Featured Post

Profitability analysis of mergers and acquisitions

Monday, December 30, 2019

Coretta Scott King Essay - 1748 Words

Throughout history many movements have tended to have a founding father and mother. Coretta Scott King portrayed this mother in the American Civil Rights Movement. She embodied all that a woman could want to be as she stood up for her rights and the rights of others. This is what has made her a household name throughout the world and an iconic figure for change. Along with her husband, Dr. Martin Luther King Jr., Coretta spent a majority of her life fighting for the equal treatment of her people in America. Over time this spread to the many different realms of society, touching on racial and economic equality, religious freedom, the necessities of the poor and homeless, employment and healthcare, equal educational opportunities, women’s†¦show more content†¦on June 18th, 1953. She finished her schooling in Boston and then shortly afterwards returned to Alabama, this time Montgomery where Martin lived. Together they had four children named Yolanda Denise King, Martin L uther King III, Dexter Scott King, and Bernice Albertine King. It was during this time, the 1950’s and 1960’s, that her husband rose in popularity to lead the Civil Rights Movement in America. In 1955 one of the first significant events took place in the changing of rights that black people had. This event was the Montgomery Bus Boycott in which many black people opposed the city’s policy of racial segregation on its public bus system. The struggle lasted from December 1st, 1955 to December 20th, 1956. The deciding factor was that most black people in Montgomery agreed to follow this act and did not ride the buses. This proved highly in favor of them as they were the majority of bus riders, soon after, the bus companies saw a drastic drop in the revenue, which led to the United States Supreme Court to declare that these laws were unconstitutional. Throughout that year, Coretta and her husband Martin participated in this event and walked to many of the places in which they needed to go. This garnered huge worldwide attention towards the injustices that existed in America and gained their cause much support in many others countries. These actions did not come without resistance though as the many white supremacist groups in America stood up against theShow MoreRelatedCoretta Scott King637 Words   |  3 PagesCoretta Scott King   Ã‚  Ã‚  Ã‚  Ã‚  Coretta Scott King was born on April 27, 1927 in Heiberger, Alabama. Heiberger was a small segregated town. Coretta’s parents were Obadiah and Bernice Scott. She has an older sister named Edythe and a younger brother, Obie. Coretta was named after her grandmother Cora Scott. Her family was hard working and devoted Christians. Coretta had a strong temper, feared no one and stood up for herself.   Ã‚  Ã‚  Ã‚  Ã‚  Coretta, Edythe and Obie had to walk three miles to an all-black schoolRead MoreThe Contribution Of Coretta Scott King1303 Words   |  6 Pageson who you consider an inspiration or hero. Is it someone who is nationally known or is it someone in your personal life? An individual who is truly known for her determination and strength is Coretta Scott King. Coretta was born April 27th, 1927 in Marion, Alabama by her two parents Obadiah and Bernice Scott. She grew up on her parents farm where she hoed and picked cotton for her family to obtain money. As a young child she had a growing interest in singing and music specifically with the violinRead MoreAnalysis Of The Book Coretta The Story Of Coretta Scott King 1459 Words   |  6 PagesSummary of the Text: The biography of â€Å"Coretta: The Story of Coretta Scott King,† was the first biography made depicting Coretta’s life, goals, and success. The book was written by a close friend of hers whose nam e is Octavia Vivian. The story tells how Coretta, as a young woman, had grown up in Alabama. She later went to Antioch College, and later found out that she, as a colored young woman, would not be allowed to teach, mix, or mingle with the whites in the state of Ohio. She later explored aRead MoreCoretta Scott, Not Just the Wife of Martin Luther King Jr. Essay1441 Words   |  6 PagesPeople probably only know Coretta by being the wife of Martin Luther King Jr. But what about the important things she did for this country? Coretta put her life in danger for believing what she supported and was right. Mrs. King also had programs to stay together with the community. She supported other people’s beliefs and doing that gave some people motivation that anything is possible. People also have to give her credit for even being Martin Luther King Jr.’s wife. His family had to go throughRead MoreThe Civil Rights Movement : Coretta Scott King, Jr., Malcom X, And Rosa Parks2182 Wor ds   |  9 Pagesthey think of big names like Martin Luther King, Jr., Malcom X, and Rosa Parks. However, there were many people behind the scenes that had as big of an impact as these forerunners had. These are the transparent heroes; the underdogs. The ones that did so much for the cause yet were never truly recognized as being such a big influence. One of these unsung heroes of the Civil Rights movement is Coretta Scott King. After her husband, the great Martin Luther King, Jr., died she strived to continue the momentumRead MoreThe Impact Of Gandhi On American Society Through Martin Luther King Jr.990 Words   |  4 PagesMahatma Gandhi. When Dr. King entered Morehouse at the age of 15, Dr. Mays became one of the great influences in his life. And there, the torch was passed on. In February of 1959, Dr. and Coretta Scott King spent a month in India studying Gandhis March techniques of nonviolence as guests of Prime Minister Jawaharlal Nehru. The impact of Gandhis teaching and example on Dr. Kings life was considerable, and he carried Gandhis message with him back to America. Dr. King once told a story of hisRead MoreFeminism And The Peace Movement1465 Words   |  6 Pagestough and like they do not care. For example, many of the men would say that the women still are scared, hate, and want nothing to do with battle or the nuclear arms race of 1984 simply because they are women and have no just reasoning.. But, Coretta Scott King says otherwise and although she is against the arms race, she gives reasoning which disproves the men’s claim by stating, â€Å"The supporters of the nuclear arms race claim that peace can only be achieved through strength. Apparently, they meanRead MoreThe Civil Rights Movement : Coretta Scott Kings Work Ethic And A Passion For Racial Equality2424 Words   |  10 Pagestoo great a burden to bear, it injures the hater more than it injures the hated.† Coretta Scott King was born in one of the most pivotal times in our nations history. Growing up in the rural, segregated state of Alabama in the middle of the Great Depression ensured in Scott a deep work ethic and a passion for racial equality. Going through college during the heart of the Civil Rights Movement allowed Coretta to find her place not only in activism, but the stance she took as a feminist marriedRead MoreCoretta Scott Kings Abandoned Musical Dreams Essays609 Words   |  3 Pagessurprised if I said Coretta grew up wanting to make music, and how she didn’t stick with the major she had planned for. Growing up, Coretta took parts in music recitals at her high school. After she graduated she studied music at Antoich College in Yellow Springs, Ohio. She received a B.A. in music and education. After Coretta earned a scholarship to the New England Conservatory of Music in Boston, She had set her mind to becoming a professional singer. While she was in Boston Coretta met Martin LutherRead MoreJoyce Carol Thomas, an Influential Writer Essay694 Words   |  3 Pageshim to break away from his situation with his drunken father. Bright Shadow won the Coretta Schott King Award. Abby’s story is continued in An Act of God (1985) and Water Girl (1986). Carl Lee’s story is told in The Golden Pasture (1986) (â€Å"Bright Shadow†). In 1994, Thomas returned to Berkley, California and continued to write (OK State). Her other books include: Brown Honey in Broomwheat Tea [another Coretta Scott King Award winner], Linda Brown [a best seller], You are Not Alone: The Brown v. Board

Sunday, December 22, 2019

National Security Congress And Defense Policy Essay

Congress and Defense Policy / LGAF 6270.LH Session 2 Issue paper / Chapter 3 6 of 911 Commission Report The terrorist attack of September 2001 was a tragedy that could have been prevented by the United States Intelligence professionals. The Islamic radicals such as Al Qaeda and its leader Osama Bin Laden had long declared their objectives to undermine the United States national security since the first World Trade Center Bombing on Feb 26, 1993. The 911 Commission report outlined the deficiencies of several government agencies, principally the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Defense, and the National Security Council. The Commission criticized the intelligence community’s effort in anticipating and proactively engaging in counterterrorism to protect and defend the nation from terrorist threats. †¢ The FBI, after the first attack on the World Trade Center performed an excellent work of investigation. However, it was more worried about effective prosecutions and the custom of the legal system. The process was not designed for counterterrorism and counterintelligence works as these tasks were not career-enhancing for field agents. †¢ The CIA and the National Security Council (NSC) have a long track record of using technology to intercept and communicate possible terrorist threats to officials. However, after the Cold War, cuts were made in national security funding and consequently diminished the CIA ability to track andShow MoreRelatedThe Three Branches of the United States Government913 Words   |  4 Pagesexecutive, legislative, and judicial branches. The capabilities of each branch is divided to ensure a separation of powers. The executive branch, headed by the President, and Congress of the legislative branch both share responsibilities to govern the nation, both domestically and abroad. In terms of foreign policy, Congress and the President have different powers that ensure that each branch works in conjunction in handling foreign affairs. The President, as Commander-in-Chief, commands the armedRead MoreNational Security Policy: Before and After September 11, 20011576 Words   |  7 Pagespresident and Congress for the purposes of evenly distributing power and preventing any single entity from wielding their power arbitrarily (Jordan et al, 2009, p. 103). Though these roles are complementary, they have also at times been conflicting. This push and pull has also been sewn into the historical narrative of national security policy-making. As the national security needs of the nation have evolved, so too have the ways, means, and agents of the national security policy-making processRead MoreObama Administrations Policy Views on Cybersecurity1338 Words   |  6 PagesTitle Page Contents Introduction Obama Administration’s Policy Views on Cybersecurity 1.1. Enhancing Resilience 1.2. Reducing Threats Obama and Bush Administrations 1.3. Bush Administration 1.4. Policy Similarities 1.5. Policy Differences Recommendations for Improvements 1.6 Cyber Czar Position 1.7 International Organization and joint punishment Works Cited Introduction The following document will provide information pertaining to presidential administrationsRead MoreThe President s National Security Policy Essay1499 Words   |  6 Pagessits at the epicenter of the US foreign policy establishments. His ability to pursue national security policy priorities depends on the quality and efficacy of decisions emanating from the existing decision-making models. The models reflect on multiplicity of values, goals, and interests through an interagency process of consensus building of several bureaucratic organizations. Rational decision model critical to identify and prioritize national security policy objectives; develop and evaluate alternativesRead MoreDefense Against Terrorism1661 Words   |  7 PagesIn the years following the September 11th terrorist attacks, homeland security has been at the forefront of American public policy. According to a January 2015 Pew Research poll, seventy-five percent of Americans believe that protecting the Homeland agai nst terrorism should be the number one priority for policy makers (Pew Research Center 2015). These sentiments on homeland security are not novel to Americans. National Security has been of great concern to Americans since World War I (Reid 2015).Read MoreThe Roles of The National Security Enterprise 1301 Words   |  5 PagesThe National Security Enterprise (NSE) is the overarching government apparatus responsible for national security decision making. This is generally thought of as the National Security Council (NSC) and the Department and Agencies they represent. However, Roger Z George and Harvey Rishikof point out in The National Security Enterprise: Navigating the Labyrinth that national security decision-making may rest with the President and the NSC but is significantly influenced by the Modern Media (includingRead MoreWorld War II ended in 1945, but America could not rest. â€Å"Serious discussion about reorganization700 Words   |  3 Pagesbegan in Congress and the military department in 1944 and aroused much public interest† (Trask 1997). Because the Air Force played such a large role, discussion of separating the Air Force from the Army Air Forces (AAF) began. A proposal was created to establish one department for the United States Armed Forces, combining all the military branches under one department. â€Å"On 19 December 1945, President Truman sent a message to Congress recommending a single department of national defense with threeRead MoreThe United States Code ( U.s. )1677 Words   |  7 Pagesgoverns the form, function, duties, and responsibilities of the US Government†. The foundational to US National Security and foreign relations are based on the three titles in the U.S.C, namely, Title 10, Title 22, and Title 50; which â€Å"govern US Armed Forces, the Department of State, public diplomacy efforts, and national defense† (American Security Project, 2012). However, the National Security Act of 1947 was the first U.S. law on the conduct of intelligence operations. The act established the CentralRead MoreChina Saper Threat777 Words   |  4 PagesWeak USA Cyber Policy vs China’s Security Threat to the USA? Abstract A cyber spy network based mainly in China hacked into classified documents from government and private organizations. One of the biggest questions still remains unanswered. Should the U.S. Congress conduct an in depth assessment of Chinese cyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage. In this paper I will review china’s cyber threat and possible USA solutionsRead MoreRationale and Analysis1293 Words   |  5 Pagesreviews the department of defense Inspector general. The initial mission for the department when it was formed in 1982 was to serve as an independent supervisor to the department of defense. The powers and responsibilities of the department are drawn from the inspector general Act of 1978. The key tasks of the department were to monitor, evaluate, and investigate all the operations of the department of defense. The department was also expected to provide leadership in policy development for the department

Saturday, December 14, 2019

Out of the Ashes Schizophrenia Free Essays

Nowadays, society sees schizophrenia seems like an outdated topic. A topic not many seem to care about. A topic that is not even taboo, because many do not even know about it. We will write a custom essay sample on Out of the Ashes: Schizophrenia or any similar topic only for you Order Now However, this topic is affecting so many on a day to day basis. Worldwide, about one percent of people are diagnosed with this mental illness. That is 1.5 million people. Even worse, sixty percent of everyone that suffers from schizophrenia makes at least one attempt to commit suicide (WebMD).That is 900,000 people. That is three cruise ships filled with people (Mental Health Schizophrenia). That is one full football stadium. Some may ask themselves, what is schizophrenia? Well according to the National Institute of Mental Illnesses â€Å"schizophrenia is a chronic and severe mental disorder that affects how a person thinks, feels, and behaves.† (NIMH). Schizophrenia is caused by genetics, biology and sometimes even viral infections. Schizophrenia has been misunderstood throughout the years; It is characterized by a shift in perception, disturbed sense of self and psychotic manifestations.A shift in perception can not only affect the patient’s emotions, but it can also greatly impact their physical life. Schizophrenics suffer from various shifts in perceptions that makes them change the way they act, not only physically but also mentally. When you suffer from schizophrenia you develop many symptoms. Meanwhile, many were not discovered until the mid-1990s. However, Schizophrenia was discovered back in 1887 by Doctor Emile Kraepelin. Before Kraepelin however, many believed people with psychotic disorders were possessed. This caused the treatment to be electric shock therapy, exorcisms, lobotomy and even drilling a hole in the patient’s eye socket which left patients with worse mental health than what they started with. This type of treatment started to be popularized with schizophrenia patients in the middle ages until the late 1880s. Schizophrenia and its treatments are one of the main reasons why society now know mental asylums as dark and scary places. When The Priory of Saint Mary of Bethlehem was founded to try to treat ‘mad men’. They believed this illness came from supernatural forces such as demons. By the patients seeing hallucinations and delusions was basically proof of a demonic possession. They were treated so badly, most of the ‘mad men’ that attended the mental asylum ended up dying, either by experiments, failed treatments or suicide. Today Kraepelin was the first to differentiate between what he called dementia praecox and manic depression. According to Psychology Today â€Å"The oldest available description of an illness closely resembling schizophrenia can be found in the Ebers papyrus, which dates back to the Egypt of 1550 BC. And archaeological discoveries of Stone Age skulls with burr holes drilled into them (presumably to release ‘evil spirits’) have led to speculation that schizophrenia is as old as mankind itself† (Burton, M.D.). The first doctor to coin the term Schizophrenia and notice the patients shift in perception was Swiss psychiatrist, Eugen Bleuler back in 1911. Schizophrenia comes from Greek roots schizo (split) and phrene (mind) as a reference to showing how the patient’s brain works. Schizophrenia brings you to a point where the patient has a disturbed sense of self. This has happened to not only to unknown patients but many well-known people and celebrities have suffered through forgetting who they are and why they are here. This list includes many people, for example, the ex-singer and founder of Pink Floyd. Syd Barrett’s real name was Roger Barrett, and he used his real name for much of his life, which started in 1946 and ended in 2006 by pancreatic cancer. He was an English songwriter, singer and guitarist best known as a founding member and songwriter of the rock band Pink Floyd. Barrett’s partnership with the band finished after failure to perform during concerts various times. These were speculated to be caused by delusions and hallucinations, two very common schizophrenia symptoms. He had been the main songwriter which greatly affected how the band worked after his resignation. Barrett withdrew from the public after that, but released two solo albums in 1970 called â€Å"The Madcap Laughs† and â€Å"Barrett† Pink Floyd went on to become massively popular and successful, their style evolving towards progressive rock since their songwriter left. Syd/Roger Barrett lived a simple and solitary life, receiving royalty payments from his ex-band. His access to spending money had been controlled by his family (Willis 143). There has been much speculation about why Barrett ceased to be a member of Pink Floyd, withdrew from the public eye, shunned his own fans, left behind the nickname that he had never himself used or liked. Syd/Roger was diagnosed with the mental illness after an apparent heavy usage of LSD. According to his family and close friends, he did LSD nearly every day for years. After his resignation of Pink Floyd, he did not just start having atrocious hallucinations daily but also he fell into clinical depression. This leads to another story of a maybe one of the most famous artists of all time. Vincent Van Gogh. He had an eccentric personality and unstable moods suffered from recurrent psychotic episodes during the last two years of his extraordinary life and committed suicide at the age of thirty-seven by a gunshot. (Blumer) According to PsychiatryOnline.org â€Å"One of Van Gogh’s psychiatrists recognized the crucial role of alcohol in the manifestation of Van Gogh’s major psychiatric symptoms. By his own confession, Van Gogh required â€Å"a glass too much† to numb his inner storms when they became too intense. The artist was not known to become intoxicated and may not have been drinking more than many of his contemporaries, but he was particularly vulnerable to the epileptogenic properties of absinthe, the favourite drink of the French artists of his time† (Blumer). The well-known part of Schizophrenia is the symptom of psychotic manifestations. According to Healthline.com â€Å"Psychosis is characterized by an impaired relationship with reality. And it is a symptom of serious mental disorders. People who are psychotic may have either hallucinations or delusions† (Carey, P.H.D.). Hallucinations are sensory manifestations, they occur mostly visually or auditory. For example, someone might hear someone yelling when nobody is there. Or maybe they see someone or something that isn’t actually there. These for the patient seem real. They also experience delusions, which is for the person to have a contrary thought to actual evidence. For example, the patient thinking a stranger they just met wants to kill them. These symptoms are powerful and dangerous. Strangely, these symptoms are the most attacked by society. Many believe these delusions and hallucinations are made up and make up false beliefs about this. Some false ideas are: Schizophrenics have multiple personalities, them being possessed, the patients are faking it and even that it’s not an illness. The first one is made up because as clearly stated before, the symptoms of schizophrenia have nothing to do with that. The illness in which the patient have multiple personalities is a psychiatric phenomenon called DID, which stands for dissociative identity disorder, which involves the patient has multiple personalities which each have their own voice, manners and characteristics. This illness can be seen perfectly in the movie Split (2016) by M. Night Shyamalan. This is not schizophrenia. Schizophrenics might hear voices but they only have one personality. The second hoax is the possession myth. This myth is mostly believed by Catholics. This myth comes back from middle ages as mentioned before.In conclusion, many schizophrenics are seen ever since the beginning of mental illnesses, many are affected by it and almost all society says about it is fake. All in all, if you or someone you know is suffering from schizophrenia, please get help immediately and know that no matter your illness â€Å"I can do all things through Christ who strengthens me.† (Philippians 4:13). Help is always there and never forget Jesus loves you. Schizophrenia has been underestimated to a point where society only knows it’s characterized by a change in view, confused sense of self and psychotic ideals. Works Cited â€Å"A Brief History of Schizophrenia.† Psychology Today, Sussex Publishers, www.psychologytoday.com/us/blog/hide-and-seek/201209/brief-history-schizophrenia. â€Å"Biological Basis of Schizophrenia.† Khan Academy, www.khanacademy.org/test-prep/mcat/behavior/psychological-disorders/v/biological-basis-of-schizophrenia. â€Å"Divine Madness – a History of Schizophrenia.† History Cooperative, 19 Sept. 2016, historycooperative.org/divine-madness-a-history-of-schizophrenia/. â€Å"Famous People with Schizophrenia: 6 Schizophrenic Celebrities.† WebMD, WebMD, www.webmd.com/schizophrenia/ss/slideshow-schizophrenia-famous-names. Marlene, Lili. â€Å"Incorrect Pleasures.† The Interesting Case of Syd Barrett, 1 Jan. 1970, incorrectpleasures.blogspot.com.co/2009/11/interesting-case-of-syd-barrett-for.html. â€Å"Psychosis: Symptoms, Causes, and Risk Factors.† Healthline, Healthline Media, www.healthline.com/health/psychosis. Schiller, Lori, and Amanda Bennett. The Quiet Room: a Journey out of the Torment of Madness. Grand Central Publishing, 2011.†Schizophrenia.† Khan Academy, www.khanacademy.org/test-prep/mcat/behavior/psychological-disorders/v/schizophrenia. â€Å"Schizophrenia.† Mental Health America, 29 Mar. 2017, http://www.mentalhealthamerica.net/conditions/schizophrenia#symptoms. â€Å"Schizophrenia.† Mental Health America, 29 Mar. 2017, www.mentalhealthamerica.net/conditions/schizophrenia. â€Å"Schizophrenia.† National Institute of Mental Health, U.S. Department of Health and Human Services, www.nimh.nih.gov/health/topics/schizophrenia/. â€Å"Schizophrenia.† Psychology Today, Sussex Publishers, www.psychologytoday.com/us/conditions/schizophrenia. â€Å"Schizophrenia and Suicide.† WebMD, WebMD, www.webmd.com/schizophrenia/schizophrenia-and-suicide. â€Å"Schizophrenia Symptoms, Patterns And Statistics And Patterns.† Mental Help Schizophrenia Symptoms Patterns and Statistics and Patterns Comments, https://www.mentalhelp.net/articles/schizophrenia-symptoms-patterns-and-statistics-and-patterns/ â€Å"The Illness of Vincent Van Gogh.† American Journal of Psychiatry, ajp.psychiatryonline.org/doi/abs/10.1176/appi.ajp.159.4.519.The History of Schizophrenia, schizophrenia.com/history.htm#.Willis, Tim. Madcap: the Half-Life of Syd Barrett, Pink Floyd’s Lost Genius. Short Books, 2002. How to cite Out of the Ashes: Schizophrenia, Papers

Friday, December 6, 2019

Strategies of a Mining Industry-.com

Question: Discuss about the Strategies of a Mining Industry. Answer: Introduction: BHP is an entity made for trading for BHP Limited and BHP Billiton plc. An Anglo-Australian multinational company is involved in mining of metals and petroleum. The company has its headquarters in Melbourne. It was founded in 1885 and by the year 2015, it was the largest mining company of the world and the fourth largest multinational company of Australia. This report includes the various businesses of the company BHP Billiton and the various strategies to be taken for improvement. The structure of the organization, problems, software uses and the vulnerabilities in the system is also included in the report. This report includes the software accounting packages that maybe included in the system. Discussion: In the year 2001, the merger between two different companies, Australian Broken Hill Proprietary Company Limited (BHP) and the Billiton plc introduced BHP Billiton that is supposed to include all the shares of both the company (Friederich and van Leeuwen 2017). According to market capitalizations of Australia, it ranks among the top largest companies whose business lies in mining. Structure of organization: The company has recently announced the introduction of a new model of operation that is supposed to help the company to grow and to be ready to face the challenges from the market (Ranosz, 2017). The company wants to focus their infrastructure to get geographical operation and global services with high expertise and scaling. Fig: Organizational structure of BHP Billiton (Source: CRONJE and VAN WYK) Problems in operation: Many operational problems are present due to the organizational structure of the company. These risks are evident due to the vast evidence of the international scope created by the organization and all the other industries that are currently involved in doing business that can have an impact in the operation of the company. The fluctuating prices due to changes in the market and the financial crisis of the global market may create a negative impact in the desired results of the company (White 2017). The changes in the market are always a risk and this causes a problem in the operation if the required profit cannot be met due to price reduction. The financial aspects may create a negative impact on the exchange rate of the currency. The changes in the rates of currencies are also a risk to the company (Boulais 2017). For example, a company doing business in a certain country may have an effect on their supplies and operations if the rate of exchange of currencies of that market and the other associated countries involved in the business increase. The changes in the financial policies may affect the business as the company is associated with many clients all over the world and the changes in policies like liquidity or financial market change may lead to a disadvantage for the company (CRONJE and VAN WYK 2017). System acquisition method: The company has revealed information about investment in software models of operation in decision automation of the industry and security of information. It has also made another investment to make the company go digital (Pillay 2017). The technology will be concerned with the digital roles of the company. The company is also looking to create a new and innovated hardware that will focus on improvement of automated operations of the industry. The company BHP Billiton has an architecture that is designed for a hybrid method of operation, which will be automated, and provide use in management and scaling. The software used here is software defined networking (SDN) for processing the IT operations. Sales operation of the company: The company successfully acquires the sale of its products and made auctions for the sale of certain products. Fig: Sales flowchart (Source: Washbourne) The company aims to focus on low cost and large assets that can be expanded. The company is committed to provide focus and investment in the economies of the company, which includes ten operations and four commodities (Washbourne 2017). The operational cost across industries and the robust demand of the products has made the company to give continuous support to the core majorities in the company. Vulnerabilities in the system: Due to the competition of the market for manufactured goods and commodities, the increased resource acquisition from the natural sources for the development of the economy has made the industries a target for cyber threats, which may be disruptive or destructive (Lee et al. 2017). These threats are due to the presence of certain technologies to help thrive in the market. The supply chains of the company in a global level are the main sources of resources for these cyber attacks. These attacks are very targeted and resourceful and the hackers are targeting these industries due to their global impact on the market and their supply chains management. The main vulnerabilities of the mining industries are their major dependence on integrated services to achieve automation in their activities (Walker 2017). As the industry for mining is a target for the economies of a country, the main objectives of hacking into the system is achievement of information about the government, policies and trying to get the analyzed results of a competitor. Stealing insights from a company about the mining prices, which are subjected to volatility due to the market, is a common problem associated to the mining industry. The company is also subjected to natural problems that affect the system of operation. The change in industry is the most common problem that is associated with the industry. The change in the price of ores on a daily basis may affect the cost of operation and if the profit acquisition is not made, the company will not be able to thrive (Kapranov 2017). In addition, the separation of a sister company from the main company led to decrease in asset prices. South32 when separated from the company to get more provisions, it only got a reduced stock prices and this led to downfall. Moreover, the company is associated with tax troubles. Taxes are an important acquisition for a government and if the requirements are not met, extreme actions might be taken. The company is accused of maintaining their operations by doing their activities associated with Australia from Singapore for lowering the tax to be paid to the government. Accounting software packages: The accounting software is used to define a special type of software that is used to record and process transactions relating to the account of the company involved in modules like payable, receivable or balance (Hall 2012). It works as an information system to store the account related transactions. The software may be purchased or third party based which can be used from anywhere. The presence of internet access is a necessity to access the software. This software can be personal, accounting for personal information. These types of software are mainly used to aim their uses for the benefit of home users. The main advantages provided are the budget analysis and the transaction accounting. The low-end market type of accounting software allows general business organizations to use this. The low-end products that have small interfaces can be accounted by this package (Artho et al. 2012). The mid-market package is used to serve organizations that are basing their activities on the medium level of market acquisitions. The high-end market package is used to notify the businesses with high activities on a global scale. The most typical uses are the acquisition of global data and large-scale transactions of the company. The company BHP Billiton also uses accounting software for maintaining their transactional records and provides insights of the financial aspects. The software used by the company is XBRL. The full form of XBRL is extensible Business Reporting Language (Doni, Gasperini and Pavone 2016). The software is intended to be used by both the companies who are dealing and the companies who are purchasing. The basic use of this software is to get accounting insights and financial reports made by the company. The clients and the consumers are the most important aspect in a company and the need to maintain the sales transaction of a company is a necessity. The software is a simple way for financial business reporting. The main features of the software are the ease of transfer between users. The main usage of the software is Excel based and this makes the transfer of reports to users very easy. The software can be used in any computers who have the Microsoft Office version (O'Riain, Curry and Harth 2012). Moreover, the report provided by the software can be used to be converted to any types of documents supported by Java. The software also allows resolving any types of error that are made by the document. In addition, the software supports the easy allocation of information to different types of templates. The templates are readymade and allow easy incorporation of data. The use of XBRL has helped the company to participate in the process of creating IFRS financial reports that had US SEC compliance. Market size: BHP Billiton ranks among the top companies in Australia. Due to a commodity prices surge, the company made a profit in the first half-year of 2017. The company made a profit of 3.2billion$ and the company expects to see a profit of 4.2billion$ in the next half-year. The investors associated with the company is now getting a 0.52$ per share (Floris, Grant and Cutcher 2013). The main cause of such profit acquisition is the rise in prices of the iron and coal ore due to the increase in demand from China. Fig: Market share of BHP Billiton (Source: Floris, Grant and Cutcher) The company BHP Billiton is supposed to have achieved a market cap of 98.3 billion$ by may, 2017. The sales made by the company are 33.95 billion $. Leaders in the market: The BHP Billiton is the top mining company in Australia. But this does not mean that the company will not have fierce completion in the market. The top companies in the global market are surely trying their best to grab a hold of the top ranks (Miller, Van Megen and Buys 2012). The Rio Tinto is another mining company who gives a serious competition to the BHP Billiton. Glencore is another such company in the global market who also gives competition to the company. The presence of better infrastructure and operations are the necessary things that are required for the company to thrive in the global market. Other leaders of the market include the Xstrata PLC, Anglo American plc, MMC Norilsk Nickel and rest. Fig: Share price of BHP Billiton (Source: Miller, Van Megen and Buys) Gaps and challenges: The accounting software packages are used in nearly every business companies to get financial and accounting aspects of the company. The advantage it provides is used to get more efficiency in transactional accounting of the system. However, the main disadvantages are the increased cost (Noble and Smith 2014). The cost of the software is not the only requirement in terms of pricing that are needed to be met but includes the prices of all the other aspects like system requirements, internet access and many more. The possibility of a backup in the system require more technical support and the overall cost to install the system is more and this gives a significant disadvantage. The next disadvantages are the complex nature of the software. Most accountants are not conversant with the software and may need the presence of learning to understand the system. This causes an increase in expense for providing information for learning and gives a stress to the accountants for learning the soft ware. Another disadvantage is the time required for the process to work (Bagley, Dalton and Ortegren 2012). The time that required in storing the information in the software is more than the manual work that can be done. Maintenance is another aspect that provides stress to the company who is implementing it. The time requires for maintenance is much greater and can hinder a days performance. The time and money both spent for maintenance are much greater than the advantage received. These problems need to be referenced as the use of software accounting packages are a necessity for the company. The company needs to hire efficient personnel to handle the software and the company also needs the presence of training materials to be provided to the staffs handling them (Moorthy et al. 2012). The system needs to be made effective and modern to allow effective modernization so that this and any other software can be installed without the need of installation of computer parts every time. Conclusion: The company BHP Billiton thus ranks among the top companies in Australia. The organizational structure present in the company needs to have certain tweaks in the system that will help the company to thrive. The company also needs the presence of certain software for accounting purposes that effectively captures the content without posing any problem for the company. Thus, it is concluded from the report that the integration of certain software in to the system needs to be first analyzed and then implemented to mitigate the risks in the market References: Artho, C., Suzaki, K., Di Cosmo, R., Treinen, R. and Zacchiroli, S., 2012, June. Why do software packages conflict?. In Proceedings of the 9th IEEE Working Conference on Mining Software Repositories (pp. 141-150). IEEE Press. Bagley, P.L., Dalton, D. and Ortegren, M., 2012. The factors that affect accountants' decisions to seek careers with big 4 versus non-big 4 accounting firms. Accounting Horizons, 26(2), pp.239-264. Boulais, C.M., 2017. Mining Capitalism: The Relationship between Corporations and Their Critics by Stuart Kirsch. Anthropologica, 59(1), pp.172-173. CRONJE, F. and VAN WYK, D.A.V.I.D., 2017. CHAPTER TWO CORPORATIONS, COMMUNITIES AND IMPACT: THE CASE OF COAL FREEK CRONJE AND DAVID VAN WYK. Revisiting Environmental and Natural Resource Questions in Sub-Saharan Africa, p.25. Doni, F., Gasperini, A. and Pavone, P., 2016. Early adopters of integrated reporting: The case of the mining industry in South Africa. African Journal of Business Management, 10(9), p.187. Floris, M., Grant, D. and Cutcher, L., 2013. Mining the discourse: Strategizing during BHP Billiton's attempted acquisition of Rio Tinto. Journal of Management Studies, 50(7), pp.1185-1215. Friederich, M.C. and van Leeuwen, T., 2017. A review of the history of coal exploration, discovery and production in Indonesia: The interplay of legal framework, coal geology and exploration strategy.International Journal of Coal Geology. Hall, J.A., 2012. Accounting information systems. Cengage Learning. Kapranov, O., 2017. 6 Conceptual Metaphors Associated with Climate Change in Corporate Reports in the Fossil Fuels Market. The Role of Language in the Climate Change Debate, p.90. Lee, K.C., Hsieh, C.H., Wei, L.J., Mao, C.H., Dai, J.H. and Kuang, Y.T., 2017. Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation. Soft Computing, 21(11), pp.2883-2896. Miller, E., Van Megen, K. and Buys, L., 2012. Diversification for sustainable development in rural and regional Australia: How local community leaders conceptualise the impacts and opportunities from agriculture, tourism and mining. Rural Society, 22(1), pp.2-16. Moorthy, M.K., Voon, O.O., Samsuri, C.A.S.B., Gopalan, M. and Yew, K.T., 2012. Application of information technology in management accounting decision making. International Journal of Academic Research in Business and Social Sciences, 2(3), p.1. Noble, H. and Smith, J., 2014. Qualitative data analysis: a practical example. Evidence-based nursing, 17(1), pp.2-3. O'Riain, S., Curry, E. and Harth, A., 2012. XBRL and open data for global financial ecosystems: A linked data approach. International Journal of Accounting Information Systems, 13(2), pp.141-162. Pillay, H., 2017. QUT| Staff Profiles| Hitendra Pillay. Ranosz, R., 2017. Analysis of the structure and cost of capital in mining enterprises.Gospodarka Surowcami Mineralnymi,33(1), pp.77-92. Walker, S., 2017. Security Enters a New Realm. Engineering and Mining Journal, 218(3), p.41. Washbourne, M., 2017. Labor pledges to cut red tape. Australia's Paydirt, 1(249), p.9. White, S., 2017. Regulating for local content: Limitations of legal and regulatory instruments in promoting small scale suppliers in extractive industries in developing economies.The Extractive Industries and Society,4(2), pp.260-266 Carvalhal, A., 2012. Do shareholder agreements affect market valuation?: Evidence from Brazilian listed firms.Journal of Corporate Finance,18(4), pp.919-933. Schmitt, A. and Raisch, S., 2013. Corporate turnarounds: The duality of retrenchment and recovery.Journal of Management Studies,50(7), pp.1216-1244.

Monday, November 25, 2019

Free Essays on The American Family

The American Family After reading â€Å"Grover Dill And The Tasmanian Devil† by and interpreting it into the movie â€Å"A Christmas Story†, I was given a better understanding of the character’s roles as individuals, while carrying out the norms of the average American Family. There were necessary changes that had to be made when making the movie, considering the novel took place during the summer and the movie during Christmas. One of the things I would have liked to see in the movie, that was left out from the book was Ralphie’s temper. In the book Ralphie discusses the killer that lies deep inside each one of us as he stares the Tasmanian devil eye-to-eye, knowing that he and the animal were both killers. In the movie, there are some hints that might give you an idea of his temper, one is when he blurted out the word fudge and another is when he is disappointed with his little orphan Annie secret decoder. Other than that we really do not know he has that bad of a temper until he blows his fuse on Scut Farcus the bully. Also in the book, the bully’s name is Grover Dill, which in the movie is Scut Farucs. Grover Dill does have a role in the movie but he only plays a henchman to Scut Farcus. Another difference that made me realize it was summer, happened right after Ralphie got into the fight with Scut Farcus. During dinner when his mother is trying to smoothen things over with the old man about the fight, she says, â€Å"I see the Bears won today.† In the novel she says, â€Å"I see the White Sox’s won today.† This made it clear to me that the novel was going on during a baseball season, which is in the summer unlike football, which is played throughout the fall. Summer was the fact that was that. I really enjoyed reading and watching both the novel and the movie. Doing so I was given a better understanding of the movie I have watched every Christmas of my entire life and I also saw other aspects of the story other than it ... Free Essays on The American Family Free Essays on The American Family The American Family After reading â€Å"Grover Dill And The Tasmanian Devil† by and interpreting it into the movie â€Å"A Christmas Story†, I was given a better understanding of the character’s roles as individuals, while carrying out the norms of the average American Family. There were necessary changes that had to be made when making the movie, considering the novel took place during the summer and the movie during Christmas. One of the things I would have liked to see in the movie, that was left out from the book was Ralphie’s temper. In the book Ralphie discusses the killer that lies deep inside each one of us as he stares the Tasmanian devil eye-to-eye, knowing that he and the animal were both killers. In the movie, there are some hints that might give you an idea of his temper, one is when he blurted out the word fudge and another is when he is disappointed with his little orphan Annie secret decoder. Other than that we really do not know he has that bad of a temper until he blows his fuse on Scut Farcus the bully. Also in the book, the bully’s name is Grover Dill, which in the movie is Scut Farucs. Grover Dill does have a role in the movie but he only plays a henchman to Scut Farcus. Another difference that made me realize it was summer, happened right after Ralphie got into the fight with Scut Farcus. During dinner when his mother is trying to smoothen things over with the old man about the fight, she says, â€Å"I see the Bears won today.† In the novel she says, â€Å"I see the White Sox’s won today.† This made it clear to me that the novel was going on during a baseball season, which is in the summer unlike football, which is played throughout the fall. Summer was the fact that was that. I really enjoyed reading and watching both the novel and the movie. Doing so I was given a better understanding of the movie I have watched every Christmas of my entire life and I also saw other aspects of the story other than it ...

Thursday, November 21, 2019

Rather than being a medium for western culture alone, the internet Essay

Rather than being a medium for western culture alone, the internet actually helps promote and strengthen the societies - Essay Example Governance and Democratization Early this year, Egypt and parts of the Arab world experienced one of their most successful revolutions in history. This revolution was organized with the help of the internet and specifically social networking tools. The people of Egypt organized themselves and through proper coordination and communication, they were able to change their country in a manner never witnessed before in any country. This revolutionary event was seen by many as what can be achieved through people power. Without the internet the Egyptian revolution would probably have taken a very different route than it did. The Egyptians were able to push for proper leadership and their democratic rights because the internet empowered them to do so. Another country that has made major gains in the democratization process is China (Lagerkvist, 2010). The country’s leadership is slowly but surely becoming more democratic as citizens become more empowered to fight for their rights usin g information technology tools such as the internet. Through the internet, citizens in a country are able to know how they are being governed. Many governments have adopted the use of the internet in service dissemination. This means that citizens can access the services from the comfort of wherever they are. The internet also empowers the people to communicate more effectively with their leaders. They can give feedback on the kind of services they want and they can use the same technology to demand for changes where they deem fit to do so. In other words, the internet has enabled citizens in different countries keep track of how their governments are doing their work and this helps in the overall development of the nations (Kalathil and Boas, 2003). Learning and Development Education is key to development and this is evidenced by the rate at which countries having high literacy levels have developed. Many nations in Asia, Africa and South America have for a long time been classifie d at the bottom in terms of literacy. However, the situation is slowly changing as more and more people from these countries seek education in different ways. The internet has played a major role in revolutionalizing the learning and development in nations outside the West. Many learning institutions in these countries have incorporated online learning into their programmes (Schell, 2007). This makes learning more effective, thus giving students the kind of education they need to lead productive lives in future. Those seeking higher education do not have to travel long distances to do so. Renowned institutions in the west have high class programmes which they offer online. This makes it easy for individuals in other countries to access the education offered in these institutions from wherever they are. These improved educational opportunities empower societies in non-western countries to develop at the same level as their counterparts living in western nations (Howard and Jones, 200 4). Business and Economic Development Most third world countries have had to struggle with the problem of unemployment for a very long time. Many youths in these parts of the world had been without any meaningful source of income before the internet age. However, things have drastically changed for the better in terms of employment opportunities among the young

Wednesday, November 20, 2019

Political Scandal - Power and Visibility in the Media Era Literature review

Political Scandal - Power and Visibility in the Media Era - Literature review Example In contemporary politics and wider society, the story of a reputation or career undone by the publication of a scandal is familiar, but a key question is whether or not this phenomenon should be left to the tabloid journalists. I am inclined to agree with Thompson that the field deserves serious study. He was writing in the aftermath of the Bill Clinton sex scandal, and given the huge implication of that affair on American confidence in the President, and the way in which it gripped the attention of readers and watchers worldwide, the presence of the political scandal as a cultural phenomenon is worthy of study. Thompson acknowledges that for many academics, scandal constitutes ‘the froth of social and political life’ (2009, p.5), and can obscure the ‘real’ political and social events – the things really worthy of study. As he goes on to argue, scandal is one of these events, and should be considered ‘a social phenomenon in its own right’ (2000, p.6). From this solid starting point, Thompson embarks on a survey which ranges widely chronologically, if not, and this is to be regretted, geographically, and raises important questions about the role of media outlets in shaping contemporary political and public debate, and the changes in communication media that have brought scandals to the forefront on political life. What could have dissolved into an encyclopaedic treatment of notable political scandals ends up as a tight and thoughtful analysis, as the author undertakes a thorough analysis of the nature and importance of political scandals, and develops some theories as to their consequences. In the first three chapters he deals with the nature of scandal, and for the duration of the work he analyses scandal as a phenomenon and tries to explain their prevalence. In doing so, Thompson is to be commended for the wide range of sources used. His research was clearly exhaustive, covering not only traditional print media, bu t also biographies and autobiographies of key players in scandals, and television broadcasts, committee reports, and historical works. His scholarship is formidable and evident throughout. Thompson openly concedes that his account is limited, by and large, to scandals in the Anglo-American world, but gives little justification for this. He certainly remains within his area of expertise at all times, but this study could have benefited from parallels drawn between scandals in the UK and America and those which have unfolded elsewhere. Certainly, the Anglo-American political scene seems peculiarly susceptible to political scandal, perhaps because of the nature of its intrusive media. However, the second part of this book, in which Thompson develops an analytical framework and reflects on the issues raised, would have benefited from some comparisons with scandals elsewhere. Perhaps the role of scandal in post-war Italian political instability, or its role in discrediting some African p residents, would have been pertinent subjects for further exploration. Nevertheless, within the parameters he sets for himself, Thompson produces an effective and comprehensive work, and the framework he sets out for classifying, identifying and theorising about political scandal could doubtless be applied beyond the Anglo-American experience. Thompson traces back the etymological origins of ‘scandal’ to its Judaeo-Christian roots, and carries it through to its first appearances in English in the 16th

Monday, November 18, 2019

Impact of International Trade and Globalisation on Corporate Strategy

Impact of International Trade and Globalisation on Corporate Strategy - Essay Example This word of "Globalisation" is not strange to a lot of people. The globe is getting in imperative respects, a solitary social arrangement owing to globalization which is made up by the association and interconnection amongst the societies and states. Such association and linkage is a multi-dimensional course but not the latest one -in the end, of19th century, there was previously unfasten global financial system, with a great deal of business, including business in currency (Gratton, Hope, Stiles & Truss C, 2008, 45). The blurry perception of globalization has been clearly explained in financial vocabulary. Corporate globalization may be viewed as the movement of items, services, and money assets or savings across global boundaries and in this manner turned into a predominately financial happenings of the world, all over which, national organisations develop into international corporations and countries are no longer seen as self-governing and closed monarch states, but as a fraction of single large financial system. If we abide by the 'best fit' theory in order to achieve the objectives of the corporate strategy, these elements must be continuously linked back, in order to reflect the business strategy employed. 1. Employee relations. This relates to the partnership between employers, and employees. It has strong connotations of 'involvement' and several key theorists advocate that without this, the strategy cannot work; it must demand a commitment to overall objectives and be practiced on every level of the business. (Macdonald, 2006, 07).

Saturday, November 16, 2019

Gigabit 10 Gigabit Networking Applications

Gigabit 10 Gigabit Networking Applications Ethernet Ethernet technology refers to a packaged based network that is most suitable for LAN (local area network) Environments and includes LAN products of the IEEE 802.3ae. 10 Gigabit Ethernet standards which is an up gradation on all other earlier versions, works on an optical fibre and operates in full duplex mode (Held, 1996). The IEEE 802.3ae is an upgraded version of the IEEE 802.3 base version developed as early as 1980. Ethernet technology originated nearly 30 years ago as a least expensive high-speed LAN based option (Ferrero, 1996). Ethernet defines the CSMA/CD protocol and is currently used in major LAN-based settings. Ethernet has the advantages of low implementation cost, simplicity and ease of installation and maintenance, reliability and compatibility with LAN based networks. Almost all Internet traffic generates and terminates with an Ethernet connection, which has been adapted for higher speeds and the volume of traffic over the Internet. Ethernet technology is rapidly changing and the new 10 Gigabit technologies maintains certain older characteristics like package format and at the same time adapts itself to faster connections, higher speeds and more efficient handling of internet traffic. The newer versions of Ethernet like the Gigabit Ethernet and10 Gigabit technologies have wide-ranging applicability in LAN, WAN,MAN and SWAN (Axel son, 2003). We will discuss these points in greater detail in the dissertation beginning our discussion with a brief description of Ethernet technology, its history, modes of operations, Gigabit architecture and applications and the rise of the 10 Gigabit technology in Ethernet applications. In our final analysis we will analyse the uses of Gigabit technology and the advantages involved. We would also discuss the market demands as far as setting up the new technology in business and enterprises is concerned and conclude with a final short summary giving the prospects of Ethernet and Gigabit Ethernet in this information savvy New Age. Ethernet Technology: Ethernet tends to connect computers using hardware that could be used on different linking machines and workstations. It differs from the Internet because the Internet connects remotely located computers with telephone or cable line or a software system. Ethernet uses software but connects in LAN on the basis of hardware and the Ethernet patent is referred to as the Multipoint data communication system with collision detection. Ethernet was the first technology that could connect through LAN hundreds of computers located in the same region or building(Spurgeon, 2000). Ethernet technology can be used on optical fibre and twisted cables and it operates on a half-duplex and in recent versions, full duplex mode. There are three major varieties of Ethernet and these are Gigabit Ethernet, 10Base T Ethernet and Fast Ethernet that supports data transfer rate of 100mbps. Ethernet uses a star or bus topology and supports a data transfer rate of 10 mbps. The CSMA/CD protocols aroused to handle simultaneous demands and workloads. The newest Gigabit version supports a transfer rate of 1000 megabits per second and thus has a speed of a 1000mbps. Ethernet is the most widely used LA standards. Ethernet specifications are used in IEEE 802.3 standard software and specify physical software layers within the system. Ethernet is used in nearly 90% of LAN workstations and LAN-connected PCs in the world (Lee and Lee 2002). Although Ethernet is the most popular physical layer of LAN technology that is in use, the other common LAN types include the Token ring, Fibre Distributed Data Interface (FDDI), Local Talk, Asynchronous Transfer Mode or ATM, Fast Ethernet, a more advanced variety of Ethernet and Gigabit technology. Ethernet helps in giving a high-speed connection along with the ease and convenience of installation and maintenance. Ethernet applications and installation are comparatively inexpensive and it has wide applicability and compatibility with LAN and other widely used networks but LAN is the most popular compatible networking. Ethernet inacceptable in the computer market and supports all popular network protocols making Ethernet the ideal networking technology for all computers used at present. The Ethernet standard is set at IEEE 802.3,deriving its name from the Institute of Electrical and Electronic Engineers (IEEE), which defines this, standard. An adherence to the standards can ensure the efficient communication and links between the networking equipment’s and the networking protocols. The IEEE standard802.3 defines the rules for configuring an Ethernet network and also specifies how the elements in an Ethernet network can actually interact with each other. Brief History about Ethernet: Ethernet originated nearly 30 years ago when Xerox corporation used an experimental coaxial cable network with an original transfer rate of just 3 mbps using a CSMA/CD (carrier sense multiple access/collision detect protocol that could be used in then existing LAN and that could support some heavy traffic. This experimentation and development of the first Ethernet technology received some attention and around 1976-1980,DEC (Digital Equipment Corporation) and Intel joined Xerox Corporation to develop a LAN architecture that supported a data rate of 10 mbps. This was the Ethernet version 1.0 specification and the original version of IEEE 802.3 was also based on this initial Ethernet version specification. The draft of IEEE 802.3 version received its approval in1983 and was specified as an official standard by the IEEE in 1985.Ethernet and IEEE 802.3 and all versions of these are ultimately compatible, derived from and improved versions of this basic version of original Ethernet technology. A number of supplemental versions and technologically upgraded and advanced versions have been used to support higher data transfer rates. Thus Ethernet technology saw gradual development with a gradual LAN technology development in the1970s to the formation of IEEE subcommittee and approval of Ethernet version IEEE 802.3 later declared as standard in the 1980s. This was upgraded further with the development of Fast Ethernet and an associated speed of 100 mbps in 1995 with the final 1000 mbps Gigabit standards approved in the middle of June 1998. Ethernet Explained: A general description of what is Ethernet and how it works can be given as Ethernet seems to be based on the idea of a group of people within the same location and on the same network sending messages through a radio system and using a common wire or channel and this has been referred to as ether, a supposed medium that 19th century physicists believed helped in the propagation of light. Each member in the system seems to have a 48-bit key MAC address assigned to the network-interface card and this makes sure that all systems within the Ethernet network have their own distinct addresses. As Ethernet is found and available and compatible nearly everywhere with wide ranging applicability, manufacturers tend to build the functionality of an Ethernet card directly into PC motherboards, which are printed circuit boards used in personal computers, also known as main boards. In the initial stages of its development and discovery, Ethernet used shared coaxial cable, which was found in the building attached to every connected machine brought within the system. All computers in a building were connected to an attachment unit interface (AUI)transceiver and this in turn connected to another cable. A simple passive wire was used for small Ethernets and was considered not quite applicable to large extended networks as any damage to the wire could actually make the Ethernet segment dysfunctional. Within the Ethernet technology, the systems are run in such a way that all communications between PCs, happen along the same wire, and information transmitted bygone computer is received by all computers in the network even if the information was meant to go only to one computer or specific destination. The interface card of the network filters out all information that is not originally addressed to the entire network and the CPU is interrupted when applicable packets are received. This information sharing by all computers is considered one of the weaker points of the shared medium of Ethernet since any node within the entire network connected by the Ethernet can dig out information that seems to have been originally meant for a single location. Thus all traffic within the single wire used for the technology, can be intercepted and manipulated. A single cable thus has its ups and downs because not only is there an information security risk with such networking, the bandwidth is also shared so after a power failure or are start, traffic can crawl to a point that it can cause a slowing down of information transmission and data transfer due to too much crowding within a single wire. The computers with an Ethernet connection networking share the channel using the CSMA/CD technology that stands for Carrier Sense Multiple Access with Collision Detection. The CSMA was first developed and used for ALOHA net in Hawaii and is comparable to token Ring and master controlled networks we have discussed here. An algorithm is generally followed when the computers transmits data and there can be several commands from start, transmitting, end transmission, wire busy, to wire idle and transmission stopped or maximum transmission attempts exceeded. In this way, a medium, the Ethernet is chosen through computers try to transmit information. When there is too much traffic, there is an apparent cessation of these attempts, which renews again after a random period of time. This aid in avoiding collision and an exponential increase of back-off times are used when there is more than one failed attempt of transmission. Depending on the type of medium used Ethernet segments can have restricted size. A 10BASE5 coax cable can only have a maximum length of500 metres. An Ethernet repeater can be used to have a bigger length cable and this device uses the signal from one Ethernet cable and repeats it into another cable. This way Ethernet repeaters can be used to connect up to five different segments with a maximum three of these devices used as attached devices. Since many segments are connected, cable breakages can be handled more efficiently. Thus when any one of the Ethernet segments breaks off, most of the devices are unable to communicate as connections are broken, however Ethernet repeaters allow the workings of different segments separately which can continue to work despite the cable breakage in one part of the network (Quinn,1997). Ethernet segments can usually be terminated with a resistor at both its ends within the network and as for the equipment’s used, each end of the coaxial cable must have 50 ohm resistor and head sink and this is called the terminator affixed to an N or BNC connector. When resistors are not used, it is usually perceived as a cable breakage and consequences will be such that the alternating current signal transmitted will be reflected and as a reflected signal is indistinguishable from a collision, similar results as in collision will take place with complete cut-off of all communication between the units. When Ethernet repeaters are used electrically different segments can continue to function even in isolation as separate units and this helps in regenerating and retiming the signals (Field, et al 2002). Most repeaters have an auto-partition function and this means they are capable of removing and isolating a segment from service when there are too many collisions, breakages, and traffic or when the collisions last too long. This is done to prevent the other segments from getting affected by such collisions or breakages and once there is a renewal of activities that are smooth and without collisions, the Ethernet repeaters reconnect the unattached segment to the original network. The advantages of using cables in the star Ethernet system has been used effectively by net workers who create Ethernet repeaters with multiple ports known as Ethernet hubs or fan outs that could be connected to other hubs or coax backbones. The earlier hubs were also known as multiport transceivers and DECs DELNI is one such example of an Ethernet fan out. Multiport transceivers allow the sharing of single transceiver by multiple hosts having AUI connections. This also allows the working of a standalone single Ethernet segment that does not essentially require a coax cable. Companies such as the DEC and Synoptic sold many multiport transceivers that could connect many10BASE-2 thin coaxial segments. However, coaxial Ethernet segments have been made obsolete by the development of unshielded twisted pair cables(UTP), which began with Starling and continued with 10BASE-T. The new developed of the unshielded twisted pair variety allowed Cat-3/ Cat-5cables and RJ45 telephone connectors to connect the fan outs to the ends. This further helped to replace the coaxial and AUI cables. Unshielded twisted pair Ethernet takes the termination problem into consideration and every segment is taken separately so that the termination could be built as a hardware component without requiring special and separate external resistor. However despite the development of the star topology, Ethernet networks use a half-duplex transmission access method and also use the CSMA/With minimal cooperation from the hub that deals with packet collisions. Every packet transmitted is sent to every port and node of the hub so what really remains are bandwidth and security problems due to this open information sharing, so to speak. Since the chance of collisions is proportional to the number of transmitters and the data that have to be transmitted, implying that the larger the amount of data sent, the higher are the chances of packet collisions. Modes of Operation: The Ethernet network elements have interconnecting media and network nodes which basically falls into two major classes known as the Data terminal equipment (DTE) which are the PCs, workstations, servers, and are usually the destination or source of data frames often referred toast end stations; the other category of network node is the Data communication equipment (DCE) that are the standalone intermediate devices such as the repeaters, interface cards, modems, switchers or routers (Hancock, 1988). The DCEs are intermediate network devices that receive and forward data frames across the entire network. The traditional Ethernet and IEEE 802.3 variety works in a half-duplex mode. For the other mode of operation as in Full-duplex CSMA/CD is not used. Auto-negotiation is another mode of operation for the Ethernet. Half-Duplex Mode of Transmission/ CSMA/CD Access Method: The Half-Duplex mode of transmission was developed in the original version of IEEE 802.3 Ethernet application and the CSMA/CD is considered as a means by which two or more stations could share common media in an environment that is switch less and does not require arbitration, or assigned time slots to indicate when workstations are ready to transmit information. This means that individual Ethernet Macias capable of determining when it can send a frame. The CSMA/CD access rules are given in the full form of the CSMA/Protocol as it involves Carrier sense multiple access and Collision Detect. Carrier sense implies that each station continuously keeps alert for traffic on the medium to determine when gaps between frame transmissions are seen. ‘Multiple access’ refers to stations that may begin transmission any time they detect that there is no traffic and the network is relatively quiet. Collision detect acronym implies that when there are two or more stations in the CSMA/CD network and if they begin transmitting data at the same instance the streams of bits from each of the workstations will collide with each other and both the transmissions which collide will then become unreadable (Halaby and McPherson, 2000). Each transmitting station should be able to determine and detect that a collision has taken place before the station has finished sending its frame. Each transmitting station then must stop transmitting any further data as soon as a collision is detected and then this workstation must show a state of abeyance in its activity for random length of time determined by a back-off algorithm before attempting to retransmit the frame all over again. In certain situations when two distant stations on the network need to send a frame and the second station does not even begin transmitting until just before frame of the first station arrives. In that case, the collision is detected immediately by the second station yet the first station does not detect it until the corrupted frame signal goes all the way to the station. The time required to detect a collision can reach a twice the time required for the signal propagation between two distant stations on the network situated at farthest points (Quinn,1997). This suggests that the maximum collision diameter and minimum frame length are directly related to the slot time and longer minimum frame lengths translate to longer slot times and larger collision diameters where the shorter the minimum frame lengths are they correspond to shorter slot times and smaller collision diameters. There was growing understanding and need to reduce the impact of collision recovery and the need for network diameters to be large enough to accommodate networks, which are large, sized. The general consensus was to choose the maximum network diameter of around 2500metres, and to set the minimum frame length to ensure that all potentially damaging collisions are reported quickly. This system worked for 10mbps speed of Ethernet but for higher transfer rate Ethernet connections and developers such as the Fast Ethernet, backward compatibility with earlier Ethernet networks were necessary and this involved the inclusion of the existing IEEE 802.3 frame format and error detection procedures as also all the networking software and applications which could run on the 10mbps networks (Quinn, 1997). For all transmission rates, the time required to transmit a frame is inversely related the transmission rate and at 100 mbps, a minimum length frame could be transmitted at one tenth of the defined and original slot time and so any collision that might occur at this time would go undetected. The maximum network diameters used and specified for 10 mbps could not be used for 1000mbps networks. Fast Ethernet networks and connections help in reducing the maximum network diameter by more than 200 meters. This problem is also seen in the Gigabit Ethernet, as there is a decrease in network diameters by a factor of 10to more than 20 meters for 1000 mbps operations. This is however potential hindrance although as a solution the same maximum collision domain diameters were used to increase the minimum frame size adding an extension field to frames shorter than the minimum lengths. Full-Duplex Mode: The full-duplex mode allows the simultaneous two way transmission of data along the same or one link. The full-Duplex mode is an MA capability that allows the two-way transmission of information over point-to-point links. This Full-duplex transmission is functionally much simpler than half duplex transmissions as no collisions, media contentions, schedule retransmissions and extension bits on short frames ends are involved. Since there is a reduction is the procedural complications, more time is available for transmission and there is also a doubling of link bandwidth and each width is capable of supporting full-rate, simultaneous two way transmission of data frames and each transmission begins as soon as frames are ready to send. The main restriction is inter-frame gap between two successive frames that has to be of a minimum specified length. Usually all frames conform tithe Ethernet standard frame formats. Ethernet Types: Apart from the broad varieties of Ethernet types that transmit data at10mbps (Ethernet), 100mbps (Fast Ethernet) and 1000 mbps (Gigabit Ethernet), 10 Gigabit Ethernet and the earlier varieties such as Starling, there can be variations in the Ethernet frame types as well. We give a brief description of Ethernet types below. The earliest and first varieties of Ethernet was the Xerox Ethernet which was the original 3m bit per second Ethernet implementation and had versions 1 and 2(Hall, 2003).The framing format version 2 is stilling use. The other earlier Ethernet application 10BROAD36 is now no longer used although it was one of the earlier standards supporting Ethernet overlong ranges. The broadband modulation techniques are similar as founding cable modems and systems operated on coaxial cables. Starling or 1BASE5 as the first Ethernet implementation on twisted paired wiring and operated at 1mbps speed. This was gradually replaced by the other versions. Among the more recent versions of the 10 mbps Ethernet is the 10BASE5that uses thick net coaxial cables also called thick wire or yellow cable is the original implementation of the 10mbps Ethernet. Transceivers could be connected using a vampire tap and connecting the core and the screen with N connectors. There is a cable that could be used to connect the transceiver to the AUI or Attachment unit Interface. This type of Ethernet can have 5 network segments with 4repeaters, with three of the segments that could be connected to the network. The bus topology is used here and the maximum segment lengths 500 meters with the overall length at 2500 metres. The minimum length between nodes is stipulated at 2.5 metres with the maximum number of nodes per segment at 100. This system is obsolete as of now. 10BASE2 uses the thin net coaxial cable, also called the Thin wire or Cheaper net, a BNC connector and bus topology with a terminator at the end of each cable. The cable specified for its purposes is RG-58 A/U orRG-58C/U with a 50 ohms resistance. the 5-4-3 rule is applicable here meaning like the 10BASE5 Ethernet there are 5 network segments, 4repeaters and 3 of these could be connected to computers. 185-200metres is the maximum length for each segment and each machine uses at-adaptor to connect with a BNC connector. Although signal quality is considerably reduced with each barrel connector, barrel connectors could be added to link the smaller cable pieces in the network. Length between nodes is given at a minimum of 0.5 meters. This is one of the more widely used Ethernet applications. The Starling which was the first Ethernet twisted wire implementation later evolved into 10BASETwhich comprises of 4 wires and two twisted pairs with a Cat-3 or Cat-5 cable of up to 100 meters in length. At the middle of the connection is a hub or switch, which has a port for each node. The 10BASET uses star topology and as we mentioned 2 pairs of unshielded twisted wires. This category of the Ethernet is not subject to the 5-4-3 rule and can use 3, 4 or 5 cables with the best performance given by category 5 cable. The maximum segment length here is 100 meters. Maximum number of connected segments can be nearly thousand. The minimum length between nodes is 2.5 meters. Whereas only1 node can be present in every segment using the star topology, this system uses RJ-45 connectors. 10BASEF is the generic name for 10 Ambits/s Ethernet standards using fibre optic cable extending up to 2 mms in length. The number of network nodes can be 1024 with a maximum segment length of 200 meters. Specialized connectors for fibre optic cables are used here. This has three main varieties: the 10BASEFL is an updated and more advanced version of the FOIRL standard. FOIRL is the Fibre-optic inter-repeater link and the original standard for Ethernet on fibre optic. This Ethernet type is used to connect computers in a LAN setting a task not done mainly due to the incurring costs. This is the most widely used of the 10BASEF Ethernet type. The 10BASEFB that has never been used serves as a backbone between hubs. The 10BASEFP is a star network that does not require a repeater for its connections connect a number of computers with hubs and switches and gets cable distances up to 500metres. The 100BASET is also known as the Fast Ethernet and is a generic term for any of the three standard varieties if Ethernet that transfers data at 100mbits/s over twisted cables up to 100 meters long. These three varieties include 100-BASETX, 100BASE-T4 and 100-BASET2. Fast Ethernet uses RJ-45 connectors and star topology. The CSMA/CD media access issued here. The minimum length between nodes is specified at 2.5 meters. With 1024 maximum number of connected segments possible, the IEEE802.3specification is used. The 100BASETX is a star shaped configuration similar to 10BASE T and uses two pairs of wires and Cat-5 cable to achieve the 100mbit/s speed. 100BaseTX requires category 5 two pair cables and the maximum distance of these is given at 100 meters. The100BaseT4 requires a category 3 cable with 4 pair and maximum distance of these cables is 100 meters. This system uses a Cat-3 cabling and uses all four pairs in the cable limited to half-duplex access methods. As now the popular Ethernet cabling is the cat-5 cabling, his is now considered obsolete. The final variety 100BASEFX is a 100mbit/Ethernet type that uses a multimode fibre. The maximum length specified here is 400 metres for half-duplex connections and 2 mms for full duplex connections to ensure that all collisions are detected.100BASEFX can thus use fibre optic to transmit up to 2000 meters and for this purpose it requires two strands of fibre optic cable. 100VG LAN is also another Ethernet variety that uses star topology, a series of interlinked hubs and RJ-45 connectors. In addition to Ethernet packets this implementation also supports the Token ring packets and has an IEEE 802.12 specification. It requires 4 pairs of category 3 cable wires and the maximum distance covered is 100 metres(Held, 1996). However with a category 5 cable 150 metres could be reached. Additionally the fibre optic can be used to transmit data up to 2000 metres. We next turn to Gigabit Ethernet Technology, which being a new and improved version of Ethernet altogether requires a separate section. Gigabit Ethernet Technology: Also known in its abbreviated form Gibe, the Gigabit Ethernet technology describes the implementation of Ethernet networking and transmitting ate speed of one or more than one Gigabit per second. Gigabit Ethernet is supported with the use of optical fibre and twisted pair cables and the physical layer standards in this category includes 1000BASET. 1 Gaps issued over a category 5 cable with copper cabling and 1000BASE SX issued to attain for short to medium distances over fibre. The first Gigabit Ethernet standard was set at the IEEE 802.3 standard in 1998.Its relatively recent launch suggests that the Gigabit Ethernet is the latest version of the Ethernet, which is the most popular and widely used computing network worldwide (Katsambis, 1998). The Gigabit speed of1000 mbps of raw bandwidth is 100 times faster than the original Ethernet version of 10mbps and its greatest advantages lies in the fact that it is compatible with existing Ethernets and uses the existingCSMA/CD and MAC protocols. Gigabit Ethernet competes directly with ATMas far as market competition is concerned. It is deployed in high capacity backbone network links and for small installations Gigabitspeed is not yet necessary. Gigabit Ethernet has been used in desktop technology in apple computers, Power MacG5, Apples power notebook and is also being built into Pentium boards. One of its desktop features includes professional video editing. Gigabit Ethernet has been outsmarted by the 10gigabit Ethernet technology, which is the fastest Ethernet standard that became fully operational in 2002. Introduction to Gigabit Ethernet Our discussion on Gigabit Ethernet began by providing a brief description of the Gigabit technologies and the main characteristic of this upgraded Ethernet variety. The transceiver used for Gigabit Ethernet is the GBIC also known as the Gigabit Interface Converter. Thebe measures 8.5 mm by 13.4 mm and has a depth of about 50mm. A hot swap standard electrical interface of a one Gigabit Ethernet port can support any physical media including copper to 100 km of single mode fibre. The standard Gigabit Ethernet system operates at 1000 Mbps speed of transfer of information (Norris, 2002). The 802.3z is the standard that describes the specifications for fibre optics for the 1000BASE-XGigabit Ethernet system. The 802.3ab standard describes specifications for the category 1000BASE-T twisted pair Gigabit Ethernet system. This rate the major two varieties of Gigabit Ethernet technologies used. The10 Gigabit Ethernet is a further up gradation and has speeds reaching10000 Mbps. According to Frazier, the chair of the Gigabit Task Force developing the Gigabit Ethernet technology has been challenging and hard work mainly because this new technology aimed at developing a standard that scales the operation of Ethernet networks to 1000 Mbps while retaining the known characteristics that are compatible with Ethernet and that have made Ethernet the dominant-local area network (LAN) technology. The Draft D3.1 of the P802.3z was approved in a letter ballot of thieve 802.3 working group and this was only possible when an approval rate of 75% was obtained from the working group. The protocol layers in802.3 standards are the areas that have been developed and modified in802.3z version (Riley and Braver, 1998). The 100BASE SX and 1000BASE Fibre optic transceiver specifications have already been highlighted here. The 1000BASE-SX specifications for short wavelength laser transceivers uses 62.5 micron fibre and supports multimode fibre optic links of up to 260 meters. The 50 micron fibre can be used to support multimode fibre optic links of up to 550 metres. The 1000BASE Supports installations at longer distances and uses higher cost components with 62.5 micron fibre used for 440 meters and 50 micron fibre on 550 meters. On a single mode fibre, up to 3 mms of fibre optic links are possible. One of the latest technologies 1000BASE-CX that supports copper cabling links of 25 metres, is included in the 802.3zspecification for transceiver technology. Frasier goes on to describe that the Gigabit Ethernet encompasses the new full-duplex Media Access Control (MAC) and the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) MAC. The full duplex operation takes advantage of the contention free access and flexible topologies and the 802.3z used the CSMA/CD MAC to work at an extended range of 1000Mbps. This was done with the aid of a technique known as ‘carrier extension which was added to the CSMA/CD to overcome certain limitations of the algorithm that was based on the rule that the roundtrip messaging time between two workstations could not be higher than that required to transmit the smallest frame. To improve the throughput of Gigabit CSMA/CD LANs, frame bursting was introduced as an optional feature. In the early stages of deployment of the Gigabit Ethernet it is mainly being used to interconnect high performance switches, routers and servers in LAN backbones. The full duplex operating mode is suited for this type for application environment and is favoured over the CSMA/Chalk duplex mode. This also ensures that high performance desktop computers can take advantage of high peak bandwidths of repeating hubs that are cost effective. Frasiers claim also points to the fact that gigabit technology may be more compatible with full duplex rather than half-duplex modes of Ethernet operation. The 10 Gigabit Ethernet is full-duplex technology and the half-duplex access mode cannot be used for its purposes. T

Wednesday, November 13, 2019

Why Launch An Advertising Campaign :: essays research papers

Why Launch An Advertising Campaign To start off, when your company is just becoming established in the British market, consumers will have no knowledge of your product, we must encourage or persuade the consumer to buy your product. To make customers aware of the product we must advertise. Large scale advertising mainly consists of advertising on TV, Radio, newspapers and other large scale media. This ensures that advertising reaches the largest amount of people in the shortest amount of time. It is likely that the consumer will be more interested in the product if they hear of on a national level such as TV or Radio. We must watch out for other companies in Britain that sell a similar product or overseas companies that sell in Britain so Pakanawa can analyse the British marketing strategy and improve upon it. Market Segmentation is also another factor to take notice of. Market segmentation helps to differentiate products for different age groups. For most product, there are segments of the market that you need to specifically advertise to. Fore example, different methods of advertising would be needed if you were to advertise to parents than to the children. For a lot of products their are a lot of age groups that you need to advertise for and these must be taken into consideration. We must analyse the different market segments that are applicable to Pakanawa and investigate how we can exploit these different market segments. An ad campaign is a very sensible idea because no-one will know about our products without the use of advertising. This means that we must concentrate on a good ad campaign so people will know about our products. Approximate prices are shown below for large scale advertising: TV  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Price agreed with company (500,000 + ) Radio   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (250,000 + ) Newspaper lineage ad  Ã‚  Ã‚  Ã‚  Ã‚  250 Newspaper full page  Ã‚  Ã‚  Ã‚  Ã‚  700-900 Cinema booklets  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  650.00 per cinema Flyers 0.08 per flyer As is shown above, advertising is very expensive when done on a large scale so to justify any form of large scale advertising it must be proven to be effective. At Pakanawaâ„ ¢ we must consider all angles of the media and come to a conclusion about advertising. What sort of advertising should you use? By far the most far reaching of these strategies is Television advertising. A large amount of people watch TV and this type of advertising will reach many social groups. Although this type of advertising is very expensive and even more so during peak times, TV advertising should be seen by the masses and encouraging a lot of new customers, so in time, TV advertising will pay for itself.

Monday, November 11, 2019

Advance Color Photography

A photograph is a frozen second in time, a token of a memory. If one would really look at any picture, however, a photograph is more complicated than that. Without formal education regarding photography, one cannot fully tell what a good photograph is by simply looking at it. Most of the time even, people say that it is a nice picture if their faces were not construed and their bad angles well kept.People don't often find the difference between black and white pictures and full color pictures. It could be that, in this day and age, color can be considered as a basic necessity, something that can sooth the senses. Likewise, color photography is a technology that allows us to maximize how we keep our memories, which is how we remember it: in full color.In this photography class, we have learned that wasting film is not exactly as it is. With every click of the shutter, we practice. At first, it was quite challenging how one can use an SLR, a camera an average person assume professional photographers use.Although there is much truth in their assumptions, not all the best photographs are taken using such a camera. A simple point and shoot camera can create the best photographs if the handler knows what he is doing.A photographer should know the three basic principles in taking high quality photographs: composition, depth of field, and exposure. Although a point and shoot camera cannot maximize the latter two principles, the composition of an image is the most important element in photography. This is due to the fact that the shutter speed and exposure levels are the elements that gives better effects to pictures.Furthermore, to become a skilled photographer, one should be aware of the other equipment used. A tripod is a fundamental component in taking good pictures. In settings with poor lighting, it is necessary to use a tripod if the camera does not a have a flash, or if it is a kind of night photography. The tripod assists the artist to take clear pictures. A sh aky hand hinders one from capturing a crisp photograph.Different lenses further allows photographers to be more specific in taking pictures. If their object relates to sports, we will need extra lenses that can zoom into moving objects, while maintaining that crisp look. These different kinds of lenses can be necessary for the different specializations different photographers have: portraits, landscapes, architecture, night, still life, journalism, and sports, to name a few.Although I did not learn everything I could have in one course, I have browsed photographs and some basic techniques online. Access is quite easy, and I believe I have the right the maximize this.By taking into my formal studies the extra curricular information I attained, I am able to explore and execute different styles. Other means of sharpening my eye in finding a good photograph was through looking at magazines, newspapers, ads, and even those brochures I can come across.I was browsing in the internet for so me of the best photographs in the recent history when I came across an address that showed the best picks in the year 2005. C.L. Garvin of The Register Herald was one of the artists included in their list.Among all those listed, her photograph was the most serene looking. Her photograph consists of a reflection of a willow, with fall floating on the surface of the water, with the sky as the overall background. The different techniques she incorporated in this photo are also applied by the other photographers in that category.The difference was how they were incorporated. The composition and total appeal of the photograph also brought about its success.In class, we also learned the difference between snapshots and photographs. Snapshots are those pictures we take during parties, special events and documentations hastily. They are usually taken with a simple automatic point and shoot camera without considering the other elements that will make it art.Photographs are taken with a caref ul eye. It doesn't matter if the photo was taken quickly, as long as the photographer keeps in mind the basic elements as he angles his camera to the scene, then it can become art.In color photography, we highly give importance to the role of color to the totality of the image. The different colors used in the composition of the photograph generally sets the mood or tone of the photograph, much like how anything is visually affected by the use of color. In photographs, shades of blue are cool colors, which represent serenity.Warm colors such as yellow and red represent energy, and earth tones are relaxing. The mixture of colors may represented something greater. This means that in taking photographs, the composition of the shot includes balance between the elements and color use.Given that color use in taking pictures can break or make the photograph, the choice of colors to use in the frame is quite vital. The purpose of taking a photograph is not just to freeze time, but also to h ave it represent something more than that, like emotions and thoughts. It is not simply taking a portion of our memories, but also giving it a justifiable aesthetic value.The basic idea is to capture, along with everything within that moment framed. A photographer should also keep in mind the harmony of colors, and how each complement the focal image of the frame.Some experienced photographers will say that those who wish to become an accomplished photographer should simply take a camera, look through the viewer, find an object and press the shutter. That is putting it too mildly. True, some of the best photographs have been taken in an instant.This does not show luck at all, but quick thinking. Moreover, any photographer will not take just one frame of one composition. It can take three frames to 3 rolls to achieve the desired composition and effect of the picture. What is important is that the artist can think fast and be observant enough to find his point of attack.There are basi c guidelines to follow in creating a good photograph. It was mentioned earlier that there are equipment involved. Composition has been long established as a basic principle.However, there are other ways to point the difference between a good and a bad shot. According to another website I came across, the other points one should consider in taking and deliberating the quality of photographs include: irrelevant elements, rule of thirds, lines, frames, camera shots and camera angles.Irrelevant elements include those objects that are not involved in the composition but happened to be captured within the frame. This is unfortunately something we cannot always make do without, especially in a very busy scenario. For example, one picture is focusing on children playing in the park.Parents often see this as a perfect time to have their cameras with them. They bring out the camera and start taking their pictures. Luckily in this age of user friendly digital cameras, one can immediately revie w the shot they took.However, in the time of film, we sometimes find ourselves frustrated when the best picture becomes a disaster as somebody's elbow get in the way, the shot was blurry, or if they weren't even in the frame. It happens, and is often depressing, to find that we don't really know how to take good pictures.The rule of thirds basically imagining dividing the frame into nine boxes, two lines horizontal, and two lines vertical. The idea is to always have this imaginary grid in place every time a picture is being taken. This grid tells us that we should never put the main focus dead center.By putting the focus along these lines, we create a more balanced photograph. The illusion adds depth to the entire image of the photograph. The focus of the photograph would seem out of place if it is at the center of the frame. It will look odd and unattractive.Lines in photographs are elements that adds drama and excitement. It has been said that this technique is quite challenging t o master due to the complexity it adds to the total appeal of the photograph. There are two kinds of lines used in photographs: explicit and implicit. Explicit lines are those close up details of objects, which if taken from a certain angle can be very beautiful.On the other hand, implicit lines are those that are implied in the photo. These lines are also considered as invisible lines because one cannot really see it. These lines have been incorporated from the moment the frame was being composed by the photographer. Furthermore, these lines are not always considered when the photographer takes a picture. Subconsciously, these lines become a guide on how the audience will look at the image.Framing involves what we call the headroom. This element pertains to the space between the edge of the frame and the focus. Also related to the rule of thirds, if the focus of the photograph is not situated in a way that it fills the frame completely. If not, the object should be strategically pl aced that if it doesn't fill the frame, other objects will make up for it. The idea is always to have balance and aesthetic value.Camera Shots will refer to distance of the camera to the object. There are different camera shots a photographer can explore: extreme long shot, long shot, medium shot, close up shot, and extreme close up shot. These shot usually involve a person as reference. Extreme long shot will look like the picture was taken from afar, and the person is only a small percent of the frame.Long shot refers to fitting the person from head to toe within the frame. A medium shot will refer to half the anatomy. The close up shot will refer to the area from the chest up, with sufficient headroom. Lastly, the extreme close up shot would be a very tight frame of a person's face. One should always remember, however, that the frames should never divide the body of a person in a frame at the joints: knees, waist, elbow, and neck.The last of the basic principles discussed by the website I found and was much used as well in class is the camera angle. Five different angles was discussed. The first refers to how the viewer seems to be interacting with the object, this is called a subjective angle. An objective angle on the other hand, refers to how the object is involved his own environment.The other three angles will refer to the point of view of the camera. The first of these is the low angle, where the camera is taking a picture from the lower areas of the object. This gives the object a sense of power and strength.The second angle would be the high angle wherein the camera takes a picture from above the object, giving it the opposite appeal: submission and weakness. The last angle discussed is the oblique angle. Quite an interesting point of view, an artist can explore a lot of different angles that can be both dramatic and playful.However, once a picture is taken, it isn't a quality photograph yet. How pictures are   printed are also taken into consider ation. In this digital era, we can print color photographs in our very homes. Technology really made it easier for us.From our cameras, we upload our photos in computers for retouching and cropping. For black and white photographs, there are specific chemicals used to develop the film, and from that film onto paper. Darkrooms and enlargers are used.However, for colored photographs, conventional printers and photo papers can be used. To have a more than satisfactory output of these pictures, the kinds of printers and papers should be of top quality to have the desired outcome. Today, the different colors used to print are abbreviated as CMYK (cyan, magenta, yellow and black). These colors are mixed to form the different colors of the spectrum, producing colorful photographs.The choices made by the photographer regarding these factors in printing highly affect the output of the picture. It is only logical that way. If pictures are printed on low quality papers, through a rather cheap machine, then what else can we expect at the paper tray? If we are really after the best quality, then we should go all the way. Making use of substitutes will not promote everything we desire.Realism in photography is quite a rampant style today. Traced to where photographs are still in forms of paintings, realism is a style which portrays real life: problems, physical appearances, and sometimes morals, as listed by the website aHUNTFOR.Apparently, this style is also used in advocacies and statement artworks tody. The general context involved in realism boils down to the emotions: the feelings during hardship and likewise happiness. It paints reality of that time.When realism first came out as a style of art, all the neglected aspects of their lives were given light. Anyone today can produce quality photographs due to the convenience technology offered. All the other emotions and overlooked issues were given light. This explains the passion people express through advocacy photograp hs. Since they are given the liberty to express themselves, so share what they see through their lenses.This course taught me so much. What I have written here only involves the technical aspects of photography. These are the basic knowledge I need in constructing my own little masterpieces in full color. Printing them out through conventional printers or those in the high end series can only support my photograph. But what matters is my idea is expressed through such a creative means, as photography.Works Citedâ€Å"Basic Rules of Photography.† trem.ca. 20 September 2003. 9 January 2008   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   .â€Å"Best Photographs of 2005.† Avolites Distributors Worldwide. 2005. 9 January 2008   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   .â€Å"Realism.† HuntFor.com. 2007. 9 January 2008 .