Saturday, November 30, 2019

Snmp - Report free essay sample

The objectives of this report are to provide the reader with a clearer understanding of network management, the concepts inherent in the Simple Network Management Protocol (SNMP), comparisons of SNMP with other network management protocols, how SNMPs are used in network management, and, finally, to provide the results of experiments carried out using several different modem configurations. SNMP is an internet-standard system of digital message format, or protocol, for managing devices on Internet Protocol (IP) networks. Routers, switches, servers, workstations, printers, modems are examples of such devices that support SNMP. It was introduced in 1988 to meet the growing need for managing Internet Protocol (IP) devices [2] and is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP includes an application layer protocol, a database schema, and a set of data objects [1]. Network management is a general concept that employs the use of various tools and techniques, and systems to aid human beings in managing various devices, system, or networks. We will write a custom essay sample on Snmp Report or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page One such model of network management is called FCAPS, or Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management. Under the SNMP system and the FCAPS model, one or more administrative computers, called managers, are tasked to monitor and/or manage one or more pieces of software, called agents, which run on the network device. Specifically, the manager is a server which is running some kind of software system that can handle management tasks for a network. SNMP uses the User Datagram Protocol (UDP) as the transport protocol for passing data between managers and agents. The upside to the unreliable nature of UDP is that it requires low overhead, so the impact on the network’s performance is reduced. Management information is the operational parameters of SNMP-capable devices. The definition of managed objects can be broken down into three attributes: Name, Type and syntax, and Encoding. Managed objects are organized into a treelike hierarchy, this is the basis for SNMP’s naming scheme. Care must be taken when identifying managed objects or Object Identifiers (OIDs), across different versions of SNMP as there are enhancements to the naming scheme. Table of Contents Summary faults, collecting long term performance data, remote configuration of devices, and the remote control of a device. Another aspect of SNMP is network monitoring, or the monitoring of an entire network as opposed to individual routers, hosts, and other devices. This is called Remote Network Monitoring (RMON) and it can be used to monitor not only LAN traffic, but WAN interfaces as well. In the SNMP system, there are two kinds of entities: managers and agents. A manager is a server running some kind of software system that can handle management tasks for a network. Managers are often referred to as Network Management Stations (NMSs). An NMS is responsible for polling and receiving traps from agents in the network. A poll, in the context of network management, is the act of querying an agent (router, switch, Unix server, etc. ) for some piece of information. A trap, on the other hand, is a way for the agent to tell the NMS that something has happened. The agent is a piece of software that runs on the network devices that are being managed. It can be a separate program or it can be incorporated into the operating system. Today, most IP devices come with some kind of SNMP agent built in. The agent also provides management information to the NMS by keeping track of various operational aspects of the device. When the agent notices that something bad has happened, it can send a trap to the NMS, where it is handled appropriately. Figure 1: Relationship between an NMS and an Agent Network Management SNMP is really about network management. Network management is a general concept that employs the use of various tools, techniques, and systems to aid human beings in managing various devices, systems, or networks. One such model for network management is called FCAPS, or Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management. Fault management is used to detect, log, and notify users of systems or networks of problems as downtime of any kind is usually not acceptable. Fault management dictates that fault resolution first isolates the problem by using tools to determine symptoms, tries to resolve the problem, and then finally record the process that was used to detect and resolve the problem. Configuration management is used to monitor network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed. This information generally is stored in a database of some kind. As configuration parameters change for systems, this database is updated. This data store can also aid in problem resolution. Accounting Management is used to ensure that computing and network resources are sued fairly by all groups or individuals who access them. Through this form of regulation, network problems can be minimized since resources are divided based on capacities. Performance management is used to measure and report on various aspects of network or system performance. Performance management usually starts when performance data is first gathered. Baseline levels are then established based on analysis of the data gathered. Finally, performance thresholds are established. A problem usually happens when these thresholds are exceeded. The last aspect of FCAPS is Security Management which is used to control access to some resources, such as a network and its hosts, and to help detect and prevent attacks that can compromise networks and hosts. Security management does not only involve network security systems but also physical security. This is usually accomplished through the use of various tools and systems such as firewalls, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), antivirus systems and policy management. Applying the Concepts of Network Management The endeavor of network management involves solving a business problem through an implementation of some sort. The basic idea is to reduce costs and increase effectiveness. There are four different possible levels of activity when it comes to managing a specific service or device. Inactive, where no monitoring is being done, reactive, where a problem is dealt with only after it occurs, interactive, where components are monitored and interacted with to troubleshoot them, and finally, proactive, where the system provides a root-cause alarm then initiates predefined automatic restoral processes all while being monitored. However, the ability to monitor a service or system interactively or proactively begins with trend analysis and reporting. Accounting Accounting Security Security Performance Performance Fault Fault Configuration Configuration Network Management Network Management Change Management Change Management Proactive Proactive Inactive Inactive Reactive Reactive Interactive Interactive Trend Analysis Trend Analysis Response Time Reporting Response Time Reporting Alarm Correlation Alarm Correlation Figure 2: Concept of Network Management Trend Analysis and Reporting In general, the goal of trend analysis is to identify when systems, services, or networks are beginning to reach their maximum capacity, with enough lead time to do something about it before it becomes a real problem for end users. Trend analysis is aided by Response Time Reporting which measures how various aspects of the network (including systems) are performing with respect to responsiveness. To narrow down the many alerts and events into a single alert or several events that depict the real problem, Alarm Correlation is used. Alarm Correlation is also used to help operators know that an agent is indeed up and operational after being in a bad state. Trending also helps determine which device is constantly unreliable for investigation. The key to trouble resolution for the operator is knowing which information provided is valuable and can help resolve the problem. If possible, alerts and alarms should provide the operator with enough detail so that he or she can effectively troubleshoot and resolve a problem. However, in the event that the network is altered, planned or not, change management is used to prevent unreliable networks and systems, and ensure the correct level of notification with minimal user impact. The key steps for change management are: 1. Assigning a change controller. 2. Holding periodic change review meetings. Documenting change input requirements. 4. Documenting change output requirements. 5. Defining a change approval process. 6. Holding post-mortem meetings. 7. Developing an emergency change procedure. Subsequently, change planning is a process that identifies the risk level of a change and builds change planning requirements to ensure that the change is successful. The eight key steps for change planning are: 1. Assigning all potential changes a risk level prior to scheduling the change. 2. Documenting at least three risk levels with corresponding change planning requirements. Identifying risk levels for software and hardware upgrades, topology changes, routing changes, configuration changes, and new deployments. 4. Assigning higher risk levels to nonstandard add, move, or change types of activity. 5. Including lab validation, vendor review, peer review, and detailed configuration and design documentation. 6. Creating solution templates for deployments affecting multiple sites. 7. Including information about physical layout, logical design, configuration, software versions, acceptable hardware chassis and modules, and deployment guidelines. 8. Documenting network standards for configuration, software version, supported hardware, and DNS. Finally, caution must be taken when implementing a network management system as this can mean adding more staff to handle the increased load of maintaining and operating such an environment. On the other hand, this monitoring should reduce the workload of the system administration staff. The Structure of Management Information The Structure of Management Information (SMI) provides a way to define managed objects and their behavior. An agent has in its possession a list of the objects that it tracks.

Tuesday, November 26, 2019

Refutation Definition and Examples

Refutation Definition and Examples In rhetoric, refutation is the part of an argument in which a speaker or writer counters opposing points of view. Also called  confutation. Refutation is the key element in debate, say the authors of The Debaters Guide   (2011). Refutation makes the whole process exciting by relating ideas and arguments from one team to those of the other (The Debaters Guide, 2011). In speeches, refutation and confirmation are often presented conjointly with one another (in the words of the unknown author of Ad Herrenium): support for a claim (confirmation) can be enhanced by a challenge to the validity of an opposing claim (refutation). In classical rhetoric, refutation was one of the rhetorical exercises known as the  progymnasmata. Examples and Observations Refutation is the part of an essay that disproves the opposing arguments. It is always necessary in a persuasive paper to refute or answer those arguments. A good method for formulating your refutation is to put yourself in the place of your readers, imagining what their objections might be. In the exploration of the issues connected with your subject, you may have encountered possible opposing viewpoints in discussions with classmates or friends. In the refutation, you refute those arguments by proving the opposing basic proposition untrue or showing the reasons to be invalid...In general, there is a question about whether the refutation should come before or after the proof. The arrangement will differ according to the particular subject and the number and strength of the opposing arguments. If the opposing arguments are strong and widely held, they should be answered at the beginning. In this case, the refutation becomes a large part of the proof . . .. At other times when the opp osing arguments are weak, the refutation will play only a minor part in the overall proof. -Winifred Bryan Horner, Rhetoric in the Classical Tradition. St. Martins, 1988 Indirect and Direct Refutation Debaters refute through an indirect means when they use counter-argument to attack the case of an opponent. Counter-argument is the demonstration of such a high degree of probability for your conclusions that the opposing view loses its probability and is rejected...Direct refutation attacks the arguments of the opponent with no reference to the constructive development of an opposing view...The most effective refutation, as you can probably guess, is a combination of the two methods so that the strengths of the attack come from both the destruction of the opponents views and the construction of an opposing view. -Jon M. Ericson, James J. Murphy, and Raymond Bud Zeuschner,  The Debaters Guide, 4th ed. Southern Illinois University Press, 2011An effective refutation must speak directly to an opposing argument. Often writers or speakers will claim to be refuting the opposition, but rather than doing so directly, will simply make another argument supporting their own side. This is a fo rm of the fallacy of irrelevance through evading the issue. -Donald Lazere,  Reading and Writing for Civic Literacy: The Critical Citizens Guide to  Argumentative Rhetoric. Taylor Francis, 2009 Cicero on Confirmation and Refutation [T]he statement of the case . . . must clearly point out the question at issue. Then must be conjointly built up the great bulwarks of your cause, by fortifying your own position, and weakening that of your opponent; for there is only one effectual method of vindicating your own cause, and that includes both the confirmation and refutation. You cannot refute the opposite statements without establishing your own; nor can you, on the other hand, establish your own statements without refuting the opposite; their union is demanded by their nature, their object, and their mode of treatment. The whole speech is, in most cases, brought to a conclusion by some amplification of the different points, or by exciting or mollifying the judges; and every aid must be gathered from the preceding, but more especially from the concluding parts of the address, to act as powerfully as possible upon their minds, and make them zealous converts to your cause. -Cicero, De Oratore, 55 BC Richard Whately on Refutation Refutation of Objections should generally be placed in the midst of the Argument; but nearer the beginning than the end. If indeed very strong objections have obtained much currency, or have been just stated by an opponent, so that what is asserted is likely to be regarded as paradoxical, it may be advisable to begin with a Refutation. -Richard Whately, Elements of Rhetoric, 1846)​ FCC Chairman William Kennards Refutation There will be those who say Go slow. Dont upset the status quo. No doubt we will hear this from competitors who perceive that they have an advantage today and want regulation to protect their advantage. Or we will hear from those who are behind in the race to compete and want to slow down deployment for their own self-interest. Or we will hear from those that just want to resist changing the status quo for no other reason than change brings less certainty than the status quo. They will resist change for that reason alone. So we may well hear from a whole chorus of naysayers. And to all of them, I have only one response: we cannot afford to wait. We cannot afford to let the homes and schools and businesses throughout America wait. Not when we have seen the future. We have seen what high capacity broadband can do for education and for our economy. We must act today to create an environment where all competitors have a fair shot at bringing high capacity bandwidth to consumers- especial ly residential consumers. And especially residential consumers in rural and underserved areas. -William Kennard, Chairman of the FCC, July 27, 1998 Etymology: From the Old English, beat Pronunciation: REF-yoo-TAY-shun

Friday, November 22, 2019

A Critical Look at Death of a Salesman

A Critical Look at 'Death of a Salesman' Have you ever loved a rock band that had lots of great songs you cherished? But then the band’s hit single, the one everyone knows by heart, the one that gets all the airtime on the radio, isn’t a song you particularly admire? That’s the way I feel about Arthur Millers   Death of a Salesman. It’s his most famous play, yet I think it pales in comparison to many of his less popular dramas. Although it’s by no means a bad play, it certainly is overrated. Wheres the Suspense? Well, you have to admit, the title does give everything away. The other day, while I was reading Arthur Miller’s esteemed tragedy, my nine-year-old daughter asked me, â€Å"What are you reading?† I replied, Death of a Salesman, and then at her request I read a few pages to her. She stopped me and announced, â€Å"Daddy, this is the world’s most boring mystery.† I got a good chuckle out of that. Of course, it’s a drama, not a mystery. However, the  suspense is a vital component of tragedy. Sure, when we watch a tragedy, we fully anticipate death, destruction, and sadness by the play’s end. But how will the death occur? What will bring about the destruction of the protagonist? When I watched Macbeth for the first time, I guessed that it would conclude with Macbeth’s demise. But I had no idea as to what would be his undoing. After all, he and Lady Macbeth thought they’d never be â€Å"vanquished until Great Birnam wood to high Dunsinane Hill shall come against him.†Ã‚   How the heck is a forest going to turn against them?! Therein lies the suspense because, sure enough, the forest comes marching right up to their castle! The main character in  Death of a Salesman, Willy Loman, is an open book. We learn very early on in the play that his professional life is a failure. He’s the low-man on the totem pole, hence his last name, â€Å"Loman.† (Very clever, Mr. Miller!) Within the first fifteen minutes of the play, the audience learns that Willy is no longer capable of being a traveling salesman. We also learn that he is suicidal. Spoiler! Willy Loman kills himself at the end of the play. But well before the conclusion, it becomes clear that the protagonist is bent upon self-destruction. His decision to kill himself for the $20,000 insurance money comes as no surprise; the event is blatantly foreshadowed throughout much of the dialogue. The Loman Brothers I have a hard time believing in Willy Loman’s two sons. Happy: He is the perennially ignored son. He has a steady job and keeps promising his parents that he’s going to settle down and get married. But in reality, he’s never going far in business and plans to sleep around with as many floozies as possible. Biff: He’s more likable than Happy. He has been toiling on farms and ranches, working with his hands. Whenever he returns home for a visit, he and his father argue. Willy Loman wants him to make it big somehow. Yet, Biff can’t hold down a 9-to-5 job to save his life. Both brothers are in their mid-thirties. Yet, they act as though they are still boys. The play is set in the productive years following World War II. Did the athletic Lowman brothers fight in the war? It doesn’t seem like it. If they had, perhaps they would be completely different people. They don’t seem to have experienced much during the seventeen years since their high school days. Biff has been moping. Happy has been philandering. Well-developed characters possess more complexity. By leaps and bounds, the father is the best part of Arthur Miller’s play. Unlike many of the show’s flat characters, Willy Loman has depth. His past is a complicated tangle of regrets and undying hopes. Great actors such as Lee J. Cobb and Brian Dennehy have mesmerized audiences with their portrayals of this iconic salesman. Yes, the role is filled with powerful moments. But is Willy Loman truly a tragic figure? Willy Loman: Tragic Hero? Traditionally, tragic characters (such as Oedipus or Hamlet) were noble and heroic. They possessed a tragic flaw, usually a bad case of hubris. (Note: Hubris means excessive pride. Use the word hubris at cocktail parties and people will think you’re ever-so-smart! But dont let it go to your head!). In contrast, Willy Loman represents the common man. Arthur Miller felt that tragedy could be found in the life of ordinary people. While I certainly agree, I also believe that tragedy works best when the main character’s choices become whittled away, much like a masterful yet imperfect chess player who suddenly realizes he is out of moves. Willy Loman has options. He has a lot of opportunities. Arthur Miller seems to be criticizing the American Dream, claiming that Corporate America drains the life out of people and casts them away when they are no further use. Yet, Willy Loman’s successful neighbor continually offers him a job! Willy Loman declines the job without ever explaining why. He has a chance to pursue a new life, but he wont let himself give up his old, soured dreams. Instead of taking the decent paying job, he chooses suicide. At the play’s end, his loyal wife sits at his grave. She does not understand why Willy took his own life. Arthur Miller would claim that the dysfunctional values of American society killed him. However, I believe that Willy Loman suffered from senility. He exhibits many of the symptoms of Alzheimer’s. Why couldn’t his sons and his ever-attentive wife recognize his failing mental condition? It’s a mystery to me.

Wednesday, November 20, 2019

Standard American English and Lyrics of Songs Essay

Standard American English and Lyrics of Songs - Essay Example For an exceptional artist to use African American language, she must have obtained a tremendously prodigious number of fans who understand her language better. For instance, when she says â€Å"to the left† is African American idiom and according to Beyonce and the song, she meant that her lover should leave the house and go away to somewhere else. Therefore, the quote â€Å"to the left† according to the standard Britain English, it is incomplete or rather â€Å"to the left† can directly and literally mean go to the left. Therefore, as far as Britain English is concerned, the meaning in those lines is not absolute. Another instance where the use of Standard English is losing the meaning is on the quote â€Å"matter fact†, here there in no preposition, but it is normal with standard American English but not standard Britain English. The meaning will always change when an artist uses standard English, for example, words like â€Å"cause† and †bout† in the song, gives a different meaning hence changes the meaning. When using words like cause instead of because, and bout instead of about, that only gives a total difference and meaning. Artists should reconsider the use of one language that can be understood easily with all people internationally. By this information, the song can reach the listener hence no problems to the

Tuesday, November 19, 2019

With reference to research findings, consider whether an Essay

With reference to research findings, consider whether an organisation's external environment has a direct causal influence on its internal structure or whether - Essay Example At the same time, the management of the organisation can fight against the pressures coming from the external forces and this process acts as a mediating influence. This can be shown to be true with practical examples of various companies as well as the research done by business analysts. The simplest example of the external forces which can influence the internal structure is the culture of the country where the business operates. For instance, a multi-national company can have a very different structure amongst its various branch offices depending on the cultural requirements of various locations where it operates. As discussed by Bartlett & Ghoshal (1998), the differences between national and corporate cultures can even lead to conflicts between the way things are structured at a local office and the management directives coming from the home office. The home office often wishes to recreate the corporate structure followed at their location in a country where the national culture can be significantly at odds with the way the corporation is structured. One such example is the case of GE’s position in Hungary where the local culture had structured the company based on the amount of time a person had served with the company. Since seniority became the basic premise of promotions, the Hungarian operation soon became bloated and could not match the expectations of GE’s head office in America (Welch, 2005). The external environment had affected the internal structure to the extent that operations managers from the home office had to step in and make changes to the present system in order to save the company’s base in Western Europe. GE’s culture is reportedly based on individuals and intrinsic motivation which helps its employees seek benefits for the company while they seek benefits for themselves. As outlined by Jack Welch in Winning (2005), GE rewards those employees who are instrumental in helping GE grow and achieve the corporate vision and

Saturday, November 16, 2019

The Prosecutors by Gary Delsohn Essay Example for Free

The Prosecutors by Gary Delsohn Essay The Prosecutors by Gary Delsohn, depicts American justice at its best and worst, It reveals the secrets of the current legal system with information that are more awful and realistic than any small screen show or any thriller. The Prosecutors gives an insight into the real-life lawful dramas that are seen daily in our courtrooms. It informs, alerts, amuses, and even makes us angry at times about the miscarriages of justice, but eventually shows in harsh detail the particulars that go into the working of our legal system. Gary Delsohn, was for the first time allowed access to spend a year in a metropolitan prosecutors office. The author presents a fascinating; secret look at how Americas more overstrained legal system really operates. Perceived by John OMara, a hard-hitting, cynical homicide chief, and Jan Scully, a proficient District Attorney, The Prosecutors’, illustrates these committed civic servants at work. The cases that these two people come across in this one-year are unforgettable, a simple robbery that goes bad breaks down a family forever, an acclaimed doctor is charged for the murder of his own daughter. A twenty-five-year-old bitter case blows up and brings terrible pressure and inquiry to the D.A.s office, which involves Patty Hearst and the SLA (Symbionese Liberation Army). A top-ranking state prosecutor’s son faces a possible death sentence for abduct, rape, and slaughter.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The most intriguing cases of all these were definitely the 1975 robbery and murder case at the Sacramento-area bank. It’s this SLA bank robbery case that clearly stands out in â€Å"The Prosecutors,† and understandably so. For almost twenty-five years, the family of the victim, a 42-year-old mother of four children, who was fired at and killed during the robbery, had tried hard to bring the killers to justice, the family members had always suspected the killers to be associates of some puzzled terrorists who abducted the newspaper heiress Patty Hearst in 1974. But Myrna Opsahl’s family members never got any respite from the case, because the office of the district attorney couldn’t get adequate proof to try the case, even after Hearst’s 1982 journal revealed, what had actually taken place at the Crocker National Bank in April 1975.   Ã¢â‚¬Å"For the Sacramento County Sheriff’s Department and the Sacramento district attorney’s office, the Carmichael bank robbery is one of those hideous failures that just won’t seem to go away,† (Gary Delsohn).   Ã‚  Ã‚  Ã‚   For John O’Mara, the homicide chief in the district attorney’s office, the case is terrifying, with no proper proof and unsatisfied family members of the victim, particularly one of Myrna Opshal’s sons, Jon Opsahl.   He wouldn’t let the case pass on and frequently disapprove of the Sacramento prosecutors for messing up the case. O’Mara is one of the important and most vibrant character in the book, although in the beginning the book port ray’s him as a picture of a graying prosecutor. But Delsohn supports his portrayal of O’Mara, presenting why a person with so much knowledge was so apprehensive of taking the SLA robbery case. In the end, it’s Delsohn’s access to the district attorney’s office, which gives us much information about this case and how the law operated during that time. Taking the case of the Bread Store trial, a failed theft that twisted into a murder when the accused, Rick Brewer, an ex-convict who had formerly stalled the same setting, fired from a shotgun into the store’s manager Jason Frost, after finding out that the whole amount from the days proceeds had been put down in a floor safe. The Bread Store case is symbolic of the vulnerabilities that prosecutors must go through when they take the trial of murders anywhere in the country, considering this lawbreaking murder where the person who drives the car in which the accused escapes is as guilty as the person who committed the crime. Taking the case of Nikolay Soltys, the security guard who was an immigrant from Ukraine who stabbed six of his relatives to death, which included his three-year-old son and pregnant wife. Prosecutors had a tough time when Nikolay killed himself to avoid trial. An average day in a city District Attorney’s office is tough, where work can take its toll on the people who do it. Most of the cases coming into the DA’s office are slaughter; children inflicted to child abuse, rape, robberies, drug deals, and fake currency rackets. It is a never-ending process of new crimes coming in day to day. This type of work cannot even be taken home and shared with your family. The prosecutors think about crimes, while sitting, standing, eating and drinking, these people are not even spared during their lunchtime, passing on shocking snaps of the crime scene. A prosecutor’s job is a tough nut to crack, as their relationship with they families get soured, because of their spending long hours in the office almost on a daily basis. During the course of his stay at District Attorney’s office, Delsohn reminds us that trials have become very rare these days. More than eighty five percent of the 36,000 crimes and misbehaviors charged every year by the Sacramento DAs office ended up with a plea agreement before the trial, as settlement. In the DA’s office at Sacramento, it mostly differs depending on who the in charge people are, but sometimes there is a strong and rarely insignificant competition between the sheriff, the FBI, the local police and the district attorneys office. But comparing the state attorney general and U.S. Attorneys office, the enmities and self-esteem battles can be unpredictable. Particularly the district attorneys office should do proper investigation before impulsively accepting what the police and feds say, about who should be detained and charged. Prosecutors have to keep the police under control to see that the case is prosecutable and concrete. Bad things can happed if prosecutors lose their independence and doubts. Gary Delsohn feels that the most important part of being an insider in the DA’s office for a year was that, he had the advantage of seeing the prosecutors’ working procedures in a manner that the media and an average outsider could not. The District Attorney’s office has been a witness to innumerable heartbreaking stories over the years, but theres hardly anything to compare with the moving release that comes after a long, stress filled murder trial, when the murder victim’s family finally speaks. The DA’s office is always humming with people, people who are related to horrible crimes, people who are innocent, but mistakenly accused of crimes, real criminals and their families etc. Works Cited Gary Delsohn, Inside the DA’s Office, Jurist, 22 February 2007. http://jurist.law.pitt.edu/forum/forumnew126.php.    Critic Reviews, Redding Book Club, 22 February 2007. http://bookclub.redding.com/reviews.cfm. The Prosecutor, Traveling Sounds.com, 22 February 2007. http://www.travelingsounds.com/Title.aspx?titleId=3212. Court tales make an arresting read, Rocky Mountain News, 22 February 2007. http://www.rockymountainnews.com/drmn/books/article/0,1299, DRMN_63_2164233,00.html.

Thursday, November 14, 2019

The Cold War Continues: From Joseph Stalin to Vladimir Putin Essay

"Nobody and nothing will stop Russia..." -- Vladimir Putin In March of 2014 Russia invaded Ukraine, unleashing a maddening flurry of concern across the world. Originally the concern was how to defend Crimea Ukraine from Putin’s forces, however, the concern has since changed. Seemingly overnight, Putin managed to worm his troops into Crimea, and dominate part of Ukraine. But where does this expansion of power end? Trying to delegate and monitor a power-hungry politician is now the focus of nearly every government in the Western world. In an article written by The Guardian’s Ian Traynor, it states that Putin has declared that if he wanted to, â€Å"Russian forces could conquer Ukrainian capital in two weeks.† This amount of confidence is highly unnerving considering Russia’s track record on simply showing up and invading a country seemingly out of nowhere. That specific action and behavior has been associated with Russian leader Joseph Stalin during the Cold war, and now is a continuous and growing concern with Vlad imir Putin. Vladimir Putin’s aggressive actions toward the western world, specifically Ukraine, is inspired by the steps Joseph Stalin took during his rise to power by developing a cult mentality, using brute force to invade countries such as Greece and Turkey, and issuing threats to all countries who disagreed with his expansion of power and communism during the Cold War. It was Stalin’s increasing aggression towards Europe and the United during the Cold War that made him one of the most feared and unpredictable individuals at that time. Today, Putin is exhibiting identical behavior by following in Stalin’s footsteps and is issuing threats in addition to ignoring what Europe and the United States has to say. At the ... ...5788398/2D5751C189D04504PQ/10?accountid=14902 Ian Traynor, â€Å"Putin claims Russian forces ‘could conquer Ukraine capital in two weeks.’† The Guardian, September 2, 2014. Web. 5 May 2015. http://www.theguardian.com/world/2014/sep/02/putin-russian-forces-could-conquer-ukraine-capital-kiev-fortnight Julie A. Cassiday, Emily D. Johnson, â€Å"Putin, Putiniana and the Question of a Post-Soviet Cult of Personality,† The Slavonic and Eastern European Review 88 (2010): 680-707. Kennedy-Pipe, Caroline. Stalin’s Cold War: Soviet Strategies in Europe, 1943 to 1956. New York: St. Martin’s Press, 1995. Robert Skidelsky, â€Å"In Ukraine, Putin may be accelerating his own demise.† The Daily Star Lebanon, September 3, 2014. Web. 5 May 2015. http://www.dailystar.com.lb/Opinion/Commentary/2014/Sep-03/269383-in-ukraine-putin-may-be-accelerating-his-own-demise.ashx#axzz3COhHc9EU

Monday, November 11, 2019

Attitude of Young People of India Towards Luxury Brands Essay

Introduction: A couple of generations ago, a typical purchase decision for the average Indian would be choosing between, say, clothes and electronic goods whenever they had a little cash to spare. Today, the customers’ dilemma involves making up their mind between Prada and Gucci, Merc and Lamborghini. Marie Antoinette would say, â€Å"If they can’t have bread, give them brands instead! † In a relatively short time span of 20 years, India has moved from pavement markets to swanky malls, from frugal minded consumer to who want it all and from a population largely obessed with celebrity gossip to one which yearns to gain knowledge. India is taking wing. It is not simple because India is set to become the fastest growing major economy in the world. The combination of a large young working population, rising income levels, overwhelming consumer optimism and increasingly urbanized lifestyle is driving consumption growth in India. The market potential of world’s second largest population has not gone unnoticed. International Luxury brands have India on the radar. As developed market continue to battle economic turmoil. India offers luxury brand owners unrivalled growth opportunities. The Indian luxury market is projected to reach USD 14. 72 billion in 2015(CII and A. T. Kearny, 2011). It may represents only 1-2 percent of the global luxury market, but its market growth rate of more than 20 percent per annum, promise positive returns for luxury players. A flow of international brands from Giorgio Armani to Ferrari to Sofitel Hotel have entered the Indian market to claim a share of the luxury rupee. Many others are waiting, watching and preparing. This is not just about today’s market but a key strategic market of the future. Problem Definition: * Young consumer attitudes are essential for the marketers to plan their strategy in reaching the target consumers. So in our study we have focused to segment young consumers according to attitude variables. Objectives: * The aim of the study is to segment young consumers based on their three important beliefs parameters (confidence, trust, optimism) as we know beliefs is an important attitudes of consumer Literature review: 1. THE ROLE OF CONFIDENCE IN UNDERSTANDING AND PREDICTING BUYERS’ ATTITUDES AND PURCHASE INTENTIONS * Peter D. Bennett and Gilbert D. Harrell * Journal of Consumer Research * Vol. 2, No. 2 (Sep. , 1975), pp. 110-117 * Published by: The University of Chicago Press * Article Stable URL: http://www. jstor. org/stable/2488752 This research examines the role of buyers confidence in the formation of attitudes and purchase intention. It supports current buyer behavior theory which postulates a positive relationship between overall confidence in a brand and intention to purchase the brand. It also examine buyers confidence in their own ability to judge attributes of brands. 2. NEED FOR UNIQUENESS AND CONSUMPTION BEHAVIOUR FOR LUXURY BRANDS AMONGST INDIAN YOUTH * Authors: Meenakshi Handa, Arpita Khare * JournalInternational Journal of Indian Culture and Business Management * Publisher : Inderscience Publishers * ISSN:1753-0806 (Print),1753-0814 (Online) * IssueVolume 3, Number 5/2010 * Pages489-502 The purpose of this research was to examine the Indian youth’s need for uniqueness (NFU) and their attitudes towards luxury brand as an expression of individuality. A primary research was conducted amongst Indian University students to ascertain their NFU and perception of luxury brands. It was apparent that while the NFU is not very high amongst the Indian youth, luxury brands do symbolize status and individuality to them and serve a value-expressive function. As the Indian social system is witnessing a transition from traditional family driven values to more of western and individual-centric values, NFU and expression of self-identity amongst Indian youth may also become more marked. While marketing global luxury brands in India, advertising may be focused towards conveying a new identity to the consumers yet maintaining a balance with traditional norms and value systems. 3. LUXURY’S NEW DESTINATION – CHANGING PARADIGMS OF THE INDIAN CONSUMERS – AN EMPIRICAL STUDY * DR. BUSHAN D. SUDHAKAR*; ARUN KUMAR. PARISE * International Journal of Multidisciplinary Management Studies * Vol. 2 Issue 1, January 2012, ISSN 2249 8834 * Online available at http://zenithresearch. org. in/ In this study the researcher investigate, Indian consumer migration towards Luxury brands form value middle tier brands. The findings suggest that there is significant difference with the gender difference, social status, price, quality to purchase a luxury good. There is a higher association between the annual household income and Purchase of luxury goods It clearly says that affordability, quality, availability, celebrity, self-satisfaction, image and social status are the key drivers to the migration of consumers to Luxury brands from value middle tier branded goods. It confirms the view that brand perception and purchase value is, apart from socially oriented motives of buying to impress others also affected by financial, functional, and individual aspects. It would seem that the dimensions presented in this paper are appropriate variables for segmenting the market for branded items. 4. ATTITUDES TOWARDS THE CONCEPT OF LUXURY: AN EXPLORATORY ANALYSIS * Bernard Dubois, Groupe H. E. C & Gilles Laurent, Groupe H. E. C. * Asia Pacific Advances in Consumer Research Volume 1, 1994 * Pages 273-278 In this paper is the author did an exploratory analysis of the perceptions and attitudes attached to the word (and underlying concept of) â€Å"luxury†. It is hoped that the results presented below will stimulate further research in the area and eventually contribute to the development of a theory of luxury acquisition and consumption behavior. Research Gap: The literature available on topics such as Need for uniqueness and consumption behavior for luxury brands amongst Indian youth, luxury’s new destination – changing paradigms of the Indian consumers – an empirical study, There is no study on attitude (belief like confidence, trust and optimism) of Young people of India towards Luxury brands, which will help in marketers to plan their strategy in reaching these new and promising target consumers. It is essential for the marketer to understand how consumers think and value a product. There has been a vast increase in the luxury market and attempts are being made to attract the youth through different marketing strategies. This research will identify the different belief parameter which is an important attitude of young people of India which influence them towards luxury brands and provide information for better understanding of young customer. Research Design:. Sample Design: Sample size: is hundred (100). Sample techniques: it is judgmental sampling these samples/ respondents will be selected from both NIFT students and young working professional’s i.e. young people’s working in companies like TCS, Infosys and Wipro. Observational Design: This research based on primary & secondary data. The primary data are collected through structured questionnaire. Primary data generally means those raw data which are handled first handedly and haven’t any previous meaningful interpretation. Secondary data collected from different journals, book and internet on topic of people’s attitudes and luxury brands. Statistical design: we are going to segment young consumers based on their three important beliefs parameters (confidence, trust, optimism) as we know consumer belief is an important factor of consumer attitude. Our proposed segmentation tool is Cluster analysis. We will be using Hierarchical cluster with between groups linkage as the clustering method based on squared Euclidian distance. Ward’s Hierarchical Clustering Method: Ward considered hierarchical clustering procedures basedon minimizing the ‘loss of information’ from joining two groups. This method is usually implemented with loss of information taken to be an increase in an error sum of squares criterion. ESS. First, for a given cluster k, let ESSk be the sum of the squared deviations of very item in the cluster from the cluster mean (centroid). If there are currently K clusters, define ESS as the sum of the ESSk or ESS = ESS1 + ESS2 + †¦ + ESS K At each step in the analysis, the union of every possible pair of clusters is considered, and the two clusters whose combination results in the smallest increase in ESS (minimum loss of information) are joined. Initially, each cluster consists of a single item, and, if there are N items, ESSk = 0, k = 1,2, †¦ , N, so ESS = O. At the other extreme, when all the clusters are combined in a single group of N items, the value of ESS is given by N ESS =j=1nxj-x†(xj-x’) where Xj is the multivariate measurement associated with the jth item and i is the mean of all the items. The results of Ward’s method can be displayed as a dendrogram. The vertical axis gives the values of ESS at which the mergers occur. Ward’s method is based on the notion that the clusters of multivariate observations are expected to be roughly elliptically shaped. It is a hierarchical precursor to nonhierarchical clustering methods that optimize some criterion for dividing data into a given number of elliptical groups. We discuss nonhierarchical clustering procedures in the next section Proposed Questionnaire: 1=strongly agree 2=agree 3=neither agree or disagree 4=disagree 5=completely disagree Please do tick which option you feel most†¦ Statement no 1: 3. 3. 2. 2. 5. 5. 4. 4. 1. 1. â€Å"I buy luxury products because good quality of product† Statement no 2: 3. 3. 2. 2. 5. 5. 4. 4. 1. 1. â€Å"Luxury means some extra things which is adding more value than the regular brands have† Statement no 3: 3. 3. 2. 2. 5. 5. 4. 4. 1. 1. â€Å"I buy luxury products whatever I can afford & whatever I want† Statement no 4: 3. 3. 2. 2. 5. 5. 4. 4. 1. 1. â€Å"I preferred luxury products what I like, if I like it a lot and feel like it’s worth my money† Statement no 5: 3. 3. 2. 2. 5. 5. 4. 4. 1. 1. â€Å"I preferred luxury brands because it brings higher aspiration in my life† Statement no 6: 3. 3. 2. 2. 5. 5. 4. 4. 1. 1. â€Å"I like to have BMW or Ferrari in future†.

Saturday, November 9, 2019

Corporate Strategy Essay

In Corporate Strategy, Collis and Montgomery explain there are two kinds of diversification—linked and constrained. Companies using linked diversification enter new businesses when it relates in some way to another business they are already in (it is linked to it), but does not necessarily have any connection to their other businesses. If they are using constrained diversification, however, they only enter a new business if it is based on their core resources or competencies. Companies based on linked diversification have little coherence to their overall corporate strategy, while companies using constrained diversification tend to be more focused. Constrained diversification allows companies to maximize the effect of their resources because they are shared (100). Apple uses constrained diversification. Apple is, inherently, a personal computer company (hardware and software), and their businesses utilize their competencies in developing hardware and software. The Macintosh, iPad, iPhone, iPod and AppleTV are all computers, which allows Apple to share resources between businesses. For example, the Macintosh, iPad, iPhone and AppleTV all run OS X, Apple’s operating system. This creates economies of scope, which, Collis and Montgomery point out, create cost savings for the company because their resources are shared across multiple businesses (72). Rather than just have related businesses, though, each business is a focused platform with no extraneous products or product types. The Macintosh, for example, consists of two kinds—desktop and notebook. These separate product lines each share resources and complement each other. The iMac and MacBook Pro are both primarily constructed from aluminum and glass, so not only do they share the same materials (which reduces costs), but they resemble each other, creating unity between product lines. Each platform, too, complements the other. Apple’s Macintosh computers sync their media and personal data (calendar, contacts, email) seamlessly with the other platforms. Because they work so well together, owning products from each platform benefits users by creating an experience where their devices â€Å"just work.† The platform advantage does not apply just to Apple’s devices. Through iTunes, users can purchase music, movies and television shows that syncs across all of their devices, or even do so from their iPhone or iPad. The App Store allows users to download applications for their iPhones and iPads wherever they are, and now the iBook Store, released in April, will allow them to do the same with books. Because Apple has chosen what businesses to enter carefully, these platforms reinforce the others and make them more powerful. The sum is greater than the parts. This creates a complete package for consumers to choose, and it is difficult for competitors to match. Their platform strategy makes each individual business more valuable than it would be as a separate entity. Their strategy can be improved, however. Currently, MobileMe—a service Apple offers that keeps contacts, calendar, and email in sync across multiple devices over the air—is a premium service that costs $99 per year. This is the wrong approach. Rather than a premium service, MobileMe should be free and integrated into Apple’s platforms. MobileMe should act like the â€Å"glue† that integrates the platforms and as a draw for users. Apple’s goal should be to get as many MobileMe users as possible. Once someone is happily using MobileMe across their various devices, they are less likely to switch to a competitor’s product.

Thursday, November 7, 2019

Megalopolis From Boston to Washington

Megalopolis From Boston to Washington French geographer Jean Gottmann (1915-1994) studied the northeastern United States during the 1950s and published a book in 1961 that described the region as a vast metropolitan area over 500 miles long stretching from Boston in the north to Washington, D.C. in the south. This area (and the title of Gottmanns book) is Megalopolis. The term Megalopolis is derived from Greek and means very large city. A group of Ancient Greeks actually planned to construct a huge city on the Peloponnese Peninsula. Their plan didnt work out but the small city of Megalopolis was constructed and exists to this day. BosWash Gottmanns Megalopolis (sometimes referred to as BosWash for the northern and southern tips of the area) is a very large functional urban region that provides the whole of America with so many essential services, of the sort a community used to obtain in its downtown section, that it may well deserve the nickname of Main Street of the nation. (Gottmann, 8) The Megalopolitan area of BosWash is a governmental center, banking center, media center, academic center, and until recently, the biggest immigration center (a position usurped by Los Angeles in recent years). Acknowledging that while, a good deal of the land in the twilight areas between the cities remains green, either still farmed or wooded, matters little to the continuity of Megalopolis, (Gottmann, 42) Gottmann expressed that it was the economic activity and the transportation, commuting, and communication linkages within Megalopolis that mattered most. Megalopolis has actually been developing over hundreds of years. It initially began as the colonial settlements on the Atlantic seaboard coalesced into villages, cities, and urban areas. Communication between Boston and Washington and the cities in between has always been extensive and transportation routes within Megalopolis are dense and have been in existence for several centuries. Census Data When Gottmann researched Megalopolis in the 1950s, he utilized U.S. Census data from the 1950 Census. The 1950 Census defined many Metropolitan Statistical Areas (MSAs) in Megalopolis and, in fact, MSAs formed an unbroken entity from southern New Hampshire to northern Virginia. Since the 1950 Census, the Census Bureaus designation of individual counties as metropolitan has expanded as has the population of the region. In 1950, Megalopolis had a population of 32 million, today the metropolitan area includes more than 44 million people, approximately 16% of the entire U.S. population. Four of the seven largest CMSAs (Consolidated Metropolitan Statistical Areas) in the U.S. are part of Megalopolis and are responsible for over 38 million of Megalopolis population (the four are New York-Northern New Jersey-Long Island, Washington-Baltimore, Philadelphia-Wilmington-Atlantic City, and Boston-Worcester-Lawrence). Gottmann was optimistic about the fate of Megalopolis and felt that it could work well, not only as a vast urban area but also as the distinct cities and communities that were parts of the whole. Gottmann recommended that We must abandon the idea of the city as a tightly settled and organized unit in which people, activities, and riches are crowded into a very small area clearly separated from its nonurban surroundings. Every city in this region spreads out far and wide around its original nucleus; it grows amidst an irregularly colloidal mixture of rural and suburban landscapes; it melts on broad fronts with other mixtures, of somewhat similar though different texture, belonging to the suburban neighborhoods of other cities. (Gottmann, 5) And There's More! Furthermore, Gottmann also introduced two developing Megalopoli in the United States - from Chicago and the Great Lakes to Pittsburgh and the Ohio River (ChiPitts) and the California coast from the San Francisco Bay area to San Diego (SanSan). Many urban geographers have studied the concept of Megalopolis in the United States and have applied it internationally. The Tokyo-Nagoya-Osaka Megalopolis in an excellent example of urban coalescence in Japan. The term Megalopolis has even come to define something much more broadly found than just the northeastern United States. The Oxford Dictionary of Geography defines the term as any many-centered, multi-city, urban area of more than 10 million inhabitants, generally dominated by low-density settlement and complex networks of economic specialization. Source: Gottmann, Jean. Megalopolis: The Urbanized Northeastern Seaboard of the United States. New York: The Twentieth Century Fund, 1961.

Monday, November 4, 2019

International Law Research Paper Example | Topics and Well Written Essays - 500 words

International Law - Research Paper Example Goliath and Junior are correct because their trade policies cannot be termed as monopolies outside the United States. Cayman Islands (Junior, Ltd.) is a foreign company and is, therefore, not subject to the laws governing trade in the United States. Goliath Inc is also not liable to the law suit being supported by the United States since its contract with Junior Ltd does not affect the American market. Regulations concerning price fixing are normally applied internationally. However, when there are laws that seek to restrict price fixing to national sovereignty, challenges arise in finding out whether Goliath and Junior violated the anti-trust law (Mann and Barry, 2004). The major controversy arises due to the applicability of the Sherman Anti-Trust Act to foreign businesses. It is true that Goliath was in contract with a company of foreign origin. However, its market is outside the United States. It is, therefore, difficult to enforce the law to the international market (Hylton, 2003). The geographic market is very important in determining whether the two companies engaged in illegal dealings. According to the act, the confines of the market are only within the United States. The market in which companies sell their products should be national, regional or local but not global. Goliath Inc. and Junior Ltd. have not committed any crime by engaging gin contracts that may affect the international market. The United States government should only be concerned if the operations of the two companies are affecting the national and interstate markets. The market in which an organization, for instance, Goliath Inc. and Junior Ltd. serve is not limited by transportation costs, the kinds of service, or product they sell and the geographic location of their competitors. Different countries have different laws concerning market monopolies. It is, therefore, difficult to find Junior Ltd with any wrong doing since the company is registered in line with

Saturday, November 2, 2019

PhD - comprehensive exam - rewrite - question 1 Essay

PhD - comprehensive exam - rewrite - question 1 - Essay Example However, in developing countries improvement of existing infrastructure still remains the most integral element of the public policy. Although the direct relationship between availability of developed infrastructure and healthier economy is still debated, there is little doubt that such relationship exists and has been confirmed, both explicitly and implicitly, in a plethora of studies. Research in the field of infrastructure development in developing countries features a number of distinctive techniques, assumptions, limitations, different potential for error and error minimization techniques. Such variety is, obviously, due to extreme broadness of the term ‘infrastructure’. The American Heritage Dictionary, defines this word as â€Å"the basic facilities, services, and installations needed for the functioning of a community or society, such as transportation and communications systems, water and power lines, and public institutions including schools, post offices, and prisons.†1 Furthermore, rapid technological and political evolution has resulted in some other important concepts (e.g. homeland security) being defined under this term. The purpose of this paper is to compare and contrast research methodologies used to study the development of infrastructure in developing countries. Since the term infrastructure is too broad, only one type of infrastructure services, namely librarianship, has been chosen as the focus of this research. The choice is determined by the reasonable consideration that narrowing the research subject will facilitate the process of comparison and reduce the potential for error. The scarcity of serious research in the field of infrastructure improvement in developing countries provides another justification for the choice. The author and supervisor agreed to take librarianship as the focal point in achieving the research purpose. Hemami’s