Wednesday, August 26, 2020

Argumentative Synthesis

In Mr. Siemiesz’s part he clarified about the National Security Consequences of U. S Oil Dependence and how it could be fixed and changed for the wellbeing of the nation; Mr. Siemiesz plot explicit focuses or steps the nation could take to roll out those improvements he laid out in the part. â€Å"Those significant vitality providers from Russia to Iraq to Venezuela have been progressively capable and ready to utilize their assets to pressure their key and political objectives.That these country’s are devouring less oil less then the entirety of different nations particularly the United States. The Fact is that the U. S. makes up to 4. 6% of the world’s populace however utilizes 25% of the world’s oil. So the test of this is throughout the following quite a long while the U. S. requirements to back off and quit devouring a great deal of Oil and ideally find better approaches to discover energy†. In Mr. Franco’s section â€Å"205 approaches t o spare the Earth† discloses a few different ways to spare the planet; the creator of the part Thomas L. Friedman talks in his article about the word â€Å"Green† and how that term is utilized, he proceeded in the article to state that individuals need to discover approaches to improve the earth and suggested that it is to the greatest advantage of the world to safeguard the world he goes into ways for instance like residents of the world ought to being reusing and to help embellish the planet.Mr. Franco’s section presumes that the nations of the world need to learn better approaches to improve the earth for everybody. The fundamental suggestion behind the study of environmental change is so immovably established in the laws of material science that no sensible individual can question it. Every single other thing being equivalent, including carbon dioxide (CO2) to the atmosphereâ€by, for instance, consuming a huge number of huge amounts of oil, coal and regula r gasâ€will make it warm up. That, as the Nobel Prizeâ€winning scientific expert Svante Arrhenius initially clarified in 1896, is on the grounds that CO2 is generally straightforward to noticeable light from the sun, which warms the planet during the day.But it is moderately hazy to infrared, which the earth attempts to reradiate once more into space around evening time. On the off chance that the planet were a featureless, monochromatic billiard ball without mountains, seas, vegetation and polar ice tops, a consistently rising grouping of CO2 would mean a consistently warming earth†. The earth’s temperature can go up and demolish the polar ice tops and slaughters a great deal of fish and raise the water and flood states. Yields are going to dry out so we can’t eat anything.People are exploiting it and wrecking our planet. â€Å"The Greenhouse Effect is likewise contrasting with an unnatural weather change that it is a procedure by which warm radiation fro m a planetary surface is consumed by barometrical ozone depleting substances and is re-transmitted every which way. Since part of this re-radiation is back towards the surface, vitality is moved to the surface and the lower atmosphere†. Accordingly, the temperature there is higher than it would be if direct warming by sunlight based radiation were the main warming mechanism.Global warming of the Earth's surface and lower climate is accepted to be the aftereffect of a fortifying of the nursery impact generally because of human-created increments in air ozone depleting substances by which warm radiation from a planetary surface is consumed by environmental ozone harming substances and is re-transmitted every which way. Since part of this re-radiation is back towards the surface, vitality is moved to the surface and the lower climate. In Mr. Anderson’s part discloses to the peruser how Oil is basic to the U. S. Economy and how their aren’t any reasonable options tha t the creator accepts will set the United States on the way to vitality freedom; The Author Price kept on saying that â€Å"politicians and tree hugger deluded Americans about the real factors of vitality which lead to enactment that harms America in the worldwide marketplace† Price accepts that they genuinely don’t comprehend what is happening with regards to nature and he kept saying that is the reason the United States is so trustworthy on outside oil.Mr. Anderson’s section finishes up with the accompanying â€Å"price concedes American imports of unrefined are high yet observes no attainable other option. The interest for vitality in America is essentially incredible and oil is just to significant for the economy†.

Saturday, August 22, 2020

Automobile Industry Research Paper Example | Topics and Well Written Essays - 2250 words

Car Industry - Research Paper Example At that point Mr. Henry Ford concocted a thought of Car for Every one. With this thought he set out the establishment of Ford Motor Company and begin fabricating vehicles at a huge scope to lessen cost, what we call large scale manufacturing. New players additionally entered the market with unexpected items in comparison to that of Ford like Mercedes, BMW, and GM. Vehicle industry is confronting colossal rivalry nowadays which has moved makers' anxiety to diminish their expense. A correct equalization of information and yields can give producers the edge which will be useful for them to build their deals and their net revenues. This occurs because of the clients' better access to information. Nowadays the clients are better educated contrasted with the earlier days consequently even the choice of a normal client is very much educated. Alongside being cost cognizant, clients are likewise after quality and eco-friendliness. The climbing costs of fuel have approached clients to search for a vehicle with better mileage. The vehicle markets are moving quick into globalization. One can locate the best of BMW's vehicle is being driven in India, the Mercedes in America and the Ford in United Arab Emirates. Consequently the makers are additionally searching for approaches to have an incorporated item innovative work place and assembling at most minimal rates since the opposition has upgraded because of globalization. Market Segmentation As far as clients' purchasing practice, market can be isolated into Fleet purchasers, Business purchasers and Private purchasers. Armada purchasers are those purchasers which purchase vehicles in large numbers to assist their business. They typically required vehicles which are low valued, acceptable in efficiency and can run easily for an extensive timeframe without asking any significant upkeep. They incorporate lodgings, taxi organizations, and vehicle rental organizations. Business purchasers are those which purchase vehicles to give their officials and workers. They require vehicles which coordinate the assignment of the individual given the vehicle. They generally go for tolerably profoundly estimated vehicles. Private Buyers purchase vehicles for their own utilization. Presently relying on their social class which they have a place with, they have various selections of vehicles. Some purchase low estimated, tough vehicles from Toyota, Honda, GM and Ford while others may go for quality and execution and select BMW, Mercedes or Audi. There are a few, similar to superstars or individuals with huge fortunes that purchase vehicles as a superficial point of interest and to show their preference for uniqueness. They for the most part go for Ferrari, Lamborghini, Bugatti, MayBach. Contenders' Analysis There are numerous players in the market endeavoring to build their size of pie. From America we have General Motors, Daimler Chrysler, and Ford Motor Co. From Japan we have Toyota and Honda. From Germany we have Mercedes, BMW and Audi and from Italy we have Lamborghini, Ferrari and Bugatti. Be that as it may, BMW faces an immediate rivalry with Mercedes and Audi as they fall in a similar class regarding execution and cost. 1. Mercedes Mercedes Benz is available in the business as a monster. Mercedes Benz is the major direct contender to BMW simply like Pepsi is for Coke. It is viewed as a set up brand inside the business among numerous contenders and among clients. It has constructed incredible brand

Thursday, August 20, 2020

Preparation at the beginning of the semester

Preparation at the beginning of the semester I dont know about everyone else, but my semester is off to a great start! Everything is so much fun, but already a bit busy. Busy in a good way, though! Im finding that the stuff I have to do is helping me be more proactive. I like to use the beginning of the semester as a chance to plan ahead and get prepared for the rest of the semester. With that in mind, this weekend, I did one of the best things I think you can do before life gets busier. I pulled out all of my syllabi, and wrote down all of the important things (exams, papers, projects, etc.) for each of my classes on my wall calendar. I know that an entire semester can be a lot to think about when its only the first or second week, but writing everything down early is super helpful. If you write everything down early and put it somewhere noticeable, it will make your life a lot easier as the semester goes on! Sarah Class of 2018 I'm from Grand Rapids, Michigan. I'm majoring in Communication in the College of Liberal Arts and Sciences.

Sunday, May 24, 2020

A Brief Analysis Of The Real Earnings Management ( Rem )...

A brief analysis between the Real Earnings Management (REM) and Off-balance Sheet Financing (OBSF) Introduction According to the paragraph 9 of AASB 101, the purpose of financial statements is to provide information referred to the financial position, financial performance and cash flows of an entity which is valuable to a wide variety of users in making economic decisions. Nevertheless, real earnings management (REM) and off-balance sheet financing (OBSF) have a negative impact on financial statements reflecting substance and economic reality of transactions. The paper provides a brief analysis of the implications of real earnings management (REM) as well as off-balance sheet financing (OBSF) which are relevant to the valuation of a manufacturing company. It begins with the introduction of the concepts of REM and OBSF respectively, followed by lists of different major types of REM and OBSF. Afterwards, it distinguishes the two methods from other ones used for financial statement manipulation. Then, the essay illustrates an explanation related to the motivations for the financial statement manipulation and the final part is relevant to methods for a perspective investor on how to detect the occurrence. Concepts of Real Earnings Management (REM) and Off-balance Sheet Financing (OBSF) Real Earnings Management (REM) Real earnings management is defined as the real activities manipulation that diverges from the company’s regular operational practices with the primary purpose of

Wednesday, May 13, 2020

Literary Analysis of the Enlightenment Period and...

During the eighteenth and nineteenth centuries, the literary world witnessed the birth of the Enlightenment and Romantic Periods. There were similarities as well as very notable differences between the two. There were also two prominent voices that gained notoriety during each of these two periods. Voltaire is considered to be the pioneer of the power of reason and Rousseau is looked upon as a legendary figure of Nineteenth Century Romanticism. This analysis will evaluate the two eras, both writers and a literary piece. The Enlightenment Era gave way to an age of reasoning. During this time, the writers were regarded as philosophers. They came up with diverse theories and possessed different points of view. Never the less, the†¦show more content†¦The focus is now shifted to individualism, emotions, and nature. (James 485)These themes provided new ideas and different means to interpret and understand the world in a whole new light. Reasoning was no longer the most important concept that guided society’s way of looking at the world. During the Romantic Era, the individual became more important than in the past. According to J.M. Cohen, this era encouraged people to look at themselves not as fragments extending from heaven to the natural world but as inimitable entities eminent in their own authenticity. (Cohen, 7) This idea indicates that man is a distinct being entitled to explore and express his own feelings and thoughts. Simply put, examine the man as an individual and not as a unit. The Romantic Era was a period of that examined emotions and put them into words. Romantics abandoned the logical traditional Western World thought which believed that intelligence was the method used to understand the world. However, the Romantics opted to espouse imagination and feelings as a veritable approach to empathize the world. (James ,488) Lastly, the Romantic Era blended human emotions with nature. The interfacing of emotion and nature was emblematic of Romantic poetry, whether it engrossed the idea of bequeathing human emotions to an innate article like a river or connecting the scenery to the temperament of the writer. (James, 491) This kind of beauty that isShow MoreRelatedThe Romantic Era Of The Age Of Enlightenment890 Words   |  4 PagesThe Romantic Era was a literary movement that occurred in the late 18th century and the early 19th century. During this movement, artists and authors alike rebelled against the established order and classism of the time, and the values once believed in during the Age of Enlightenment (The Romantic Era ). While the people of the Age of Enlightenment valued reason, and focused on the new and original (The Enlightenment), the people of the Romantic Era focused on the emotions of the individual, natureRead MoreComparison of Hofffman’s work, The Sandman, and Mosse’s, F rom Romanticism to the Volk1218 Words   |  5 PagesMosse’s, From Romanticism to the Volk, share cohesive concepts, each examine the dramatic cultural shift toward promoting nationalist thought in the minds of the German people. Through the â€Å"rootlessness† of his characters, the cognitive disparity between Nathanael and Klara, and the structure of The Sandman, Hoffman aptly uses the folktale genre to effectively reveal his disdain for the tenets of enlightenment as they challenged the new Volk ideology of Germany. Mosse’s scholarly analysis criticallyRead MoreJean Jacques Rousseau s Work Essay941 Words   |  4 Pagesreligious writing which put the crosshairs right on his back. In the time period that Rousseau lived this was a dangerous opinion to have. Rousseau lived in the Age of enlightenment which was dominated by reason and analysis rather than traditional authority. The thinkers of this age argued that â€Å"human history was progressing towards perfection by casting off old habits and fetters.† (55). However by the 1750’s Enlightenment thinkers were becoming vulnerable and a few rose up to attack them such asRead MoreRomanticism And The Formation Of The Romantic Era1920 Words   |  8 PagesHow does Romanticism relate to the Enlightenment? A simple question, but with a very complex answer. Essentially, the Enlightenment is the very reason for the formation of the Romantic era. In order to understand how the Enlightenment inspired Romanticism, it is important to be familiar with each era as a separate entity. Consequently, the Enlightenment, also known as the â€Å"Age of Reason,† began during the late 1600s and lasted up until the mid-late 1700s. Some of the most prominent ideals that cameRead MoreClose Critical Analysis of Coleridges Frost at Midnight1716 Words   |  7 Pagesrevealing how the key concerns of Romanticism were communicated through the poem. The Romantic period in English literature ran from around 1785, following the death of the eminent neo-classical writer Samuel Johnson, to the ascension of Queen Victoria to the throne in 1837. However, in the years spanning this period writers were not identified as exponents of a recognised literary movement. It was only later that literary historians created and applied the term Romanticism. Since then, a further distinctionRead More Close critical analysis of Coleridges Frost at Midnight Essay1685 Words   |  7 Pagesrevealing how the key concerns of Romanticism were communicated through the poem. The Romantic period in English literature ran from around 1785, following the death of the eminent neo-classical writer Samuel Johnson, to the ascension of Queen Victoria to the throne in 1837. However, in the years spanning this period writers were not identified as exponents of a recognised literary movement. It was only later that literary historians created and applied the term Romanticism. Since then, a further distinctionRead MoreFrankenstein, by Mary Shelley1078 Words   |  5 Pagesfundamental for the comprehension of this essay, especially when it contrasts cohesively with Shelley’s lucid references to â€Å"the sublime.† Over-reliance on scientific information and progression, eventually leads to environmental diminishment. During the period of time when Shelley was writing this piece, she would’ve been exposed to the consequential factors of the Industrial Revolution in England. Modernization was resulting in the destruction of the natural world the R omantics favoured so heavily. TheseRead MoreAnalysis Of Samuel Taylor Coleridge s Kubla Khan 1778 Words   |  8 Pagesas one of the few major leaders of British Romanticism. His poems, both individual works and collaborations with another Romantic leader, William Wordsworth, are proof of this. His works incorporated ideas that are often found in Romantic poetry, such as a reverence for nature, emphasis on emotion and imagination over reason and logic, and other themes that contradicted thinkers of the Age of Reason. Coleridge assisted in the change from Enlightenment ideals favoring rationality and deduction toRead MoreEnglish Preromanticism: William Blake3403 Words   |  14 PagesGriciuvien English Preromanticism: William Blake Term Paper Supervisor: Assoc. Prof. M. Ã…  idlauskas 2008 CONTENTS Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...............3 1. William Blake-a forerunner of English Romanticism 1 William Blake-a social critic of his own time†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..6 2 William Blake’s ideas and the Modern World†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 2. â€Å"Songs of innocence and of Experience†-the most popular W.Blake’s poem book 1 The social significanceRead MoreAnalysis Of The Book The Good And Evil 1565 Words   |  7 PagesProfessor Murray ENC 1102- 07 03 November 2014 The Good and Evil in â€Å"Benito Cereno† Benito Cereno is certainly one of the most mysterious and notorious novellas of Melville. Full in symbolism and somewhat gothic in its analysis, that it has caused a great partition among the literary critics of Melville. Various critics have argued that the text defenses the association of slavery while others have argued that it sentences it. There are those who have not taken into consideration at all the racial

Wednesday, May 6, 2020

Lalala Free Essays

Summary of the story Weekend is a short feminists story depicting traditional middle-class family, consisting of the mother- Martha and the father of three- Martin, going for the weekend to their cottage near Stonehenge, where they will meet their friends. On Friday, Martha is preparing some things, food and complaining Nearly) about her life. Martin wants her to be perfect, as she says â€Å"he Likes women with small hips and big bosoms, that’s Incredible. We will write a custom essay sample on Lalala or any similar topic only for you Order Now † She has a suspicion that her husband has an affair with his secretary, who looks exactly that way. Martin has a small sport car, but they take Marsh’s car for the trip, since it is bigger, although it is the older one. Martha can ‘t drive, because her driving license was taken away for drunken driving. The whole Journey, Martin Is Joking about the car, but Martha takes It personally, whilst she has got the feeling, he Is ambiguously talking about her. Late at night, their friends- Colic and his girlfriend Katie, arrive to visit them in their cottage. His previous wife, Janet with whom he has two children, was a nice woman and Martha liked her, however she was not so stunning like the new one. Martha prepares mushroom omelets In her night, sets the table, cleans everything after the late supper and goes to bed at 2 a. M. Katie sits and has a good time, without any intention to help her. The other day Martha sleeps longer than usually and has the consumptions, because everything in the kitchen stays exactly in the same place, where the consumers had left It. She should ‘t sleep so long. Glamorous Katie did not help with anything. Again. The rest of their friends, Harry and Beryl, come for the lunch. They bring fresh artichokes. Ill Martha Is preparing the artichoke soup, the top of the blender flies away and the kitchen is full of artichoke puree. Awkward Martha. Jenny starts her first period and Martha is impressed and cries. She is not her little child anymore, but a little woman. To sum up the story, a woman must be always perfect. Great wife, mother, babysitter, awesome cook, successful careerist, best friend, psychologist, teacher, doctor, dishwasher, cleaner wit h bottomless sexual appetite. While exhaustion, influenza, migraine or other illnesses are mission impossible. And naturally, you would do it all in high heels, scented, with exquisite hair, flawless make- up and smile on your face. 2) Characteristics of the mall characters wants to be a perfect woman and tries to manage everything, what in her eyes woman should manage; however, her husband does not see that. She feels undervalued by him as long as he is criticizing her and looks back to the other women, young, childless, with big bosoms and little hips. She is also helping pretty much with house expenses, the thing, she’s not very satisfied with, because a good husband of his good wife should manage that. Martin- husband of Martha; iconic example of a man who comes home, extremely exhausted after all day in work and awaiting the house to be clean, children calm and that his wife will be neat, scented, smiling and ready to make him a supper according to his wishes. He is not satisfied with his wife. She should be slimmer, nicer, make healthier meals, and use plenty of perfumes he keeps buying her. Jenny, Jasper, Colony- children of Martha and Martin. We don ‘t know much about them. Jenny dries off her hair with Katie ‘s Yves Saint Laurent towel and gets the erred for the first time at the end of the story. Jasper has hay fever. Katie- a glamorous, childless, scented chick in her middle thirties; kind of a â€Å"modern wife†, who came to the relationship with one bag of clothes, intelligence and free mind. Colic- boyfriend of Katie, he loves her very much and wants to marry her. He has two children from the previous marriage. Katie does not like his ex-wife Janet and their children; he can meet them Just once per month. He is a successful businessman. Harry and Beryl- friends of Martin and Martha; Beryl is a secretary and Harry is an artist. She falls asleep during the visit and Harry gets drunk and is going to drive. He has scar on his temple from the car accident. Mrs†¦ Hooded- came in twice a week to clean and Martha paid her from her wages 3) The story is described from Martha ‘s perspective. Would it be the same, if the narration would be done by Martin? No, definitely. It would not be the same. As far as l’ m concerned, Martin perceives the whole situation completely differently than Mart does. He is looking onto problems and situations with a â€Å"man’s eye†. He does not feel that Martha does too much around the house, children etc. He feels that she should cook better, have smaller hips and try to be fresher. 4) What are Martha ‘s main worries? Why does she obey Martin in everything? Why does she never object? She wants to be an amazing wife of her great husband that’s why she obeys him. She feels that it is her duty in the role of a woman, mother and wife to behave that way. She is afraid of losing of Martin and fail in all her roles. Martha cannot imagine her life without a husband – she does not realize she could live a different life, because this is what she knows. That is why she is trying to keep Martin at all costs although she is not happy with him. Martha is a prototype of housewife and Katie is her opposite. Martha has a husband, three children and her family is something sacred for her. But she works and keeps her own money that means, she can get by from her wages. Katie has different attitude to these things. She hates to be in the traditional position of a woman, like Martha is. Katie is divorced twice and doses t have children. From my point of view, she is that kind of woman, who needs husband to take care of her in general, mostly from the viewpoint of expenses. Although Katie appears as a confident woman, we also witness her insecurities – she realizes that Colic is tied to Janet because they have children together and that her position might not be that stable. ) How is the story narrated? Are there long descriptions or dialogues? Why not? The story is narrated as Mart ‘s train of thought. Her mind is important. She is describing the situations from subjective point of view, not like the omniscient narrator. There are no long descriptions, nor dialogues, because they are not necessary (and Martha does not have time for them since she rushes from one task o another – so the narration reflects her state of mind); the reader understands from the situations the whole context. Anyway the direct speech is used for being more authentic. Her descriptions make the story more personal than the universal third person narrator or â€Å"the eye of the camera†. If any woman reads it, she finds herself in many similar situations and that is the aim, to personalize the story and give the percipient the space to make his point of view about the piece and given problem. 7) Look at Martin ‘s comments which are inserted in the brackets. What do they suggest? They suggest Martin’s dissatisfaction or ironical view on Martha and her acts. They are not formulated as direct criticism, but are rather indirect. Though he might appear as a kind husband, Martha takes his remarks personally as a form of criticism and thus puts even more pressure on herself. 8) What is author’s opinion on women like Martha? Who is responsible for their unhappiness- is it men or the women themselves? A woman should love her family and her husband, but should not obey him in the way like Martha did. She gave her win â€Å"Self† and life to her family, but doses ‘t get it back from them. She doses t feel intrinsic fulfillment, which she should feel, living this pattern of life. They are both responsible for their unhappiness – males and females. Because if Martha doses ‘t want to, she din ‘t have to behave this way. As long as, we are concerning on feminist fiction, then men are responsible for the woman’s unhappiness 0. Weldon is critical not only to men, but to women as well. She points to the fact that they have power in their hands and they should be active in pursuing happiness. Martha, forever, only relies on her husband, not on herself so it is her own fault that she leads an unhappy life. ) Why does Martha cry at the end of the story? Because her only daughter is becoming a woman. From this important hoar stone in her and they will cause troubles to her woman being and gain control over her whole life, like Martin does to Martha. Martha realizes that her own daughter is now entering the period of womanhood with all its responsibilities. The ending also shows that Martha feels powerless and does not realize that her own daug hter does not have to have the same life as she does. How to cite Lalala, Papers

Tuesday, May 5, 2020

Type of Crime That Use It Systems as Weapons free essay sample

Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information.The different types of computer crimes have caused the introduction and use of newer and more effective security measures. Out of the many crimes that use IT systems, the one that cost us the most would have to be identity theft. Biegelman states, â€Å"Simply put, identity theft is the stealing of your good name and reputation for financial gain. We will write a custom essay sample on Type of Crime That Use It Systems as Weapons or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Yet not everyone can agree on a suitable meaning of the term. The definition of this crime differs among law enforcement, regulatory agencies, and the many studies of this subject† (2). There is big money at stake and the financial rewards for criminals are almost limitless, they go to amazing lengths to defraud their victims. The Federal Trade Commission (FTC) estimates that as many as 9 million people have their identities stolen each year (FTC, 2012). Experts agree that identity theft is a serious problem, and special precautions must be taken to avoid it. When people become the victims of identity theft, they are unaware of what just happened, and they need answers. According to the FTC, Identity theft is serious.While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit. (FTC 2012) One way of stealing someone’s identity is by Phishing. Phishing is an attempt to lure unsuspecting computer users to phony web sites that mimic the sites of legitimate businesses or public or government organizations. These copycat cites trick users into revealing private and sensitive information such as their usernames, passwords, and account numbers. This information is then used by or sent to criminals’’ (Ross 69). There is also skimming which occurs when a dishonest employee of a company steals customer’s information, such as their credit card number.This type of fraud usually happens in bars and restaurants, because the waiter will take your card to process the bill. Once they have your card, they will photocopy it, or use an electronic skimmer device to pick up the numbers. The person will use the credit cards later to make online purchases, or transfer money to their accounts. Criminals also engage in dumpster diving, which is going through a person’s trash, to obtain copies of checks, credit card and bank statements, or other personal records that bear your name, address, and even your telephone number.These types of records can help a thief; get control over your accounts or your identity. Credit card companies send pre-approved applications to consumers, and if they are not destroyed before going to trash, the thief may get access to the trash, and activate the credit cards, without the person’s knowledge. United States Department of Justice states that, â€Å"Some credit card companies, when sending credit card applications, have adopted security measures that allow a card recipient to activate the card only from his or her home telephone number, but this is not yet a universal practice† (USDOJ, 2012)Many of us are very hesitant to shop online because of the looming threats of identity theft. For those of us that are concerned because of the frequent use of personal information online the best way to keep track of your information is to monitor your accounts and bank statements each month, and check your credit report on a regular basis. If you check your credit report regularly, you may be able to limit the damage caused by identity theft. â€Å"Most people find out that they are victim of identity theft, after damage has been done to them.Filing a police reports, checking your credit reports, notifying creditors, and disputing any unauthorized transactions are some of the steps you must take immediately to restore your good name† (FTC, 2012). If you believe you are a victim of mail fraud, contact the postal inspection services immediately. If someone has used your social security number, contact the Social Security Administration to file your case. Also contact the three credit reporting agencies and have them place a freeze on your account.The Federal Trade Commission states, â€Å"It is best to close all your accounts in writing, so that you have proof of contacting the company, in case something goes wrong† (FTC, 2012). There are a few easy ways to help prevent identity theft. One identity theft victim says, â€Å"When you move and fill out the change of address card, be sure to watch for a letter from the Post Office at your new address confirming that you have changed your address. If you do not get the letter within a couple weeks, be sure to check with the Post Office to make sure they indeed paid attention to your change of address† (Privacy Rights, 2002).Lastly, Elisabeth Goodridge states, Balancing your checkbook may seem a monotonous chore, but understanding where your money goes will help you spot any irregular withdrawals or charges. Reviewing your credit card bill each month is critical as well, especially if you charge a lot of your daily purchases. If you have not already, this may be a great time to sign up for online accounts. It’s easier and faster to review accounts online, on a computer you trust. (2009) IT system crimes are clearly on the rise as more companies, organizations, and individuals are more connected to the internet, and this trend does not appear to be slowing down.

Wednesday, April 1, 2020

Like Father Like Son Essays - Song Of Solomon, Milk, Milkman

Like Father Like Son The book called Song of Solomon, by Toni Morrison, deals with many real life issues, most of which are illustrated by the relationships between different family members. One archetypal relationship that Morrison includes in her book is the father:son relationship. Although it is obvious that Morrison does talk about this topic, it is not so obvious what she is trying to say about it. So, one might ask, how does the author establish the father:son relationships throughout Song of Solomon and do they fit some sort of archetype? To answer a question such as this, it would be beneficial to examine the actual father:son relationships throughout the book. One established father:son relationships that is significant to this issue is the one between Milkman and Macon. From the start, Macon objected to Milkman even being born; he forced Ruth to do things to her body that could possibly kill the fetus. With a little help from Pilate, however, Milkman was allowed into the world. Macon, perhaps instigated by never having a mother and seeing his own father killed, has always appeared to be a cold and unforgiving parent even to his other children besides Milkman, but since Macon heard that his son?s nickname was ?Milkman? he has seen him as a symbol of his disgust for his wife and lost a lot of respect for his son and became even colder towards him. The only time Macon did spend time with Milkman, he spent it boasting about his own great upbringing, warning him to stay away from Pilate and telling him about the embarra ssing actions of Ruth. This is the manner in which Morrison establishes the relationship between Macon and Milkman in the first part of the book. As Milkman grows up, he recognizes the emotional distance between his father and himself. He goes his own way with a few skirmishes here and there and later he even manages to hit his own father. As Macon and Milkman grow apart and go their separate ways, Milkman doesn?t even think twice about it and just continues on with his life as if nothing was different. Near the end of the book Milkman seems to change his view of his father, with some help from the positive memories of the old men in the passage. Milkman grew up thinking that his father was a cold-hearted, hot tempered control freak who was only interested in gaining money and property. He came to realize that although there was some truth to what he thought, Macon was not inhuman. This is displayed in the passage when it states, ?His own father?s words came back to him: ?I worked right alongside my father. Right alongside him.? Even though Macon was against Milkman?s birth, he came to cherish his only son in his own way. Probably under the impression that showing affection was a sign of a weak man, Macon held back what feelings he had for his son. Milkman?s feelings about his father?s shows of affection are described when Morrison writes, ?Milkman thought then that his father was boasting of his manliness as a child. Now he knew he had been saying something else.? One of the few go od memories that Macon had of his father was spending time working alongside his father. Milkman finally figured out that Macon?s description of his time spent working with his father were meant to as a show of affection for Milkman and to cause Milkman to see the similarities between Macon?s relationship with his father and Milkman?s relationship with Macon. Milkman?s revelation is explained, ?That he loved his father; had an intimate relationship with him; that his father loved him, trusted him, and found him worthy of working ?right alongside? him.? He most likely remembers gaining a great amount of respect for his father by learning and watching how his father made a living. Milkman now saw that all those times that he spent with Macon down in the workshop and being taught how to run a business were his father?s mild way of showing love. When Macon would tell Milkman about how he worked right alongside his father, he wasn?t bragging about how masculine he was when he was little,

Sunday, March 8, 2020

Analysis of a Start

Analysis of a Start Introduction Technological innovations have influenced the manner in which people operate from roads to their offices. The rapid growth of technology seems to influence even the automotive and transport industry (Akhilesh 2013).Advertising We will write a custom research paper sample on Analysis of a Start-up Lyft specifically for you for only $16.05 $11/page Learn More Whereas several businesses and innovative ventures are emerging each day in the modern world, uniqueness and exclusivity are becoming an important factor in the growth and development of modern businesses (Osterwalder Pigneur 2013). Innovators regularly come up with new ideas, but their innovations rarely capture the market and consumers, and hence, they slowly plummet, because they fail to receive the expected adoption. With the changing trends in consumer preferences, competent businesses are emerging with tantalizing business models and products, and thus new technologies have found it un easy to penetrate the already explored markets (Louise 2013). A starting technology meets many challenges and fears among financiers over the emerging technological businesses, as they are normally unsure of its future commencement. Fundamental to such notions, this research provides a professional analysis of a start-up tech venture known as Lyft. Description of the Venture Lyft is a modern and privately owned tech venture that emerged through innovations in the cab transportation company, and it is currently gaining extensive support and fame across the American roads (Lyft 2014). Initiated during the summer of 2012, two innovators John Zimmer and Logan Green began the transport business and named it Zimride to offer passengers peer-to-peer ride sharing experiences (Lyft 2014).Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Zimmer and Green developed the Lyft transport system with a dream of enabling passengers save money, avoid congested city traffic, and bring communities together through rideshare transport program (Lyft 2014). The cabs form a system of transport network with the company affording to connect and match drivers with passengers, who have requested for a cab ride through the Lyft Android and iPhone mobile applications. Lyft promotes the venture by encouraging passengers to influence their friend to sign up and reward them with $25 on the subsequent ride. Using Department of Motor Vehicles (DMV) and background checks, Lyft screens drivers to assess their credibility and driving record standards in a stricter manner than the traditional taxis (Lyft 2014). Lyft taxis are unique because they receive voluntary donations from passengers, unlike traditional taxis that rely on cash payments. Deposited weekly into their bank accounts, these community drivers receive approximately 80% of the total donations that passengers voluntarily produ ce (Lyft 2014). Independent community drivers must have personal cars in good working condition and must possess Android phones or iPhone connected to passengers via the mobile applications. Business Model Canvas for the Venture In undertaking the professional analysis of Lyft as a new venture in America, this research paper uses the business model canvas to carry out the business analysis process.Advertising We will write a custom research paper sample on Analysis of a Start-up Lyft specifically for you for only $16.05 $11/page Learn More Business model canvas is a modern form of the strategic entrepreneurial and management tool that allows businesspersons to challenge, design, describe, or even formulate and support their businesses (Manzano 2012). Business canvas model has several elements that help businesspersons to describe and analyze a business system. It encompasses an appraisal of business partners, key activities, key resources, value proposition s, customer relationships, business channels, revenue streams, customer segments, and the cost structure. Key Partners The key partners of Lyft business innovation are the core members, including the founder, John Zimmer, who oversees overall operations and progress, Amy Fox, who is in charge of partnership development, business counselor, Beth Stevens (Lyft 2014). Corey Owens is responsible for maintaining public policy, Bill Vainisi is the vice president, and deputy general counsel, Kedar Deshpande, is responsible for strategic initiatives, while Marzia Zafaris is the director of planning and policy (Lyft 2014). The community drivers, Department of Motor Vehicles (DMV), insurance agencies and companies, and the passengers are also important partners of Lyft. Key Activities Lyft undertakes numerous activities to ensure the rideshare program becomes effective. The main activity is to provide efficient and cheap transport of passengers and building an effective rideshare community (L yft 2014). Lyft connects drivers and passengers technologically using Android and iPhone applications. The company collaborates with insurance companies and the Department of Motor Vehicles to enhance transportation safety (Lyft 2014).Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Lyft ensures that they scrutinize drivers through background checks and analyzing driving record standards, uses technological app feedback to analyze driver rating by passengers, and ensures an active the $1,000,000 excess insurance program. Key Resources For the rideshare program to be effective, Lyft has been relying on numerous important assets and human resources. Human resources that are valued the most are the skilled drivers. The most important assets in the business are cars for taking passengers around designated locations (Lyft 2014). Lyft Transportation Company requires the Smartphones, especially Android phones, tablets, and iPhones that can support mobile applications, which connect drivers with passengers (Lyft 2014). Smartphones must have the independent Lyft applications installed as one of the most important recourses that the passengers use to invite friends, co-workers, and relatives. Value Propositions The intention of Lyft is large and unique in nature. Lyft ai ms at leveraging passengers to use charitable free lifts enable them to avoid pedestal walls that expose them to carbon inhalation, and finally bring unity among communities (Lyft 2014). Lyft business program aims at providing affordable, convenient rideshares, and improving the road safety through proper screening of credibility of drivers using criminal and background checks (Lyft 2014). Therefore, Lyft aims at reducing cost and risk of travel, while enhancing credibility of drivers and improving transit convenience for the passengers. Customer Relationships Lyft has a unique customer-business relationship that hinges upon trust as one of the most important virtues between the two actors, and it is useful for the emerging peer economy (Lyft 2014). Customers do not pay directly during service delivery, but willing donors send their contributions to the company after receiving free rides (Lyft 2014). Customers expect the taxi drivers to remain genuine during the offering of rides, a s the Lyft principles require them, but not make any cash payments during the free rides. Business Channels The mobile phone technology in Lyft is an important innovation as it builds the central business channel (Lyft 2014). Customers remain connected through the Lyft mobile applications that act as the platform for social connection. The Smartphones connect customers and drivers, and thus provide a means of enabling Lyft to assess the credibility of community drivers through a rating of 1 out of five rides scale (Lyft 2014). Passengers capable of bringing friends to free ride get $25 free credit for the next ride. Revenue Streams Revenue streams involve means of generating income within the business. The Lyft free rideshare program has ensured satisfaction among customers and since the payment is voluntary donation, the passengers are of different economic class and capable of giving higher amounts than from direct service charges (Lyft 2014). The voluntary community contribution exceeds what ordinary taxis generate through direct service charges, as passengers give based on their willingness and financial abilities (Lyft 2014). Customer Segments Each business, according to economists, has its own customer segment (Osterwalder Pigneur 2013). Lyft has a business customer segment that focuses on the niche business platform, as it targets specifically the passengers. In the niche market, business relationships between consumers and service or goods providers rely solely on the specific necessities of the positioned market (Osterwalder Pigneur 2013). Lyft focuses on developing the passenger community and providing them with affordable and reliable taxi transport system. The Cost Structure Cost structure in business model canvas is the cost incurred in running the business model. Lyft business model seeks to eliminate the notion of pay service in the taxi transport network, as its most important duty is to make city rides cost-effective to passengers (Lyft 2014 ). The cost structure of the business model is therefore variable, as the service. The provision does not rely on fixed payments, but relies on the voluntary community donations prior to free peer-to-peer rideshare service. The donations vary depending on individual donors. Table 1: The Business Model Canvas Key Partners Founder John Zimmer, Logan Green, Corey Owens, others Community Lyft drivers DMV and insurance companies Key Activities Free rides Driver screening Partnering with insurances Value proposition charitable free lifts safe driving suitable driving protecting passengers form carbon cost effective rides Customer Relationships Communities Trust Understanding Honesty Customer Segments Niche business platform Concerned particularly with passengers Key resources Human resources Capital resources Cars and vans Channels Phone apps Technology Cost Structure Variable and unpredictable as it entails donations Revenue Streams Brokerage fees, Advertising a nd Negotiation SWOT Analysis for the Venture SWOT, which is a renowned business analysis tool, stands for Strengths, Weaknesses, Opportunities, and Threats, and assesses the entrepreneurial model of a business system (Dyson 2004). Fundamentally, SWOT analyzes capabilities, limitations, chances, and risks that businesses experience. This section of the term paper presents a professional assessment of Lyft business system using the SWOT analysis tool. Strengths of Lyft Tech Venture The main strength of Lyft tech venture is that it serves on a unique and modernized business system that relies on simple mobile phone technology, which connects targeted consumers and drivers. As the use of Smartphones is increasing and their demand is very high, it provides a platform for Lyft to flourish. The Lyft mobile applications rooted in modern and trendy Smartphones enable consumers to enjoy easy communication, connection, convenience, and reliability with service providers. Lyft is a modern te chnology business that also understands the aspect of sociability in the business. Weaknesses of Lyft Tech Venture The foremost weakness that is likely to hamper a smooth development of the Lyft technology venture is dishonesty. Many passengers that may require the rideshare program are youngsters, whose capacity to give voluntary donations remain limited. Due to such notions, the future of the technology venture relies on donations to pay community drivers. Since youths and teenagers may misuse the joy rides, the venture may suffer financial constraints as the misuse hampers its sustainability. Opportunities of Lyft Tech Venture A young technology venture with great innovative ideas has great advancement opportunities. As the business model is still young, the ideas are fresh in the market, involve active and youthful population, it has many opportunities in technology markets, which seem underexploited. The cost-effective approach tailored to community may assist to generate enorm ous market fame and substantial consumer reputation, which may support its future progress in other potential markets. Moreover, Smartphones are increasingly becoming valuable and its consumption is rising. Threats to the Lyft Tech Venture Technology is ever changing because Smartphones appeared has just appeared in the markets, while iPhone and Androids may vanish as technology transforms. The modern technology is also prone to piracy since strict regulations are not in place to handle copyright infringements. Competition is a significant threat to the success and progress of Lyft, as several taxi companies in the transport system are emerging. As consumers familiarize with modern technologies and Smartphone applications are easy to make, too much reliance on the Smartphone and mobile apps may raise security issues in future. Analysis of the Ventures Team Lyft emerged following innovations of two John Zimmer and Logan Green who are the core founders of the Zimride business program. However, Lyft has an advanced venture team of more than ten members, but the five main members comprise: John Zimmer and Logan Green- Co-founders of Lyft Amy Fox- responsible for partnership development in Lyft Beth Stevens- acts as general counsel of Sidecar Corey Owens- works for public policy in Uber Bill Vainisi- acts as the Senior Vice President at Allstate Insurance John Zimmer and Logan Green John Zimmer is a resident of San Francisco and the co-founder of Zimride program. Zimmer went to Cornell University, an institution renowned for intellectual development and broad research and developing innovative future leaders (Zimride 2008). He had once worked with Lehman Brothers Holdings Inc, a financial company that offered global financial-services and investment banking until when it went bankrupt in 2008. Logan Green is also the co-founder of Zimride. Logan Green graduated at university of California at Santa Barbara and has once worked as a sustainability coordinator at the University of California, Santa Barbara (UCSB) and a board member of Santa Barbara Metropolitan Transit District (Zimride 2008). Green had a high motivation in the transportation industry. Logan grew up within Southern California and frequently spent most of his time stuck in heavy traffic that always insinuated him. Logan noticed the rising demand for ridesharing program as at the same time annoyed by the empty cabs and people walking on foot (Zimride 2008). Out of his inspiration to change transportation system, Logan Greene began the Zimride in 2007, when he launched his first car-share program around Santa Barbra. Following the successful adoption and integration of the Zimride, a Business week program recognized Logan Green as Top 25 Entrepreneurs in business economics from the Santa Barbara region (Zimride 2008). Being a Lyft driver, Logan Green has had a dream of transforming the world transport system through 80% achievement of the Zimride. Conclusion and Recommendations fo r Crossing the Chasm Conclusively, following an increase in risks associated with venturing in new business innovations, it is increasing becoming uneasy for financiers from topmost venture capital companies to fund these new businesses without proof of future progression. An emergent innovation must show proof that the technology will get a market reputation (Warford 2004). After a proper analysis of Lyft tech venture using business model canvas and the SWOT assessment tools, Lyft venture has to do much to ensure diffusion of innovation of the emergent Zimride program. Target Customer Although the Zimride and the Lyft tech venture have targeted the most diverse and needy market that is the transport industry, members should remain cautious about the preference and abilities of the targeted consumers (Louise 2013). From an analytical view, peer-to-peer rideshare may involve the youthful population that is incapable of providing donations that are imperative for paying Lyft community drivers. Teenagers may enjoy the riding offered, and therefore, change of policies may be necessary. Compelling reason to buy The global traffic industry is ever growing as few individuals can afford personal cars even to date. Offering free rides to the needy travelers daily across the cities makes Zimride a unique business venture that may survive for quite some decades. The population of America is swelling with many medium class individuals seeking jobs in towns and cities, but unable to afford personal rides. To improve trust to the Zimride, certain payment standards should prevail to discourage joy riders. Competition Zimride has provided the best solution to passengers, who experience inconvenience from the costly pay cab drivers. Just as people have adopted and exhausted other technologies, the same technological innovation may undergo manipulation to design a different innovation, as Americans are still technologically suave (Zimride 2008). People may fear ridesharing with people they are unfamiliar with and this may provide a chance for new tech businesses to take over the transit system. Partners and allies The Zimride program has already started receiving external support and donors. The relationship with other independent companies is increasing. However, Zimride and other supportive programs may not have the capacity to continue influencing people to use their personal highly valued cars for the Zimride program. Zimride requires highly moral drivers who cannot ask for cash payments to take people for the peer-to-peer riding privileges. To ensure smooth progress, Lyft and Zimride program must strengthen its operational policies. References Akhilesh, K 2013, Emerging Dimensions of Technology Management, Springer, London. Dyson, R 2004, ‘Strategic development and SWOT analysis at the University of Warwick’, European Journal of Operational Research, vol. 152, no. 3, pp. 631–640. Louise, M 2013, ‘A knowledge exchange and dif fusion of innovation (KEDI) model for primary production’, British Food Journal, vol. 115, no. 4, pp. 614-631. Lyft: Providence: Warm, Fuzzy Rides Coming Your Way 2014. Web. Manzano, G, Ayala, J, Castresana, J, Parras, M 2012 ‘Factors Affecting the Growth of New Firms: A Multidisciplinary Perspective’, Journal of Management Studies, vol. 46, no. 4, pp.16-20. Osterwalder, A Pigneur, Y 2013, Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers, John Wiley Sons, London. Warford, M 2004, ‘Testing a Diffusion of Innovations in Education Model (DIEM)’, The Innovation Journal, vol.10, no.3, pp.1-41. Zimride: A carpool community 2008. Web.

Thursday, February 20, 2020

Apple commercial Essay Example | Topics and Well Written Essays - 1000 words

Apple commercial - Essay Example Many people believe that this ad did succeed in causing enough damages to Microsoft and also to cement the supremacy of Apple over Microsoft. The competition between Apple and Microsoft was often labeled as the competition between charismatic leaders of these companies; Steve Jobs vs. Bill Gates. So, the advertisement, "Im a Mac, Im a PC" was also accepted by the public as a comparison between the abilities of Steve and Gates. It should be noted that in 80’s and 90’s Microsoft caused enough damages to Apple’s growth prospects because of the introduction of their Window based operating system. In fact Apple was on the verge of total destruction during this period. However, the capabilities of Steve helped Apple to think differently and also to regain their lost supremacy in the market. Steven introduced many innovative products such as iMac, iPhone, iPod, iPad etc during the beginning of 2000 with the help of some thought provoking ads. "Im a Mac, Im a PC", was one such ad formulated for Apple computers or iMac. The commercial "Im a Mac, Im a PC", was directed by Phil Morrison. Justin Long and John Hodgman were acted as a Mac and a PC, respectively in this commercial. In the beginning of these ads, Long introduces himself as a Mac and Hodgman introduces himself as a PC. Then each of them started to say something about their capabilities. It should be noted that in all these ads, Long dressed casually with jeans and t-shirts whereas Hodgman dressed formally with pants, coats, ties etc. Apple wanted to spread the message that Microsoft is not as cool as Apple. In other words PC is designed for high level executives whereas Mac is designed for ordinary people ("Im a Mac, Im a PC"). The actor who represents PC in this ad appears to be fatty than the actor who represent Mac. Apple deliberately did so in order to spread the message that Mac is stronger than PC. It should

Tuesday, February 4, 2020

Information Systems management Research Paper Example | Topics and Well Written Essays - 1250 words - 1

Information Systems management - Research Paper Example expenditure from 10 to 6 billion dollars and development time from 6 to 4 years (Tang &Zimmerman, 2009).Supply chain integration is basically the â€Å"approach of technically linking supply chain of vendors and customers† so as to make sure the â€Å"process is streamlined and to increase efficiency and accuracy.†(Pearlson & Saunders, 2010, p.152).However the final outcome was a complete opposite. As things stand now, apart from the project being in over budget of billions of dollars, it is also behind schedule by 3 years (Steve, 2013). Boeing’s Chief of Commercial Airplanes, Jim Albaugh, explains that they have spent so much more money than anticipated trying to recover than they ever would have used had they tried keeping major technologies nearer home (Steve, 2013). The main problem facing Boeing is shortfall in supplier oversight due to enthusiastic embrace of Integrated Supplier Information System, which allows suppliers to log in a portal, provided by Boeing, and thus need not necessarily meet with Boeing’s main team in US (Steve, 2013). Boeing further, rather than planning for face-to-face basis of communication, or on-site communication relied so much on their information systems with a web-based communications instrument known as Exostar that required suppliers to feed the latest information regarding their work progress (Steve, 2013). This IT equipment was to offer improved control, supply chain visibility as well as integration of important business processes, thus reducing development cost and time (Steve, 2013).Thus, instead of face-to-face kind of communication, the information technology tool was supposed to, in real time, flag problems. Not surprisingly, this technology miserably failed. As a result of this â€Å"remote con trol† outsourcing business, Boeing 787 encountered several Information systems problems that included electrical system faults in addition to battery issues that resulted to the Dreamliner’s grounding (Dominic, 2013). This

Monday, January 27, 2020

MAC and Physical Layer Enhancements

MAC and Physical Layer Enhancements Abstract Communication technologies have improved a lot since the time we started using radio waves for communicating. We have seen advancement not just in the Cellular side but also on the WiFi side. The availability of limited spectrum has been the issue of the 21st century. As we have improved our technologies from the First generation which was based on analog communication to Fourth Generation which is based on Orthogonal Frequency-division multiplexing (OFDM), the free space in the spectrum has also reduced which has created the problems of congestion. We have come to the point where there is a demand for high capacity, better throughput, constant connectivity and high spectral efficiency. To cater this demand, we not only need high-end devices but equally efficient core network. This paper would focus on the converging technology enhancements at Physical and MAC (Media Access Control) layer of the Fifth generation (5G) on the cellular side and 802.11ad on WiFi side. I. Introduction With the increasing number of users, there is a spectral crunch in both the licensed and unlicensed spectrum. Licensed spectrum is the frequency chunk which is bought by the telecom companies, and a company can use its specific frequency band. The technologies in the licensed spectrum are GSM (Global System for Mobile Communication), CDMA (Code Division Multiple Access), LTE (Long Term Evolution). Unlicensed spectrum is the frequency chunk which is free and can be used by anyone. The technologies used in unlicensed spectrum are Bluetooth, WiFi. The increasing number of users have created the need for finding new spectrums and simultaneously new technologies which can be used to improve the efficacy of both cellular and WiFi communication. New standards i.e. 5G for cellular communication and 802.11ad for WiFi are going to use high-frequency bands which were never used before. This untapped potential is going to be a game changer. It will not just improve the spectral efficiency and th e throughput but will also increase the capacity. Technologies such as 802.11ac and LTE-Advanced (Long term evolution-advanced) could provide data rates as high as 1 Gigabytes per second (Gbps) [5] [6]. Also, LTE-A used 2620-2690 MHz (Mega Hertz), and 802.11ac used 5GHz (Giga Hertz) band for data transfer [1] [5]. 802.11ac and LTE-A employed technologies such as MIMO (multiple input, multiple output), beamforming which helped in achieving necessary throughput and capacity requirements, but now even these enhancements need necessary upgradation and changes to support the ever-increasing demand. Not only this but the cost of the wired backhaul is also a big concern. All these needs must be met in 5G and 802.11ad. The cost of wired backhaul can be reduced by moving towards mm-wave (Millimeter wave) which will not just decrease the cost of backhaul but will also improve the overall throughput [1]. This can be a converging point for the two technologies. 5G will be using frequency band i.e. 28 and 38 GHz, and 802.11ad will be using the 60GHz band which falls in mm-wave frequency band [1] [2]. Directional beamforming will be another addition to both 5G and 802.11ad wherein we will direct the signal towards the intended receiver that will help in reducing the power required [1] [2]. Figure 1. Improvement in performance from 4G to 5G. [8] Figure 1 gives a clarity about the targets which were set after using International Mobile Telecommunications-Advanced (IMT-Advanced Standard) i.e. 4G to enhance its performance in case of International Mobile Telecommunications-2020 (IMT-2020 Standard) i.e. the 5G standard [8]. II. Physical Layer Enhancements Here are some of the enhancements at the Physical layer of 802.11ad and 5G: 1. Millimeter Wave: (i) Millimeter wave in 802.11ad: Propagation of signal in the 60GHz unlicensed spectrum is different from that of 5GHz and 2.4GHz which were used in previous WiFi protocols. The frequency range in which the 60GHz falls is the Millimeter wave frequency band. Millimeter wave band will allow faster data transfer and will help us in using wireless docking stations. This will reduce the cost of backhaul as we will be removing the wires. The issues with 60GHz spectrum are its smaller range due to high attenuation, as the wavelength is small thus it causes blockage due to concrete walls [2]. We can also see from the figure 2. that the effect of oxygen in the atmosphere at 60GHz is high and causes atmospheric absorption of the millimeter wave. These are some of the limitations of 60 GHz band which are being looked at like the issue of absorption by oxygen can be reduced by using band Figure 2. High Atmospheric absorption at 60GHz. [1] (ii) Millimeter wave in 5G: The proposed band for 5G is 28GHz and 38GHz which falls in the region of millimeter wave. This is going to help in increase the data rate. The proposed data rate is nearly 20Gbps which is nearly 20 times that of 4G [8]. Millimeter waves can travel smaller distances as the wavelength is small which causes high attenuation due to atmospheric absorption. This can be mitigated by using the concept of small cells in our network. Cell size can be up to 200 meters. Figure 3. Attenuation Due to Heavy Rainfall. [1] Figure 3 shows the attenuation due to heavy rainfall of 25 millimeter/hour for a 28GHz band for 1 Kilometer cell size i.e. 7db which will be only 1.4db for a cell size of 200 meter [1]. 2. Beamforming: (i) Directional Beamforming in 802.11ad: In directional beamforming, the signals are directed to the intended receiver. It has been introduced instead of using an omnidirectional antenna which used to send the beam in all the directions reducing the power of the signal. But it is highly impractical to use highly-directional transmissions as there is a high chance of attenuation due to blockages. This can be prevented by using automatic gain control. MAC mechanisms are also affected due to the Highly directional communications such that the devices are not able to know that there is some other communication going on which increases the chances of collision. Golay sequences are used to reduce these chances of collisions. Golay sequences are the complementary sequences and help in synchronization and automatic gain control that in turn helps in attaining a throughput of 27.5Mbps thus making Management frames more efficient. Sum of out-of-phase Autocorrelation coefficients for Golay sequ ences being zero reduces the level of side lobes which in turn helps in reducing the chance of collision [2]. (ii) Adaptive beamforming in 5G: Beamforming is a concept in which we change the specific weights at the antenna level such that we direct the signal to a specific area by concentrating the power in the main lobe and reducing the power of signals in the side lobe. This will increase the throughput and hence will improve the user experience. In adaptive beamforming, the channel is used in an efficient manner which also helps in reducing the issue of interference. This can be achieved by using the concept of scheduling in different base stations. This can be used in a very interesting manner in 5G, and it will also help by improving the coordination between various eNodeBs. Hence the concept of adaptive beamforming will make the 5G network faster and more efficient [9]. 3. MIMO: (i) Multiuser-MIMO (MU-MIMO) in 802.11ad: At physical layer level 802.11ad works in two modes i.e. OFDM and Single carrier mode. MIMO is used for diversity in communication. In multiuser MIMO for 802.11ad, we use a matrix of a minimum of 2X2 (2 receiver antennas and 2 transmitter antennas). We can send signals to 2 or more users at one time with a very high throughput because we are employing OFDM. Previously we were employing only single user-MIMO wherein we used to send multiple signals to only one user. No doubt it gave high speed, but we were not able to use the limited unlicensed spectrum efficiently. Thus, with the advent of Multiuser-MIMO, the problem of low efficiency has been reduced [2] [10]. Figure 4. Block diagram of Transmitter in MIMO [10]. From figure 4 we can see how the data is sent using MIMO technique. Here firstly data is sent to the scrambler. After scrambling the data, it is encoded by the LDPC (low-density parity-check) encoder for tone interleaving. After interleaving the OFDM processed data we apply Inverse Fast Fourier Transform (IFFT) on the data. Finally, we add a guard interval to protect the sent data [10]. (ii) Massive MIMO in 5G: 5G will be using massive MIMO technique that will involve a large number of antennas and the number will more than 10 times larger than previous networks. This will not just give a high amount of beamforming gains but will also increase the capacity of the network. But there is a catch here. The increase in a number of streams will increase the overhead of pilot signals, and because of this, we will use some part of our spectrum. Also, there is an increase in the complexity if we use a high number of antennas. The solution to this overhead is that we can use Non-Linear Estimators and small cells which will help in reducing the effect as at high signal-to-interference-plus-noise ratio (SINR) the effect of errors in the signal is very less [4]. III. MAC Layer enhancements Here are some of the enhancements at the MAC layer of 802.11ad and 5G: 1. Beamforming Training in 802.11ad: Beamforming training is a part of directional beamforming in which we select a pair of receiver and transmitter sectors so that the network can be optimized and we can get the best coverage. Figure 5. Sector training in Transmitter and Receiver antenna [2]. Figure 5 shows the sector training process. This is done is three phases. In the first step, we try to find the best transmitting antenna. In the second step, the training of only those transmitting and receiving antennas happens for which the transponder thinks are the best for the network. In the third step, various weights for the antennas are adjusted according to the changes in the channel so as to get the maximum level of Signal to Noise Ratio which will thus be able to get the best coverage for the network. Hence the process of Beamforming training for 802.11ad is completed [2] [3] [7]. 2. Contention-Based Medium Access in 802.11ad: In IEEE 802.11 standards, enhanced distributed channel access (EDCA) is used for contention-based Medium access. But there is an issue of deafness that arises when we use the contention based medium access and directional beamforming together. This can be reduced by using Beamforming training wherein we select the best transmitter and receiver antenna for the communication. Chances of collisions are increased due to deafness because carrier sensing ability is reduced. Multiple Network allocation vector (NAV) timers are used at the MAC level. Here the channel is allocated only if the NAV is zero and will not be allocated in case the NAV is non-zero. The concept of NAV for the contention window in 802.11 standards has been used previously as well. Using this concept will enhance the capacity and efficiency of 802.11ad and will be different from previous standards as it uses direction beamforming [2]. 3. Dynamic Channel Time Allocation in 802.11ad: Dynamic channel time allocation is a polling based allocation of resources in 802.11ad at the MAC layer. The polling is done not just for one frame but for a specific time chunk of the channel. The issue of deafness is avoided due to personal basic service set (PBSS) control point/access point (PCP/AP) that reduces the chance of a collision as PCP/AP knows the path of transmitting antenna. The process of Dynamic Channel time allocation is explained in Figure 6. It shows the Beacon header interval (BHI) can be used in dynamic scheduling. Firstly, a channel is gained by the PCP/AP for the polling frames that are sent to their respective stations. Service period requests (SPRs) are used to reserve a specific channel time for their respective communication. Communication can be between Station (STA)- STA or STA Access Point (AP). Channel protection points act as the guard time between two allocated channel times adding reliability in communication [2]. Figure 6. Dynamic Channel Time Allocation [2]. 4. Full-Duplex MAC Protocol in 5G: At Physical layer level, Full-Duplex must reduce the use spectrum making the communication efficient. At MAC layer level the protocol must be defined such that it optimizes the network and reduces the chances of collision. The problem of a hidden node due to highly directional communication can also arise just like it used to happen in the case of WiFi standards. We can use the concept of Request to Send / Clear to Send (RTS/CTS) which was used in WiFi standards being a half-duplex communication. For 5G we will be using full-duplex clear-to-send (FCTS) instead of just the CTS which was used in WiFi i.e. a unidirectional communication. Figure 7 shows the channel allocation for communication between Node A and Node B. Firstly RTS is sent from Node A to check if there is the availability of the channel. After that there is a Short Interframe Space (SIFS) for which we need to wait for FCTS from Node B. Now being a bidirectional communication (Full-duplex) an FCTS is sent by Node A as wel l which makes it different from WiFi standards. After another SIFS interval, the channel is allocated, and there is a bi-directional communication between Node A and Node B. After the channel time allocated is complete, there is a small SIFS before ACK (Acknowledgement) which is kept and this ACK shows that the channel has been released [11]. Figure 7. Channel Allocation in Full Duplex 5G between Node A and Node B [11]. 5. Device-to-device communications in 5G: It is currently a part of LTE-A Release 12 of the 3gpp standards. Device to device (D2D) communication will be an inter-communication between the devices that will use 5G. There is no need to route the data from the 5G base station in D2D communication. The devices will use the same spectral resources as the 5G network. Thus, we must optimize the network to meet the requirement of the users. This will improve the spectral efficiency of the network and will increase the capacity as well. For D2D communication the devices should be in proximity. This can be very useful in case of Autonomous vehicles such as driverless cars which can communicate with each other and thus protect the passengers. D2D communication can occur in two ways. The first way is that one of the UE (User) can send a broadcast signal about its availability and what it can offer. The discoverer UE if interested in the characteristics of the broadcasting UE establishes a connection. The second way is that one of the UE will broadcast its requirements and the UE which meets these criteria can establish a connection with this UE [12]. IV. Conclusion This paper has shed light on the most recent enhancements taking place in 802.11ad and 5G. The paper has addressed the issue of spectral crunch and how these two technologies will cope up with this issue in the near future. The enhancements introduced in the paper have opened the way for the two technologies to interoperate such that the user can get 5G connectivity when outside and 802.11ad connectivity when inside their homes. Convergence of these two technologies will be made easy not just at the Physical level but at the MAC level too. At physical layer level, we have seen the use of mm-wave and directional beamforming, and at MAC layer level, we have seen full-duplex communication using RTS/CTS in 5G which will increase convergence.   Hence, the convergence of these two technologies will increase the capacity as a lot of unused spectrum will be released. V. References [1] T. Rappaport, S. Sun, R. Mayzus, and H. Zhao, Millimeter Wave Mobile Communications  for 5G Cellular: It Will Work! IEEE Access, pp. 335-349, 2013. [2] T. Nitsche et al., IEEE 802.11ad: Directional 60 GHz Communication for Multi-Gigabit-per-Second Wi-Fi, IEEE Commun. Mag., vol. 52, no. 12, Dec. 2014, pp. 132-41. [3] H. Shokri-Ghadikolaei, C. Fischione, P. Popovski, and M. Zorzi, Design aspects of short-range millimeter-wave networks: A MAC layer perspective, IEEE Netw., vol. 30, no. 3, pp. 88-96, May 2016. [4] V. Jungnickel, K. Manolakis, W. Zirwas, B. Panzner, V. Braun, M. Lossow, M. Sternad, R.  Apelfrojd and T. Svensson, The Role of Small Cells, Coordinated Multipoint, and Massive  MIMO in 5G, IEEE Commun. Mag., pp.44-51, May 2014.   [5] R. Van Nee, Breaking the Gigabit-per-second barrier with S02.11AC, IEEE Wireless Communications, vol. IS, pp. 4-4, April 2011. [6] S. Parkvall, et al., LTE-Advanced Evolving LTE Towards IMT-Advanced, in IEEE Proc.  Vehicular Technology Conference, Sept. 2008. [7] E. Perahia and M. X. Gong. Gigabit wireless lans: an overview of IEEE 802.11 ac and  802.11ad. ACM SIGMOBILE Mobile Computing and Communications Review, 15(3):23-33,  2011. [8] M.2083, Recommendation ITU-R, IMT Vision Framework and overall objectives of the  future development of IMT for 2020 and beyond, September 2015. [9] S. Chen, S. Sun, Q. Gao and X. Su, Adaptive Beamforming in TDD-Based Mobile  Communication Systems: State of the Art and 5G Research Directions, in IEEE Wireless  Communications, vol. 23, no. 6, pp. 81-87, December 2016. [10] X. Zhu, A. Doufexi, and T. Kocak, Throughput and coverage performance for IEEE  802.11ad millimeter-wave WPANs, in Vehicular Technology Conference (VTC Spring), 2011  IEEE 73rd, 2011, pp. 1-5. [11] X. Zhang, W. Cheng, and H. Zhang, Full-duplex transmission in PHY and MAC layers for  5g mobile wireless networks, Wireless Communications, IEEE, vol. 22, no. 5, pp. 112-121,  2015. [12] Z. Ma, Z. Zhang, Z. Ding, P. Fan, and H. Li, Key techniques for 5G wireless  communications: network architecture, physical layer, and MAC layer perspectives, Sci. China  Inf. Sci., vol. 58, no. 4, pp. 1-20, 2015.

Sunday, January 19, 2020

Essay --

Previously it has suggested from studies that rates of hypertensive disorders of pregnancy varies between Hispanic and non-Hispanic Caucasian women mainly due to the presence of risk factors that are associated with chronic hypertension. Furthermore, Hispanic ethnicity and multiple gestations are an independent risk factor for preeclampsia. Therefore, in Hispanic women if hypertension is diagnosed early in pregnancy there is an increased likelihood of presence of early preeclampsia. In this study, Wolf et al. examined the relative risk rates of hypertensive disorders of pregnancy. Therefore the objective of this study was to evaluate the risk of preeclampsia and gestational hypertension by conducting a prospective cohort study of normotensive, nulliparous Hispanic (n = 863) and non-Hispanic Caucasian women (n = 2,381). It was determined that in comparison with non-Hispanic Caucasian women, Hispanic women have significantly decreased incidence of gestational hypertension (1.6% versu s 8.5%; P ...om the review that infants born to mothers with gestational diabetes and HDP are more likely to have hypertension and diabetes as these diseases have their origin in fetal life. Based on review there is a minutely increased risk of preeclampsia in nulliparous Black women than nulliparous White women however opposite is true for parous Black and White women. Hispanic women are more likely to present with preeclampsia than gestational hypertension as Hispanic race is independent risk factor developing preeclampsia. It is suggested that pregnancy may provide an opportunity to recognize the opportunity to detect women who either have subclinical symptoms of CVD or at heightened risk for CVD later in life thus making lifestyle changes are necessary and if other clinical interventions such as frequent monitoring should needed be implemented before the onset of disease.

Saturday, January 11, 2020

Digital PCS: The Future of Wireless Phone Service

In the past few years the use of mobile phones has increased tremendously. At one time only available to the rich and elite business executives, the luxury of mobile phones can now be used by a wide group of people in different financial situations. Mobile phones are a necessary convenience. They provide instant communication access wherever mobile phone service is offered. There are two options for mobile phone service: analog, and digital PCS. Analog is the more expensive option and has long been the standard for mobile phone service. Digital PCS is the newest form of phone service. It works by converting human speech into software codes and converting them to audio signals before the codes reach the listener. Because it is software based it provides a perfect platform for a variety of advanced wireless features. Digital PCS is the future of mobile phone service and the soon to be de facto standard for wireless phone service. People can choose digital PCS service for many reasons, though affordability might be the initial attraction. Because of competition by many companies price is always being driven down. Also, the many different customizable price plans offer an affordable package for any type of budget. Companies, which offer digital PCS service are always looking to lure new customers, and therefore are in constant review of their plans always trying to make sure they are treating their customers properly. This eventually leads to the best product for the customer. If there is any drawback to digital PCS it is that the service is still fairly new. Digital PCS systems need to be laid from the ground up. They are physically hard-wired from community to community. While designing a system like this takes much longer, the outcome is worth it. Hard-wired systems provide for a stronger signal, and better connection. Because the implementation of the system takes long, it is difficult to spread digital PCS service quickly. But the service is expanding rapidly and soon, it will cover most of the country. Another drawback is that people cannot use Digital PCS phones in the more common analog environments. Much of the country is already equipped with analog services so it is better to purchase a dual band Digital PCS service phone that has analog service on it also. While these dual band phones are expensive, they provide connections in both analog and digital environments. Since digital PCS is based on wireless software it allows a robust variety of applications to be used with the service. This allows your phone to expand its capabilities. These applications enable you to be reached at all times. Phones using digital PCS service include caller ID, voice mail, paging, enhanced battery management, and encryption systems. These applications make the phone a powerful communication system. Caller ID is a feature that alerts you to what number is calling. When your phone rings the display units flashes the incoming number of the caller. On some phones you can program the name with the number, so the next time that number calls the name flashes along with the incoming number. This feature is useful since the owner can preview who is calling the phone before he even takes the call. People can evaluate the importance of the call and see if their time is important enough for the person who is calling them. Another feature that makes digital PCS superior is interactive voice mail. Interactive voice mail is a voice mail system that alerts you when voice messages are received. Traditional voice mail systems require the owner to keep calling in order to check if new messages are on the system. On a digital PCS system, when the person receives a voice mail, a signal is sent to the phone and the phone alerts the owner of the new mail. This method prevents the waste of unnecessary airtime or personal time checking the voice mail. Digital PCS phones are always in signal contact with the service provider. When the phone is turned on, a signal is always sending information to and from the phone. The signal indicates to the phone how to regulate power. This leads to a longer battery life since the phone can â€Å"sleep† when peak energy is not needed. Battery information is always reported on the display unit, thus allowing the owner to know well ahead when the battery is about to go weak. This allows the owner of the phone to know whether or not to charge the phone or carry a new battery. Digital PCS sends signals in ISO-3 digital format. This means that calls made from a digital PCS phone are encrypted and cannot be scanned or eavesdropped on. Digital voice transmission enables you to feel confident when discussing personal information over your digital PCS phone. Since many people use mobile phones, to conduct business this element is crucial to their goal of protecting sensitive information Alphanumeric paging is one of the best features of digital PCS service. This paging allows someone to send a page with regular text. Also it enables you to receive specially formatted Internet information, such as news and stock quotes. Also having alphanumeric paging allows someone to email the phone, and depending on the phone, a response can also be sent. This feature provides access to electronic mail when one is not near a computer. E-mail has become very important for many people, so having access to email is very essential. This feature also eliminates having to carry a separate pager for your alphanumeric paging needs. Digital phones are the future. They provide services that analog mobile phones could never provide. From an engineering standpoint alone, phones using digital PCS are more advanced and capable of amazing applications. But it is the convenience that digital PCS phones provide which make them a better option for people who are on the move. From a system level, they are designed from the ground up, providing the best connection and signal performance. Digital PCS is software based thus providing better applications such as caller ID, voice mail, enhanced battery management, paging, and encryption systems. They save time by providing on demand information including alerting the owner immediately when a voice mail is received, and when the battery of the phone will expire. They are affordable in cost because many companies are in competition to provide the best service. This provides the customer with ample choices to evaluate. Digital PCS phone service is reliable, robust and affordable. It allows a person to be able to be reached at all times. It is the future and the soon to be standard for wireless communications. Digital PCS, the future of mobile phones is here.

Friday, January 3, 2020

Psychology And Science Of A Heterosexual And Homosexual...

This is an exploration that will summarize and investigate the researched biology and science background comparing the neurological anatomy and science of a heterosexual and homosexual man through the studies; Simon LeVay, Roselli, Hamers, Sanders, Hansen. The perception of whether homosexuality conforms to the course of nature vs. nurture can influence the amount of scrutiny judged upon affected individuals. So, the purpose of this extended essay is to answer the research question of to what extent is there a biological basis with neurological structurally, genetically, hormonally, and prenatally behind male homosexuality and how an individual’s perception of this fact influences their behavior towards homosexuals. Furthermore, draw†¦show more content†¦The underlying message I am conveying is despite what the scientific makeup of a homosexual entails, homosexuals should not be discriminate against or judged. Beyond this extended essay, we must reflect on our knowerà ¢â‚¬â„¢s perspective and comment on society when enquiring about tok knowledge question dispersed throughout the essay. Love CAN hurt. In recent studies The Suicide Prevention Resource Center synthesized that between 30 and 40% of LGBT youth have attempted suicide and about 9 out of 10 LGBT teens have reported being bullied at school within the past year because of their perceived sexual orientation. (CDC, 2014) There is a never-ending debate upon whether homosexuality is chosen or not. My response to this question is; â€Å"Would an individual voluntarily choose to walk against the socially accepted norms?† It is critical to investigate if acquiring a socially â€Å"different† sexual orientation is implemented into the natural being of humans biologically, a result of chemical reactions in our brains, or a chosen â€Å"lifestyle†? Sexuality, and predominantly homosexuality is a vast and controversial area to be studying. To make the focus of the extended essay more manageable, I will offer scientific research narrowed into neurology and the biology of the brain. The research ques tion to be investigated is; to what extent is there a biological basis with neurology structurally, genetically, and prenatally behind male homosexuality? The brainShow MoreRelatedDiscuss the Nature-Nurture Debate in Relation to Individual Development (M1)2187 Words   |  9 PagesDiscuss the nature-nurture debate in relation to individual development (M1) Evaluate the nature-nurture debate in relation to development of the individual (D1) Over the course of the last century one of the greatest debates in psychology concerns, the basis of behaviour, specifically whether behaviour is innate i.e. genetically controlled, or whether it is learnt through the socio-cultural environment. This is often referred to as the Nature vs. Nurture debate. There are two main arguments onRead MoreCoun 5014908 Words   |  20 Pagesis talk. There are many reasons why one may become a counselor. Some of the main reason being; excitement and satisfaction for helping people change, opportunity for evaluating one’s own life, desire to nurture others, or even joy of seeing others become in control of their lives vs. â€Å"victims†. This job is not for everyone; for instance a person with anger, unresolved issues and habitual relationship conflicts may not fit the role of a â€Å"good counselor†. A counselor would be one with inner