge-based activities generate most of the value in services and manufacturing. In services, which account for 79 percent of all jobs and 76 percent of all value-added in the United States, intellectual inputs create virtually all of the value-added. Banking, financial services, advertising, consulting, accounting, retailing, wholesaling, education, entertainment, communications, and health care are clear examples. In manufacturing, knowledge-based activities like RD, product design, process design, logistics, marketing research, marketing, advertising, distribution, and customer service @ also dominate the value-added chain of most companies (see Exhibit 1). 2. Flexible, long-term platforms capable of adaptation or evolution. Too many companies try to focus on the narrow areas where they currently excel, usually on some product-oriented skills. The real challenge is to consciously build dominating skills in areas that the customer will continue to value over time, as Motorola is doing with Its focus on superior quality, portable communications. The uniqueness of Toys R Us lies in its powerful information and distribution systems for toys, and that of State Street Boston in its advanced information and management systems for large custodial accounts. Problems occur when managers choose to concentrate too narrowly on products (as computer companies did on hardware) or too inflexibly on formats and skills that no longer match customer needs (as FotoMat and numerous department stores did). Flexible skill sets and constant, conscious reassessment of trends are hallmarks of successful core competency strategies. 3. Limited in number. Most companies target two or three (not one and rarely more than five) activities in the value chain most critical to future success. For example, 3M concentrates on four critical technologies in great depth and supports these with a peerless innovation system. As work becomes more complex, and the opportunities to excel in many detailed activities proliferate, managers find they cannot be best at every activity in the value chain. As they go beyond three to five activities or skill sets, they are unable to match the performance of their more focused competitors or suppliers. Each skill set requires intensity and management dedication that cannot tolerate dilution. It is hard to imagine Microsofts top managers taking their enthusiasm and skills in software into, say, chip design or even large-scale training in software usage. And if they did, what would be the cost of their loss of attention on software development? 4. Unique sources of leverage in the value chain. Effective strategies seek out places where there are market imperfections or knowledge gaps that the company is uniquely qualified to fill and where investments in intellectual resources can be highly leveraged. Raychem and Intel concentrate on depth in design and on highly specialized test-feedback systems supporting carefully selected knowledge-based products not on volume production of standardized products to jump over the experience curve advantages of their larger competitors. Morgan Stanley, through its TAPS system, and Bear Stearns, through its integrated bond-trading programs, have developed in-depth knowledge bases creating unique intellectual advantages and profitability in their highly competitive markets. 5. Areas where the company can dominate. Companies consistently make more money than their competitors only if they can perform some activities which are important to customers more effectively than anyone else. True focus in strategy means the capacity to bring more power to bear on a selected sector than any competitor can. Once, this meant owning and managing all the elements in the value chain supporting a specific product or service in a selected market position. Today, however, some outside supplier, by specializing in the specific skills and technologies underlying a single element in the value chain, can become more proficient at that activity than virtually any company spreading its efforts over the whole value chain. In essence, each company is in competition with all potential suppliers of each activity in its value chain. Hence, it must benchmark its selected core competencies against all other potential suppliers of that activity and continue to build these core capabilities until it is demonstrably best. Thus the basic nature of strategic analysis changes from an industry analysis perspective to a horizontal analysis of capabilities across all potential providers of an activity, regardless of which industry the provider might be in (see Exhibit 1). 6. Elements important to customers in the long run. At least one of the firms core competencies should normally relate directly to understanding and serving its customers that is, the right half of the value chain in Exhibit 1. Hi-tech companies with the worlds best state-of-the-art technology often fail when they ignore this caveat. On the other hand, Merck matches its superb basic research with a prescription drug marketing knowhow that is equally outstanding. By aggressively analyzing its customers, value chains, a company can often identify where it can specialize and provide an activity at lower cost or more effectively to the customer. Such analyses have created whole new Industries, like the specialized mortgage broker, syndication, secondary market, transaction-processing, escrow, title search, and insurance businesses that have now taken over these risks and functions for banks and have disaggregated the entire mortgage industry. 7. Embedded in the organizations systems. Maintainable competencies cannot depend on one or two talented stars such as Steven Jobs and Stephen Wozniak at Apple or Herbert Boyer and Arthur D. Riggs at Genentech whose departure could destroy a companys success. Instead, the firm must convert these competencies into a corporate reputation or culture that outlives the stars. Especially when a strategy is heavily dependent on creativity, personal dedication, and initiative or on attracting top-flight professionals, core competencies must be captured within the companys systems broadly defined to include its values, organization structures, and management systems. Such competencies might include recruiting (McKinsey, Goldman Sachs), training (McDonalds, Disney), marketing Procter Gamble, Hallmark), innovation (Sony, 3M), motivation systems (ServiceMaster), or control of remote and diverse operating sites within a common framework and philosophy (Exxon, CRA, Inc.). These systems are often at the heart of consistent superior performance; in many cases, a firms systems become its core competencies.(12) Preeminence: The key strategic barrier For Its selected core competencies, the company must ensure that it maintains absolute preeminence. It may also need to surround these core competencies with defensive positions, both upstream and downstream. In some cases, it may have to perform some activities where it is not best-in-world, just to keep existing or potential competitors from learning, taking over, eroding, or bypassing elements of its special competencies. In fact, managers should consciously develop these core competencies to block competitors strategically and avoid outsourcing them or giving suppliers access to the critical knowledge bases or skills that underpin them. Honda, for example, does all its engine RD in-house and makes all the critical parts for its small motor design core competency in closely controlled facilities in Japan. It will consider outsourcing any other noncritical elements in its products, but builds a careful strategic block around this most essential element for all its businesses.(13) Most important, as a companys preeminence in selected fields grows, its knowledge-based core competencies become ever harder to overtake. Knowledge bases tend to grow exponentially in value with Investment and experience. Intellectual leadership tends to attract the most talented people, who then work on and solve the most interesting problems. The combination in turn creates higher returns and attracts the next round of outstanding talent. In addition to the examples we have already cited, organizations as diverse as Bechtel, ATT Bell Labs, Microsoft, Boeing, Intel, Merck, Genentech, McKinsey, Arthur Andersen, Sony, Nike, Nintendo, Bankers T rust, and Mayo Clinic have found this to be true. Some executives regard core activities as those the company is continuously engaged in, while peripheral activities are those that are intermittent and therefore can be outsourced. From a strategic outsourcing viewpoint, however, core competencies are the activities that offer long-term competitive advantage and thus must be rigidly controlled and protected. Peripheral activities are those not critical to the companys competitive edge. Strategic outsourcing If supplier markets were totally reliable and efficient, rational companies would outsource everything except those special activities in which they could achieve a unique competitive edge, that is, their core competencies. Unfortunately, most supplier markets are, imperfect and do entails some risks for both buyer and seller with respect to price, quality, time, or other key dimensions. Moreover, outsourcing entails unique transaction costs searching, contracting, controlling, and recontracting that at times may exceed the transaction costs of having the activity directly under managements in-house control. To address these difficulties, managers must answer three key questions about any activity considered for outsourcing. First, what is the potential for obtaining competitive advantage in this activity, taking account of transaction costs? Second, what is the potential vulnerability that could arise from market failure if the activity is outsourced? Conceptually, these two factors ca n be arrayed In a simple matrix (see Exhibit 2). Third, what can we do to alleviate our vulnerability by structuring arrangements with suppliers to afford appropriate controls yet provide for necessary flexibilities in demand? The two extremes in exhibit 2 are relatively straightforward. When the potential for both competitive edge and strategic vulnerability is high, the company needs a high degree of control, usually entailing production internally or through joint ownership arrangements or tight long-term contracts (explicit or implicity). Marksk Spencer, for example, is famous for its network of tied suppliers, which create the unique brands and styles that underpin the retailers value reputation. Spot suppliers would be too unreliable and unlikely to meet the demanding standards that are Marks Spencers unique consumer franchise. Hence, close control of product quality, design, technology, and equipment through contracts and even financial support is essential. The opposite case is perhaps office cleaning, where little competitive edge is usually possible and there is an active and deep market of supplier firms. In between, there is a continuous range of activities requiring different degrees of control and strategic flexibility. At each Intervening point, the question is not just whether to make or buy, but how to implement a desired balance between independence and incentives for the supplier versus control and security for the buyer. Most companies will benefit by extending outsourcing first in less critical areas, or in parts of activities, like payroll, rather than all of accounting. As they gain experience, they may increase profit opportunities greatly by outsourcing more critical activities to noncompeting firms that can perform them more effectively independence and incentl,v In a few cases, more complex alliances with competitors may be essential to garner specialized skills that cannot be obtained in other ways. At each level, the company must isolate and rigorously control strategically critical relationships between its suppliers and its customers. Competitive edge The key strategic issue in insourcing versus outsourcing is whether a company can achieve a maintainable competitive edge by performing an activity internally usually cheaper, better, in a more timely fashion, or with some unique capability on a continuing basis. If one or more of these dimensions is critical to the customer and if the company can perform that function uniquely well, the activity should be kept in-house. Many companies unfortunately assume that because they have historically performed an activity internally, or because it seems integral to their business, the activity should be insourced. However, on closer investigation and with careful benchmarking, a companys internal capabilities may turn out to be significantly below those of best-in-world suppliers. Ford Motor Company, for example, found that many of its Internal suppliers quality practices and costs were nowhere near those of external suppliers when it began its famous best in class worldwide benchmarking studies on 400 subassemblies for the new Taurus-Sable line. A New York bank with extensive worldwide operations Investigated why its Federal Express costs were soaring and found that its Internal mall department took two days more than Federal Express to get a letter or package from the third floor to the fortieth floor of Its building. In interviews about benchmarking with top operating managers in both service and manufacturing companies, we frequently encountered some paraphrase of We thought we were the best in the world at many activities. But when we benchmarked against the best external suppliers, we found we were not even up to the worst of the benchmarking cases. Transaction costs In all calculations, analysts must include internal transaction costs as well as those associated with external sourcing. If the company is to produce the item or service internally on a long-term basis, it must back up its decision with continuing RD, personnel development, and infrastructure investments that at least match those of the best external supplier; otherwise, it will lose its competitive edge over time. Managers often tend to overlook such backup costs, as well as the losses from laggard innovation and unresponsiveness of internal groups that know they have a guaranteed market. Finally, there are the headquarters and support costs of constantly managing the insourced activity. One of the great gains of outsourcing is the decrease in executive time spent managing peripheral activities freeing top management to focus more on the core of Its business. Various studies have shown that when these internal transaction costs are thoroughly analyzed, they can be extremely high.(14) Since it is easier to identify the explicit transaction costs of dealing with external suppliers, these generally tend to be included in analyses. Harder-to-identify internal transaction costs, however, are often not included, thus biasing results. Vulnerability When there are many suppliers with adequate but not dominating scale) and mature market standards and terms, a potential buyer is unlikely to be more efficient than the best available supplier. If, on the other hand, there is not sufficient depth in the market, overly powerful suppliers can hold the company ransom. Conversely, if the number of suppliers is limited or individual suppliers are too weak, they may be unable to supply innovative products or services as well as a much larger buyer could by performing the activity in-house. While the activity or product might not be one of its core competencies, the company might nevertheless benefit by producing internally rather than undertaking the training, investment, and codesign expenses necessary to bring weak suppliers up to needed performance levels. Another form of vulnerability is the lack of information available in the marketplace or from individual suppliers., for example, a supplier may secretly expect labor disruptions or raw material problems, but hide these concerns until it is too late for the customer to go elsewhere. A related problem occurs when a supplier has unique information capabilities: for example, large wholesalers or retailers, market research firms, software companies, or legal specialists may have information or fact-gathering systems that would be impossible for the buyer or any other single supplier to reproduce efficiently. Such suppliers may be able to charge what are essentially monopoly prices, but purchasing from them could still be less costly than reproducing the service Internally. In other cases, there may be many capable suppliers (for example, in RD or software), but the costs of adequately monitoring progress on the suppliers, premises might make outsourcing prohibitive. Sometimes the whole structure of information in an industry will militate for or against outsourcing. Computing, for example, was largely kept in-house in Its early years because the information available to a buyer of computing services and Its ability to make judgments about such services were very different for the buying company (which knew very little) than for the supplier (which had excellent information). Many buyers lacked the competency either to assess or to monitor sellers, and feared loss of vital information. A company can outsource computing more easily today, in part because buyers, computer, technical management, and software knowhow are sufficient to make informed judgments about external suppliers. In addition to information anomalies, Stuckey and White note three types of asset specificity that commonly create market imperfections, calling for controlled sourcing solutions rather than relying on efficient markets.(15) These are: (1) site specificity, where sellers have located costly fixed assets in close proximity to the buyer, thus minimizing transport and inventory costs for a single supplier; (2) technical specificity, where one or both parties must invest in equipment that can be used only by the parties in conjunction with each other and has low value, in alternative uses; and (3) human capital specificity, where employees must develop in-depth skills that are specific to a particular buyer or customer relationship. Stuckey and White explain the outsourcing implications of information and specificity problems in the case of a bauxite mine and an alumina refiner. Refineries are usually located close to mines because of the high cost of transporting bauxite, relative to Its value. Refineries in turn are tuned to process the narrow set of physical properties associated with the particular mines bauxite. Different and highly specialized skills and assets are needed for refining versus mining. Access to Information further compounds problems., if an independent mine expects a strike, it is unlikely to share that information with its customers, unless there are strong incentives. As a result, the aluminum industry has moved toward vertical integration or strong bilateral joint ventures, as opposed to open outsourcing of bauxite supplies despite the apparent presence of a commodity product and many suppliers and sellers. In this case, issues of both competitive advantage and potential market failure dictate a higher degree of sourcing control. Degree of source control In deciding on a sourcing strategy for a particular segment of their business, managers have a wide range of control options the Exhibits 3 and 4 for the most basic). Where there is high potential both for vulnerability and for competitive edge, tight control is indicated (as in the bauxite case). At the opposite end is, say, office cleaning. Between these extremes are opportunities for developing special incentives or more complex oversight contracts to balance intermediate levels of vulnerability against more moderate prospects for competitive edge. Nikes multi-tier strategy offers an interesting example (see boxed insert on page 62). The practice and law of strategic alliances are rapidly developing new ways to deal with common control issues by establishing specified procedures that permit direct involvement in limited stages of a partners activities, without incurring either ownership arrangements or the loss of control inherent ln arms-length transactions. Flexibility versus control Within this framework, there is a constant tradeoff between flexibility and control. One of the main purposes of outsourcing is to have the supplier assume certain classes of investment and risk, such as demand variability. To optimize costs, the buying company may want to maintain its internal capacity at re atively constant levels despite highly fluctuating sales demands. Under these circumstances, it needs a surge strategy. McDonalds, for example, with $8billion in sales and 10.1 percent growth per year, needs to call in part-time and casual workers to handle extensive daily variations yet also be able to select its future permanent or managerial personnel from these people. IBM has had the opposite problem, since its core demand has been declining, the company has had to lay off employees. Yet it needs surge capacity for: (1) quick access to some former employees, basic skills; (2) available production capacity without the costs of supporting facilities full time; and (3) the ability to exploit strong outside parties specialized capabilities through temporary consortia for example, in applications software, microprocessors, network development, or factory automation. Strategically, McDonalds has created a pool of people available on call options, while IBM through spinouts of factories with baseload commitments to IBM, guaranteed consulting employment for key people, flexible joint venturts, and strategic alliances has created put options to handle surge needs as it downsizes and tries to turn around its business. There is a full spectrum of outsourcing arrangements, depending on the companys control and flexibility needs (see Exhibit 4). The issue is less whether to make or buy an activity than it is how to structure internal versus external sourcing on an optimal basis. Companies are outsourcing much more of what used to be considered either integral elements of their value chains or necessary staff activities. Because of greater complexity, higher specialization, and new technological capabilities, outside suppliers can now perform many such activities at lower cost and with higher value-added than a fully integrated company can. In some cases, new production technologies have moved manufacturing economies of scale toward the supplier. In others, service technologies have lowered transaction costs substantially, making it possible to specify, transport, store, and coordinate inputs from external sources so inexpensively that the balance of benefits has shifted from insourcing to outsourcing. In certain specialized niches, outside companies have grown to such size and sophistication that they have developed economies of scale, scope, and knowledge intensity so formidable that neither smaller nor more integrated producers can effectively compete with them (for example, ADP Services in payroll, and ServiceMaster in maintenance). To the extent that knowledge of a specific activity is more important than knowledge of the end product itself, specialized suppliers can often produce higher value-added at lower cost for that activity than almost any integrated company. Strategic benefits versus risks Too often companies look at outsourcing as a means to lower only short-term direct costs. However, through strategic outsourcing, companies can lower their long-term capital investments and leverage their key competencies significantly, as Apple and Nike have done. They can also force many types of risk and unwanted management problems onto suppliers. Gallo, the largest producer and distributor of wines in the United States, outsources most of its grapes, pushing the risks of weather, land prices, and labor problems onto its suppliers. Argyle Diamonds, one of the worlds largest diamond producers, outsources virtually all aspects of its operation except the crucial steps of separation and sorting of diamonds. It contracts all its huge earth-moving operations (to avoid capital and labor risks), its housing and food services for workers (to avoid confrontations on nonoperating issues), and much of its distribution (to De Beers to protect prices, to finance inventories, and to avoid the complications of worldwide distribution). By outsourcing to best-in-class suppliers in each case, it further ensures the quality and image of its operations. Important strategic benefits Strategically, outsourcing can provide the buyer with greater flexibility, especially in the purchase of rapidly developing new technologies, fashion goods, or the myriad components of complex systems. It reduces the companys design-cycle t