Featured Post

Everything you Need to Know About Human papillomavirus Essay

Odds are you have in any event came into contact with the human papilliomavirus and did not understand you did. Most grown-ups have whom are...

Thursday, November 28, 2019

Womens Charity Organisation Essay Example For Students

Womens Charity Organisation Essay An Inspector Calls is full of lies and deceit. Write fully about the way in which Priestly exposes weakness and wickedness, not only in the characters on stage, but also in society. The title of the play An Inspector Calls, is very specific and immediately we know that the key words are Inspector and Calls, this is obviously what happens. I will attempt to write fully how Priestly exposes weakness and wickedness, in the characters on stage and also in society. The play tells the story of the Birling family and Gerald Croft and how their lives are intertwined. There are hidden lies and truths that the family keeps from each other. Any family that tells lies or has hidden truths must display signs of being weak or wicked. In my opinion all the characters show signs of weakness or wickedness and in some cases both, for example the whole of the family must share responsibility of Eva Smith or Daisy Renton, nobody in the family realised everybody was involved with her. Arthur Birling is in his middle fifties and is the father of Sheila and Eric. He runs his own company called Birling and Company. We will write a custom essay on Womens Charity Organisation specifically for you for only $16.38 $13.9/page Order now The first sign of wickedness that Mr Birling shows is him refusing to make the wages higher which Eva Smith wanted, shed had a lot to say-far too much-so she had to go, but the other girls who complained of low wages, as well as Eva were allowed to stay. This displays Mr Birling deceiving his staff because they went on strike for higher pay rises, well, we let them all come back-at the old rates-except the four or five ring-leaders, whod started the trouble. Eva was amongst the ring-leaders so she was sacked. I understand from this that really the employees went on strike for nothing. Another sign of his wickedness is that he wanted to keep labour costs down and prices high, so that he got more money, to buy the luxuries in life such as port and cigars. This was also one of his greater weaknesses being pompous, always offering port or cigars to his visitors. Sybil Birling is approximately fifty and married Mr Birling who was below her class. They have two children. Her interest is raising funds for the Womens Charity Organisation. In my opinion she lied when she denied all knowledge of Eva Smith. When the Inspector showed her a picture he asked, You recognise her? she replied No. Why should I? She was trying to hide that she knew Eva so she didnt get into trouble, but the Inspector knew the truth because he had read a diary of Evas. Mrs. Birling indicates wickedness in her character when Eva turned up at the Brumley Womens Charity Organisation asking for help to find a place to live. She was homeless and had hardly any money to buy food or drink. Mrs. Birling wasnt satisfied with the girls claim. Eva Smith seemed to Mrs. Birling not a good case and so she used her influence to have it refused. She deceived her committee members in advising them not to allow her claim for assistance, as she didnt feel Eva was suitable. Sheila is the twenty-year-old fiance of Gerald Croft and on the night the Inspector calls they are having an engagement party. A signal of weakness in Sheilas character is jealousy, this is noticed when she visited Milwards, a clothes shop to try something on. The assistant and her mother advised her that it wouldnt suit her. As she was trying a dress on she knew herself it wouldnt suit, but in the mirror she caught the assistant sniggering. Eva Smith the assistant had held the same dress up against herself and it looked perfect because she was also beautiful. .u280344ebea1d4dc1b5a55fa3f73fd825 , .u280344ebea1d4dc1b5a55fa3f73fd825 .postImageUrl , .u280344ebea1d4dc1b5a55fa3f73fd825 .centered-text-area { min-height: 80px; position: relative; } .u280344ebea1d4dc1b5a55fa3f73fd825 , .u280344ebea1d4dc1b5a55fa3f73fd825:hover , .u280344ebea1d4dc1b5a55fa3f73fd825:visited , .u280344ebea1d4dc1b5a55fa3f73fd825:active { border:0!important; } .u280344ebea1d4dc1b5a55fa3f73fd825 .clearfix:after { content: ""; display: table; clear: both; } .u280344ebea1d4dc1b5a55fa3f73fd825 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u280344ebea1d4dc1b5a55fa3f73fd825:active , .u280344ebea1d4dc1b5a55fa3f73fd825:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u280344ebea1d4dc1b5a55fa3f73fd825 .centered-text-area { width: 100%; position: relative ; } .u280344ebea1d4dc1b5a55fa3f73fd825 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u280344ebea1d4dc1b5a55fa3f73fd825 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u280344ebea1d4dc1b5a55fa3f73fd825 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u280344ebea1d4dc1b5a55fa3f73fd825:hover .ctaButton { background-color: #34495E!important; } .u280344ebea1d4dc1b5a55fa3f73fd825 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u280344ebea1d4dc1b5a55fa3f73fd825 .u280344ebea1d4dc1b5a55fa3f73fd825-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u280344ebea1d4dc1b5a55fa3f73fd825:after { content: ""; display: block; clear: both; } READ: 'Croft' family EssayIn a furious temper Sheila immediately approached the manager and wickedly arranged for Eva to be dismissed stating that shed persuade mother to close the account with them. In my opinion Sheila didnt lie because she said to Gerald, Im trying to tell the truth. She was not deceitful either. Eric is a public school and University educated only son of Mr and Mrs. Birling. He is the brother to Sheila who is of a similar age. He is an employee of the family firm Birling and Co, but his father threatens that unless you brighten your ideas, youll never be in a position to let anybody stay or to tell anybody to go.

Wednesday, November 27, 2019

Words for Telling the Future

Words for Telling the Future Words for Telling the Future Words for Telling the Future By Maeve Maddox Even as scientists explore Quantum Theory, ancient practices for divining the future continue to flourish. Ronald and Nancy Reagan regularly consulted astrologers, and many newspaper readers check the astrology column before looking at anything else. Tarot readers and palm readers make a living at it. Here are some words writers might want to use in describing some of these practices. Divination is the practice of foreseeing the future or finding out hidden knowledge by some means or other. Ancient Romans studied the flight of birds to determine whether or not the day was favorable for some action. This method of divination is called augury. The verb to augur means to predict or indicate the future. One could say, missing a step on the way out of the house, That does not augur well! Romans had a specialized diviner called a haruspex who cut open animals and examined their entrails. This practice is called haruspicy. Several words that end in -mancy refer to methods of divination. Geomancy interprets markings on the ground, or the piles or patterns made by dirt when it is tossed. The geo comes from the word for earth. Necromancy involves summoning up the dead, the way King Saul did when he called on the Witch of Endor. The necro comes from the Greek word for dead. Sometimes necromancy is used to refer to any kind of black magic that involves the summoning of demons. Oneiromancy is divination by dreams. Bibliomancy is divining by opening a book at random and reading the first phrase that ones eyes light upon. Although the Bible is often the book used for this form of divination, other books are used. The biblio comes from Greek and Latin words for paper or scroll. The Bible is literally the Book. Another word for this practice is sortes. Some other familiar types of divination: Palmistry is divination by reading the lines on the palm of the hand. Phrenology is divination by feeling the bumps on a persons head. This practice was really popular in Victorian times. Many novelists have their characters talk about it. Astrology predicts a persons future according to alignment of the stars and planets. Dowsing is a method of finding the location of water or other underground substances with the use of a forked stick or wire. Clairvoyance is divination by second sight. Numerology is divination with numbers Sortilege is divination by casting lots. Priests do it in the Old Testament. Finally, two practices that you know about, but probably dont know the words for, are those of reading tea leaves and gazing into a crystal ball. Tasseography is the word for reading the future in tea leaves at the bottom of a cup. Scrying is what the gypsy does when she looks into her crystal ball and tells you that you are going to come into a large sum of money. If you ever doubted that English has a word for everything, take a look at these sites that feature lists of divination of every kind: Online etymology dictionary Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:50 Rhetorical Devices for Rational Writing26 Feel-Good Words50 Musical Terms Used in Nonmusical Senses

Sunday, November 24, 2019

Was the Treaty of Versailles Unfair to Germany Essays

Was the Treaty of Versailles Unfair to Germany Essays Was the Treaty of Versailles Unfair to Germany Paper Was the Treaty of Versailles Unfair to Germany Paper The Treaty of Versailles was signed on June 28th, 1919. It took David Lloyd-George, Prime Minister of Britain, Georges Clemenceau, Prime Minister of France, and Thomas Woodrow Wilson, president of the United States of America, six months to negotiate this peace treaty. I believe that the Treaty of Versailles was reasonable, mostly fair but sometimes unfair as well, as Germany had annexed parts of other countries and it was only fair to give those parts back to their original country, also Germany invaded Belgium, a neutral country, destroying it. However, it was unfair that Germans who lived in parts of Germany, such as Posen and near Danzig, were not allowed to be German or a part of Germany, while for example Poles who had been living in Germany before the Treaty of Versailles, now had their own country, Poland. According to the Treaty of Versailles, Germany had to lose 10 percent of its land and all of its colonies1. Germans did not like this; however, Germany had annexed Alsace- Lorraine, two rich industrial parts of France after the Franco- Prussian wars in 1870 and 1871, and in 1918 after Russia had signed the Treaty of Brest- Litovsk, Germany took 35 percent of Russias land together with most of its industry. Germans were now thinking that losing 10 percent was a lot, when before they had had no problem with forcing Russia to lose 35 percent of its land, especially most of its industrial land. The Treaty of Versailles now simply commanded Germany to return Alsace- Lorraine to France, the 35 percent of Russia was partly given back to Russia but was also use to form new countries, Schleswig was given to Denmark, West Prussia, Posen and Upper Silesia were given to Poland2 just to name a few. Article 116 of the Treaty of Versailles states: Germany acknowledges and agrees to respect as permanent and inalienable the independence of all the territories which were part of the former Russian Empire on August 1st, 1914. 3 And article 51 says that: The territories which were ceded to Germany in accordance with the Preliminaries of Peace signed at Versailles on February 26, 1871, and the Treaty of Frankfurt of May 10, 1871, are restored to French sovereignty as from the date of the Armistice of November 11, 1918. The provisions of the Treaties establishing the delimitation of the frontiers before 1871 shall be restored. 4 These article states that Germany shall respect the parts of th e former Russian Empire, which it annexed, now to be free and no longer a part of Germany. The second article states that Alsace- Lorraine shall be returned to France, and that the German and French boundary is to be just like it was before the Franco- Prussia wars. Also articles such as, 83, 87 and 1095 command Germany to give land to Poland, Czechoslovakia and Denmark and establish the new German boarders. On August 4th, 1914 Germany invaded Belgium, which up till then had been a neutral country just like the Netherlands. With this act Germany broke article seven of the 1839 Treaty of London, which stated that: Belgium, within the limits specified in Articles I, II, and IV, shall form an independent and perpetually neutral State. It shall be bound to observe such neutrality towards all other States. 6 However, the German army went through Belgium plundering and terrorizing- they shot civilians, burned down towns, raped women and children7, while trying to full fill the Schlieffen Plan. The German army did not only do this to Belgium, but to all other countries they invaded, but Belgium is simply one of the most known as it marked the begin of World War One. As a result it is quite fair that Germany had to pay 132 billion German marks8 for the reparations of World War One, after they went through a country destroying it and its people, invaded other countries such as Russia and France, doing the same there. However, you can also look from the other side, Germany didnt only have to pay for the damage it made, but also for the damage the British, the French, the Russians, the Americans and everyone else who fought in the war made. But Germany was one of the strongest, on of the richest country and the USA, Britain and France could not let Germany stay too powerful. I still believe that this was not too harsh on Germany, as Germany caused a lot of damage and started the war, and now had to pay. One of Woodrow Wilsons fourteen points was self- determination. This meant that he wanted every nationality to be able to rule themselves, in their own country9. As a fact, this point was incorporated in the Treaty of Versailles leading to the creation of Czechoslovakia and Yugoslavia and to the recreation Poland. Czechoslovakia was mostly made up of mostly Czechs (seven million) and Slovaks (two million). However, there were also seven hundred thousand Hungarians, four hundred fifty thousand Ukrainians and three and a half million Germans living in Czechoslovakia10. Yugoslavia was mostly made up of Serbs, Macedonians, Croats, Slovenes and Bosnians11. Poland was recreated but around thirty percent of its population was not Polish, but Russian or German or Jewish,12 to name some. Due to the Treaty these Poles, Czechs, Slovaks, Serbs, Bosnians, Croats, Macedonians and Slovenes, all got their own country, which they could rule. This was self- determination. However, the Germans living in Czechoslovakia were not allowed to be German and they were not allowed to live in their own country and be ruled by Germans. These Germans had to be Czechoslovakian, which a majority of the Germans did not want to be as many wanted to live inside Germany. The same thing happened with Poland and the Polish Corridor. The Germans living near Danzig, in the Polish Corridor, now no longer were German but Polish instead. This was basically against Woodrow Wilsons point of Self- determination, as these Germans were not allowed to live in their own country and to be their own nationality. Therefore I believe that the Treaty of Versailles was mostly fair but also a bit unfair, due to the fact that Germany had annexed parts of, for example France and Russia and it was nothing but fair, that Germany had to return this land. Also Germany started World War One or at least the actual fighting, by invading the neutral state of Belgium, demolishing it. And lastly, and the reason why I believe that the Treaty of Versailles was a bit unfair, because Germans living in parts of Germany that were given to another country, were not allowed to rule themselves, or to live in their own country going against the point of self- determination in the Treaty of Versailles. All in all I believe that the Treaty of Versailles was reasonable. References historylearningsite.co.uk/treaty_of_versailles.htm http://avalon.law.yale.edu/imt/partiii.asp firstworldwar.com/source/london1839.htm https://www.csmonitor.com/World/Europe/2010/1004/Germany-finishes-paying-WWI-reparations-ending-century-of-guilt

Saturday, November 23, 2019

How to Write Without Really Trying

How to Write Without Really Trying How to Write Without Really Trying How to Write Without Really Trying By Maeve Maddox A paradox of our times is that, although schools no longer insist that students master standard writing conventions in order to graduate, more people are writing for publication than at any previous time in human history. According to one estimate, more than 152 million blogs populate the Internet, with more joining them every day. And then there are the books: in the years between 2007 and 2012, self-published titles rose 422 percent. As might be expected, much of this verbal outpouring is rife with nonstandard grammar, sloppy style, and a general lack of respect for the reader. Here, for example, is a notice written by an online purveyor of fan fiction: Please Note, alot of typoes and grammatical errors  will  be found. i just posted this recently and have not had a chance to edit yet. so  bare with me will  be eiditing soon. Professional journalists, on the other hand, might reasonably be expected to pay attention to the conventions of formal written English. Or so I thought, until I read an article about a spate of burglaries in a residential neighborhood in California. The article appears on the site of an ABC affiliate. Presumably, the writer was paid to write it. Here are a few extracts, with comments: It [a manhunt] started with a stolen getaway car that the burglars left behind when they took off to hide inside people’s homes. The expression â€Å"to take off† in the sense of â€Å"to leave in a hurry† is at best informal usage. I suppose the writer chose â€Å"took off† because he’d already used left in â€Å"left behind.† By replacing â€Å"left behind† with abandoned, he could have used left instead of took off to mean depart. The three burglary suspects were believed to be holed up in someone’s house. The expression â€Å"to hole up† or â€Å"to be holed up† is definitely slang. Conventional usage: â€Å"were believed to be hiding in someone’s house.† Snipers in camouflage climbed on roof tops and officers made sure every inch of the neighborhood was covered, from backyards, to front porches, dogs hunted for the suspects scent. i. The word rooftops is a closed compound. ii. A comma usually separates independent clauses joined by and: â€Å"Snipers in camouflage climbed on rooftops, and officers made sure† iii. The sentence is actually two sentences, incorrectly joined by a comma splice. The first sentence should end with â€Å"from backyards to front porches.† The next sentence is â€Å"Dogs hunted for the suspects’ scent.† iv. The dog sentence is less than satisfying. Did the dogs really hunt the scent? Or were they following the scent as they hunted the suspects? Police are praising the woman at the start of the day who called police when she heard the burglars inside her home. This is an example of a misplaced modifier. The hunt for the burglars began when the woman phoned the police that morning. Better: â€Å"Police are praising the woman who called police at the start of the day when she heard the burglars inside her home.† Shortly after writing this post, I heard about the availability of software applications designed to write articles with a minimum of human input. According to an online advertisement, one such revolutionary application includes templates and phrase lists that will enable a blogger to produce a 500-word article â€Å"on any topic in under a minute.† Who knows? A machine may have written the story about the burglars. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the General category, check our popular posts, or choose a related post below:Masters Degree or Master's Degree?Yay, Hooray, Woo-hoo and Other Acclamations45 Idioms About the Number One

Thursday, November 21, 2019

Macroeconomics - Economic Growth Essay Example | Topics and Well Written Essays - 250 words

Macroeconomics - Economic Growth - Essay Example Most of the regional developments have been caused by local and international investments. Research has placed China among the top countries with increased industrial developments. Economic leaders have ensured friendly policies so that investors can start businesses in local areas. Finance has also been offered to local investors with business ideas through the sale of bonds by local governments. The regions act as economic blocks where production and trade is regulated (China Central Television 2014). Free trade and a large capital and human resource have contributed to most of the economic developments in China. Industries in these regions range from electronic companies to designer clothing firms. They provide job to locals leading to middle and upper class lifestyles. China’s high population has been advantageous in the provision of local markets (China Central Television 2014). Most of the produced goods are sold locally while the national government invests in exports as a source of income. Reliance on internal sources of raw materials has also enhanced the country’s economic stability because economic meltdowns in other countries do not cause a chain reaction. Despite its high population, presence of skilled labor and investment programs has led to job creations leading to better lifestyles that are a sign of economic development. China Central Television. (2014, May 29). China pursuing coordinated regional economic development - CCTV News - CCTV.com English. China pursuing coordinated regional economic development - CCTV News - CCTV.com English. Retrieved May 30, 2014, from

Profile of a Learner Essay Example | Topics and Well Written Essays - 1250 words

Profile of a Learner - Essay Example As a teacher, I have to make sure each student gains from the course by trying as much as possible to accommodate their needs in my teaching methods. My current class consists of students with a wide range of capabilities, talents and learning abilities. As a teacher, I have had to change my teaching mode in order to enhance learning outcomes of each of the students. In this essay, I will profile one of my students, Emmy. Emmy is an eighteen-year-old female student taking various subjects including as working in partnership, health and safety, and principle of practice, which are the main elements of the Health and social care Course. Each of these course elements equip students with different skills and are all essential to their general understanding of health issues and social care. Therefore, it is essential for the students to perform well in all the course elements, in both theory and practice in order to excel in the course as indicated by Armitage, et al, (2012). Description of Initial Assessment Procedures In order to fully understand Emmy, I endeavored to conduct an assessment on her academic and general behavior in order to know how to help her. This, according to Keeley-Brown, (2007), is the best way to conduct an initial assessment of the student and get a clear picture of the student’s needs.... In order to help her and the other students, I decided to take a keen assessment of Emmy and her behavior in order to help her achieve the best learning outcomes at the end of the course. I therefore went through her academic records, talked to her friends as well as sitting down worth her in order to assess her mental abilities. A look at her academic records revealed that she had one of the lowest average grades with extremely poor results in theoretical subjects. She performed pretty well in practical subjects. After looking at her results and comparing with other students in her company, I concluded that she was somewhat nonchalant in reading a lot of the theory notes given to her by the teachers. She preferred doing practical; assignments on the other hand. Theoretical subjects demand that students use up their time reading in order to grasp the content. Her lack of interest in reading could have contributed to her poor results in theory. Upon keeping a keen eye on her behavior in class, I noticed that she shunned away from students who performed better than her and preferred to hang with average students like herself. She also did not like participating in group assignments. Most of the groups were formed around the idea that the students with different learning abilities would come together to share their skills and learn from one another. The groups therefore consisted of both average and excellent students. I tried to sit down with Emmy and chat with her and I discovered that her mental strength was a little bit lower than the course required in order for one to excel. She had a low self-esteem and feared interacting with students she felt were clever. She also had a negative

Wednesday, November 20, 2019

Nazis and how the final solution came to be Research Paper

Nazis and how the final solution came to be - Research Paper Example The following paper will discuss this process of refinement.   Gas vans employed the usage of poisonous cases to implement the ideology of mass murder of the Jews by the Germans. The initial slaughter of the Soviet Jews was carried out by shooting them individually. This method of slaughter or killing turned out to be inefficient and had certain negative outcomes. It not only proved as inefficient in murdering a large number of the Jews, but it also had devastating after-effects on the perpetrators. Problems such as alcoholism and psychological issues became common and widespread due to this method of murder. Himmler Heinrich, second in power to Adolf Hitler who led the breakthrough methods of employing â€Å"medicine† in the mass murder techniques and was also involved in the set up of the extermination camps, was himself a victim of the psychological after-effects caused by the shootings. He almost fainted at the sight of the 100 Jews being executed through shootings on th e Russian front in 1941 (Nicholls 80, 117-118). These reasons urged and motivated them to experiment with other methods which were more effectual and could be performed in a more â€Å"humane† way causing lesser effects on the perpetrators. ... The journey of the Jews was initiated from the train cars where they were crammed and transported first to Kolo and then to Powiercie. Trucks from the junction took the prisoners to Schlosslager. Prisoners took a bathe there and any valuable objects under their possession were taken by the Germans. Stripped groups of fifty to seventy men, women, and children were forcefully directed towards a ramp which led to deceptive signs â€Å"To the Washrooms.† From there, the prisoners were cramped into gas vans and even during or after the killings the vans drove to Waldlager. The dead bodies were buried in massive graves and the vans were then cleaned by Jewish prisoners specially appointed for this job. In spite of the effectual exhaust fumes that were used for the mass murders, the gas vans eventually reflected some short-comings. The vans were not spacious and the requirement for deaths in the East was increasing tremendously. Moreover, the burial pits used after the gas vans execu tion procedures did not fulfill the requirements for secrecy of the government. Better methods of getting rid of the corpses had to be formulated to carry out the mass execution of the Jews (Rubenstein and Roth 196-197). More than 150,000 Jews were executed using the carbon monoxide gas vans at Chelmno in 1942. After Chelmno, four other extermination camps were put up in 1942 at Sobibor, Treblinka, Belzec and by the end of 1942, Majdanek. The first three camps were successful in the mass murder of 600,000 Jews by using carbon monoxide gas as the killing agent (Nicholls 80). Operation Reinhard, which was the code-word for the secretive execution of the Polish Jews, was named after Reinhard Heydrich, one of the main

Tuesday, November 19, 2019

Wall Street Journal Opinion Article Essay Example | Topics and Well Written Essays - 750 words

Wall Street Journal Opinion Article - Essay Example This is because this could automatically affect the GDP of the countries in which the investors originate from. The greatest effect was felt from the withdrawal of the world’s super power-America’s bank-Merrill Linch. The bank had anticipated a GDP rise of about 7.6% but due to the drawback they were now expecting a rise of about 7.2% (Ellison 74).They therefore withdrew from China so as to maintain a steady economy in their country. However the bank’s management stated that they did not expect China to experience financial strain or even suffer a drop in their economy as a result of the drawback (Ellison 78). They also added that the Chinese government has the opportunity to stabilize their economy despite the unfolding that took place. However, there is still risk of these potential investors to withdraw from the business as it is expected that the growth forecast of Nomura Company will drop to 7.3% from7.5%.The CNBC further presumed that this may pose risk to the annual target of the company that was at 7.4% (Ellison 67).Conversely from a press release of an official government statement, investors were assured that the country would still be able to maintain their economic growth within reasonable limits despite the drawback that had occurred. The government official added that the debt risks of the county were manageable and that they would have no instances of default despite there being evidence that one company had defaulted (Ellison 69). According to data obtained from a survey conducted by the Fact sheet, it was noted that since July 2010, this was the first time that copper products were being sold below $ 3a pound (Ellison 76). This is critical to investors who have engaged in the business as this is termed as spoilt business on their part. This is because they cannot be able to sell their products at high prices

Monday, November 18, 2019

Clinton Trial Essay Example | Topics and Well Written Essays - 1500 words

Clinton Trial - Essay Example However, in 1998, he was accused for perjury and obstruction of justice during a case against him. These two accusations were related to a scandal concerning a white house intern. Although he was acquitted by the U.S Senate and completed his term in office the trial marked a great part of American history. Clinton’s Trial President Bill Clinton’s trial for the charges brought up against him of perjury and obstruction of justice, started in January 7 1999, in the Senate. As indicated in Article 1 of the United State Constitution, Chief Justice William Rehnquist of the Supreme Court was sworn in to preside over the trial and the juniors sworn in were the 100 senators. This was the second time in the United State history that the senate conducted a trial of a head of state (Sigelman et al, 2001). The origin of Clinton’s trial was in a sexual harassment lawsuit claimed by one Paula Jones in Arkansas in May, 1994. Paula Jones was a former Arkansas state employee. Paul a claimed that in May 8, 1991 while she was helping to staff a state-sponsored conference at the Excelsior Hotel in Little Rock, a member of at that time Governor Bill Clinton’s security, Danny Ferguson, came to her and told her that the Governor was asking to meet her in his hotel suite. Jones saw this as an opportunity to advance her career therefore she took the elevator to the Governor’s suite. According to her statement, Jones claims that when she got to the suite, the Governor, Clinton at that time, continuously made increasingly aggressive moves on her. In her account, she claimed that the Governor forced her to do sexual things but, according to the security guard outside the suite, Jones looked happy when she got out of the Governor’s suite. The lawyers of Clinton asked the court to dismiss Jones claims in 1997 saying it would only disrupt his work at the white house but the supreme court ruled against the president and allowed the discovery of the case to continue that was in May 1997. An independent Counsel Ken Starr was the one in charge of the investigation (umkc.edu/faculty/projects/ftrials/clinton/). Counsel Ken had history with investigating the officials in the white house although many of his cases had failed to hold in court for example his case on the land deal years earlier known as White-water. It was during this investigation that he got prove of Clinton’s misuse of power by being intimate with an employee, Monica Lewinsky. Consequently, Clinton’s trial had a lot of impact to the political sector mainly in Clintons rating and publicity. During this Lewinsky/impeachment controversy, Bill Clinton received the highest job approval ratings of his administration. Furthermore, as the Lewinsky situation unfolded, Clinton's approval in terms of his job went up, not down as was expected. Moreover, his ratings remained high for the duration of the impeachment proceedings. However while Clinton's job approval rati ng went up during the scandal with Lewinsky and the trial, his poll numbers though went down concerning the question of honesty, integrity and moral character as a political leader. As a result of this low ratings about his moral character and honesty led to change the political leadership of the United States. George.W.Bush was the president elected defeating Gore in the 2000 presidential elections and according to

Sunday, November 17, 2019

Geography of the Big Mac Essay Example for Free

Geography of the Big Mac Essay McDonalds has been around since 1940, when it was created by Nick and Mac McDonald in Bernardino, California. Since then McDonalds has only grown around the world in popularity and business. There are currently more than 33 thousand restaurants around the world in 119 countries. The chain has remarkably gone form offering just a few items on its menu to a wide range of over a 145 diverse items on its menu. Needless to say McDonalds has embedded itself within the world’s society. The way McDonalds runs its business has many different components. These different items include geography of a location, Weber’s model, development, and mass consumption. One of McDonald’s most successful items on its menu is the big mac. Worldwide it is known for its flavor; however, many do not understand how that burger gets to them. The ingredients are not merely picked up at a local store, but shipped across miles of land and sea. There are many different factors for why this happens. The three main reasons for why this occurs are due to geography, weber’s model, and development. Geography plays a big role in where things grow for instance if one looks at the United States corn grows better in the Midwest. This then affects what farmers will grow in a certain climate, because they need to meet the needs of the plant they are growing. This pattern is seen in Europe with the ingredients needed to make a big mac and largely affects where certain places receive certain items. The buns used to create a big mac are produced in Germany, America, and Canada. The climate in Germany is a moderate climate with a good amount of rain throughout the year. This makes it an ideal place to grow wheat which needs the climate to be mild and not too cold. There are also many places throughout the United States and Canada that classify as this climate. The pickles are needed to be raised in a warm atmosphere. This is why the pickles for the big mac are grown in Spain and Turkey. Spain has a Mediterranean climate with dry summers and relatively warm winters, and Turkey has hot and dry summers and mild winters. The beef is nurtured in Ireland. This is mainly due to the fact that Ireland has sporadic weather that is not necessarily spectacular for growing crops. This means that they are not losing money by not planting a crop but using the land instead is used for cattle ranching. The dairy farmers often need a cool climate to run their farms. This correlates with the fact that Germany and Ireland are the suppliers for the big mac’s cheese in the United Kingdom. Both climates have relatively cool atmospheres almost year round. The lettuce for the big is grown in Spain due to the fact that it needs a warm climate to grow in. The last item on the big mac is the onions and these are found in Holland. Holland has cool summers and mild winters which make it the optimal place to grow onions. Onions need temperatures to be at a happy medium between hot and cold for them to grow well. All of these places and items grown are directly related to the McDonalds in the United Kingdom. The United Kingdom gets all of its ingredients for its big mac from different countries. The reason they do this can be described by Weber’s model. Weber’s model centers on three main ideas such as transportation, labor, and agglomeration. Transportation in today’s modern world is fast and inexpensive meaning that it is a viable option to ship products to different locations that may be far away. The fact that there is cheap transportation makes it easier for countries, such as the U. K. , to get products that they do not have the capability of growing as well. Labor is a much more important component of Weber’s model today. This part of the model is classified as the most costing part of an organization. This means that companies will look for a cheaper labor pool. The U. K. follows this pattern for the most part. The United Kingdom has a minimum wage of $9. 83 in U. S. dollars. Some of the main suppliers for the items in the big mac for the U. K.are Germany, America, Canada, Turkey, and Spain. All of these places have less of a minimum wage requirement than the United Kingdom. This means that it is cheaper for the United Kingdom to pay workers in other countries to grow their products rather than grow them in their own country. Lastly, there is the matter of agglomeration. Agglomeration is often when businesses that produce the same product locate around each other to reap some sort of benefit. This directly relates to all 1,200 McDonalds in the United Kingdom. Many of these restaurants are located around other fast food chains. The main idea behind this is to potentially steal costumers from other fast food restaurants. McDonalds can also benefit from other fast food chains advertisements if they are located near them. McDonalds tends to symbolize development in countries. Every developed country in the world practically has a McDonalds. Most people credit McDonalds for being the innovator of the development of the fast food industry. The food chain has developed a well-oiled machine for creating the same products. They have people located at certain areas to do specific jobs such as grilling burgers, adding dressing, frying fries, getting drinks, and cashiering. This may sound similar to another model that gave birth to the auto industry. This model being the Ford model. Ford was the first to develop an assembly line, which basically gave workers a specific job that they only did. This maximized production for Ford made it so they could produce cars in a more efficient time frame lowering prices. Due to the fact that McDonalds runs their business similar to Ford’s is the reason why their prices are so affordable. Many different companies have shaped their businesses around McDonalds. This is why there are so many different types of fast food chains. Since there are so many McDonalds worldwide there are bound to be negative side effects centering on the issue of consumption. McDonald’s food is very high in sodium and fats. This type of food is not very healthy for the average person’s diet. This means that the food consumers are consuming at McDonalds can contribute to obesity if they eat there too frequently. The obesity rate in the United States is 35. 7% of all adults. These statistics show that obesity is a huge issue. There is currently 550 million big macs sold in the United States each year. This is not a very healthy product. The fact that so many people are buying and eating it could contribute to their unhealthy weight. There is also a matter of how much virtual water is used to make the beef patty in a big mac. There is 4-18 thousand gallons of water used per beef patty in a big mac. The reason this number is so high is due to the fact that it takes a lot of water to grow grain for cows to eat and cows drink a lot of water. Water seems like a substance that can be found on a whim. However, it is actually a relatively hard thing to find. For instance, people around Texas are actually mining water. They are mining in the Ogallala Aquifer which is basically a huge underground supply of water. The fact that people have to mine water just adds to the fact that there is not an abundant amount to be wasted like is being seen on the production of a meat patty. There is also the matter with the idea that the more McDonalds that are spawned in certain areas there is less of a culture in areas. This is the idea of placelessness. Areas lose their own culture due to the fact that everything starts to look the same. The more demand for McDonalds means more stores and less of a cultural background in places.

Friday, November 15, 2019

Functions and Elements of Self Organising Networks

Functions and Elements of Self Organising Networks CHAPTER 1 In this chapter I will be discussing about the main functions of SON, its components, elements and how does it atomizes the whole LTE network infrastructure. I have organised this chapter in the following way and will explain each of the component respectively. OAM Automatic Configuration Features Neighbour Relation Automatic Neighbour Relation management Connectivity Management Self Test Automatic Inventory So, lets get started with the detain explanation, description and working of the OAM system first. 1OAM (Operation, Administration and Management) 1.1Introduction OAM stands for Operation, Administration and Management systems. As we have discussed in the earlier chapters that most of the network operations today is controlled and managed by a central entity which is known as the OAM system. Mainly in a centralized system architecture all the Self-Configuration, Self-Optimization and Self-Healing operations are controlled through the OAM system. In the next paragraph a brief description of what functions does the Operation, Administration and Management system take care of is explained. Operations system deals in both the administration and management systems. It is basically a centralized control structure which keeps coordination between both the other systems. Administration system as it stands control all the administrative tasks like networks design, assignment of addresses, keeping network up to date and other administrative functions. And lastly the Maintenance system maintains and keeps the network running through keeping check of all the elements, executing appropriate diagnostic functions, monitoring network and resetting the components or whole network if required. All these components work parallel to keep the network in operational state. 1.2Architecture For any network to operate optimally it is very necessary to keep check on all the elements. The operator of network should have a system through which he can make sure that there is no fault and network is running normally. In the figure 1.1 below a high level OAM architecture architecture is represented. OAM Architecture Fig1.1 As it is clear through fig 1.1 that OAM has further devided management layers and provided dedicated servers to each management layer to deal with its functions. All the management servers serves their corresponding nodes layer by layer to perform the management tasks. Network protocols has been defined at each interface onto the Network Element or end user for execution of effortless management functions. Though the architecture diagram we can conclude two main logical functions that devides the OAM according to their functions and roles. These functions are given below, Network Management function Element Management function Mainly in the network managements systems, OAM is addressed as the entity which controls, maintains and configures the network. The term OAM is used in the 3GPP documentation for the network management functions. As five main sub-functions of Network Management Systems are derived from the main functions of OAM and hence NMS is also reffered as the OAM systems in many contexts. OAM when demand lot of provisonal functions then it is known as the OAMP, P stands for provision in this situation. The functional elements of Network Management System is given in the figure 1.2 below. Fig 1.2 In the next part I will be discussing two very important management functions related to the OAM architecture and those are as follows, 1.3Element Management System (EMS) As we know network element is an entity composed of the physical hardware. Processes and executions are performed on those physical devices to provide service the users. Therefore, a management technique to manage these elements of the network is known as the Element Management System. The management system a very broad topic but I will keep focus on the main components which integrates with the SON technique for the optimization of cellular networks. As we can see in the fig 1.1 the Network management system collects all the data from EMS and EMS gathers all useful measurements for the NE respectively. The difference is NMS mainly execute the aggregated measurements from NEs to accomplish required functions but EMS works on individual NE at a time. Below is the high-level architecture of the EMS and the components it interacts with. Fig 1.2 Furthermore, I would give a brief description of the components shown in the fig 1.2 above. The EMS connects to the NMS server to provide all the collected and aggregated information or measurement from the network elements. NMS makes decisions based on these collected data from EMS. The client is used to show or present the data to user with a user friendly graphic user interface. The operator can login through the client to configure and maintain network when needed. The database function is to store all the usable measurements and information. These measurements are used when a fault occurs in the Network Element. Evaluating and comparing the network performances with these measurements give a complete sight of what might be causing the errors in the network. And the last component which is the Network Element is same we have discussed earlier, a physical device used to execute all the processes and functions. A question that arises here is that the network elements can be managed and configured through accessing the devices itself so why do we need a central Element Management System? Therefore, the need of this management function is explained as follows. 1.3.1Requirement of EMS Network are getting very complex as new functionalities and services are added very frequently. And with that, new vendors and service providers are introducing themselves in market. As the network size is enhancing the operations at the network element end is also increasing. This operation management demands high cost and effort. Therefore, to minimize the cost, effort and a centralized solution to manage the networks were provided by the 3GPP. An appropriate and user-friendly interface is very vital to perform and manage managerial tasks with ease. Some main issues which the operators of telecom companies were facing are described in the next paragraph. Firstly, Due to the development of fresh network elements and services there was a need to provision diverse elements from different vendors. For example, even in a single network GSM, UMTS and LTE can work side by side therefore a management system was required which can gather all the data from all the network elements. Secondly, the complexity issues were raising as of now many multiple functionalities are merging into one single functionality which makes the network complex. And lastly but the most important is the cost. The cost associated in dealing with each element individually was very high, therefore to manage complete network and its services remotely and through a central entity which has all the data and measurements from all the network elements can reduce huge costs. Progressing through EMS now I will explain the functions and services EMS provides to the network and how it interacts with its upper layer that is the Network Management System. 1.3.2Functions of EMS Element Management System basically manages the base stations that is eNodeBs in the LTE network architecture in accordance with SON. The main functions which EMS features while managing the network elements are given below. 1.3.2.1Provisioning and Installation of NE When a base station that is eNodeB is connected to a power station but not yet configured and basic setup is not initiated, eNodeBs at this point needs to connect to the network to perform basic functions. So, the Self-Configuration function of SON is initiated to make a connection, eNodeB for connectivity requires an IP-address and OAM support to start functionating. For obtaining basic configuration and parameter settings the eNodeB connects to the OAM system. Now the EMS element in the OAM must provision, support and provide these basic configuration settings to the eNodeB. The EMS checks is they can provide the service base station is asking for. The inventory management server is checked for this purpose. Once the resources are available and identified the configurations are uploaded onto the base stations and correct parameters are set up. At this point the network elements are ready to be interconnected with the network and start functioning. This technique is used in the Self-Configuration function of SON for the basic connectivity with the network. Furthermore, this function of EMS also maintains the backup and restore points for the network element. Downloading, installing the patches and newly updated software on the eNodeBs are handled by the EM system too. The inventory system database in the EM system contains all the required parameter settings used by the eNodeBs for the self-configuration and auto-connectivity once powered on. Every element in the modern telecom services are automated through SON and a technician is only needed when something couldnt be resolved automatically. At that point the engineer or operator just login through the EMS graphical user interface and handles all the faults and errors with ease. 1.3.2.2Managing User terminals and maintaining QOS In a wide scale network, there are thousand of base stations and thousands of user-equipment are connected to these base stations. Therefore, to manage this big network is not easy at the operators end. The capital expenditure to deploy base stations and then the operational expenditure to maintain each single base station requires huge amount of cost and with cost excessive human effort is required to maintain base stations. Therefore, EM system manages these user terminals by gathering the statistics of all the users cell through cell and saves these measurements into the database. So, the message status between the base station and UE are attained in the shape of statistical reports. The vital data collected in these statistics are given below, All the successful calls. All the failed calls. Dropped calls. Successful HOs. Failed HOs. The traffic capacity that is throughput. By gaining all these important statistics from the network the EM system analyzes and makes appropriate decisions when needed. Not only this but EMS uses these measurements to maintain the Quality of Service too. 1.3.2.3Network Support Network support mainly aims in the activities related to the maintenance of the network. And as discussed earlier operators goal is to decrease the cost as much as they can. As much the network is well managed and well driven the cost will decrease. So, quality of management systems is inversely proportion to the cost. With the cost, there is one more concern that operators are facing and that is the lack of professional technicians. And both concerns can be mitigated through the automatic solutions. Therefore, automatic network systems reduce human intervention and cuts the cost too. And for the support of network automatically EMS functionalities are evolved. Main functionality that EMS provides for the network support are given below. Debugging and resolving software issues such as bugs and errors. EMS provides a method to automatically resolve these errors remotely. All the security statistics are handled by EMS which the network requires to handle and secure vital information and data. All the network faults and issues at the element level are mitigated through the EMS. As Network management system deals with the combined data and information from several network elements. But the EMS takes charge and record of each Element individually. And lastly EMS allows operators to login to the specific node for the purpose of upgradation or changing parameters. The operator does not have to go physically to the base station and login through its internal interface. 1.3.2.4Monitoring of Networks The monitoring of networks is mainly done on the Network Management System but some of its function is executed on the EMS. EMS supports the NMS through some of its functionalities for the monitoring and control. First, we need to understand that monitoring of networks is executed on NMS and portions of these functions are performed on the EMS level. The EMS layer is below the NMS layer and therefore it provides major feeds to the layers above it. The monitoring systems main tasks which optimizes the network are given in the figure 1.3 below. Fig 1.3 The 3GPP defines standards of OAM with very classified specification. And it is very clear that the OAM specification gives ease in implementing the management system for the network. There are other network management specifications like TMF but the 3GPP specification about the OAM is very broad and revolves around some specific function or technology. The specifications, standards, specifications and how does 3GPP uses SON to optimize networks are explained in the last chapter of this paper that is 3GPP specifications and its interaction with SON. 1.4Network Management System (NMS) The network management system in the OAM architecture is capable of managing the complete network in a combined method that is, managing of radio transmissions, core networks and the base stations. NMS manages all these entities on one single platform. And due to the capability of managing everything on one single node the cost and human effort is decreased exponentially. There is a term used in the management system called FCPS which stands for Fault, Configuration, Performance and Security Management. And this function works on all the layers of the OAM model. On every layer, it has different function but the general explanation of FCPS is explained in the last portion of this topic. Basically, how NMS functions is explained in the example below, Lets consider there is a fault detected on the NE. Because whenever an event occurs network element generates a log which notifies EMS of the event occurrence. EMS would collect these statistics from the NE. Now NMS responsibility is to tackle the issue and take corrective measures. To accomplish these goals NMS correlates the statistics from different NE and different events, this technique helps the NMS to discover the issue or fault by comparing different statistics. A real-time example of NMS working could be of a disconnection scenario between a base station and the media gateway. Logs and stats screening the connection lost will be generated on the elements of both base stations and the MGW. As base station and MGW are two different network elements and EMS always record the stats of specific network element individually. So, it might collect the stats from the base station or the MGW, but the Network Management System at this point records data from both the elements and then correlate them. Therefore, in the scenarios defined above the stats and logs from base station and MGW can be analyzed together which makes the work on NMS level easy to find the actual problem in the network. And when the problem is diagnosed NMS takes the proper corrective measure to mitigate the issue which EMS can not do by just gathering the logs of one network element. This is a case specific function of how NMS tackles the issues. The other functions and activities NMS performs to optimize the network are given in the next section. 1.4.1Activities performed by NMS All the main activities that the NMS performs prior to any maintenance instructions or corrective measures are given below. Learn about all the elements available in the network. It works in two ways, manual discovery which is done by the operator and the second is automatic element discovery. In an auto discovery mode, this management system automatically discovers and identifies all the network elements and assign IPs to the particular element which requires it. The manual discovery is executed by the operator and manage the network elements that is assign IP addresses to the elements and discover all the elements in the network through the application menu. Gathering all the faulty data. The reason this activity is scheduled to be executed after the network elements discovery is to associate the faulty information with the specific element and components which are causing the error. In the NMS software, all the discovered elements form a tree type structure and hence associating the correct statistics with the corresponding element assists in debugging the fault. Collecting all the performance statistics and data. The faulty data discussed above is sent to the NMS only when they arise but on the other hand the performance logs and stats are stored in the files of network element itself. And these stats are downloaded on the NMS from the NE at the periodic intervals. User Authentications. All the internal user in the NMS needs to be authenticated for the security reasons. There are commands in NMS which can collapse the vital network components which can cause affect on whole network therefore, robust security needs to be implemented on the NMS. Collecting other configurations and data. The last activity executed by the NMS prior to start managing and maintenance of the networkall the other statistics and configurations in the element required in the NMS to execute any function is also collected from the NE. So, when all the elements are discovered and prerequisite activities have been executed successfully the NMS is the all set for the management and maintenance tasks of the network. These functions, maintenance, corrective measures, fault detection etc. are performed by analyzing the earlier collected data from the NE. Main functions of the NMS includes outlining the flow of information, provisioning of network, troubleshooting, configured elements maintenance, making appropriate decisions for the optimal utilization of resources etc. The problem which sometimes arises is the parameter or configuration changes in the network elements. These changes must be updated on the NMS so that it can find an appropriate solution when required. Therefore, network elements are rediscovered at periodic intervals so that the most current statistics and data could be known to the EMS. The next section would comprise of the NMS general architecture and the components which reside in the NMS. Description and explanation of these components are also given in the section below. 1.4.2NMS Architecture

Thursday, November 14, 2019

How does Kafka Comment on 20th Century Capitalism Throughout the Novel

How does Kafka Comment on 20th Century Capitalism Throughout the Novel and what Symbolism does he Use to Depict it Firstly, it is important to point out that I don’t believe that the individual characters symbolize a certain social or political group in the novel - the characters’ actions and responses to each other in the in the novel do though, representing a social or political group in a specific situation. For example, the majority of people agree that the father in â€Å"Metamorphosis† represents the powerful capitalist society, being the dominant male figure. If one tries to follow this concept throughout the novel, they will encounter many contradictions. While the father does seem powerful at points, such as when he drives out the lodgers, he is in the start portrayed as a rather idle figure, allowing his son to take the dominant position as the family’s income earner. This detail, which could be of great significance, is many times overlooked. All the novel’s links to capitalism are in the author’s choice of words, the concocted situations and in the character’s interaction. The time period in which â€Å"Metamorphosis† was written in (1912) is very significant, because of its historical impact on the novel and the particular views of the time. America was becoming increasingly prosperous with its capitalist views, and was seen by the world as ‘the land of opportunity’, where anyone could be wealthy. Between 1880 and 1930, approximately 2,800,000 Germans and Czechs immigrated to America, in search of a better life, possibly causing resentment and bitterness from those left behind for the capitalist way of life. Kafka criticizes the capitalist views by portraying situations where the family responds to Greg... ...nces you from humanity, and this is also an argument in favour of Communism. This message is clearly portrayed in Gregor’s family, who are forced to find jobs after Gregor’s transformation. As a result of Gregor’s escape from the capitalist economic order, his family is drafted into it. From what we are told of their work periods, they seem to have become much like the old Gregor in their dehumanising jobs, becoming servants even at their home, for the lodgers. Only when they decide that it is necessary for the lodgers to leave and for them to take a ‘day off’ that that seem to be happy again. Though they mourn for Gregor, and in my opinion, they have some sort of ‘enlightenment’, realizing that their financial condition is not the most important aspect in of heir lives. The family takes a ‘day off’, something Gregor would never have done, and go for a walk together. How does Kafka Comment on 20th Century Capitalism Throughout the Novel How does Kafka Comment on 20th Century Capitalism Throughout the Novel and what Symbolism does he Use to Depict it Firstly, it is important to point out that I don’t believe that the individual characters symbolize a certain social or political group in the novel - the characters’ actions and responses to each other in the in the novel do though, representing a social or political group in a specific situation. For example, the majority of people agree that the father in â€Å"Metamorphosis† represents the powerful capitalist society, being the dominant male figure. If one tries to follow this concept throughout the novel, they will encounter many contradictions. While the father does seem powerful at points, such as when he drives out the lodgers, he is in the start portrayed as a rather idle figure, allowing his son to take the dominant position as the family’s income earner. This detail, which could be of great significance, is many times overlooked. All the novel’s links to capitalism are in the author’s choice of words, the concocted situations and in the character’s interaction. The time period in which â€Å"Metamorphosis† was written in (1912) is very significant, because of its historical impact on the novel and the particular views of the time. America was becoming increasingly prosperous with its capitalist views, and was seen by the world as ‘the land of opportunity’, where anyone could be wealthy. Between 1880 and 1930, approximately 2,800,000 Germans and Czechs immigrated to America, in search of a better life, possibly causing resentment and bitterness from those left behind for the capitalist way of life. Kafka criticizes the capitalist views by portraying situations where the family responds to Greg... ...nces you from humanity, and this is also an argument in favour of Communism. This message is clearly portrayed in Gregor’s family, who are forced to find jobs after Gregor’s transformation. As a result of Gregor’s escape from the capitalist economic order, his family is drafted into it. From what we are told of their work periods, they seem to have become much like the old Gregor in their dehumanising jobs, becoming servants even at their home, for the lodgers. Only when they decide that it is necessary for the lodgers to leave and for them to take a ‘day off’ that that seem to be happy again. Though they mourn for Gregor, and in my opinion, they have some sort of ‘enlightenment’, realizing that their financial condition is not the most important aspect in of heir lives. The family takes a ‘day off’, something Gregor would never have done, and go for a walk together.

Wednesday, November 13, 2019

Hamlet Essay -- essays papers

Hamlet William Shakespeare composed the play Hamlet, around 1600-1601. This play, named after his only son, in my opinion is one of Shakespeare’s best works. The play shows the literal as well as the realistic sides of people during this culture as well as those generations to come. During the play, Hamlet’s character went through several different transitions. In the beginning he was shown as a child, by his actions and curiosity, but towards the end of play his manhood begins surface and he begins to be aggressive at getting what he wants. Hamlet is full of mysterious relationships. Hamlets relationship with his so called friends (Rosencrantz and Guildenstern), his relationship with Ophelia (he proclaims his love at the end) and certainly his relationship with his father/uncle Claudius are all very mysterious in how they’re played out through their characters in the play. The relationship that stood out in my mind was the one between Hamlet and his mother Gertrude. Although Gertrude is the person that Hamlet has the most inner conflict with, he still loves his mother as most children do. As a mother figure, Gertrude is supposed to be the perfect one- with out any impurities or errors. When Hamlet realizes that his mother is a flawed, sinful women, who’s sexual appetite is so deviant she takes on her brother in-law, Hamlets whole view changes. How could the women who just buried her husband become a blushing bride so rapidly? After Hamlet contemplates all of this, how can he trust any woman when his own mother betrayed his father? When Hamlet has thoughts of his mother he is affected both emotionally and psychologically. He is affected emotionally because it is his mother, his own blood that is apart of the ... ... he over re-acts and the ghost of his father appears to remind him of why he was there. Gertrude senses Hamlets anger after he kills Polonius and asked what have I done? Hamlets reply was one full of grief, anxiety and anger. He begins to tell his mother of what he knows and what he expects from her. Not to share her bed with Claudius as well as take part in any more corruption. Gertrude then begins to see that her son is not mad with sickness, but is more mad with anger over her stupidity. Hamlet has let his mother become his main role model for all women in the world and that is why he is so negative towards women. Gertrude has influenced Hamlet more then anyone in the play. Although the influence is negative, it has made Hamlet look at other sides of people and take them for what they are. He has a better out look on life even though it has cost him greatly.

Tuesday, November 12, 2019

Swot Vodafone

Email Developing a total communication strategy in the uk market 1. INTRODUCTION This report will critically analyse the external environment of the mobile phone operators industry with the application of appropriate strategy tools including PESTEL and Michael Porter's five forces models. An immediate result of this would be the identification of opportunities and threats that may arise from change in environmental factors and assessment of the attractiveness of the industry respectively.The report will also analyse critically, the strategic capability of Vodafone, also applying appropriate strategy tools resulting in the identification of key strengths and weaknesses of the firm. The aim here will be to identify and discuss the core competences the firm possesses. To aid the analysis, the report will draw on information from various sources such as: The Vodafone case study on page 557 in the main textbook by Johnson, Scholes and Whittington, Exploring Strategy 9th Edition, Prentice Hall, 2011. Other sources include Keynotes, Mintel and Magazines. . QUESTION ONE: PESTEL, KEY DRIVERS AND MICHAEL PORTER'S 5 FORCES 2. 1 PESTEL The PESTEL framework is used for the analysis and according to Johnson, Scholes and Whittington (2011), â€Å"it provides a comprehensive list of influences on the possible success or failure of particular strategies†. Discussed below are a few issues of PESTEL, please see appendix for other issues. Political/Legal factors Government's privatisation(through Ofcom) of the national telephone company, BT, compelling it to allow access to its network (via Openreach) for voice and broadband.This has helped to break down BT's monopoly thereby creating an opportunity for mobile operators to operate and at competitive rates. (case study p. 558) Economic factors a. The UK economy has still not fully recovered from the financial crisis of 2008, recovering even slower than other countries amidst huge government resuscitation efforts and even con sumer spending is expected to decline by 0. 6 per capita in 2011(the Telegraph, May 2011). This is a threat to the industry as, the slower the economic recovery, the slower the market growth for the mobile operators industry. b. Though the case study(p. 58) says that personal disposal income growth as experienced between 2002 and 2007 was forecasted to resume in the future, recent developments suggest otherwise. Now the future is here, reports say household incomes are falling(NewStatesman, May  ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­2011 and Mail Online, May 2011 ). This is a threat to the mobile industry as it means less income at the disposal of households, hence less subscribers to its services. Social factors a. Consumer need for converged services, such as mobile telephony, fixed line telephony, television and broadband internet, was increasing(case study p. 558).This means an opportunity for mobile operators to expand their market as more people are coming on board with t his convergence need which could be a result of the plunge in disposable income so people want all services in one and pay a lower lump sum for all in a bid to ration their income. b. A decline in UK fixed line telephone market as households were becoming â€Å"mobile-only† users. This is an opportunity for mobile operators to capture the market share of fixed line telephone operators in a bid to expand theirs. c. Consumer perceived prestige that comes with owning smartphones is an industry opportunity.For example, everyone wants to have an IPhone, HTC or Blackberry because they are ‘cool' or for other reasons, so operators in the industry can capitalize on this and increase their market share by offering cheap deals. d. Consumer ‘hype' for new and modern technologies as everyone wants to have the latest ‘thing' in technology. This would create an opportunity for the industry to capitalize on and expand their market share. Technological factors a. Developmen t of new technologies, IP(Internet Protocol) for voice, data and video transmission(case study p. 557).The dynamic nature of technology is posing a threat as operators may be stuck with obsolete technology thereby facing a challenge to be pro-active in order to retain market share and keep churn rates at bay. b. Continued upgrading of speeds over mobile networks poses a threat as operators have to keep up with the upgrading of speeds because they might loose customers to service providers who can offer better speeds. Environmental factors As a result of advancement in telecommunications technology, mobile operators have to replace network equipments and hazardous wastes(masts, cables, construction waste etc)frequently.Mobile operators are then faced with the challenge of finding energy efficient ways of recycling which may also be capital intensive, altogether posing a threat. Legal factors a. Ofcom's issuance of licences for additional mobile network operators will pose a threat to incumbent operators( as their market share is threatened) and be an opportunity to potential operators as this will lower entry barriers for them. b. Elaborate legal contracts can also be a threat to the industry as lots of legal obligations have to be satisfied prior to and after entry.Drawing up different phone contracts for different mobile packages can prove challenging for the operators. 2. 2 KEY DRIVERS FOR CHANGE Socio-cultural issue Consumer need for converged services: Consumer needs(which has led Virgin Media to provide multiple services such as the ‘quad play and others providing the triple play) change from time to time and even some firms will try to create the needs for the consumers thereby pushing the industry towards finding ways to satisfy these needs as the market expands. This is one of the major drivers of change for the industry.Technological issue: Development of new Technologies: The dynamic nature of technology will keep operators findings ways to sta y ahead of competitors by developing new technologies such as the IP, digitising high-speed distribution of voice, data and video over multiple networks. 2. 3 MICHAEL PORTER'S 5 FORCES ANALYSIS a. Threat of entry: (low) The barrier of initial capital cost of entry may be daunting but the regulatory changes in the UK communications industry by Ofcom saw the issuance of licences to more mobile operators and also allowing MVNOs to ease network capacity without the capital cost of building their own hence reducing barriers to entry. This has also led to increase in the number of competitors. b. Threat of substitutes: (low/moderate) Considering the advantages of mobile connections (make calls, sending messages/data, music etc), substitutes would be the fixed line connections, skype(or VOIP) on broadband, radio airwaves, phone booths or simply go without. With the fixed line connections, Ofcom reported that the number of lines dropped from 34. 9million in 2003 to 33million in 2009.Call mi nutes had also decreased by 15% from 167billion to 138billion over the same period with mobile minutes expected to exceed fixed line minutes in 2010(Case study p. 558). A report on Broadband news also says that mobile broadband will overtake fixed line connections in 2011. (Broadband Choices 2009). It is likely that the trend will continue in this way, considering the convenience offered by mobile connections, of being able to make a call on the move. c. Competitive rivalry: (high) One of the aims of Ofcom is to ensure healthy competition among operators which saw a rapid growth in the number of competitors.The major competitors in the industry are Vodafone, Telefonica O2, Orange, 3 UK and Tmobile plus lots of MVNO's. According to the case study, wireless operator margins in the UK were up because of strong competition(p. 559). d. Buyer power: (moderate) The main buyers from the industry are households(individuals) and businesses. According to case study(p. 559), average churn(custo mer switching) rates in the market was 20% annually due to the introduction of number portability in 2007 and competitive tactics such as subsidising handsets for subscribers. Customers would switch operators for better offers or added value for their money.To counter this churn rate, most operators have found a way to switch post-paid customers to longer contracts of 18months or even 24months as at 2009. A recent 2011 report (Sim-only deals, 2011) highlights other reasons for low switching rates including provider's loyalty programme and value for money SIM only deals which altogether gives them the power to make customers stay. e. Supplier power: (moderate) The main suppliers to the industry would be the handset makers and Ofcom. Major handset suppliers such as Nokia with 40% of UK handset market and Samsung,21%, supply handsets to the industry under global contracts(case study p. 59). There are more suppliers today including Apple, which is another fast growing supplier as their phones are deemed trendy and a must-have because of its innovative features. Sony-Ericsson, Samsung are among the loads of others. The case study p. 559 says mobile handset sales had experienced a decline in 2009 as UK wireless operators started to offer sim-only plans which allow consumers to retain their current handset and pay lower monthly tariffs. Ofcom on the other hand is the sole provider of spectrum. ATTRACTIVENESS: Based on the evidences from the five forces, the report concludes that the industry is attractive.This being that, though rivalry is high, but other threats and powers are low. Essentially incumbents or new operators can then focus only on competition and worry less about powers and other threats. 3 QUESTION TWO: STRATEGIC CAPABILITIES OF VODAFONE According to Johnson et al. (2011), Strategic capabilities are capabilities of an organization that contribute to its long-term survival or competitive advantage made up of two components: Resources, which are assets t he company has or can call upon and Competenceswhich are ways in which those assets are used or deployed effectively. 3. 1 RESOURCES AND COMPETENCESHuman Resources Vodafone has had a history of experienced CEOs including Arun Sarin(resource), who was skilled in achieving growth in developing markets(competence/strength). Also, Gary Laurence(resource), head of Vodafone UK, appointed CEO in September 2008 was known for his ability to identify strategic options(competence/strength) and the current CEO, Vittorio Colao(resource) who succeeded Arun in 2008 is known for strong reputation as cost cutter. (competence/strength). (Case study page 563) Vodafone's partnership with BT(resource) hosting BT's MVNO, allowed it to provide services to corporations. competence/strength). It started a joint venture with O2(resources) which enabled it to extend its fixed-line network. (competence/strength). Vodafone, in its target of business travelers with passport services(resources), was able to offer home country voice rates while roaming in Europe and mobile data services for ? 10 a day(competence/strength). (case study page 563) Financial Resources Financial Performance of Vodafone: (a) ROCE(Return on Capital Employed): measures the returns made from all forms of resources or capital employed in the business.Vodafone's resources are the capital employed and its competence is shown in the amount of returns generated from utilization these capital. Vodafone's ROCE plunged by 3. 73% to give a ROCE in 2010 of 19. 85. This may be slightly better than industry average but it shows a weakness to efficiently utilise resources to yield maximum profits. Vodafone| 2010| 2009| Industry| ROCE| 19. 85| 20. 59| 19. 48| Source. Morning Star Stock Report. (b) Current ratio:   measures a company's efficiency at meeting its short term obligations.A good ratio would be for current liabilities to be covered at least once but Vodafone's current assets(resources) can barely cover 50% of its liabi lities in 2010 though it improved from previous year. On the whole, this is a weakness as the company is low on liquidity and incurring too much liabilities in terms of its short term borrowings. Vodafone Plc| 2010| 2009| Industry| Current Ratio| 0. 50:1| 0. 47:1| | Source: Morning Star Stock Report. (c) Net Gearing: shows the proportion of debt within a company's overall capital. The table below shows that Vodafone's net gearing has declined from 40. 7% in 2009 to 37. 76% in 2010. Overall for the industry borrowing is about 40% of total capital. The reduction therefore for Vodafone is good as its means a reduction in finance costs too. Vodafone| 2010| 2009| Industry| Net Gearing ratio| 37. 76%| 40. 67%| 39. 40%| Source: Morning Star Stock Report. (d) Interest cover: explains Vodafone's ability to service its debt. From the table below, it appears Vodafone makes enough profits to service it finance costs as it has been able to increase its interest cover to 7. 51times in 2010 from 7 . 03times in 2009.This may not be a core competence but it is a strength for Vodafone. Vodafone| 2010| 2009| Interest cover| 7. 51 times| 7. 03 times| Source: Morning Star Stock Report. Physical Resources Vodafone makes heavy investments in the marketing of its Product brands (competence/strength) which includes, landline solutions and mobile telephony, mobile broadband and secure employee remote access(resources), making them well known. (Vodafone website). It invests also in the marketing (competence/strength) of 3G dongles or cards(resources) for internet connection giving it the largest share of 3G subscribers.Vodafone used wholesale services to distribute its fixed voice and broadband (resources) but its prices were too high giving it only a few customers(weakness). Another of its products is the Vodafone-at-home(resources), with which it competed with fixed line providers by offering fixed line prices when customers call from within or near their home(competence/strength). Cor e Competences For the sake of this report, the core competences identified are Vodafone's CEO's. They have been exceptional with what they bring to the table and how their expertise has been able to transform the company.Vodafone UK CEO, Gary Laurence has been formidable in terms of identifying strategic options available to the company such as successful alliances and joint venture with likes of BT and O2. Heavy investment in the marketing of its products giving it largest share of 3G subscribers is another core competence. 3. 2 VODAFONE VALUE CHAIN Primary Activities Inbound logistics: Vodafone possesses its own network equipments, backbones and infrastructure to provide various communication services, and purchasing of handsets (Annual Reports 2010, p. 21).Now, its in a network sharing agreement (sharing masts, sites and towers) with O2 covering the UK and 4 European countries,. (case study page 559, Guardian March 2009). , Another inbound logistic is the ownership of spectrum. S pectrum is of particular importance to the mobile phone and mobile broadband industry, which relies on it to carry information between customers' handsets and mobile masts. Vodafone spectrum is 1800MHz. (Ofcom report, Feb 2011). Operations: All Vodafone operations are based on in-house infrastructure. Vodafone's operations is dependent on its people, infrastructure and financial resources.Its logistics operations (which provides a variety of value-added services), evolves from a single, purpose built site in West Midlands. (Unipartlogistics. com) Out-bound logistics: Vodafone has consumer on-line purchasing systems in place that allow customers to purchase its services directly(Vodafone website). It also has its own billing system. Marketing and Sales: Vodafone has several own branded and other retail chains that it uses in distribution. According to the case   study(page 563), Vodafone invests a lot in marketing in all markets whilst promoting its brand and also sponsors Formula 1 and England cricket sports.Services:Its all encompassing website enables customer online ordering and feedback monitoring. (source). Vodafone has customer services helpline that offer after sales services and it also offers services to MVNO's such as Lebara mobile, Asda mobile, Talk mobile(Carphone Warehouse) and BT mobile(http://ukmobilecoverage. co. uk/), Support Activities Infrastructure: Vodafone's mode of expansion was the formation of a joint venture with O2(case study p. 559) to manage its mobile network and share network covering 4 European countries and the UK.It also leases BT's fixed line services and hosts BT's MVNO. (case study p. 562) Human Resource Management: Vodafone depends on its employees for the quality of its services to customers. It ensures an inclusive working environment and encourages innovation, ambition and pro-activeness. Vodafone encourages enthusiasm, talent and commitment in its employees in order to build and maintain its success and stay competit ive. (Vodafone, Our people). Technology and Development: Vodafone owns internet portals which enables on-line ordering.Also, continuous R&D helps the company to incubate and deliver innovation to the business. (Annual Report, 2010. p. 20) Procurement: Vodafone, like other networks, purchases branded handsets from suppliers. Vodafone holds several training courses for its procurement team for efficient management of supplier performance. CONCLUSION SWOT MATRIX STRENGTHS1. Experienced CEO's(UK CEO, Gary Laurence). 2. Partnership with BT and O2. 3. Offering home country voice rates abroad. 4. Heavy investment in marketing. 5. Vodafone at home6. Good Interest Cover7.Reduced borrowing| WEAKNESSES1. Low level of liquidity2. Inability to increase ROCE3. High prices and inefficient channel of distribution for fixed voice and broadband. | OPPORTUNITIES1. Government's privatization of Ofcom. 2. Consumer need for converged services. 3. Decline in Fixed line telephone market4. 2012 Olympics5. C onsumer demand for smart phones6. Consumer hype for modern technology7. Ofcom issuance of entry license| THREATS1. Slow economic recovery from recession2. Decline in disposable income3. Immigration cap4. Health issues in areas of mobile masts. 5.Customer switching rates. 6. Development of new technologies7. Capital intensive recycling8. Ofcom's issuance of entry license9. Elaborate legal contarcts| From all facts assessed in the report and also information from the case study and Vodafone accounts, it is indeed evident that Vodafone is struggling to develop a total communications strategy to enable it to secure leadership   in the rapidly growing market for high speed internet services in its UK home market due to the fact that it actually cannot improve its core activities in order to gain competitive advantage.Please rate the quality of this essay: Good Neutral Poor Struggling with your essay? You can get your essay custom written by an expert in your subject area. Fully researc hed and referenced, the perfect model answer†¦ Get a quote here Share ; download: Print Download Email Request the removal of this essay. GET A PRICE EssayDissertationModel AnswerCoursework/AssignmentLiterature ReviewDissertation ProposalOutline/Skeleton Answer GCSENVQA-LevelDiplomaUndergraduatePGDMastersGDLLPCBPTCPhDGCSE B GradeGCSE A GradeGCSE A* GradeNVQ Level 2 PassNVQ Level 2 MeritNVQ Level 2 DistinctionA-Level B GradeA-Level A GradeA-Level A* GradeDiploma (HNC/HND) PassDiploma (HNC/HND) MeritDiploma (HNC/HND) DistinctionUndergraduate 2:2Undergraduate 2:1Undergraduate 1stUndergraduate Upper 1stPGD PassPGD MeritPGD DistinctionMasters PassMasters MeritMasters DistinctionMPhil PassPhDGDL PassGDL CommendationGDL DistinctionLPC PassLPC CommendationLPC DistinctionBPTC Competent (Previously BVC)BPTC Very Competent (Previously BVC)BPTC Outstanding (Previously BVC) 000 Words (~4 pages)No Word Count1250 Words (~5 pages)1500 Words (~6 pages)1750 Words (~7 pages)2000 Words (~8 pages)2 250 Words (~9 pages)2500 Words (~10 pages)2750 Words (~11 pages)3000 Words (~12 pages)3250 Words (~13 pages)3500 Words (~14 pages)3750 Words (~15 pages)4000 Words (~16 pages)4250 Words (~17 pages)4500 Words (~18 pages)4750 Words (~19 pages)5000 Words (~20 pages)5250 Words (~21 pages)5500 Words (~22 pages)5750 Words (~23 pages)6000 Words (~24 pages)6250 Words (~25 pages)6500 Words (~26 pages)6750 Words (~27 pages)7000 Words (~28 pages)7250 Words (~29 pages)7500 Words (~30 pages)7750 Words (~31 pages)8000 Words (~32 pages)8250 Words (~33 pages)8500 Words (~34 pages)8750 Words (~35 pages)9000 Words (~36 pages)9250 Words (~37 pages)9500 Words (~38 pages)9750 Words (~39 pages)10000 Words (~40 pages)10500 Words (~42 pages)11000 Words (~44 pages)11500 Words (~46 pages)12000 Words (~48 pages)12500 Words (~50 pages)13000 Words (~52 pages)13500 Words (~54 pages)14000 Words (~56 pages)14500 Words (~58 pages)15000 Words (~60 pages)15500 Words (~62 pages)16000 Words (~64 pages)16500 Words (~66 p ages)17000 Words (~68 pages)17500 Words (~70 pages)18000 Words (~72 ages)18500 Words (~74 pages)19000 Words (~76 pages)19500 Words (~78 pages)20000 Words (~80 pages)25000 Words (~100 pages)30000 Words (~120 pages)35000 Words (~140 pages)40000 Words (~160 pages)45000 Words (~180 pages)50000 Words (~200 pages)55000 Words (~220 pages)60000 Words (~240 pages)65000 Words (~260 pages)70000 Words (~280 pages)75000 Words (~300 pages)80000 Words (~320 pages)85000 Words (~340 pages)90000 Words (~360 pages)95000 Words (~380 pages)100000 Words (~400 pages) Price ? 390 Share this Have a question about our service? * See our FAQs * Ask our writers a direct question now * See the UKEssays team * Customer testimonials WARNING! avoid essay writing scams Sign up and be the first to receive our latest offers: Your email address†¦ Instant Price Order Now * Join our circle on Google+ * Find us on Facebook * Follow us on Twitter * Get our latest updates Copyright  © 2003 – 2012 – UK Essays is a trading name of All Answers Ltd.All Answers Ltd is a company registered in England and Wales Company Registration No: 4964706. VAT Registration No: 842417633. Licensed under the Consumer Credit Act under Licence No: 0612201. Registered Data Controller No: Z1821391. Registered office: Venture House, Cross Street, Arnold, Nottingham, Nottinghamshire, NG5 7PJ. * Fair Use Policy * Terms ; Conditions * Privacy Policy * Cookie Info * Complaints Policy * Get Verified * Fraud * Writer Jobs * Corporate Client Services * Sitemap Are you writing an essay and struggling? We can help you! Find out more Read more: http://www. ukessays. com/essays/communications/developing-a-total-communication-strategy-communications-essay. php#ixzz2DTJZYU7Q

Sunday, November 10, 2019

About Negativity Essay

And you stare at it happen, as it happens right in front of you, and say no. Just, no. It can’t work out like this. It’s not supposed to end like this. In what kind of fucked up story does the bad guy win? In what kind of story does the victim end up in disbelief that she never got the justice she deserved. That’s when you realize you’re the villain. But no, the other person’s not innocent either, they’re the villain too. They’re worse than you, but you’re still the villain, because you let it get this way. Everything’s your fault. And you hate everyone. And you hate yourself. And you hate everything. And your so filled with hate that you just want to end it all. And then you realize that if you do that, you’ll be hated even more, and that realization makes you hate them more, and there’s just so much fucking hate and no way to end it. And that hate turns into sorrow and confusion and pointlessness, and it’s endless really. And it’s as blunt as I just put it because there’s no other way to express yourself lyrically when you’re that upset. And in all the hate you feel homicidal, suicidal, maniac, and repulsive. And there’s no way out. See more: Examples of satire in adventures of huckfinn essay And there’s no one to help you, because you’re too embarrassed to share these repulsive feelings with anyone but yourself. And you’re your only companion, but it doesn’t matter because you’re used to it being that way. And you’re shaking, shivering, bawling in your loneliness, not feeling sorry for yourself like your accused of but hating yourself. No. It can’t be like this, the villain doesn’t feel this way. But the victim doesn’t hate this way. And you find the devil’s in your thoughts, and you’re nothing but a victim of yourself. And the cycle of hatred†¦ it starts again.

North South Airlines Essay

BACKGROUND OF THE COMPANY Northern Airlines merged with Southeast Airlines to create the fourth largest U.S. carrier in January 2008. The new North–South Airline inherited both an aging fleet of Boeing 727-300 aircraft and Stephen Ruth. Stephen was a tough former Secretary of the Navy who stepped in as new president and chairman of the board. Peg Jones on the other hand is the vice president for operations and maintenance. DEFINE THE PROBLEM Stephen’s objective is to gear the company’s financial performance towards stability and continuous growth. This made him concern that the aging fleet of Boeing 727-300 aircraft’s maintenance cost may impede realization of this goal. The significant difference in the reported B727-300 maintenance costs (from ATA Form 41s) both in the airframe and engine areas between Northern Airlines and Southeast Airlines made him to probe through Peg Jones’ assistance on determining the quantitative and graphical report of the following : Correlation of the average fleet age to direct airframe maintenance costs Linear relationship between the average fleet age and direct engine maintenance costs CASE FACTS AND INFORMATION (INCLUDING LIMITATIONS & CONSTRAINTS) In addition to the aging formulas below, Peg constructed the average age of Northern and Southeast B727-300 fleets by quarter since the introduction of that aircraft to service by each airline in late 1993 and early 1994 respectively. TOTAL FLEET HOURS = TOTAL DAYS IN SERVICE X AVERAGE DAILY UTILIZATION AVERAGE AGE OF EACH FLEET = TOTAL FLEET HOURS FLOWN # OF AIRCRAFT IN SERVICE AVERAGE DAILY UTILIZATION = TOTAL FLEET HOURS FLOWN TOTAL DAYS IN SERVICE In getting the average utilization, Peg used the actual fleet hours flown on September 30, 2007 from Northern and Southeast data, and dividing by the total days in service for all aircraft at that time. The average utilization for Southeast and Northern were 8.3 and 8.7 hours per day respectively. In addition, available cost data including the average fleet age were calculated for each yearly period ending at the end of first quarter. Business asset depreciation depends on the cost of asset and its useful life. What is distinct about aircraft depreciation is that each component of an airplane is depreciated at different rates and depreciation methods. The North-South Airline problem for this instance may also be resolved by using depreciation methods as follows: straight line with salvage value method = Asset Cost/ Useful Life The advantage of using the straight line method involves the ease of calculating the annual depreciation amount. The disadvantage of using the straight line method is that this method does not consider the rate the asset will actually depreciate in value. Declining balance method = Remaining Asset Value x Depreciation Rate The advantage of using this method is that it accelerates the depreciation recorded early in the asset’s life and thus reduces the taxable income and the taxes owed during the early years. The disadvantage is that the method can be applied only when there is a residual value of the asset. quantitative method/s employed and the solution to the problem Northern Airlines Data AIRFRAME ENGINE Southern Airlines Data AIRFRAME Southeast Airline—airframe maintenance cost: Cost = 4.60 + 0 (airframe age) = 4.60 Coefficient of determination = 0.39 Coefficient of correlation = 0.62 ENGINE Northern Airline—airframe maintenance cost: Cost _ 36.10 _ 0.0025 (airframe age) Coefficient of determination _ 0.7694 Coefficient of correlation _ 0.8771 Northern Airline—engine maintenance cost: Cost _ 20.57 _ 0.0026 (airframe age) Coefficient of determination _ 0.6124 Coefficient of correlation _ 0.7825 Southeast Airline—engine maintenance cost: Cost __0.671 _ 0.0041 (airframe age) Coefficient of determination _ 0.4599 Coefficient of correlation _ 0.6782 ethical considerations DEPRECIATION USED = SAFETY The units of production method involves determining the cost to depreciate and dividing that amount by the estimated production units the company expects to manufacture over the life of the asset. The advantages of using the units of production method include the ease of calculating the annual depreciation amount and that the depreciation is matched to the production quantity. The disadvantage of using the units of production method is that this method assumes the asset will depreciate evenly over its productive life. The graphs below portray both the actual data and the regression lines for airframe and engine maintenance costs for both airlines.Note that the two graphs have been drawn to the same scale to facilitate comparisons between the two airlines. Northern Airline: There seem to be modest correlations between maintenance costs and airframe age for Northern Airline. There is certainly reason to conclude, however, that airframe age is not the only important factor. Southeast Airline: The relationships between maintenance costs and airframe age for Southeast Airline are much less well defined. It is even more obvious that airframe age is not the only important factor—perhaps not even the most important factor. Overall conclusion Overall, it would seem that: 1. Northern Airline has the smallest variance in maintenance costs, indicating that the day-to-day management of maintenance is working pretty well. 2. Maintenance costs seem to be more a function of airline than of airframe age. 3. The airframe and engine maintenance costs for Southeast Airline are not only lower but more nearly similar than those for Northern Airline, but, from the graphs at least, appear to be rising more sharply with age. 4. From an overall perspective, it appears that Southeast Airline may perform more efficiently on sporadic or emergency repairs, and Northern Airline may place more emphasis on preventive maintenance. Ms. Young’s report should conclude that: 1. There is evidence to suggest that maintenance costs could be made to be a function of airframe age by implementing more effective management practices. 2. The difference between maintenance procedures of the two airlines should be investigated. 3. The data with which she is presently working do not provide conclusive results.