Wednesday, August 26, 2020

Catholic Reformation Outline!

Bipin Pant AP Euro Thesis Statement While a definitive goal of the Catholic Reformation was to perceive and spread Catholicism. A few points, techniques, and level of accomplishment of the catholic renewal in the sixteenth century were exercises of the Jesuits, the recovery of papacy and the Council of Trent. Exercises of the Jesuits Established profoundly restrained schools The Jesuits took over in catholic colleges and by 1600 they were the most well known teachers in Europe Propagation of the catholic confidence among non-Christians Francis Xavier spread thoughts and impacted different nations like JapanThe recovery of papacy Pope Paul III (1534-1549) was the defining moment to the restoration of papacy Appointed a change commission to contemplate the state of the Jesuits and called the gathering of Trent A Colloquy was held at Regensburg to settle strict pressure calmly Cardinal Caraffa was picked pope as Paul IV (1555-1559) Council of Trent Problems, for example, flare-up in pla gues, war among France and Spain, and changing of popes happened The stepping stool bunch wan and just the congregation could decipher Scripture Both confidence and acts of kindness worked for salvation he catholic church entered another period of its history taking everything into account, the catholic reorganization's principle objective was to continue with Catholicism and a portion of the points, strategies, and level of achievement of the catholic reconstruction were the exercises of the Jesuits, the recovery of papacy and the making of the committee of Trent. Every one of these occasions hinted at the new world that we live in and a portion of these occasions upgraded our instruction and our insight for the world and its perspective on life. What comes straightaway? Thought processes of extending area and â€Å"The new world†.

Saturday, August 22, 2020

High Fashion Styling Research Paper Example | Topics and Well Written Essays - 4250 words

High Fashion Styling - Research Paper Example The paper High Fashion Styling examines How to Become an A class Stylist. Hopeful beauticians ought to be prepared to confront obstructions in immovably setting up professions. In particular, this paper digs on the parts of turning into a brilliant beautician in high style. High Fashion is also called high fashion which is French for high sewing. It is likewise equivalent with high style which incorporates the most present with regards to plan. This sort of style is frequently implied for elite customer bases. It likewise ordinarily alludes to uncommon and select attire. All the more critically, the plan is matchless in light of its cost. High fashion items are unmistakable since they are monetarily hard to get to. Consequently, the beautician ought to use great textures. He should likewise configuration clothes with most extreme taste, considerable measure of time, and careful skill. Beauticians were not all that famous years prior. In the past they were very disregarded in the gene ral public. They were just known in the limits of the little style ventures. The roads of their acknowledgment were just behind magazines and photograph shoots. Charles Frederick Worth is known as the dad of high fashion. He reformed the customary styles and earned an imprint in France’s design showcase. The term high design has been known to be previously utilized in 1804. At this period, women’s dresses moved to high-waisted plans which didn't require the standard bodice. Basically, high design originated from Paris. This development produced different beauticians. across time and societies. As a Career â€Å"There are no rigid principles to starting your styling career† (McAssey, and Buckley, p.17). In all actuality, probably the most renowned beauticians didn't really have any proper preparing. Then again, there are additionally the individuals who have spent numerous years in various schools, temporary positions, and institutes. The fact is one should inves tigate the entirety of the perspectives that can help in propelling his status in the style world. Despite the fact that what you know is normally significant in progressing admirably, who you know matters extraordinarily. Since the greater piece of the calling flourishes with independent, it is very crucial to have associations. Concerning remuneration, the normal modifies relying upon the sort of market. For instance, in huge scope advancements, beauticians get paid from $400 up to $800 in one day (Lawson, 2012). Absolutely, this sort of remuneration is a motivation to numerous hopefuls. Experts’ pay rates may get higher with proper accreditations. The Association of Image Consultants Seminar is one of the associations that ensure a stylist’s capability. During shoots and creations, beauticians work at their most noteworthy. They have to direct every angle concerning extras, assortment of attires, and executing a minute ago changes. They additionally need to produce into consultation the results of lighting, beautifying agents, and the model’s highlights. One of the stylist’s trustworthy occupations is to be accountable for managing abrupt setbacks, for example, tore garments and unrivaled sizes. Consequently, this calling requires creativity and genius among numerous others. When contrasted with different fields, this sort of occupation involves perception to subtleties. Despite the fact that it to a great extent sounds stylish, a wide cluster of occasions can cause you to get harried and wildly involved. For instance, it must be ensured that the calendars of the garments being purchased or custom fitted are in precise request. It has likewise to be verified that the attire obtained are fit as a fiddle before returning. In this vocation, a

Tuesday, August 18, 2020

CPW Thursday liveblog

CPW Thursday liveblog My approximate CPW schedule 6:36am: Alarm clock goes off. SNOOZE. 6:45am: I actually wake up. I look outside and see that the bad weather hasnt yet arrived. Hmm. 7:35am: Nance picks me up; we head in to campus together. 8:10am: I drop off the CPW Festival programs at CopyTech (the campus copy center) to be copied 1000 doubled-sided, folded copies are on their way for tonights event. 8:20am: Ben starts spreading the word about all of the airport delays and closings, including OHare in Chicago. 8:25am: CPW Registration opens; I take my post at the Help Desk. 8:50am: The first student I recognize arrives: Candice from Utah =) 9:42am: The 100th student arrives! 9:55am: Snively! 10:30am: Its starting to get windy, but still no precipitation. 10:55am: Dean Marilee Jones has arrived! 11:13am: It has started to rain. Lots of umbrellas on the campus tour. 11:30am: Kevin 11 quizzes me about his application. I say, Did you design a pinball machine for a nursing home? Kevin 11: No! I designed an arcade machine for a hospital. Doh! So close, yet so far. 11:45am: I talk to Stevens mom on the phone from Tennessee. Hi! 1:10pm: Edmund says, You really are good at the 45 minute conversations, Matt. Im tired from 90 straight minutes of talking, but it was great to talk to a family from Nebraska and our head Educational Counselor from South Korea. Now, my shift is over. Nearly half of the students have arrived. I have time for a quick break, then go talk to prospective members of the Classes of 2012 and 2013 (!). 3:31pm: I cant walk more than 10 feet without getting stopped in the halls. Its awesome, but Im starting to lose my voice! Im now getting ready for the Abroad Panel. Its always a fun panel, so Im looking forward to it =) 3:46pm: Almost all set for the MIT Abroad Panel! The Powerpoint is running off of this laptop, so no more liveblogging for the next hour or so 5:24pm: Abroad Panel is over. Sam was a panelist, and did an awesome job talking about MISTI and his experiences in Germany. 5:56pm: Quick rest in the office. The weather hasnt been quite as bad as Id feared, but the rain is starting to pick up a bit now. At least theres no more sleet. 6:05pm: I get a chance to upload some pictures from earlier today. Tim the Beaver made an appearance, welcoming and hugging students: Kevin 11 shows off his nerd-tastic shirt: Ben and Mollie register a student: 8:20pm: Ive been running around getting the Student Welcome and the Festival all set. Now, with the Festival 10 minutes away, Im taking time for a quick breather before things get started. The Welcome and Festival are two of my favorite CPW events, so Im pretty excited. Students are filing into Rockwell Cage the site of the Student Welcome and Im happy to see that most people are traveling in groups, having already made friends on campus. This is going to be a great way to cap off a great day. 12:59am: What a day! I have finally reached my bed. The Festival has ended, and I think people had a good time. The Welcome was awesome, too I wish I could step like the A Phi As, and I wish I could sing like the Logs. My voice is shot now from talking so much, and while Im exhausted, I fear Im still too excited to sleep. Anyway, its time to sign off for the night. Happy CPW Thursday!

Sunday, May 24, 2020

Financial Analysis The Nursing Shortage - 1719 Words

Financial Analysis The nursing shortage in the health care setting, can affect the quality of care and the overall outcome of the patient’s health. Hospital’s having lower numbers in nursing staff can have an adverse effect on the organizations. This can result in higher incidences of hospital acquired pneumonia, urinary tract infections, decubitus and falls with injuries. The acuity level of the patient’s entering the hospital continues to rise because there are a lot of patient’s delaying to seek prompt medical attention. As these things occurs, the skills and amount of the nursing staff need to be ready and available for the patient’s as they entered into the health care setting. Although inadequate nursing staff can have an adverse effect on the patient, this can also have a financial impact on the organization. After conducting an interview with two co-workers, an analysis will discussed concerning the financial problems identified within th e organization. Second, there will be a discussion of the potential budget impact of two financial problems identified in the organization. Third, a discussion regarding the role of nursing in process of analysis with the budget development within the organization. There will be further discussion of the budget development within the organization from the chief of nursing, nurse in manager and staff nursing prospective. The purpose of this paper is conduct an analysis of the potential budget impact of the financial problemsShow MoreRelatedNursing Shortage Essay905 Words   |  4 PagesNursing Shortage (revision) October 29, 2012 The nursing shortage is an issue that is battled worldwide. There is evidence that there was a growing concern of a nursing shortage in the United States dating back to the early 1960’s. In a March 2012 report it was noted that the healthcare job market is exceeding the growth realized in 2011. This growth accounts for one out of every five new jobs in 2012 according the Bureau of Labor and Statistics (BLS). Registered Nursing will beRead MoreTackling the Nursing Shortage at Renfrey Memorial Hospital: Analysis and Recommendations1385 Words   |  6 PagesTackling the Nursing Shortage at Renfrey Memorial Hospital: Analysis and Recommendations Introduction The nursing situation at Renfrey Memorial Hospital is unsustainable and in dire need of correction on several levels and for several reasons. The primary problem facing this institution is the same problem faced by medical institutions throughout the nation and indeed much of the world: many nurses are nearing retirement age, and the nursing profession is no longer the draw for younger collegeRead MoreDemand Versus Supply Essay1232 Words   |  5 PagesStates continues to be an issue with increasing shortages of registered nurses (RN) and the increasing demand for health care services. There is a higher demand for registered nurses because of the increase in population, aging baby boomers, and increase in chronic diseases. The shortage of registered nurses impacts the health status and quality of life of the population. Factors that impact health care are the importance of supplying adequate nursing personnel and retaining RN’s in the workplaceRead MoreEducational Prepara tion And Varying Competencies Of Bsn Vs And Nurses1029 Words   |  5 Pagesinception in the 1950s, Associate Degree Nursing programs remain the subject of much controversy, policy and conviction with World War II prompting innovative changes in nursing education. The World War called for nurses to serve the need of the civilian force, however, since traditional hospital programs at the time spun 36 months or more, a shortage of competent healthcare professionals was imminent. The United States Congress responded to the shortage by passing the Nurse Training Act of 1943Read MoreNursing Workforce Shortage Essay1032 Words   |  5 PagesWith a growing population of baby boomers there is a high demand for nursing care. Nursing care is the most important because nurses provide the highest number of preventative and curative patient care (Oulton, 2006). However, a growing problem of nursing shortage will put older adult care in great jeopardy. A higher demand for nurses are needed to take care of the older generation, but issues such as aging nursing staff, unfavorable work environment, and lack of access to continueRead MoreNurse Turnover And Nurse Retention1315 Words   |  6 Pages Nurse Turnover and Nurse Retention Stephanie Williams NURS- 411.01 Issues and Leadership in Nursing Delaware State University The nursing shortage in healthcare has been a highlighted issue for many years. With the ever-growing health care system, hospitals and healthcare facilities often find themselves searching for ways to acquire new nurses and retain their very own. Throughout the years, the number one solution to this problem remains the same: decreasing nurse turnoverRead MoreEssay Effective Approaches in Leadership and Management1273 Words   |  6 PagesEffective Approaches in Leadership and Management The current and growing shortage of nurses is posing a real threat to the ability of hospitals, long-term care facilities, and others to provide timely access to quality care. Nurse staffing shortages and nurse turn-over contributes to the growing reduction in the number of staffed patient beds available for services, increasing costs, and rising concerns about the quality of care. Health care organizations highly depend on nurse managers and leadersRead MoreDescription Of The Program Or Service997 Words   |  4 Pagesof adverse events in the or Creating financial efficiency in training programs – long term Increase recruitment Justification or Rationale for the Program or Service Today’s health care environ- ment is characterized by both a nursing shortage (Buerhaus, Staiger, Auerbach, 2008) and financial instability created by continuous declines in cost reimbursement (Zelman, McCue, Glick, 2009). The Bureau of Labor Statistics (2013) projects over 1 million nursing job openings by 2022 due to growth andRead MoreThe Shortfall Of Available Nurses In The Healthcare Industry.1339 Words   |  6 Pagesproblem which many researches and studies have concluded. Finally, the report provides the most effective solutions and recommendations to the nurses shortage problem in the US. The Shortage of Available Nurses in The Health Care Industry One of the biggest challenges that the healthcare industry is facing is the shortage of the registered nurses in the hospitals and in the community. Lack of nurses is a widespread problem that many counties around the world are facingRead MoreThe Quality Of A Quantitative Research Study1403 Words   |  6 Pagescontinues to face a nursing shortage with a national vacancy rate of 8.1% (Hunt, 2014) and a turnover rate of 14.1%. The American Association of Colleges of Nursing (AACN 2009) and others have predicted that by the year 2025, there will be a shortage of 260,000 nurses (Buerhaus, Donelan, DesRoches, Hess, 2009). Although this shortage has improved from 2007 to 2009, the need for nurses over the next several years is uncertain because of changes in the economy, population, interest in nursing, and availability

Wednesday, May 13, 2020

Definition and Examples of Correlative Conjunctions

In English grammar, correlative conjunction is a phrase that joins together two other  words, phrases, or clauses. These conjunctive pairs, as they are sometimes known, are used commonly in everyday communication.   How to Recognize Them The elements connected by correlative conjunctions are usually parallel  or similar in length and grammatical form. Each element is called a conjoin. An easy way to spot them in a sentence is to remember that they always travel in pairs. Conjoins must also match: nouns with nounspronouns with pronounsadjectives with adjectives These are the primary correlative conjunctions in English: both . . . andeither . . . orneither . . . nornot . . . butnot only . . . but also Other pairs that sometimes have a coordinating function include the following: as . . . asjust as . . . sothe more . . . the lessthe more . . . the moreno sooner . . . thanso . . . aswhether . . . or Used properly in a sentence, correlative conjunctions (shown in italics) look like this: I like  not only  to be loved  but also  to be told that I am loved.I have  neither  been there nor  done  thatIn the end, we will remember  not  the words of our enemies  but  the silence of our friends. All of these sentences can be broken into two separate sentences, and their overall meanings will not change. Correlative conjunctions allow you to compare and contrast, giving your language additional context. Proper Parallel Structure There are a number of grammatical rules governing how to use correlative conjunctions properly.  One common mistake that English students make is not pairing the proper preposition by using a conjunction. For example: Incorrect: The cabinet was designed not only for storing linens but also protecting wool clothing.Correct:  The  cabinet was designed not only for storing linens but also for protecting wool clothing. This rule extends to pronouns and antecedents as well. When joining two subjects (the antecedents), any pronoun that follows must agree with the closest antecedent. Look at this example: Incorrect: Neither your mother nor her sisters are planning to donate her portion of the estate to charity.Correct:  Neither your mother nor her sisters are planning to donate their portion of the estate to charity.Incorrect: Either the twins or Bobby will say they cant go.Correct:  Either  the twins or Bobby will say he cant go. Another thing to remember is that correlative conjunctions can only join two other words. Joining three words looks awkward and is grammatically incorrect. For instance: Incorrect: Either lead, or follow, or get out of the way.Correct: Either lead, follow, or get out of the way. Sources Mikoluk, Kasia. Correlative Conjunction: Basic Grammar Rules Explained. Udemy.com. 15 May 2014.Sherlock, Karl. Correlative Conjunctions. Grossmont.edu. 9 February 2015.Write.com staff. Correlative Conjunctions: What Are They? Write.com. Accessed 21 March 2018.

Wednesday, May 6, 2020

Effective Biblical Church Leadership Free Essays

Africa International University A. I. C G. We will write a custom essay sample on Effective Biblical Church Leadership or any similar topic only for you Order Now S. U Training College Church Youth Ministry Strategic Plan Period: 1st October 2012-31st December 2012 Unit Title: Church Administration Unit Code: PA 204 Presented to :Lecturer –Dinah K. Nyamai Presented by: Stephen Mutua Adm no: 12066 Background General Service Unit Training College Embakasi Church is a under the umbrella of Africa Inland Church of Kenya. We are situated in the Training College main compound. The Church main congregants are the Training college community and the surrounding neighbors. Since the church was started there has never been any active youth ministry. There has been growing need to meet the spiritual needs of the increasing number of youth church members. This has led the church administration to take a move to initiate and strategize on how to effectively the community at large. Thus, a need for a comprehensive and attainable strategic plan for the youth ministry be put in place to help our young people. The Church Strategic Plan for youth ministry will be for a period of three months from 1st October 2012- 31st December 2012. Our first main focus will be to equip the leaders who will thus help has a important means to reach the entire group. Time has come that the church has to seriously need to invest in the youth group for if we miss them then the churches will be at a threat of closing their doors tomorrow. This is because there will be no one of the young generation to be handed over the church leadership. Our strategic plan has been prepared in line with the Vision, Mission, goals of Africa Inland Church of Kenya; VISION: To equip and teach every church member in all wisdom, so that every church member may be mature in Christ; Col: 1-28 MISSION: To fulfill the Great Commission of Our Lord Jesus Christ. (Matthew 28:19-20) Our Goals: 1. To fulfill the great commission of our Lord Jesus Christ. (Matthew 28:19,20;†Go therefore and make disciples of all nations†¦ 2. To instruct and strengthen church members in the faith and holy living   3. To help Christians to stand firm on the scriptures principles   4. To show and demonstrate Christ’s love and concern for people by engaging in selective community development projects based on biblical and evangelical principles and practices Our Vision, Mission, Goal and objectives for the Africa Inland church General Service Unit Training College Embakasi youth ministry; Vision To be a youth ministry that effectively shares our faith and hope in Jesus Christ, (Acts 20:27), Mission: To nurture the youth in church so as to nurture their peers in Christ . Goal: To inspire, train and mentor Christ like youth leaders. Objectives: 1. By the end of October 2012, fifteen youth leaders will be trained to lead at least four youth members through personal Bible study and evangelism. 2. By the end of November 2012, all the trained leaders will evangelize to at least ten people mainly the youth in our surrounding church community. 3. By the end of December 2012, youth leaders will be trained on how to effectively formulate youth programs. October – 2012. |ACTIVITY |HOW TO ACCOMPLISH THE ACTIVITY |WHO TO UNDERTAKE THE ACTIVITY |COST | | A three day seminar for the| The seminar takes place weekly on |Youth pastor, Youth Patron and the youth |Total cost is ksh 20,000. 0 | |youth leaders. |Saturday’s, starting from 9:am-3:30pm |chairman to organize the other youth |The facilitators will be honored | |The seminar topic will be how |We will have two facilitators for the seminar. |leaders to attend the seminar and be |with Ksh 1,000/= on everyday of | |to lead a Bible study group and| |available on time. |attendance . Thus totalcost foe them| |evangelism | |Youth leaders attending the seminar will |will be Ksh 6,000/=. | | |be fifteen. |Tea and snacks will cost kshs | | | | |4,000/= and Lunch will be Kshs | | | | |10,000/=. | ? Evaluation; At the end of the three day training seminar the leaders will undertake an exam and some practical presentation on what they have learned in the seminar. . November 2012 |ACTIVITY |HOW TO ACCOMPLISH THE ACTIVITY |WHO TO UNDERTAKE THE ACTIVITY | COST | | Youth leaders and other five | The group will divide themselves into four |Youth Pastor, Youth patron and The youth |Approximately Ksh 17,000. | |active members will evangelize in|groups. |chairman will lead the other group. |The amount ksh 12,000/= for lunch | |the area around the church |Evangelism will be a three day ministry taking |We expect twenty participants. and kshs 5,000/= for soda and | |community. |place weekly every Saturday of the week. A door | |snacks for the get together. | | |to door and one on one evangelism method. | | | | | | | | Evaluation; After end of evangelism each group will be giving their reports on how many people wer e saved, challenges the met in the field, follow up procedures adopted e. g contacts of those with specialn needs and the newly converted members. †¢ Fourth Saturday we will hold get together fellowship especially to welcome the new converts from the evangelism ministry. 3. December 2012 |ACTIVITY |HOW TO ACCOMPLISH THE ACTIVITY |WHO TO UNDERTAKE THE ACTIVITY |COST | | A two day seminar for youth |The seminar will take place weekly on Saturdays. The Christian education department |Kshs 7,000. 00 will be used to | |leaders on formulating smart youth |Leaders to be trained on how to identify youth |coordinator will facilitate the seminar. |cater for tea and snacks Kshs | |programs in line with the youth |needs and how to formulate programs in line with |All the fifteen youth leaders will attend |2,500. 00 and lunch kshs 4,500. 00 | |members needs. |how to overcome and reach those needs. |the seminar. |for the two days | Evaluation There will be an exam at the end of the seminar a nd each leader to formulate his or her program to be presented for discussion by all youth leaders. I believe with the above training foundation for the leaders will be an important tool to be used in the ministry to reach even more and more in the community at this time when young men and women are vulnerable to all manner of social entertainment and vices. With the help of the trained leaders we will be able to reach many and unto their personal spiritual needs. How to cite Effective Biblical Church Leadership, Essay examples

Monday, May 4, 2020

Health of Australian Liberal Democracy

Question: Discuss about the Health of Australian Liberal Democracy. Answer: Introduction: The presence of political parties is essential to the success of a democracy. It has been observed that the more is the involvement of political parties in the political progress of a nation the greater are the chances of the country to move towards a democratic direction. In the context of democratic developments it must be noted that the fate of a liberal democracy is largely decided by how actively the political parties are participating. This truth is applicable to the liberal democracy of Australia too, but in reality the truth has not been turned into practicality. Time and time again it has been proved that the two-party system has failed to contribute to the overall success of Australian liberal democracy, primarily because it has turned the political arena of the country into a biased one incapable of appeasing the interests of the majority of the populace. Hence, it must be argued that the existence of the two-party system is not at all essential to the health of Australian liberal democracy. Australia is a nation that embodies elements of both liberalism and democracy, and even though the structure has its origins in Western Europe and particularly in Britain, Australia has been able to develop some of its own unique political features (Irwin, 2016). Among such features is the predominant two-party system. The existence of political parties is due to representing the interests of different groups and individuals who constitute the citizenry of a nation. As the needs and demands of the citizens are varied, there must be the existence of multiple political parties to represent the diversity. This principle has not been thoroughly followed in the political system of Australia, the political domain of which is dominated by two major political parties despite the presence of several other minor parties and independents (Parliamentary Education Office, n.d.). The two major political parties, the Liberal Party of Australia and the Australian Labor Party (ALP) (Desai and Boreham , 2016) has, till date, been able to maintain the political imbalance that has put at stake the well being and welfare of the populace. It is to be noted that proper voting system is the backbone of every democracy and this is true for Australian democracy too. In this respect it is noteworthy that to maintain the dominance of compulsory voting it has become mandatory for the Australian political system to resort to the two-party system (Harmsen, 2016). But time has come to alter the system. Unlike nations like Britain, Canada, or New Zealand, the traditional political system of Australia is reliant on the obtainment of majority of votes by the two major political parties, and as this has become a political tradition that has contributed to the weakness of governance over the years, it is high time to look for an alternative multi-party system within the Australian political realm. A liberal democracy must be based on collaboration and not on contradiction. Though differences and contradictions are often needed to come to a conclusion that is beneficial for the majority, the Australian political sphere, owing to the dominance of the two-party system, has only been able to add to the confusion. Too much contradiction between the two major political parties has rendered inefficacy to the system of governance in Australia. It is a fact that the two-party system has brought about extreme polarization in different levels of government (Reference.com, n.d.). The two major political parties in Australia have opposite views on almost everything, and when the two get hold on the governance at the federal and state levels, problems only aggravate (Woldring, 2012). It can be pathetic to learn that while in most of the representative democracies, multiple parties seek cooperation to form majority government, in Australia, the system of governance is hampered primarily due to the time wasted by the two majority parties in finding fault in one another (Woldring, 2012). Moreover, there are other issues to add to the problem that is created by the two-party system in Australia. It is to be noted that, Membership of the major parties is at all time low. Politicians are recruited from an extremely small number of people. Combined with this is the fact that, in a large number of seats, candidates are elected on well below 50 per cent of the vote in their single-member electoral districts (Woldring, 2012). And all such facts are not at all beneficial for the health of Australian liberal democracy. Furthermore, it must be taken into account that the Australian liberal democracy was supposed to be based on some basic tenets, but the prevalence of the two-party system has contradicted the supposition. Australian democracy was supposed to be open to popular participation and was also supposed to be characterized by genuine competition for political office (Kane, n.d.). But the dominance of the two-party system has confined the political system within the reach of powerful few, and this is an unhealthy proposition indeed. The two-party system has only been able, to a large extent, to bring about factionalism and sectionalism. And in this respect it must be noted that, Australian parties did little to encourage greater consciousness of specifically democratic norms serving merely to express and channel sectoral interests (Kane, n.d.). Another interesting fact is that, the two-party system has given rise to a vicious political cycle of election and re-election. The Australian two-party system has paved the way for the existence and dominance of a preferential voting system combined with single-member electorates, and this, in turn, has made it almost impossible for the minor parties to gain hold over the lower house (Murphy, 2013). In this respect one may note that, Until an electorate gets to the tipping point where a minor party comes at le ast second, as in the seat of Melbourne in 2010, the preferential system means minor parties vacuum up discontented voters to deliver back to one of the major parties (Murphy, 2013). Such a system is, in its true sense, quite an antithesis to liberal democracy. The sound health of a liberal democracy is usually ensured by political plurality. The more is the participation of political parties, the more are the chance of both majorities and minorities to be represented in an equal manner. But this has not been the case with Australian democracy. The dominance of the two-party system has made it almost impossible for the minority parties to prove their ability to reframe political debate and to bring under light those issues that have been overlooked by the stubborn two-party political system (SBS, 2015). In a liberal democracy the genuine minorities have to be properly represented and for doing so the minority parties should be given the chance to air their voice and show their capabilities. It is only when such plurality will prevail in the democratic arena of Australia that the true health of the liberal Australian democracy would be preserved. Moreover, it is an undeniable truth that a liberal democracy must be capable of addressing diver sified problems arising among the masses. And for doing so, the democracy must be equipped with multiple solutions which can only be provided through the presence of a multiparty system in which all the parties, both major and minor, have the chance to get properly represented. The greater the involvement of political parties, the greater the chances of solutions to several cropping problems faced by a liberal democracy (Debate.org, n.d.). Furthermore, it must be noted that the hallmark of a truly liberal democratic system is the confidence of the citizenry in important political institutions like political parties, and if considered from this perspective, it can be seen that the dominance of the two-party system is injurious to the political health of Australia. This can be argued by citing the fact that majority of Australian populace has lesser confidence in the two major political parties. This truth had been revealed through the Australian Election Study conducted in 2010 which states that, citizens express very little confidence in political parties. Only 31 percent of respondents expressed a great deal or quite a lot of confidence in Australian political parties (Martin, n.d.). This shows that the predominance of the two-party system is doing more harm than good to the health of the Australian liberal democracy. Also, it must be noted that the binary divide that the two-party system in Australia represents actually does not reflect the true nature of the contemporary Australian society (Political Imagination and a Hung Parliament, n.d.). Today the communities in Australia are much more differentiated, diversified, and pluralised, and their ideologies and philosophies are also different (Marsh, 2010). Sadly enough, all such diversities are not properly represented by the two-party system and by the leaders of the majority parties. This indeed is a grave problem which is affecting the health of the liberal democracy attributed to Australian political realm. Moreover, the trust of citizens on political parties is a key to the success of a liberal democracy, but in this respect too, the two-party system of Australia has rendered inefficacy to the system of governance. Owing to the rigid, stagnant, and ineffective two-party system, today, only a relatively small number of voters have remained loyal to the major parties, and For their part, party organisations have virtually collapsed. They play almost no role in policy development or in activist mobilisation. Membership is insignificant and real power has flowed to party leaders (Marsh, 2010). And such an outlook on the part of the majority of Australians is a pointer to the fact that the two-party system is not at all essential anymore to the sound health of the liberal democratic political structure of Australia. Besides, the argument should be supported by citi ng the fact that owing to the lack of interest in the two-party system, according to a study conducted by the Australian National University, there is a sharp decline in the number of Australians who are presently engaged in the democratic system of the nation (Triffitt, 2014). In conclusion, time and time again it has been proved that the two-party system has failed to contribute to the overall success of Australian liberal democracy, primarily because it has turned the political arena of the country into a biased one incapable of appeasing the interests of the majority of the populace. Hence, it must be argued that the existence of the two-party system is not at all essential to the health of Australian liberal democracy. Unlike nations like Britain, Canada, or New Zealand, the traditional political system of Australia is reliant on the obtainment of majority of votes by the two major political parties, and as this has become a political tradition that has contributed to the weakness of governance over the years, it is high time to look for an alternative multi-party system within the Australian political realm. Moreover, Australian political sphere, owing to the dominance of the two-party system, has only been able to add to the confusions that have hind ered the progress of Australia into a more egalitarian society. Too much contradiction between the two major political parties has rendered inefficacy to the system of governance in Australia. Furthermore, the growing distrust of the populace in the two-party system and the lack of confidence of majority of Australians in the functioning of the system have also pointed to the fact that now it is time for the two-party system to get substituted by a more robust system of governance that would be beneficial to the health of the liberal democratic nature of Australian government. References Debate.org. (n.d.). Is a two-party system preferable to a multi-party system?. [online] Available at: https://www.debate.org/opinions/is-a-two-party-system-preferable-to-a-multi-party-system [Accessed 20 Jan. 2017]. Desai, N. and Boreham, G. (2016). Comment: is Australia's two party system crumbling?. [online] Available at: https://www.sbs.com.au/news/thefeed/story/comment-australias-two-party-system-crumbling [Accessed 20 Jan. 2017]. Harmsen, N. (2016). Election 2016: Why do we have a two-party preferred system?. [online] ABC. Available at: https://www.abc.net.au/news/2016-05-14/why-do-we-have-a-two-party-preferred-system/7413578 [Accessed 20 Jan. 2017]. Irwin, R. (2016). POL10244: Australian Politics. 1st ed. Southern Cross University. Kane, J. (n.d.). The Tyranny of the Two Party System: The Australian Case. [pdf] Available at: https://www.ine.mx/docs/IFE-v2/CDD/CDD-EventosForosAcademicos/EventosForos-2008/PPs-CalidadDemocracia/PPs-CalidadDemocracia-docs/Conferencia02-JohnKane.pdf [Accessed 20 Jan. 2017]. Marsh, I. (2010). Its the system, stupid: why Australias two party system has passed its use by date. [online] Centre for Policy Development. Available at: https://cpd.org.au/2010/08/it%E2%80%99s-the-system-stupid-why-australia%E2%80%99s-two-party-system-has-passed-its-use-by-date/ [Accessed 20 Jan. 2017]. Martin, A. (n.d.). CONFIDENCE IN POLITICAL PARTIES IN AUSTRALIA: EVIDENCE FROM THE AES. [pdf] Available at: https://www.auspsa.org.au/sites/default/files/confidence_in_political_aaron_martin.pdf [Accessed 20 Jan. 2017]. Murphy, J. (2013). The two-party balancing act doesn't get any easier. The Sydney Morning Herald. [online] Available at: https://www.smh.com.au/federal-politics/political-opinion/the-twoparty-balancing-act-doesnt-get-any-easier-20130530-2nf0p.html [Accessed 20 Jan. 2017]. Parliamentary Education Office. (n.d.). Party system. [online] Available at: https://www.peo.gov.au/learning/closer-look/parliament-and-congress/party-system.html [Accessed 20 Jan. 2017]. Political Imagination and a Hung Parliament. (n.d.). 1st ed. [ebook] Available at: https://www.utas.edu.au/__data/assets/pdf_file/0020/172514/Consensus-in-a-Hung-Parliament.pdf [Accessed 20 Jan. 2017]. Reference.com. (2017). What are the disadvantages of a two-party system?. [online] Available at: https://www.reference.com/government-politics/disadvantages-two-party-system-d468c7d445946fce [Accessed 20 Jan. 2017]. SBS. (2015). Comment: is Australia's two party system crumbling?. [online] Available at: https://www.sbs.com.au/news/thefeed/story/comment-australias-two-party-system-crumbling [Accessed 20 Jan. 2017]. Triffitt, M. (2014). Are we seeing the death of the two-party system?. The Sydney Morning Herald. [online] Available at: https://www.smh.com.au/comment/are-we-seeing-the-death-of-the-twoparty-system-20140827-109bi8.html [Accessed 20 Jan. 2017]. Woldring, K. (2012). The Australian party system and proportional representation. [online] Independent Australia. Available at: https://independentaustralia.net/politics/politics-display/the-australian-party-system-and-proportional-representation,4510 [Accessed 20 Jan. 2017].

Monday, March 30, 2020

The Metamorphosis Essays (607 words) - Absurdist Fiction

The Metamorphosis When he lifted his head a little, he saw his vaulted brown belly, sectioned by arch-shaped ribs, to whose dome the cover, about to slide off completely, could barely cling. His many legs, pitifully thin compared with the size of the rest of him, were waving helplessly before his eyes. Gregor Samsa has gone through a metamorphosis. This change has turned Gregor into a monstrous vermin. Kafka expresses the anxieties, inner terrors, and cynicism, which fill Gregors life, throughout the novel, metamorphosis. The main theme of the story is the effect of others control on a person such as Gregor's relationship with his family, and how the people around him controlled his life. He realized that he would be his own person when he could escape from his familys control, even if the only escape was death. Gregor was the most unselfish person in The Metamorphosis. This characteristic shows with his dedication to his work. He was the only family member with a job, believing he was the only one capable of it. His only hobby was fretwork, sitting alone in his room. His devotion to his work was remarkable. In all of the five years he had worked for his fathers creditor, he had never once been absent. Gregor always tried to help out, and he never asked for anything. He was never understood, nor was he liked or associated with. We already know he had no friends. Also, who ever like him, or thought anything of him, slowly became less and less associated with him and/or had disbelieves in him. His boss even accused him of stealing, just because he wouldnt open the door. We see Gregor could not be accepted or understood by the ones that need to understand him most. He died from a lack of love and respect from his family, the ones whom he needed love from the most. Kafka used the constant setting of the Samsa household to show the true repercussions of the metamorphosis. It is here that Gregor is truly dehumanized. No longer can he stand the taste of what used to be his favorite dish. He is reduced to a vermin who feeds on rotted, decaying food and who finds the presence of fresh food repulsing. The very means by which he sustained himself is not fit for a human, but rather for a dependent beast. After Gregor dies, at the end of the story, his parents notice that his sister has grown up into a beautiful woman and they feel that it is time for her to get married. This means that they used Gregor as the pawn that went out and supported them. Now that his sister is grown up they can force her into marrying a rich man. Then they would be well off for a long time to come. They can now control the daughter like they did Gregor. Gretes new husband can support the whole family. Once she is married, she too will then become a pawn, a victim of her parents control. It comes to be that a person could die from lack of love and too much control. We see that Gregors going through a metamorphosis and changing into a bug, proved to characterize what he was. It shows what his life was about. The bug represents the anxieties, inner terrors, and cynicism. One of the definitions of the word bug is an unexpected defect, fault, flaw, or imperfection. This is what became of Gregor, all because of lack of love, and too much control. English Essays

Saturday, March 7, 2020

The Inciting Incident How to Write One Correctly to Hook Readers

The Inciting Incident How to Write One Correctly to Hook Readers The Inciting Incident: How to Write One Correctly to Hook Readers Your inciting incident has the power to influence readers to 1) buy your book and 2) pull them in for the remainder of it.In order to get readers to keep reading, your book needs something to trigger that.Sometimeseven starting your story out strongly isnt enoughAnd that means you need a powerful and inticing inciting incident.Heres how to write an inciting incident:Know why the inciting incident mattersLearn what an inciting incident isEnsure it changes the characters life foreverMake sure it draws a line between old life and newIt must kick off the main plotLearn from inciting incident examplesNOTE: We cover everything in this blog post and much more about the writing, marketing, and publishing process in our VIP Fiction Self-Publishing Program, in addition to your 1-on-1 coaching with a bestelling fiction author. Learn more about it hereWhy Inciting Incidents MatterBy the time you get to Death Wish 5, Charles Bronson has run out of reasons to seek vengeance on the world. You can o nly have everyone (and everything, if you count the house and the dog) you love destroyed by violence so many times before it stops being much of a motivation.In action films (and thriller-type novels), the setup for revenge often comes down to quickly killing a loved one. But the 80s are over and motivations need to resonate with an audience that rightly finds some quick woman-in-a-refrigerator to be as irredeemable as it is lazy.When writing a book, you need to incite your hero to action by giving them a reason.Your reader needs to be on board with that reason. Barring that, your reader needs to understand the reason. Failing that, your reader shouldn’t hate your reason.The difference between an antihero and a villain often comes down to a mixture of how they handle an Inciting Incident and the scope of the incident.A villain will want to burn the world because they lost face to the protagonist. An antihero might decide to shoot every criminal they see because children murd er, for example.Before we get lost in the weeds, let’s break it down and ask the big question.What is an inciting incident?An inciting incident is a specific event at the beginning of a story that kicks off the main plot by forcing your main character into it. The inciting incident changes your characters life forever.A good Inciting Incident contains the following four qualities:Creates a Story Question that the Climax must answerIs Sufficient and Kickass: The stakes matter, the presentation WOWs!Sets a ToneTruly Motivates a Character (internally, not superficially)Essentially, an Inciting Incident gives the hero a reason. This reason must be sufficient to the character in question and also sufficient to the story in question. In the Matrix, the Inciting Incident for Neo comes from learning that he is in a simulation. He is offered a choice between learning about that world or going blissful ignorance.In Romeo and Juliet, the star-crossed lovers meet and fall in love at a party, setting them on a course that leads to tragedy.Katniss, an independent girl with skills and a drive to protect others, sees her sister drawn to be Tribute in the Hunger Games.Mild-mannered office worker Richard Mayhew has a job, a fiancà ©, and no real problems in his life until he can’t help but rescue a wounded girl he sees on the street in Neverwhere.All these examples show inciting incidents that start their respective stories.Each of these inciting incident examples reveals something about the protagonist and the world they live in. They don’t just set the story in motion; they give us a reason to want to see our heroes succeed.How do they accomplish this? They do so by deftly ticking off all four boxes without ticking off the reader.How to Write an Inciting Incident do it WellAs stated above, if youre writing a novel, you need an inciting incident. The key here is to do it well by including the necessary elements to do just that.Heres what an inciting incident needs to do:Alter a hero’s life in an irreversible wayDraw a Line between mundane life and the QuestKick Off the story’s MAIN plotlineLet’s walk through what each of these means as well as examples to bring them to life.#1 Alter a heros life foreverTheres really one main objective of an inciting incident and if you fail this part, the rest of the book will be hard to construct.Your inciting incident must, above all else, alter your characters life forever.Without this very element, its very hard to convince your readers to buy into the story.If your readers can sit back and say, or they could just not do it. to whatever the inciting incident is and their life would be u nchanged, youve created a lot more work for yourself when it comes to the plot.The idea behind this is that if your characters life is changed forever, they dont have a choice but to move forward with what has happened.And that forward momentum is what you need to keep readers engaged.#2 Draw a line between normal life and the new normalThere needs to be a stark contrast between what your characters life looks like now versus what its about to look like after the inciting incident.Why?Because readers want to know that your character cant just go back to how things were. Otherwise, whats the point of them continuing on this journey?With the inciting incident (and really the setup of your story), you are making a promise to the reader about what will happen in your story. If you dont draw a line between the old and whats to come, they wont be interested in finding out whats to come because it wont feel like a mystery.#3 Kick off the storys MAIN plotlineYour inciting incident has to be related to the main plot of your story. If the inciting incident is unrelated to what the main plot points are, youve done something wrong.A common mistake authors make with this is using a big, tense moment as the inciting incident in order to draw intrigue, but then in the next chapter, introducing the real main plot elements.If your story can work separately from the inciting incident, its not done correctly. Go back and tie it into the main plot.An example of this would be Katniss Everdeen in The Hunger Games.The main plot is her journey to survive the Hunger Games. The inciting incident is when she volunteers as tribute to replace her sister in the games.Had the inciting incident not happened (volunteering), the main plot would not exist (Katniss surviving the games).An example of how this could not go well is if the author decided to use a raid or a brawl of some sort as the inciting incident, and then making Katniss be chosen for the games. These elements would not be tied in this instance and it wouldnt be as intriguing or as good of a story.Inciting Incident ExamplesOne of the best ways to get the hang of what an inciting incident really is, is to read and learn from some examples.Here are 4 inciting incident examples to help you learn how to do this well.Inciting Incident Example #1 The MatrixFor Neo, the choice represents an important internal motivation for his character. He doesn’t choose red vs blue pill because he wants to find out what’s going on, he NEEDS to know.The events leading up to this choice have already illustrated his deep #2 Romeo and JulietThe titular characters met and fall in love. As has been said, you can redo this story with anything, like 2005s pirates and ninjas, and by the end, the audience will demand to know why pirates and ninjas can’t be in love. Or vampires and werewolves, if Underworld is more your thing.The Inciting Incident creates a story question about love and its consequences which the Climax delivers on. It reveals the character of both Romeo and Juliet as they feel truly, without the pretense of the society they live in. The costumes and masks of the party keep their prejudices out, revealing an inner truth.Whether you enjoy a stage production, an older movie, or the Baz Luhrmann version, the party sets a tone for the rest of the events. The presentation leading up to the moment of love discovered feels earned even after a thousand iterations. We root for the characters because we are practically programmed to do so.Finally, the line is drawn between each character’s former life and their new reality of being in love. Nothing about their old prejudices continues forward. The consequences of the main plotline stems from this moment.Inciting Incident Example #3 The Hunger GamesKatniss offers herself up literally as ‘tribute’ to save her sister. It’s character motivated, it sets a tone, and it stuns the crowd. This Inciting Incident creates an echo that follows the character as the story question becomes about the purpose and meaning of sacrifice.The separation between the world of the District and the world of the Games themselves is inexorable and clear cut. The film uses a diluted and diffused palette for the earlier scenes, giving way to a brighter almost saturated pallet for the games. In the book, the prose shifts, becoming more playful and les terse. In both cases, the audience knows which world they are witnessing.The story happens because of this decision.All of this is sufficient, but Collin’s pulls it off in three words. Well, almost, the setup makes the specific Inciting Incident possible.The main plotline occurs, in almost a cheat, at the titular Hunger Games.Finally, the stakes matter to Katniss personally. She saved her sister. The further ramifications that change the society also stem from this incident, but they don’t have to.If the book ended with her sacrifice it would still be sufficient.Inciting Incident Example #4 NeverwinterGaiman uses the Inciting Incident figuratively for the reader and literally for the character of Richard Mayhew. The moment that Richard notices Door, he crosses over from the real world to the realm of London Below.The distinction between the two worlds is irrevocable but not obvious to the intractable Richard, at least not at first.Meeting Door is both an Inciting Incident personally for Richard, who must help because you help people when you see they need it, and a deeply revealing part of his character development. The naiveite that comes with it almost gets him killed quite a few times, but the character line is there.The WOW! of the moment comes from the way Richard entirely focuses on the wounded girl, Door, and totally ignores his blathering fiancà © who demands Richard make a decision, on the spot, between helping the wounded waif and staying engaged.Much like in the Matrix, this is no kind of choice at all. Richard can’t not help.The stakes don’t seem high to Richard, but the reader soon learns that without aid, the men who wounded Door would have caught up to her.Finally, the Incident creates a story question about both Richard and Door, how they interact with the world(s) they interact with and who they are. All of which has a pay off in the Climax.How the Inciting Incident Shapes Your StoryAs you see, the Inciting Incident does a lot with very little. The best of them seem to be almost happenstance, a nearly throwaway event that makes an impact on the characters and the world(s) around them.Even something simple can be used as an iceberg tip, drawing the reader down a rabbit hole (for a fifth example of this EXACT thing) into the world of your story.Be cautioned! These examples represent everything going right and fulfilling the Musts to be sufficient. Losing one of the Musts alone can cause a story to stumble out of the gate.It is possible to recover, but never ideal. Consider the Inciting Incident of The Phantom Menace (picking on a poorly executed story is low fruit, but that’s the point). Anakin is discovered because they need a part to fix a ship to get back on the ‘real’ adventure of protecting Padme. The Incident has prophetic potency but its lack of both a clear separation between the mundane and the quest and its failure to set the stakes leave the audience baffled and relying on external information to care.The Inciting Incident can be thought of as the first major hurdle you need to jump to make a story kickass. If you stumble, even a little, on that first hurdle getting to the finish line and medalling in the event isn’t impossible, but it sure as hell isn’t going to be easy.Start Working Toward a Powerful Story TODAYSometimes getting started is the hardest part. When you have a coach, someone you can work with 1 on 1 to take your story idea to the next level, your progress (and future publishing goals) are better for it.Check out this free training to learn how you can get started.

Thursday, February 20, 2020

Since the mid-nineteenth century income inequality across nations has Term Paper

Since the mid-nineteenth century income inequality across nations has increased dramatically. Discuss the sources and consequenc - Term Paper Example Nineteenth century witnessed collapse of pre-modern empires like the Roman Empire (Mokyr 40). As a result, new political entities, including the British and German empires came into existence. These changes created corresponding dynamics within economic sectors in affected regions. Since then, the world continues to experience shifts in economic dynamics from one region to another. Numerous theories strive to explain causes and consequences associated with these economic shifts. In order to understand what really happens, it is appropriate to look back at history and identify what caused economic changes at those times. Subsequently, we will be able to explain current economic inequality witnessed in modern societies across the world. Introduction In this context, political and social changes that took place during industrial revolution makes 19th Century the starting point of contemporary economic disparities. This period saw the rise of European powers into leading advancement in e xplorations and social modernization. Great Britain championed industrial revolution, which totally changed productivity and wealth creation across the globe. It was during this time that scientists came up with numerous breakthroughs in the field s of mathematics, electricity, chemistry and metallurgy (Mokyr 43). As a result, Great Britain and other European nations resolved to engage in industrial production of goods and mining activities. In this case, new resources that were not discovered and exploited in earlier empires came into existence. Improvement of transport networks through railway lines and establishment of urban settlements changed ways of living. On the other hand, Japan, Germany, and Portugal embarked on programs meant to spark modernization within their economic sectors. Great Britain led the world into abolition of slave trade in Europe, America, and Brazil. As a result, adoption and application of Liberalism started prevailing in modern government systems. Liber alism translated into the economic system of capitalism, which advocated for liberalized pursuit of economic goals by individuals within the society. Therefore, those who had access to key raw materials could utilize them for profit and wealth generation (Mokyr 44). On the other hand, poor citizens of these empires were employed in mines and industries as casual laborers. In this regard, integration of Liberalism and Capitalism marked inception of economic and income inequalities. In addition, globalization derives its roots from this period when economic performance of one nation could influence performance in another related country. Colonization spread into Africa and Asia where colonizers acquired additional wealth from unexploited territories. As a result, the scramble and partition of Africa by European’s major powers influenced economic changes through wealth acquisition from the colonies. All these economic changes resulted in advancement and increase of economic dist ribution and income inequality in the world. Income Inequality: Definition In this context, income inequality or economic inequality refers to distribution of assets and factors of production within a given economic region under consideration. Factors of economic production include major assets like land, capital, and labor. Income inequality changes depending on the period of time and economic

Tuesday, February 4, 2020

Service learning Assignment Example | Topics and Well Written Essays - 500 words

Service learning - Assignment Example This implies that every member of the society is equally important and holds the potential to make positive contributions consequently leading to the overall societal development. Racism is a global problem that can affect anyone since it arguably depends on an individual’s location. For example being white in America and other Western countries is seemingly a free ticket from racism unlike other races such as Asians. However, this privilege is limited to regions where the highest percentage of inhabitants are white. For example, during a tour to Africa with my family we encountered an incident where we were overcharged simply due to the divisions and notions created by race. There was no considerable benefit to the oppressors apart from the extra cash of course. Nonetheless, racism is seemingly double sided since in some instances I get served first regardless there being people from a different race that had arrived earlier. Stereotyping is a common practice in the society and can either be positive or negative. For example, the stereotype that all politicians are selfish or that girls are not good at sports or that all Muslims are terrorists or all women like make-up. Going by this examples it is evident that stereotypes are specific to particular groups such as politicians, girls, Muslims, and women respectively. Additionally, stereotypes are seemingly true but the main contestation is the generalization that is not necessarily true. For example, a relatively high number of women like and frequently use make-up. However, there is also a relatively high number of women who do not wear make-up and in fact do not like it. The theory of voluntary oppression is deeply rooted in the provisions that for oppression to occur one must belong to a group that is facing oppression. This is despite the fact that the particular individual in play may not be directly affected. This implies that an individual is oppressed simply due to the fact that they

Monday, January 27, 2020

Heart Rate Changes In Different Genders Physical Education Essay

Heart Rate Changes In Different Genders Physical Education Essay This report sets out research based on prior experience and literature carrying out the study of relations between exercise and respiration eventually resulting in variation in pulse rate. In essence the research proposal seeks to understand more about the effect and cause relationship to come out with precise results. The report details the methodological issues connected with the research and it explores the choices and assumptions necessary in planning the research. The aim of the study was to see the effect of age and gender on pulse rate variation in response to exercise. For this investigation we made sure the practical is safe because we would not do things that would affect people and also we would not be dangerous to others. We needed to use pulse-meter to check pulse rate down every finding. In our research it was expected that the pulse rate would increase during the time of exercise and also the breathing rate would be faster than normal and that gender and age would affe ct the pulse rate of people. The weights (dumbles) were given to the subjects to use for five minute and one of us assisted them to make sure they used the weights properly. The pulse rate was noted down before the experiment with the help of pulse meter and was recorded again after carrying out the five minute round of exercise with the weights. The ages and gender were also noted. The results of the experiment proved that the pulse rate increased by a substantial amount after the exercise had been completed and that females had a higher pulse rate than men. Moreover, it was seen that age mens ages increase, their pulse rate increases and there was no correlation between females ages and their pulse rates. This experiment tests the effects of age, gender and exercise on pulse  rate. Pulse rate represents the beating of the heart, specifically the  ejection of blood from the left ventricle to the general circulation of the body.  Before the start of exercise, your pre-exercise heart rate usually  rises  above normal, and this is called an anticipatory response. During  exercise, respiration increases based on the amount of activity being  done. When exercise is being completed, there is an increased demand  for gas exchange, due to the circulatory system being under continuous  stress. Oxygen consumption increases rapidly, as well as carbon dioxide  production.  Regular exercise also produces changes in circulation. The blood flow  to working muscles increase, and this means that more oxygen and  energy can be delivered to the muscle cells. Blood volume and the  number of red blood cells also increase with this large flow, and  oxygen  levels rise conside rably.  In our experiment we have decided to test a type of exercise;  use of weight (dumbles). This will affect various parts of the body and is designed  to  build up stamina and keep a regular heart beat. Objective This experiment aims to discover how exercise can  affect the pulse rate of any given individual by testing their pulse  rate after different amounts of exercise and how gender and age affects the pulse rate. Literature Review Research has shown that the pulse rate of men is slower than the pulse rate for women. Different researches have been conducted on the effect of exercise on the health of human being. The studies were intended to examine the influence of exercise on pulse rate, heart rate and fitness of people. Experts from cardiac health suggest that the best way to keep hearts healthy is a balanced diet, avoiding smoking, and regular exercise. Exercise that is good for your heart elevates your heart rate. The American Heart Association recommends to do exercise that increases your heart rate to between 50 and 75% of your maximum heart rate. They recommend getting at least 30  minutes of exercise on most days of the week (AHA, 2006). The American Heart Association also suggests that pulse rate for woman is considered normal if it is between 70-80 beats per minute. However, pulse rate may be affected by variables such as age, sex, physical fitness, some drugs/medication, genetics and anxiety. A study of (WebMD Medical Reference from Healthwise) revealed that your pulse changes from minute to minute. It will be faster when you exercise, have fever or when you are under stress. It will be slower when you are taking rest. The institute also did an experiment to see the pulse rate difference in males and females. The results of the experiment were that the pulse rate of the females was in fact higher than the male pulse rate by six beats.   The overall female average was 85 beats per minute and the overall for males was 79 beats per minute. Scott Roberts, Ph.D., FACSM, FAACVPR, is an assistant professor in the Department of Physical Education and Exercise Physiology at California State University, Chico. His primary area of expertise is Clinical Exercise Physiology. He has authored and co-authored 10 fitness and exercise science books and over a hundred articles and chapters in books. His studies tell that women have a higher Heart Rate response than men. This response compensates for the lower stroke volumes women have compared to men. The average amount of blood pumped out of the heart per minute is referred to as cardiac output. Another research by the American Journal of hypertension concluded that there was no influence of the exercise on pulse rate, blood pressure level and rates of hypertension of the elderly population of ages 50 and above. But the research showed that regular exercise can develop better health and fitness in the younger population. According to (Silverstein, Alvin Dr., et al, The Circulatory System Canada; Fitzhenrey and Whiteside Ltd.  1994), age also affects the pulse rate.   The usual pulse rate for a baby embryo is 150 b.p.m. (beats per minute).The average pulse rate of an infant140 b.p.m and 90 b.p.m in seven years old.   A man from 30-40 years old usually has a pulse rate of approximately 72 b.p.m; this differs from 76-80 b.p.m for a woman of the same age.   Elderly people have the lowest of the other age groups, which is around 50-65 b.p.m.   Women usually have higher pulse rates than men.   Another difference among pulse rates is physical activity. Exercising, such as playing sports, speed your pulse rate up and almost double the speed of your heart.   A study from Brigham and Womens Hospital also conveys the message that the human health can be judged by four vital signs which are Pulse rate, Body temperature, Respiration rate and the Blood pressure. All of these signs can be controlled and regulated by doing regular exercise. Like all other researches Texas Heart Institute also came up with a thought that exercise can help your body in many ways. Aside from helping you to keep a healthy body weight, exercise increases your mobility, protects against bone loss, reduces your stress levels and pulse rates, and helps you feel better about yourself. And research has shown that people who exercise are less likely to develop heart disease, high blood pressure, and high cholesterol levels. People of any age or fitness level can benefit from some type of exercise, be it running, walking, ballroom dancing, water aerobics, gardening, or any activity you choose. A study from NEMA (National Emergency Medicine Association) shows that many athletes have pulse rates in the 40 60 range depending on how fit they are. In general a lower pulse rate is good and exercise programs helps doing so. In addition to that declines will be seen in resting heart rate, blood pressure, and stress levels as well. Overall body changes will also be experienced including weight loss and increase of lean body mass. Hypothesis Development Null Hypothesis H0 = There is no relationship between the age, gender and pulse rate. HO: p à ¢Ã¢â‚¬ °Ã‚   0 Alternative Hypothesis HA = There is a relationship between the age, gender and pulse rate. HA: p = 0 Theoretical Framework The dependent variable here is the pulse rate which changes when exercise is carried out. So, exercise, gender and age are the independent variables which can be manipulated to determine the change in pulse rate. Some intervening variable also interrupt the independent variable and create a discrepancy in the results. Identification of Variables Independent Exercise Age Gender Dependent Pulse Rate Intervening variables Such as illness, faulty tools etc. DIAGRAM Dependent Variable Independent Variables Age Gender Exercise Pulse Rate Intervening Variables illness, faulty tools Methodology Nature Of study the nature of the study is hypothesis testing. Data Collection The data for our research was obtained through experiment and some secondary sources of information, which included internet articles, journals and books. Population Our target population consisted of males and females living in Lahore. Sample The sample comprises of 1070 people, half males and half females. Instruments The instruments used were two dumbles weighing 5 kg each, a stopwatch and a pulse meter. Procedure: The methodology was based on field Experiment research. 1070 people (half males and half females) were approached in different parks and market areas of Lahore. Convenience sampling was used i.e(willing people were chosen to be a part of the experiment). Their pulse rates were recorded before exercise. They were each asked to use lift two weights of 5 kg each for five minutes. Their pulse rate after the exercise was then recorded using the pulse meter. Their age and gender was recorded. The results were then recorded in SPSS and conclusions were drawn based on the collected results. Reliability The reliability of the instruments was ensured through test-retest method. For test-retest reliability method five males from the sample were chosen. Their pulse rate before exercise was recorded twice after a time interval of two minutes. The results obtained in both the attempts co-related to a high degree (Co-efficient=0.87). Validity The content validity is ensured since the pulse meter is measuring the pulse of a person per minute. Results The results of the experiment are as follows: Descriptives: The results show that the mean values of pulse rate in males are lower than the mean values of the pulse rate in females. This shows that females have a higher pulse rate than men. The results also prove that the pulse rate increases after exercise, as the means of the pulse rates before exercise are lower than the means of the pulse rates after exercise. N Minimum Maximum Mean Std. Deviation Without Exercise male 1070 55 105 85.09 10.227 With Exercise male 1070 82 144 116.03 13.118 Valid N (listwise) 1070 N Minimum Maximum Mean Std. Deviation With Exercise Female 535 96 144 120.41 10.060 Without Exercise Female 535 70 105 92.19 6.373 Valid N (listwise) 535 Correlation: The table below shows a weak positive correlation between age of males and their pulse rate without exercise. This means that as the ages of males increase, their pulse rate increases. The value is significant. Age Without Exercise pulse Age male Pearson Correlation 1 .270(**) Sig. (2-tailed) .000 N 535 535 Without Exercise pulse males Pearson Correlation .270(**) 1 Sig. (2-tailed) .000 N 535 535 ** Correlation is significant at the 0.01 level (2-tailed). The table below shows that there is almost no correlation between the age of females and their pulse rate without exercise. This means that the two variables are not related. Age Female Without Exercise pulse Age Female Pearson Correlation 1 .043 Sig. (2-tailed) .317 N 535 535 Without Exercise pulse female Pearson Correlation .043 1 Sig. (2-tailed) .317 N 535 535 Graphical representation of results Discussion We are of the view that when the body is exercising the muscles respire to  produce energy, so the muscles can contract. Oxygen is needed for this  process; the oxygen is carried in the hemoglobin of the red blood  cell. The heart and lungs need to work harder in order to get a  greater amount of oxygen to the muscles for respiration. In muscle cells digested food substances are oxidized to release energy. These  oxidation reactions are called cellular respiration. When muscles use  oxygen in order to respire the process is called aerobic respiration:  The heart rate rises because during exercise, cell respiration in the  muscles increases, so the level of carbon dioxide in the blood rises.  Carbon dioxide is slightly acid; the brain detects the rising acidity  in the blood, the brain then sends a signal through the nervous system  to the lungs to breathe faster and deeper. Gaseous exchange in the  lungs increases allowing more oxygen into the circulatory syst em and removing more carbon dioxide. The brain then sends a signal to the  senatorial node to make the heart beat faster. As a result the heart  rate would rise.  The length of exercise is  increased; the number of beats per minute will rise. The number of  beats per minute rises steadily because the amount of exercise is gradually increased. The heart reacts to this by increasing the number  of times per minute that it beats so that the muscles have enough  oxygen and glucose to work with the greater amount of exercise. In a trial the body temperature of the  exerciser will rise. The heat of the body will increase the heart  rate which will adversely affect our results, making them less  accurate and reliable. We cannot control if the body heats up during  exercise, only to the extent of using a fan to cool the epidermis of  the skin which would lower the temperature of the blood, thus reducing  the bodys core temperature. This would then keep the heart ra te at a  more natural level when a sample will be exercising. The intervening variables which may act at the point of time and are hard to calculate may affect the findings but we are trying to minimize the chance of error by taking measures. Although exercise increases pulse rate, age and gender definitely have an impact on it also. We saw that as age in men increases, their pulse rate also increases, whereas in females, there is no correlation between the age and pulse rates. Moreover, the mean values of pulse rates for females are higher than the mean values of pulse rates for men. Acknowledgements Our debt to people who have supported us in this whole project is enormous. We highly appreciate their complete support, interest, patience and lucid explanations. We highly appreciate the coordination of individuals most of whom we didnt know who cooperated and showed their consent to complete our research. We are really thankful to Mr. Humair Hashmi who taught and led us to the path of attaining a successful Research. References http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B7CVK-4HCDTJ6-3_user=10_rdoc=1_fmt=_orig=search_sort=d_docanchor=view=c_acct=C000050221_version=1_urlVersion=0_userid=10md5=c933d0d1170fe63eac5d49a773503097 www.coursework.info//Investigation_to_see_the_effect_of_exerc_L47472.html wiki.answers.com//Why_is_the_pulse_rate_high_after_exercise   www.studentcentral.co.uk//Investigation_to_see_the_effect_of_exerc_L100012.html http://www.cheathouse.com/essay/essay_view.php?p_essay_id=91613 www.jstor.org/stable/80790   http://www.standards.dfes.gov.uk/schemes2/science/sci5a/sci5aq7?view=get http://journals.cambridge.org/action/displayFulltext?type=1fid=793376jid=ECPvolumeId=2issueId=04aid=793364 www.tki.org.nz/r/science/science/isact_pulse_rates_e.php   http://www.molecularstation.com/research/effect-of-exercise-and-massage-on-the-pulse-rate-arterial-pressure-and-electrocardiogram-in-patients-during-cardiological-rehabilitation-after-myocardial-infarction-5767998.html http://www.123helpme.com/view.asp?id=121764 lose-5-pounds.homeunix.net/effect-of-exercise-on-pulse-rate-pulse-rate.htm ccgi.dcpmicro.plus.com//files/pdf//exercise%20pulse%20rate.pdf   www.patentstorm.us/patents/RE40401.html www.sd67.bc.ca/schools/salc/biology%2012//bplab.pdf   www.umm.edu//what_effects_does_exercise_have_on_other_conditions_000029_8.htm www.deniseallen.org/images/lecture/module3/bplab001.pdf www.8starshop.com//exercise-stop-watch-calorie-heart-pulse-rate-counter.html jp.physoc.org/content/76/1/39.full.pdf http://cgi.ebay.co.uk/Exercise-Stop-Watch-Calorie-Heart-Pulse-Rate-Counter_W0QQitemZ250512726867QQcmdZViewItemQQimsxq20091012?IMSfp=TL091012157003r8163 AHA, 2006. Target Heart Rates, American Heart Association [accessed June 20, 2006 http://www.americanheart.org/presenter.jhtml?identifier=4736. WebMD Medical Reference from Healthwise http://www.webmd.com/heart-disease/pulse-measurement American Journal of Hypertension http://www.nature.com/ajh/journal/v18/n4s/abs/ajh2005608a.html Brigham and womens Hospital http://brighamandwomens.staywellsolutionsonline.com/Library/Encyclopedia/85,P00866 Texas Heart Institute http://www.texasheartinstitute.org/HIC/Topics/HSmart/exercis1.cfm NEMA (National Emergency Medicine Association) http://www.nemahealth.org/programs/healthcare/heart_rate_pulse.htm

Sunday, January 19, 2020

1-Year Marketing Plan Essay

Introduction This one-year strategic marketing plan for Great Gaming Graphics (3G) has been created by its founder to obtain additional private funding for the company. Great Gaming Graphics has been launched two years ago and the discrete graphic chip prototypes that got developed during this time shows great promise, offering computer gaming graphic speeds in excess of 220% compared to the competition. The prototypes have been put on graphic card reference boards for standard PC’s and distributed to PC Gaming Review sites, PC Gaming magazines and PC Game companies for testing/review purposes and the reception was extremely positive. Alongside with this the Gaming Review Sites and Magazines published their findings in their publications and the reception of the general public (through letters, blogs) has been extremely enthusiastic. The next step in the process is to bring the prototype to market (expected launch is Q3 2015 and evaluate entry into new markets (mobile and High Performance Computing) See more:  The Story of an Hour Literary Analysis Essay Mission Statement Great Gaming Graphics mission statement is as follows: â€Å"The best Gaming experience in the world. Period!!!!!!!† The Product  3G has developed graphic chips for the PC gaming market. The graphic chips (lower end model 3G100 and higher end model 3G200) offer substantially higher frame rates per second with the maximum feature set enabled (Anti-Aliasing at maximum) than the competition. The experience for the video gamer is that games can run with live like graphic experience on large resolution screens (including 4K screens) without any stutter of the motion (at least 60hz up to 4K resolution). Consumer Product Classification Gaming Graphics Cards are shopping products. Consumer usually spend 1-3 month researching the product they are looking at buying and replace their cards within 12-36 month, depending if they are hardcore or casual gamers. Gamers usually have a graphic chip brand affiliation (either AMD or NVidia), but will sway to another brand if the performance is at least 20% higher for  the same price. Graphic Cards are usually ordered through online retail outlets like Amazon, Newegg and TigerDirect. Target Market The target market for the 3G products are computer gamers (Males in the age group 14-50 years old), PC/Notebook OEM’s (HP, Dell, Lenovo, ASUS, MSI etc.) and Graphic Card Manufactures. The gaming market represents at least 100 Mio people globally, based on the best-selling computer games ever sold. The target audience for the product is split into three distinctive groups: The Casual Gamer The term â€Å"casual gamer† is often used for gamers who primarily play casual games, but can also refer to gamers who play less frequently than other gamers. Casual gamers may play games designed for ease of gameplay, or play more involved games in short sessions, or at a slower pace than hardcore gamers. The types of game that casual gamers play vary, and they are less likely own a dedicated video game console. The casual gamer represents approx. 80% of the gaming market. The casual gamer will upgrade his gaming experience from build-in graphics (at time of purchase of the PC/Laptop), if the price is low enough to justify the upgrade. The price a casual gamer is willing to pay for a better gaming experience is up to $50. Mainstream Gamer A mainstream gamer is a player with a wider range of interests than a casual gamer and is more likely to enthusiastically play different types of games, but without the amount of time spent and sense of competition of a hardcore gamer. The mainstream gamer enjoys games but may not finish every game they buy and doesn’t have time for long MMO (Massive Multiplayer Online) quests. The mainstream gamer represents approx. 15% of the gaming market. The mainstream gamer will seek out the best bang for the buck regarding his/her gaming experience and is willing to spend up to $200 for a graphic card. Hardcore Gamer A hardcore gamer is a player that spends the majority of his/her free time with gaming. The hardcore gamer is very competitive, often owns the latest high-end technology (High-End PC’s, Consoles, Multi-Monitor Setup, 7.1 Sound  System etc.), are very technology savvy and often seek out and participate in gaming communities. The hardcore gamer represents only about 5% of the gaming market, but a large part of the earnings for the gaming hardware producers, because the margin of the high-end products are substantially higher than in the other categories. The hardcore gamer will seek out the best performing product, no matter what the price is. Some hardcore gamers install up to 4 graphic cards (with a total price of up to $3000 for the Graphic System alone) to have the best gaming experience possible (very high resolution across multiple screens and all graphic options enabled for the best experience) Competitive Situation Analysis Analysis of Competition using Porter’s 5 Forces Model Competitive Rivalry The discrete PC graphic card market generates approx. $6 billion revenue annually on a global scale. The two competitors in this market are AMD (Radeon) and Nvida (GEForce) with a roughly equal market share of about 20% each. Even though Intel is considered to be the market leader in PC graphics, they only have CPU embedded graphics with low performance/features and are currently not considered a competitor. NVidia has recently released an upgraded product line (Mainstream to High-End), with performance increases of approx. 20% across the product line and power reduction of approx. 25% compared with the previous models. Pricing got slightly reduced within the classification of their products (~$200 Mainstream, ~$300 Enthusiast, ~$600 High-End) to gain market share against its only competitor who hasn’t upgraded its product line yet. Nvidia is still producing its upgraded product line in a 28nm process and is not going to 20/16nm before the end of 2016. 3G’s current prototype is already produced in 20nm and is slated to be on 16nm at Q1/2016, which gives it an even greater greated competitive advantage over Nvidia, considering that smaller structures allow substantially faster performance of graphic chips while at the same time reducing power requirements. AMD’s current product line is still based on the three year old Graphics Core Next (GCN) design, which has been refined over the years but is clearly at its limit. Power consumption of AMD powered  graphic cards is almost twice of Nvidia’s and more than 4 times of the 3G prototype. 3G has a clear advantage against both competitors, considering that 3G’s high-end prototype is currently 220% faster than either competitor, with a power use advantage of at least 50% which results in not only a lower power bill for the end consumer of the graphic card but as well reduced cost for cooling components. Additionally the low power requirements allow the use of smaller and cheaper power supplies, which is going to reduce the overall cost of a PC gaming machine even further. One large advantage of the reduced power requirements is that the graphics chip can be used in the upcoming STEAMOS machines (small form factor PC gaming machines, which resemble video game consoles) without sacrifice to performance. Threat from New Entrants There is a potential that ARM (with Mali) and Qualcomm (Adreno) redesign their current SoC (System on a Chip) products and license it to third parties to produce discreet graphic chips. Both companies offer their current products only in the mobile market (Phone/Tablets), which is high volume with a substantially lower margin per chip sold than the discreet PC graphic market. Alongside with this, both companies are in a very good position to drive power requirements even further down, considering their experience with the low power requirement of battery operated systems like phones and tablets. Threat from Buyers The following two potential issues arise from an end customer perspective. 1. Competitive products catch up or exceed with 3G’s product performance at the same price point, which will lower the appeal for end-consumers to use the 3G product. 2. A change in gaming habits to games that don’t have the high graphic power requirements and therefor curbing demand for the overall discreet graphic chip market. Threat from Suppliers Considering the initial lower volume of the product for production in a Semiconductor Fab (TSMC, Samsung etc.) 3G might get bumped to a lower priority if larger customers of the Fab are asking for a larger part of the capacity, due to higher demand. There is a limited amount of Fab Capacity available and it is not easy to move to another Fab (ramp-up time approx. 6 month). Therefor the contracts with the Semiconductor Fab have to be structured in a way to have a guaranteed amount of product delivered (with penalties associated if not fulfilled) plus a contract  clause to allow ramp up of production by 10% on a monthly bas e. Once 3G is getting bigger, it might make sense to pursue a dual supplier strategy, with the advantage of not relying on a Single Fab to produce all graphic chips and the disadvantage alongside with this with not getting high enough volume discounts. Threat from Substitutes One potential issue arising in the future is that IGP (Integrated Graphic Processing) units that are part of a CPU (Intel, AMD and SoC’s) are becoming powerful enough to play the most demanding games and therefor a dedicated Graphic Chip is not going to be required anymore. At this stage this is not a threat for the next 3 years (according to 5 year roadmaps of potential CPU/SoC providers), but could certainly change in the future. It takes 2-3 years to develop a competitive product and there is usually enough advanced notice in the market that a new competitor is going to enter the specific segment. SWOT Analysis In this first paragraph, please introduce the SWOT analysis. For more information, see the recommended text. This section is laid out to summarize the analysis in a table, and is then followed by more detailed explanations of each item. Please see specific instructions in the four sections below the table. STRENGTHS *indicates core competency *Worldclass ASIC Engineering Team Experience of the Executive Management Team Strong capital base WEAKNESSES Only two Graphic Card Manufacturers signed up to produce Graphic Cards based on 3G chips No PC OEM relationships established yet No reputation yet OPPORTUNITIES Approaching the mobile market (Phones/Tablets), with either licensing the technology to SoC companies Finance the game development efforts of Independent Game Companies to focus their efforts specifically on the 3G product Develop out of the existing product a GPGPU, to be used in Supercomputers. THREATS Competition (AMD and NVdia) moving to new Fab technology faster than 3G, removing the advantage on the power front Competition launching new designs that are as efficient as 3G’s, but with the advantage of greater brand recognition Game Developers hitting a plateau with their new generation of games, that don’t require anymore improvements on the graphics card front Strengths 3G’s first strength is having a world-class ASIC (Application Specific Integrated Circuit) engineering team. The members of the team have on average 15 years’ experience in the field of development of low power and high performance ASIC and some of the members of the 3ZG engineering team have been instrumental on developing in the past key products in the graphics card market. The second strength of 3G is the extensive experience of the executive management team. The CEO of 3G used to serve as the president of AMD (direct competitor) for over 10 years. The Sr. Vice President of engineering was the head of engineering at 3DFX in 2001 and after the acquisition of 3DFX by NVidia, he served as the head of engineering products until joining 3G. The Executive Vice President of Sales and Marketing has over 20 years’ experience in building rapid growth sales and marketing teams in seven companies. The third strength/advantage 3G has is its strong capital base. 3G got ove r the past 2 years funding from venture capital in excess of $175 million and currently still has $100 million in the bank, which at current and planned spending levels should sustain the company for another 30 month. Weaknesses The first weakness in 3G’s strategy is that 3G has only managed to sign-up two mid-tier Graphic Card Manufactures (EVGA and XFX). The Graphic Cards Manufactures use the reference boards 3G delivers and implement their own cooling solution plus additional tweaks to boost performance of the cards by 5%-10%. A large part of the Mainstream and Hardcore Gamers like to buy their graphic cards from the top graphic card companies (ASUS, MSI, GigaByte), due to the custom designs and extended warranties. This might limit the initial availability of cards in the market until 3G can sign-up the top graphic card companies as well. The second weakness in the strategy is that 3G has not established any relationships with PC OEM’s (Dell, HP, Lenovo etc.),  which will limit the initial exposure of the product to the mainstream and hardcore gaming user. 3G will start pursuing 6 month after the launch of the product the PC OEM’s, to start including the lower end 3G products in their offerings. The third weakness in the strategy is that 3G doesn’t has the reputation of the two main competitors. AMD and NVidia have both been in the graphic card marketplace for almost 20 years and the end consumer knows what to expect from both companies. 3G is new to the game and will need to build this reputation over time to gain the confidence of the gamers. Opportunities Additional opportunities persist for 3G in several areas that can be explored once 3G had a successful launch of its core product and got additional funding for development. The first opportunity is in the mobile market (phone/tablets). 3G is actively looking into creating reference designs for the mobile market that satisfy the unique requirements present (very low power, with fast performance). The big advantage of the mobile market is that the volumes of the market are extremely high (total annual volume in excess of 1 billion units) and 3G would only need to license the product to SoC companies (e.g. Samsung, MediaTek, Apple, Allwinner) versus getting into production as well. The second opportunity for 3G is the GPGPU (General Purpose Graphic Processing Unit) market, to develop cards that will power Supercomputers. The current prototype is already ahead of the completions (NVidia’s Tesla and Intel’s XEON Phi) and this is a very high margin, but low volume market that will give 3G additional market recognition. The third opportunities for 3G is to finance the game development of up-and-coming independent game developers to specifically optimize the games for the 3G product line. AMD (with Mantle) and NVidia (with PhysX) have been quite successful with the strategy to boost the sales volume of their products. Threats 3G wants to look at potential threats that can derail the strategy in the future and has identified the following three areas: The first threat is that 3G’s competitors are moving faster to a new fab technology than currently presented in their roadmap, which would allow them to come closer to 3G’s low power requirements and allows them as well to boost the performance of their current generation of graphic chips without redesign.  The second threat comes from 3G’s competitors launching radically new design concepts for their graphic cards, which are equal or better to 3G’s design. This would remove 3G’s current advantage entirely and 3G would potentially lose market share. The third threat not only for 3G but as well for 3G’s competitors comes from Gaming Developers hitting a plateau with their next generation of games, which won’t require anymore additional performance from graphic chips. The graphic chip market is largely driven by game developers putting graphic features in place that require substantial upgrades to older gaming platforms. One example of developers driving the graphics chip market was the release of Crysis by Crytek in 2007, which was not playable (with all graphic options enabled) even on high-end hardware available at the time. It took almost four years to have powerful enough graphic chips to be able to play the game with all options enabled, which gave the gamer an almost super realistic view. Market Objectives (launch Q3 2015) During the next year, 3G seeks to achieve the following objective using their marketing mix, including product, price, place (distribution), and promotion strategies. Successful launch of the 3G graphic chip/card on a global scale.

Saturday, January 11, 2020

Internet Security Essay

During the past ten years, the intensiveness and variety of electronic financial transactions have increased dramatically. The last decade was characterised by the rapid spreading of financial transactions involving the use of online and/ or remote mechanisms. E-services and e-transactions have become an essential element of the postmodern technological reality. As the number of online financial services increases, so do the number and variety of security threats. Small and large companies are equally vulnerable to the risks of security breaches in various types of financial transactions. These threats are becoming more and more complex and can take full advantage of the existing network and application vulnerabilities. The current state of technology provides numerous solutions to the existing and emerging security threats; however, the success of the proposed countermeasures will depend on how well businesses realise the seriousness of the major security threats and are prepared to invest additional resources in the development and implementation of the complex security strategies. Security threats and statistical information: The current state of literature A wealth of literature was written about the most serious security threats and the financial losses which security breaches and various types of system vulnerabilities cause to large and small businesses. The period between 2006 and 2008 was marked with the slight decrease in the number of financial frauds and security breaches in financial operations: U. S. Federal Trade Commission asserts that frauds as a percentage of online revenue in the United States and Canada has decreased slightly over the past few years and stabilised at 1. 4 percent in 2008 (Paget 2009). Meanwhile, the losses caused by security breaches and financial fraud display a marked increase – in 2008 alone, the American market lost over $4 billion due to security breaches and financial frauds (Paget 2009). This is a 20 percent increase compared with 2008 (Paget 2009). Given the new trends in technology-related financial services and businesses’ striving to reduce their transaction costs, the development of new methods of e-payment and the use of open architectures will create new technological challenges for professionals and new fraud opportunities for hackers (Glaessner, Kellermann & McNevin 2002). The current state of literature provides the basic overview of the most serious security threats and proposes unique solutions businesses and individuals can take to address these threats. Financial transactions and security threats: what literature says The discussion of security threats in the context of e-financial transactions is one of the most popular topics in scholarly literature. Today, the rapid growth of wireless technology and the increasing role of wireless solutions in daily financial operations turn electronic security into the issue of the major public concern. Numerous authors tried to identify the most important security threats and to categorise them according to their severity and define the risks they pose to the stability of the financial e-flows. For example, Glaessner, Kellerman and McNevin (2002) state that the most frequent problems in the financial transactions arena include (a) insider abuse, (b) identity theft, (c) fraud, and (d) hacking. Cate (2005) concentrates on the discussion of identity-based fraud and suggests that account fraud, true identity fraud and synthetic identity fraud are the three most frequent forms of security threats in online financial transactions. In this context, Keller et al. (2005) seem the most objective and detailed in their observation of the existing security threats and financial transaction issues. According to Keller et al. (2005), the first generation of vulnerabilities started in the middle of the 1980s and took a form of boot viruses that affected computers and networks over the course of weeks; the next generation of viruses was spread by means of macros and e-mails. Denial-of-service attacks became prevalent in the middle of the 1990s and still present one of the basic problems in financial transactions domains (Keller et al. 2005). New types of threats include worms that affect individual and multiple computers and networks, and can easily self-replicate to infect large number of users (Keller et al. 2005). Trojans are used extensively to steal passwords or create back doors on computers, compromising network security (Keller et al. 2005). Keller et al. (2005) believe that the rapid expansion of spyware and malware are of particular concern to IT specialists and business people – these programmes are downloaded into computers without users’ knowledge or consent, typically run in the background, track personal information and execute damaging commands. Statistically, every PC contains approximately 27. 5 pieces of various malicious programmes (Keller et al. 2005). Fortunately, IT professionals actively work to develop effective countermeasures against the most sophisticated security threats. Financial transactions and security threats: Potential solutions Given that malware presents one of the most serious issues in the field of electronic financial transactions, numerous authors sought to offer their solutions to the problem. Vlachos and Spinellis (2007) provide an overview of the so-called Proactive malware identification system, which is based on the computer hygiene principles and demonstrates relative effectiveness in combating the risks of malware in financial transactions. Vlachos and Spinellis (2007) call the proposed algorithm PROMIS and base it on a peer-to-peer architecture; the choice of the P2P architecture is justified by the fact that P2P networks often become a propagation vector for various types of malicious software. The P2P architecture used by Vlachos and Spinellis (2007) contains two types of nodes, the member and the super nodes, and all nodes wishing to participate in the discussed P2P networks must authenticate themselves to the super nodes. PROMIS nodes generally fulfill the two basic types of operations – a Notifier daemon regularly checks the log files on the security applications, while a Handler daemon analyses the incoming rates from other peers of the group and computes a global malicious activity rate (Vlachos & Spinellis 2007). The researchers use experimental design to prove that the performance of the P2P group improves proportionately to the number of P2P members. Extensive simulations suggest that PROMIS has a potential to protect the operating networks from known and unknown worm activity (Vlachos & Spinellis 2007). That during virus epidemics PROMIS exploits only specific vulnerabilities and leaves all other systems intact is considered as one of the basic system’s benefits (Vlachos & Spinellis 2007). However, Vlachos and Spinellis (2007) are not the only professionals in the field of financial security. The fact is in that malware is often associated with denial-of-service attacks, which continue to plague the Internet. Malware substantially lower the bar for massive distributed denial-of-service attacks (Wang & Reiter 2008). Unfortunately, the current state of protection against DoS attacks is passive by nature and does not offer incentives to the owners of the Internet networks to protect their computers from the risks of malware (Wang & Reiter 2008). Wang and Reiter (2008) suggest that client puzzles be a potentially effective mechanism against DoS attacks in financial transactions. Client puzzles imply that â€Å"a client solves a computational puzzle for requesting service before the server commits resources, thereby imposing a massive computational burden on adversaries bent on generating legitimate service requests to consume substantial server resources† (Wang & Reiter 2008). End-to-end puzzles imply that each client bidding for a financial service from the Internet server must present his solution to a puzzle; meanwhile, the server will allocate its limited resources to the bidders who solve the most difficult puzzles (Wang & Reiter 2008). In this system, an adversary cannot seize the financial and informational resources of a victim without committing its own resources first (Wang & Reiter 2008). These systems are effective in mitigating DoS threats at all application layers and can be readily interoperable with various legacy systems (Wang & Reiter 2008). These, however, are unique technological solutions to the existing security threats. Other authors offer less sophisticated but no less effective ideas of how to deal with security threats in financial transactions. According to Corzo et al. (2008), Automated Banking Certificates (ABC) can be readily used to timely identify unauthorised financial transactions. In the current system of electronic transactions, a financial transaction is considered authentic if it (a) is performed by an authorised entity; (b) has not been altered since the moment it was generated; and (c) is not a replay of another valid transaction (Corzo et al. 2008). Unfortunately, current banking systems can identify non-valid and fraudulent transactions only by means of audit after the transaction took place; as a result, there is an urgent need to develop a mechanism which will trace and identify fraudulent transactions before and while they are taking place (Corzo et al. 2008). An ABC is a data structure which allows monitoring the relationships between various transactions within one workflow (Corzo et al. 2008). A complete ABC allows tracing operations within workflows that go beyond the boundaries of one financial institution, as long as their tasks are related (Corzo et al. 008). The use of ABC’s in the current system of financial transactions proves that the task of identifying an unauthorised user is absolutely achievable. The use of network smart cards is another potential solution to the existing and emerging security threats. A network smart card â€Å"is a smart card that is an Internet node and is accessible from the Internet† (Lu & Ali 2006). The Smart Card stores user information and provides this information only to the trusted client or server, as soon as the user authorises the service or transaction (Lu & Ali 2006). Smart cards are beneficial in the sense that they can create and maintain secure Internet connections with another Internet node, a web server or a web browser (Lu & Ali 2006). As long as the smart card sends selected user information directly to the service provider, this information does not go through the local computer and the threats of identity theft or similar security breaches becomes minimal (Lu & Ali 2006). Unfortunately, the effectiveness of these developments is yet to be discovered. Meanwhile, companies continue using more traditional solutions to their security issues. The current research suggests that AdAware and Spybot are the most common tools used by businesses to deal with such threats (Keller 2005). Moreover, despite the availability of effective tools that cost little or nothing at all, many businesses recognise that they do not use any spyware at all (Keller 2005). As a result, businesses either lose significant material resources or fail to timely identify the emerging threats. The case is particularly difficult with the so-called insider threats, when security threats are being born from within the business entity. For example, in 2008, the FBI alleged that a former Intel employee copied top secret documents that posed a threat to the future of the whole company and its business projects (Patel 2009). The cases when bank workers become the basic sources of the security threats and the initiators of the complex financial frauds are not rare. As a result, the success of financial transactions, their security, and the technical safety of consumers depends on how well companies realise the seriousness of the security threats and whether they are prepared to deal with them. The current state of technology provides numerous solutions to the security issues in financial transactions, and businesses can secure themselves from the potential risks and failures by using the proposed technological Internet solutions at low or no cost. Conclusion The past years have been marked with the rapid increase in electronic financial transactions. The use of online and/ or remote mechanisms in financial operations has already become an essential element of the daily business routine. Financial transactions are associated with numerous security threats, including identity fraud, insider abuse, and the use of malware and denial-of-service attacks to access and steal personal user information. The current state of literature provides numerous solutions and ideas, which businesses could use to address the existing and emerging security threats. Smart cards, automated banking certificates, and the use of client puzzles are just some out of many ways to address security threats in financial transactions. Unfortunately, businesses often neglect the existing technological opportunities and do not deem it necessary to use effective protection from the real security threats. As a result, the effectiveness and safety of financial transactions largely depends on how well businesses realise the seriousness of the discussed threats and are prepared to invest additional material resources in the development of effective security strategies and solutions.