Saturday, August 31, 2019

Case Study on Hr Planning Essay

It is the country†s best recognised energy brand. Centrica is a multinational company, with businesses in many countries. Centrica was formed in 1997 and consists of eight separate energy-related businesses, ranging from the supply of gas and electricity to consumers and organisations in the UK and Europe, to storage of gas for other providers, and drain and pipe work maintenance. The UK energy market is highly dynamic. Customers look for the best deals and are increasingly prepared to switch suppliers. In 2007, 900,000 customers switched energy providers. An energy company needs to show it is not just competitive on price, but that it can also provide the right levels of customer service to attract and retain customers. British Gas does not only supply gas but also deals with the installation and maintenance of domestic central heating and appliances. It provides a maintenance and breakdown service for electrical white goods and home wiring. Through the Dyno brand, British Gas also offers drain clearing services, plumbing and home security services. To deliver these services, British Gas needs high calibre staff. It employs more than 9,000 trained gas engineers to install and maintain central heating and gas appliances. This case study explores how British Gas manages the recruitment and selection of new employees. Page 2:  The role of human resource management Managing a successful large business involves acquiring, developing and maintaining a wide range of resources. These resources include materials, buildings, land, equipment, technology and, crucially, people. Any organisation needs good employees who have the right skills to achieve the company†s aims and objectives. Human resource management (HRM) is the business function that focuses on the people aspects of an organisation. It ensures the efficient management of people in the business. It is responsible for ensuring that an organisation has the right people to deliver its overall business plan. Meeting customer needs Centrica, the parent corporation of British Gas, has to deliver long term profitability. Its shareholders expect the business to show a return on their investment by making profits, now and in the future. British Gas needs to contribute to these profits. This means consistently meeting the needs of its customers with competitively priced products and services that give good returns to the company. Residential consumers across the country are the core customer base of British Gas. These customers expect top-class service at keen prices. If British Gas does not meet this standard, the company may lose business to competitors. To ensure customer satisfaction, British Gas engineers must have the technical skills to undertake work to the required standard and the people skills to deliver good customer service. Through its engineer recruitment team, the British Gas Academy must therefore ensure that the company attracts and retains the best engineers. This involves several complementary tasks. It requires planning to assess the future needs for skilled employees at British Gas. It requires a recruitment and selection programme to bring new people into the business. It requires a training operation to equip new recruits and existing employees with the right skills. Retaining people Importantly, British Gas must also ensure that it retains its best people. It is much more cost effective to retain trained and highly skilled staff than recruit and train up new people. British Gas seeks to retain people by offering a mix of financial and non-financial benefits. As well as good pay and a pension scheme, the company provides employees with the opportunity to buy shares in Centrica and it offers a great place to work and high-class training. Page 3:  Training As an expanding business, British Gas needed to increase its workforce to meet customer demand. At the end of 2002, British Gas established the British Gas Academy. The Academy has helped to develop and refocus training facilities to handle the extra training requirement in recruiting an additional 5,000 employees into the engineering workforce. * British Gas runs an intensive apprenticeship programme. This is delivered in training centres. Trainees should expect to qualify by year five. All domestic gas engineers become fully acquainted with the latest computer-aided diagnostic technology. There are also traineeships, which provide a way for new recruits to learn about the gas industry and gain relevant skills and qualifications. British Gas provides technical training for all its engineers throughout their careers. This ensures that its employees are kept up-to-date with new information and technologies to enable them to provide the best service possible. Training does not simply focus on technical skills and knowledge. Most employees have direct contact with customers, so it is important that they have good people skills. Awareness training is provided for employees across British Gas through an online learning package. Another programme is improving staff†s cultural awareness, particularly to support the growing international operations at British Gas. Page 4:  Workforce planning Workforce planning is the process of assessing a company†s current and future labour needs. The British Gas Academies must consider not just overall employee numbers but also the skills that will be required within the business. Workforce planning also involves managing any training and recruitment process to ensure the organisation has the right staff in place. Managers at British Gas conduct a programme of forecasting to predict how much the UK market for domestic gas engineering services will grow. This helps the company decide how many additional engineers it will need in the future. British Gas makes detailed forecasts of its demand for engineering personnel for one year in advance and makes more general estimates for a further two years into the future. Factors affecting workforce planning At British Gas, workforce requirements are driven by two different demands. First, there are contract customers that have service agreements with the company. Second, there are customers who call for one-off assistance if they have a specific problem. Demand for both these services has grown. In the last three or four years, the need for engineers has expanded accordingly. This has meant that it has had to recruit more staff. There are several other factors that influence workforce planning for British Gas. Engineering skills need to be constantly updated. Health and safety issues are also critically important in the gas industry. Health and safety regulations are changing all the time and EU regulations must also be considered. Apart from regular formal training to close skills gaps to ensure engineers stay up to date with technical matters, British Gas can alert engineers about technical changes via field radio or text messaging. Engineers can work all their careers in the field until they retire. Qualified engineers may spend up to 10 years gaining their skills, qualifications and experience. They have valued practical skills that are needed to deal with equipment and customers. However, British Gas also needs suitable people for promotion to higher roles, such as management jobs. It needs managers to plan, organise and co-ordinate the teams of engineers. It therefore needs to attract and recruit a wide range of people into the organisation. Page 5:  Recruitment As part of its workforce planning, British Gas implements a diversity and inclusion strategy using tailored action plans. This means it actively seeks new recruits from a wide range of backgrounds. The need to recruit a diverse engineering workforce is seen as critical by British Gas. It plans recruitment to ensure it has a socially inclusive workforce. This is important as it will enable British Gas to reflect the diversity of its customer base. For example, it is useful to have employees from different nationalities and backgrounds to communicate with customers that do not speak English as a first language. Recruiting more women engineers may help to attract female customers. British Gas has won a national award from the Council for Registered Gas Installers (CORGI) for its efforts to encourage and attract women into the engineering workforce and into plumbing and associated trades. To dispel the myth that only men can be good engineers, British Gas runs a Georgina and the Dragon campaign for children. What British Gas’ recruitment programmes  have achieved  is demonstrated by various awards during 2009: * British Gas  won awards from the Local Employment Partnership in the East Midlands. The awards for â€Å"Unlocking Talent†Ã‚  and the  Ã¢â‚¬Å"Outstanding LEP Achievement Award†Ã‚  recognise  the company’s recruitment work with the LEP and Jobcentre Plus in the region. * British Gas has been named in the 2009  Sunday Times’s 20 Best Big Companies to Work For. * The British Gas Academy won an award from Women into Science and Engineering (WISE). The award – Investor in WISE  Ã¢â‚¬â€œ rewarded the efforts British Gas makes  to promote science,  engineering and construction  to girls and young women. Advertising British Gas tries to appeal to a varied and diverse audience when promoting its apprenticeships. To advertise opportunities widely, British Gas uses specialist Sky channels like Parliamentary Projects TV, which focuses on careers, and Passion TV, which is aimed at the black community. In print media, it uses women’s magazines, publications targeted at ethnic minorities such as The Muslim Weekly as well as other careers directories for the same reason. Other channels include radio, newspapers,  British Gas website  (www. britishgasacademy. co. uk) and a DVD for schools. Recruiting gas engineers of the right level is important. Candidates for a British Gas apprenticeship must be at least 16 years old, and have a minimum of four GCSEs at grade C or above or equivalent (e. g. NVQs). However, they need more than academic qualifications, they must be able to show some aptitude for customer service, such as being able to listen to customers and understand their requirements. Application British Gas uses an online application form. To help British Gas decide an applicant’s suitability, this includes a value-based questionnaire. This requires responses to a series of statements about attitudes to work. There are 90 statements in all, and an applicant’s overall responses are rated green, amber or red. The colour reflects the attitudes the applicant has about work and people. This helps to show which roles a person is best suited to. British Gas does not take applicants with red ratings further as they may not show a ‘fit’ with the company requirements. However after an initial screening, green and amber applicants are invited to an interview and assessment centre for the final selection process. Here, candidates must show evidence of qualifications, ID and driving licence. Page 6:  Selection At the British Gas assessment centre the emphasis is very much upon ‘core competencies’ and ‘life skills’. Life skills are personal skills that are likely to affect the customer experience when someone is working in the field. British Gas engineers needs to show courtesy and politeness, for example. These are personal qualities that have a direct impact upon customer perception. Core competencies involve team working, interpersonal skills (such as dealing with people), motivation and responding to change. These are crucial skills that can affect the way an individual fits in and works within an organisation. Candidates attend the centre for a half-day assessment. This has three elements. The total scores from the three-part assessment help British Gas to decide who receives a job offer. Candidates are notified of the outcome within 14 days. All candidates can receive feedback. For those candidates offered a job, British Gas provides the usual job benefits including a van from the outset and a competitive starting salary. The new recruits then go on to benefit from the comprehensive programme of training through its Academy. This ensures that they are given the best start in their new careers. It also builds employee motivation and commitment to the company. Recruiting and selecting staff is an expensive process. By following a robust selection programme in this way, British Gas is able to ensure it gets the right people with the right skills. It also means it maximises the benefit from its investment. Page 7:  Conclusion Recruitment and selection at British Gas is driven by the need to maintain the competitive position of the company within the energy market. Domestic gas customers demand the very highest standards of service. They can be assured that British Gas engineers have high-level skills and expertise through its careful specification of entry qualifications followed by top quality training. British Gas also assesses the personal attributes of staff through role play and questionnaires as these influence customers’ perceptions of the service and the company. Great care is taken in determining the organisation’s future staffing needs. This drives the recruitment and selection process to ensure British Gas is seen as offering dynamic and exciting career paths for people of all backgrounds. By developing and nurturing its people, British Gas ensures that new recruits have the right qualities to help the business to compete.

Friday, August 30, 2019

Middle passage of slavery

One of the dark periods of the world’s history is the trading and exploitation of black slaves. The economic expansion in Europe and America through agricultural lands brought a growing demand for labor hands. European traders seized the opportunity by supplying Africans to be sold as slaves. Sources included Kongo and Ndongo (which now became Angola) and Senegal, although major trading took place ion the Atlantic Coast of Africa. As demands for slaves increased, trading spread in Eastern Africa (Perry 227).   Nowhere can one find a more profitable business than slave-trading during these period, which remarkably spanned for about four centuries (15th to 19th century) of continuous trading, estimated to reach about 20 million slaves (Ferguson and Bruun 569). At the height of trading during the 17th to 18th century, a trader who sold one male slave is guaranteed to make more than enough a year’s earnings. In England, a trader can even gain respectability since its society saw nothing wrong with this kind of business and was not regarded as illegal. It is not surprising therefore that many Europeans were lured by the promise of making a big fortune out of slave trading, to the detriment of Africans who were taken captive. The desire to make a sizeable amount of money and the insensibility of land owners had blinded them to see that these Africans were fellow human beings and should be treated humanely. A significant aspect of the entire process involved partnering with Africans. While it is shocking to see how one race could brutally treat another, it is more startling to see how a fellow African could exploit its own kind. Fellow Africans play a key role in helping European traders to succeed. They are responsible for the capture of their own countrymen, snatching and detaining them to a slave factory located at the western coast of Africa (Hibbert 127). Many do not reach the coast, since they could not survive being forced to march as far as 1,000 miles chained and with little food. Those who do were forcibly held in the factory, where working conditions were deplorable and food was scarce. Detention could range from a number of weeks to a year. These African human smugglers would exchange their ‘goods’ for guns, fabrics, metal products for weapons and farm tools, beads, or even cowry shells and other insignificant items brought by their European counterpart (Perry 2 29). Slave trading then became a lucrative business. There were written accounts of the horrific conditions with which captured Africans were subjected to. One captive slave named Olaudah Equiano vividly described through his own experience, the ordeal of many African slaves (Winds of Revolution 123). For this reason, some slaves had come to regard death a blissful way of ending the hardship. From the onset of their captivity to the point of slavery, slaves were deprived of any right to choose for themselves. Slaves were regarded more as a piece of property than a worker. Men, women, or children, common or of noble descent, all were taken captive for selling. Their ‘fate’ totally depended on the hands of their captors and ‘owners’ (Ferguson and Bruun 569-590). I. The Slave-Trade Route and The Middle Passage The course of trading by the Europeans involved different stages. The Middle Passage was usually associated with the trans-Atlantic shipment of human cargoes either to the Americas or the Caribbean. Strictly speaking however, the term was used to describe the second of a three-part stage of a trading process which includes the transportation of captured Africans. This also meant that traders are able to make a big size of income since every stage is able to produce a large amount of profit. The first part starts with the Europeans carrying goods to Africa that will be used to trade-in for the African slaves. Upon completion of negotiations, the now empty vessel is now replenished with purchased humans. The Middle Passage or otherwise known as the â€Å"middle† leg then begins — the second part of the trading route. This voyage would often take two to three months before reaching America or other destinations in Europe. During bad weathers, the trip could stretch as long as four months. Those who survive the trip were sold and the huge profit was used to purchase products such as sugar. The traders will make another huge profit, as they sell these goods in their return trip to Europe, the last part of the voyage (Winds of Revolution 122). II.  Ã‚  Ã‚  Ã‚  Ã‚   Conditions During the Voyage Those taken to the slave ships were treated worse than animals. The decks were cramped and did not leave much room for standing. Men and women in shackles were packed closely. They were required to lie on their backs, with their heads on another slave’s leg. Such a horrible position caused them to lie down on human discharges of another’s feces, urine, and at times even blood all throughout the passage. The air was putrid for breathing. Consequently, such poor conditions in cargo ships led to the rapid spread of diseases that took the life of many these people. Those who died were thrown overboard to keep sickness from spreading further. In order to control any rebellion, the crew often resorted to cruelty. Women were often abused sexually. The poor physical conditions within the ship, the lack of food, the cruelty of their captors, and the uncertainty of the future caused others to attempt suicide. Traders however, would want as much as each slaves to survive, simply for profit’s sake. When a slave attempts to commit suicide through self-imposed starvation, the method of force-feeding was used.   Others sought death by jumping off the ship. If it is of any consolation, members of the crew’s ship were treated just a little better than the slaves. Others also experienced being severely beaten by their captain. One account even records of a crew who sought his watery death than continue the agony of being repeatedly beaten (Winds of Revolution 124-129). III.  Ã‚  Ã‚  Ã‚  Ã‚   Reason for Choosing Africans as Slaves When Spain and Portugal took off plans for exploration, it ended in human exploitation. As they reached and colonized parts of the Americas, Native Americans proved extremely difficult for forced labor since they were unaccustomed to agricultural work. They also exhibited poor resistance to Old World diseases. Their familiarity of the surroundings made it extremely difficult for the Europeans to prevent them from escaping. Meanwhile, a small portion of Africans slavery was already being practiced in its outposts in Africa. Europeans had taken the idea from an African practice of enslaving war prisoners.   African characteristics were also observed to be a lot better: Africans were found to be more useful and stronger than the Native Americans. Since they were used to a hotter climate and agricultural work, Africans did not easily fell prey to European diseases. All these factors caused Europeans to rely more on Africans for slavery. IV.  Ã‚  Ã‚  Ã‚  Ã‚   Conclusion The practice was deeply rooted in greed. Actions to counter slavery met with great resistance and were relatively slow. It even tore America apart during a bitter civil war. The dispute concerning slavery continued for many generations between those who are for or against it. England passed the abolition of slavery in 1833 and anyone caught violating the law was fined as much as â‚ ¤ 20 million (Checkland 341). Other European nations also followed suit. Towards its abolition, great damage was already done on the economic, political, and social aspects of Africa. Since wealth was concentrated on slave-trading and possessed only by a few hands; acquired wealth was not used for the development of the land to benefit its entire society. Africa lost much of their human wealth and for four hundred years, suffered the consequences — losing potential leaders and good laborers for its own advancement. Those transported became alienated from their culture of origin (Perry 231). As for the following generations of those people who were transported, the struggle still continuous for people of color even thousands of years after the abolition of slave trading in America and the Western countries. Many still feel the sting of living from the taint of stereotyping created by the past. It left a legacy of racism present in some parts of society today. Although the practice should remain buried in the past, looking back on this bitter history should keep aflame all efforts to prevent it from recurring again. Traders before referred to it as a necessary evil. However, no amount of reason should be sufficient enough to allow anyone to exploit or even look down on its fellow human being. Works Cited: Checkland, S.G. The Rise of Industrial Society in England, 1815-1885. Great Britain: Longman, 1964. Cowell, Alan. Killing the Wizards. New York: Simon & Schuster, 1992. Ferguson, Wallace, and Geoffrey Bruun. A Survey of European Civilization 3rd ed. USA: The Riverside Press, 1958). Hibbert, Cristopher. Africa Explored: Europeans in the Dark Continent (1769-1889). London: Penguin Books Ltd., 1982. Perry, Marvin. Unfinished Journey: A World History. USA: Houghton Mifflin Company, 1983. Winds of Revolution AD 1700-1800. USA: Time-Life Books, 1991.

Thursday, August 29, 2019

A Burlesque Biography By Mark Twain English Literature Essay

A Burlesque Biography By Mark Twain English Literature Essay by Mark Twain (1835-1910) Two or three persons having at different times intimated that if I would write an autobiography they would read it when they got leisure, I yield at last to this frenzied public demand and herewith tender my history. Ours is a noble house, and stretches a long way back into antiquity. The earliest ancestor the Twains have any record of was a friend of the family by the name of Higgins. This was in the eleventh century, when our people were living in Aberdeen, county of Cork, England. Why it is that our long line has ever since borne the maternal name (except when one of them now and then took a playful refuge in an alias to avert foolishness), instead of Higgins, is a mystery which none of us has ever felt much desire to stir. It is a kind of vague, pretty romance, and we leave it alone. All the old families do that way. Arthour Twain was a man of considerable note–a solicitor on the highway in William Rufus’s time. At about the age of thirty he went to one of those fine old English places of resort called Newgate, to see about something, and never returned again. While there he died suddenly. Augustus Twain seems to have made something of a stir about the year 1160. He was as full of fun as he could be, and used to take his old saber and sharpen it up, and get in a convenient place on a dark night, and stick it through people as they went by, to see them jump. He was a born humorist. But he got to going too far with it; and the first time he was found stripping one of these parties, the authorities removed one end of him, and put it up on a nice high place on Temple Bar, where it could contemplate the people and have a good time. He never liked any situation so much or stuck to it so long. Then for the next two hundred years the family tree shows a succession of soldiers–noble, high-spirited fellows, who always went into battle singing, right behind the army, and always went out a-whooping, right ahead of it. Thi s is a scathing rebuke to old dead Froissart’s poor witticism that our family tree never had but one limb to it, and that that one stuck out at right angles, and bore fruit winter and summer. Early in the fifteenth century we have Beau Twain, called â€Å"the Scholar.† He wrote a beautiful, beautiful hand. And he could imitate anybody’s hand so closely that it was enough to make a person laugh his head off to see it. He had infinite sport with his talent. But by and by he took a contract to break stone for a road, and the roughness of the work spoiled his hand. Still, he enjoyed life all the time he was in the stone business, which, with inconsiderable intervals, was some forty-two years. In fact, he died in harness. During all those long years he gave such satisfaction that he never was through with one contract a week till the government gave him another. He was a perfect pet. And he was always a favorite with his fellow-artists, and was a conspicuous member o f their benevolent secret society, called the Chain Gang. He always wore his hair short, had a preference for striped clothes, and died lamented by the government. He was a sore loss to his country. For he was so regular.

Wednesday, August 28, 2019

Food Lion Research Paper Example | Topics and Well Written Essays - 2000 words

Food Lion - Research Paper Example verseas; currently being represented in over 70 countries and seeking to integrate with the Midwestern and Western markets of grocery retail; rather than forever being attributed to the southeast/mid Atlantic region. The mission statement of Food Lion reads as follows: â€Å"Food Lions mission is to ensure that we remain the low price leader in the supermarket industry without compromising quality or customer satisfaction† (Delhaize, n.d.). Naturally, in order to achieve this goal, it is necessary for the human resources Department/organization to ensure that the needs of employees are met, a culture is defined, and effective policies which relate to this mission statement can be trained on and affected. Rather than understanding Food Lion’s mission statement as something of a separate issue to human resources, it must be understood and appreciated that human resources are integral in seeking to accomplish the goals that the mission statement sets forward. Assess the common HR challenges facing this organization (e.g., high turn-over, low wages, lack of skilled workers, etc.). Recommend an HR strategy you would implement to overcome the challenges assessed.   The core problem that Food Lion faces is the fact that it primarily hires low wage earners that have very few marketable skills. As a direct result of this, Food Lion experiences an extraordinarily high turnover rate; as individuals soon a look for other jobs that are more lucrative based upon the skills and valuable work experience that have gained while working at Food Lion. This extends not only to individuals responsible for inventory control, customer relations, and warehouse work, it encompasses the full gamut of logistics and supply that the Food Lion brand leverages each and every day as a function of encouraging further profitability. However, rather than coming to accept the fact that Food Lion is due to continually experienced high turnover rates from these low-wage earners, there are human

Tuesday, August 27, 2019

Market Position Analysis of Yum Brand Essay Example | Topics and Well Written Essays - 6750 words - 1

Market Position Analysis of Yum Brand - Essay Example According to the company website, Yum Brand is adjudged as the world’s largest fast-food restaurant in the world in terms of the total number of operating units. With a staggering figure of 40,000 restaurants and presence in more than 130 countries of the world, the global sales figures of Yum increasing at a robust rate (Yum, 2013). Â  Since the spin-off from PepsiCo in the year 1997, the company has truly become a global company. The assets skyrocketed from $4,531m to 9,011m in the global restaurant industry (Global Business Browser, 2014). For the 36 weeks ended 07 September 2013, its revenues reduced by 6% to $8.91b and net income decreased 39% to $770m (Interim report, 2013). The company always aims at entering countries which have strong market potential and implements relevant operational strategies which allow them to surmount a different kind of market challenges. Yum Brands have experienced growth by focusing on the foreign markets such as China, India, and Brazil to name a few. Â  Some of the key competitors of the firm are McDonald's, Burger King, Subway and Dunkin Donuts among others. The company is also known for its philanthropic activities across the globe and has always received respect from the society. For example, the company offers employment opportunities to the unprivileged segment of the society. Though it is facing the decline in sales and profits, reports have suggested that the macroeconomic environment has always remained strong for the Yum Brands, especially in the overseas markets (Cho, 2012). According to Global Business Browser (2013), the restaurant's industry all over the world increased by 8.5% in 2011 to reach a value of $2,457.1b and it is expected to increase by 41.7% to $3,482.5b by 2016. The company anticipates that the in the next 8-10 years, the rising incomes will continue to unfold and will allow millions of people to afford fast foods from Yum Brands (Cho, 2012).

Monday, August 26, 2019

BHS 499 (Senior Capstone Project) Module 1 SLP Essay

BHS 499 (Senior Capstone Project) Module 1 SLP - Essay Example through eliminating healthcare acquired infections and other avoidable accidents. National Health Services (NHS) formulated the Quality Framework in order to achieve the more improve quality of care at the same time support local clinical teams that consist the following: (1) Bring lucidity to quality in terms of access to evidences on best practice; (2) Publication of quality information to make it available to the public; (3) Offering rewards to high quality care givers; (4) Safeguarding basic standards in healthcare setting; (5) Ensuring state-of-the-art medical advances and service design; (6) Distinguishing the role of clinicians as leaders in quality of care (Davis, 2005; p1 par 1). warning systems in therapeutic procedures for cures of progressive diseases such as cystic fibrosis, diseases like cancer and heart disease, implantation procedures of artificial hips and kidneys. Nanoparticles may be very useful to researchers to overcome problems in gene therapy, and treatment of genetically inherited diseases. .Nanoparticles generally used to apply heat to cancer cells so they will be killed.

Ecosystem structure and function lecture (Kindly follow the Essay

Ecosystem structure and function lecture (Kindly follow the instructions) not an - Essay Example The energy as a result of cellular respiration is called net primary productivity. Decomposers feed on the waste product. As one moves up the next energy level, only 10% of the energy moves to the next level with the rest been lost as heat (Boag, 1- 7). The net primary productivity of ecosystems such as marine ecosystems is limited by certain nutrients like nitrogen and phosphorus. Pyramids of biomass and energy change between ecosystems. Some pyramids of biomass are inverted. Biomagnification is as a result of the concentration of pollutants as they move from lower to higher trophic levels. The nutrients in an ecosystem are transferred from organism to organism through assimilation, consumption and decomposition. Factors that influence the rate of nutrient cycling in an ecosystem include decomposition of detritus limits the rate of movement of the nutrients through an ecosystem and the abundance of decomposers in terms of biomass. The carbon cycle involves the movement of carbon among terrestrial ecosystems, oceans and atmosphere. Photosynthesis and respiration are the main movers of carbon. Carbon dioxide is a greenhouse gas that traps heat on earth (Boag, 8 – 14). The lecture was full of intensity and concentration was required throughout without which vital concepts were missed. The reason why I chose to attend this lecture was because the topic on ecology is related to my field of study which is Microbiology and I have an interest in knowing the nature of the courses I shall attend during my graduate program. This lecture is related to my field of study through the study of the nature of organisms, how they coexist and relate to their environment. In this lecture, I already knew about the four components of the ecosystem. I learnt a new concept termed as biomagnifications. I learnt that my ability to follow take notes in a typical academic lecture was excellent at the beginning, but as the lecture went on, the

Sunday, August 25, 2019

Negotiate Assignment Example | Topics and Well Written Essays - 250 words

Negotiate - Assignment Example The negotiation processes would be discussed, compared and contrasted in the light of the applicability to one’s work setting. A car dealer in Denver, Colorado pegs the price of a second hand vehicle at a certain amount or level. Buyers, usually opt to negotiate purchasing that commodity at a lower price. For example, I was looking for a second-hand van to purchase. The car dealer offers the van for sale at $5000. I try to negotiate to purchase the van at a lower price, say $4000. The negotiation style most appropriately applied is the compromising style. Compromising usually requires that both people give up something in order to reach an agreement. It seems fair because both sides win and lose. This style of conflict resolution is common. Unfortunately, neither person usually gets exactly what one wants. This can sometimes lead to angry feelings later. Since I wanted a lower price for the van, say $4000, then, this would immediately be relayed and the seller would immediately respond by their agreeing or disagreeing on the suggested buying price. The end result of a compromise agreement is a solution that is acceptable to both sides. We eventually ended up on agreeing at a price of $4500 for the van – which is a midpoint of the pegged prices. By utilizing the compromising approach, face-to-face negotiations are applied. This would directly pinpoint the source of the problem by identifying the situation and the options. Meeting halfway is the most effective solution to this negotiation approach. Although both parties did not get their original intended prices for the van, we were able to work out an agreeable price which is amenable to

Saturday, August 24, 2019

The Lasting Social and Political impact of the 1950's Essay

The Lasting Social and Political impact of the 1950's - Essay Example The full effect of the national mobilization, in both countries, was a unique and monumental undertaking that served to provide the technical knowledge that led the staggering innovations of the subsequent generation. Proving that the benefits ran far beyond the military application, this study will confirm that argument that the 1950’s, in specific, marked a turning point in military ingenuity and upper tier scientific exploration. Directly accompanying this rise in technology was the fundamental fact that better education was needed to further any significant works. Birthed of the militaries need for expertise in new and still developing fields of research this study presents arguments that define the effect that need had on the education system of an entire nation. With new demands and ever increasing competition from the Soviet Union, the American education system underwent a substantial upgrade. Such an accomplishment, while made for sake of the brief military need, still serves to provide educated students for a still warring world. Alongside the Military buildup of the 1950’s, the Space Race helped to define a nations pride and determination. In direct competition with the U.S.S.R., American Space technology was thrust into the mainstream of society. Unknown and unremarkable scientists became national heroes and figures of consequence nearly overnight. By proving that the need for the American culture to feel triumphant helped to fuel the drive to space, this research will link the importance of the Space race to the cultural development in the decade of 1950 – 1960 and well beyond. By providing a point of national pride with which an entire population could not only rally around but hold up as role models and heroes, the Space Race provided an outlet for the pent up frustrations that were left simmering from the Second World War. Facing our once ally in a political and exploratory arena served to drive ingenuity and innovation to a never before level, that alone would have been a monumental achievement. Standing alongside the major accomplishments that took place in that decade, the research will show the profound influence that these footholds attained gave to following research. Much like the rest of the culture, competition combined with a sense of potential conflict, will serve to drive an already driven person to every greater height. On the other end of the cultural spectrum, the Space Race and the Arms race respectively are directly responsible for several still extant social movements across the globe. An entire philosophy was spawned by the detonation of the first nuclear bomb. The mere sight of the blue marble of Earth from space helped to cause the environmental movement; this was their first adopted symbol. The technology to see and the knowledge to learn that harm or potential harm would happen was direct result of military and space exploration innovation. This link will serve to show the fundame ntal and utterly connected nature that the movements of a society and their military are. The intertwining nature of a culture encompasses every facet and excludes none. During the 1950’s, there was such momentous tidal wave of change that the facts will make it nearly impossible to argue

Friday, August 23, 2019

Leon Battista Alberti Essay Example | Topics and Well Written Essays - 1500 words

Leon Battista Alberti - Essay Example During the times Alberti introduced the idea of linear perspective, many other people could write a treatise about the upcoming work of art (Peter, 2007). Fortunately, he was the only fully equipped to manage the work than anyone else in the time. He had the passion for art and device of words which most of his associatesneeded. He brought a familiarity and logical baggage to the task, which was essentially giving utterances to the rules covering his new art and convinced all clienteles and artists that the art was worth taking. Alberti’s thinking that his theory and other works of those times could be precised as knowledge comes from sensory insights (Alberti, 1966). The sensory perception used in comparison with others and in relation to human being to make conclusions (Honour & Fleming, 2002). The conclusions made, approved, and applied by use of mathematics. In his theory mostly made use of, joints of pyramids with image surface, comparativetrios and side view for foreshor tening while testing with diagonal and the use of street as locus. Alberti was concerned with filmicentrances since person’s knowledge relies on sensualfacts. The fact that most solid bodies have a skin, Alberti was also concerned with the play of shades through the surface of an entity. Once these observations are, made conclusionsusing comparison since with it there is a power that illustrates within entities that are less or equal (Martin, 2003). Alberti believed that, man, nature, and mathematics are parts of one thing and that man uses mathematics to comprehend and regulate nature. In his theory, mathematics is a solutions not an end as the theory is more of appearance that reality. As Alberti is concerned, mathematics used to control the data used in art and the painting by itself. In his theory, he advocates for fertility and diversity of color codesand presumes the same variety of man positions and engagements. He says that good work of art has to consist of all sorts of living things including human beings of all ages and both male and female. He has not set formulae to guide the artist, but has put the obligation for the result in the artist’s hands. His approach of the use and the easy way of changing three-dimension world into two-dimension has helped many artist in their work and has been adopted by many across the world (Alberti, 1966). Alberti claims that a point is symbol that cannot split into several parts because it can be located on a plane and visible. He further explains how points joined to form a line and how these lines joined in rows to make a plane. A plane is known by its length and breadth and if need be the quality. Some plane qualities cannot change without changing the plane while others are due to visual effects and seems to change to the viewer even as the plane remains unchanged. A plane changes its name and shape when either its angles or lines are changed. By making angles either more acute or obtuse and short ening or lengthening the lines will completely change the plane. Alberti further explains other qualities of a plane that lie on the surface of a plane. There are two other qualities according to Alberti which although seems to change the plane, it is not actually changed (Stockstad, 2004). This depends on the power of sight as explained above, when the distance between an object and the eye changes, the object seems to

Thursday, August 22, 2019

El Presidente Essay Example for Free

El Presidente Essay El Presidente was a film which portrays the happenings from the past when colonization of other country started while Emilio Aguinaldo was the president.  After watching the film, though we watched it bit by bit because of limited time, I can say it was still worth it, because it at least showed to us the events in the past with the creativity of the people behind it. The film was good. I enjoyed watching it, though in some parts of it were kind of confusing to me maybe because I don’t have enough knowledge of history. There are parts when Andres Bonifacio had been a traitor and had been punished to death because of him being a traitor, this confused me. Way back years ago, when I was in elementary and high school years, I can still remember that A. Bonifacio was one of the people I salute in the Philippine History, for being the Father of Katipunan and founder of it. But when I saw that film, I’m confused with what to think of him because of what he acted when someone kind of insult him for not having a higher level of education. He loses his patience and that led to his betrayal to the katipunan. I think if I was in his position, I wouldn’t do what he did, I would prove them wrong about what they think an uneducated or someone who has lower level of learning unworthy to lead, with that he should have proved himself worthy instead of being eaten by his anger. Also, there’s another thing of the film which I’m confused, its Emilio Aguinaldo. It seemed like E. Aguinaldo was a type of person who do not have any flaws in the film. Overall the film was worth watching. It gave me goose bumps in some part of it because of its intensity, and that hurt feeling seeing how our ancestors fight for our freedom that we’re having now because of their bravery even though they had risked their lives for it.

Wednesday, August 21, 2019

McAfee Spyware Blocker Essay Example for Free

McAfee Spyware Blocker Essay McAfee, an Intel company, has been an industry leader for antivirus software to protect personal computers for many years. The company has expanded its services from protecting computers to also protecting cellular browsing as well, the software can be used on the iPhone, and Android phones. Product McAfee is introducing a new line of software designed specifically for Android and iPhone devices to block unwanted spying from applications downloaded on the mobile devices. McAfee Spyware Blocker will target applications designed to collect personal and private information. The applications on the users phone that are targeted are; photos, email, browsing history, camera, contacts, passwords, and all information posted in mentioned applications. Mission Statement McAfee Spyware Blocker for the iPhone and Android follows the same mission as the products for its personal computer software. Our mission for the McAfee Spyware Blocker application is to protect each client’s identity and personal information while using their mobile device with an advanced innovative software program designed to protect all information on the mobile device. The McAfee Spyware Blocker will filter all movements on mobile devices and warn the user with unwanted tracking, or spying from developers of applications. This also includes third party applications such as the popular Facebook, Pinterest, Yelp, Instagram, and other social media sites who require access to the users information. Customer Need As the first of its kind, McAfee Spyware Blocker, has set itself apart from other spyware blockers. The software provides protection on mobile devices, and from unwanted sharing of information when downloading applications. The software creates a separate profile based on user preferences, which block all real information of the user. It then forces applications to use false information, created by the user, to run applications that require access to personal information. Clients of McAfee are guaranteed by the history of the company, and its proven success and growth of its other products, which set the company apart from the current competition. The company is in constant development of its products to improve, grow, and meet the quick changing needs of technology and clients. McAfee follows trends and see’s the need for an advanced spyware blocker for the mobile market. The division has developed, what it feels, is an advanced, superior product for its current client base, and has developed a plan to achieve a new market of customers. Vision Model The vision of the McAfee Spyware Blocker is to create the best mobile spyware blocker in the market. The company started with the iPhone and Android markets first, but will add the iPad, iPod, tablet, and eventually all wireless devices. Wireless devices could potentially allow applications to be hacked and monitored for personal and private information. With the growing market of personal mobile and wireless devices, McAfee will continuously grow and advance the current software technology. The advances developed will provide upgrades for current clients and new software for new devices and platforms. The demand for privacy protection in today’s quick moving and growing technology market speaks volumes for the need for new advanced software for the growing community of mobile and wireless devices. The decision to create the McAfee Spyware Blocker division and be a leader in the market was an easy decision, and one that will grow the company in the direction of the ever-expanding technology movement. Business Model Throughout the history of McAfee products, the growing development of new technology has brought about a high demand and need for protection of client’s information. The need to protect clients has grown from personal computers to mobile and wireless devices and has our clients asking for more advanced protection while using an array of devices Mobile browsing on an Android or iPhone device, allows spies to access personal information. In recent years, breeches have caused an increase of identity theft directly related to mobile devices. The information stored, or applications used while on the device are likely to provide an expert hacker to gain valuable personal information. To satisfy the consumer need for protection, McAfee developed the spyware blocker division. The value created to offer advanced protection while operating the Android or iPhone devices, is unparalleled to any other spyware protection claims. No other spyware developed by competing companies has provided the user with absolute confidence of protection while using their mobile device. The software is an advancement of our current products, and the basis of the spyware is the same as in our other products. Because we have added to an existing product, the product, planning, development, and creative costs were minimal in relevance to the overall product offered. The company will continue to develop products that are on the cutting edge of what is going to come in the future. By utilizing the current software platforms, coding, scripting, and language, we are able to make advances quickly and cost effective. McAfee Spyware Blocker will continue to grow and develop as the market grows, and technology advances to include new products, McAfee, Inc. (2014). Vision, Mission, Value The previous launch of the McAfee Expanded Data Security, Application Security, and Ease of Administration in 2012, protected users from browser invasions. The applications, however, did not stop companies from using information from a clients phone, McAfee, Inc. (2014). The previous launch of mobile device protection, allowed McAfee to move in the direction of advanced mobile and wireless protection, by the development of the McAfee Spyware Blocker. The company continues to move in the direction of technology development and advancements and the need to create software to protect clients using multiple platforms, and from the creators  of applications that require access to personal information. The vision and mission of McAfee have always been to protect and provide its clients with the most advanced software protection from spies and hackers. The decision to create a new line of defense against advanced hackers and spies came from the need to protect against unlawful privacy breeches. The value of the product could be described as valuable beyond any dollar. To sell the product, the cost to produce, and the market value of the product describes the cost of the product to be $59.99, which will include any follow-up updates, McAfee, Inc. (2014). Vision, Mission, Value Summary The vision of McAfee Spyware Blocker is that each client will feel secure and trust that their information is protected on their Android or iPhone devices, and in the future, other wireless and mobile devices. The future of McAfee Spyware Blocker, according the analysis of the market research, shows that the software will continue to grow with demand of its clients and technology. The mission of McAfee Spyware Blocker is to be the best in the market, to out sell, out develop and outshine the competition. The ability to build and expand on an existing product to provide clients the best possible product has allowed McAfee to be a leader in spyware blocking software. The employment of highly knowledgeable employee’s of McAfee products gives client’s confidence in receiving assistance with the product Employees will have vital knowledge of the product and how the product works. Having extensive knowledge the users platform (Android/iPhone) will not only give confidence to the leaders of the McAfee Spyware Blocker, but also the end users of the software. Protection of personal information is priceless. Everyone, including the leaders at McAfee, want protection from theft of information. The McAfee Spyware Blocker gives all users exactly that, protection. The stated value  of $59.99 for the product does not include the value of protection, that is the additional bonus of the software. Principles and values The principles and values of the McAfee Spyware Blocker division follow the same guidelines of the company, McAfee, Inc. (2014). Listed below are the five principles of McAfee: 1.Conduct business with honesty and integrity 2.Follow the letter and spirit of the law 3.Treat each other fairly 4.Act in the best interests of McAfee Spyware Blocker and avoid conflicts of interest 5.Protect the company’s assets and reputation, McAfee, Inc. (2014). The company’s business values in the division of McAfee Spyware Blocker follow directly in line with McAfee, Inc. They are listed as: 1.Expertise – We have a deep mastery of digital security, and we never stop building and improving our expertise. 2.Partnership – We have a true sense of teamwork and partnership across McAfee functions and with channel partners and customers, developing collaborative solutions that offer tangible benefits. 3.Integrity – We’re in the business of protecting data from the unscrupulous, performing to the highest standards of ethics and responsibility. 4.Results – We have definitive goals with definitive outcomes, always striving for higher performance and never losing focus. 5.Courage – Being always ready is a requirement for courageous leadership across our business. We’re never intimidated by the audacious challenges we face every day, McAfee, Inc. (2014). The division of McAfee Spyware Blocker promises to be innovative regarding new technology developed for Android, iPhone, wireless devices, and other devices as they grow and change. The spyware blocker software will continue to advance and grow as the malicious methods of unscrupulous individuals and companies develop new ways to spy. References McAfee, Inc. (2014). McAfee for Consumer Retrieved from http://home.mcafee.com/?CID=MFEen-usMHP001 Pearce, J. A. II. (2013). Strategic management: Planning for domestic and global competition (13th ed.). New York, NY: McGraw-Hill. Thompson, A. A., Gamble, J. E., Strickland, A. J. (2012). Crafting and executing strategy: The quest for competitive advantage (18th ed.). New York, NY: McGraw-Hill.

Tuesday, August 20, 2019

Bluetooth Remote Access to PC Using Mobile Devices

Bluetooth Remote Access to PC Using Mobile Devices CHAPTER 1 INTRODUCTION TO RESEARCH 1.1 INTRODUCTION: Bluetooth is a wireless technology of the last decade, there has been a lot of research going on this technology all over the world. The Bluetooth was named after the 10th century Danish King Harald Blatand or Harold Bluetooth. King Blatand was influential in uniting militaristic factions in parts of what are now Norway, Sweden and Denmark just as Bluetooth technology is designed to allow collaboration between differing industries such as computing, mobile phone and automotive markets. Bluetooth technology was the internal project of Ericssion, which was intended for providing short distance multiple links. Then it was collaborate with Intel in 1997, later the association with Nokia, IBM, Toshiba, Microsoft, Motorola, 3com etc to form a non profitable trade association Bluetooth Special Interest Group (SIG). The formed consortium adopted common code name to Bluetooth for their open source specification. Bluetooth uses 2.4 GHz frequency for transmitting the data at band rate of 1Mbps . In taking account of users point of view, there are three important features to Bluetooth. (Ali M Aljuaied 2001) It is wireless. When you got to client place, you need not have to worry about keeping track of cables to attach all of your components and you can design your application without wondering where all the wires will go. It is economical. You do not have to think about it. Bluetooth does not require any extraordinary skills to make it work. The devices find one way or another and pairs up a conversation without any user input at all. Bluetooth technology is a standard and communications protocol which is designed for low power consumption, with a short range (power-class-dependent: 1 meter, 10 meters, 100 meters) based on low-cost transceiver microchips in each device. Bluetooth enabled devices tend to communicate with each other when they are in range. These devices use radio wave communications system, so that they do not have to be in line of sight with other and can even be in other rooms, as long as the received transmission is powerful enough. During the discovery process Bluetooth device transmits class type of device and the supported services of that class Class Max permitted power Range(approx) Class1 100mW 100meters Class2 2.5mW 10meters Class3 1Mw 1 meter Table reference [www.bluetooth.com] The popular Bluetooth applications are: Mobile phone and hands free headset. File transfer between Bluetooth enable devices using Obex application The places where traditionally used by IrDA in control equipment. In gaming equipments like play station. Used to connect the Dial up internet for PC. 1.2 AIMS AND OBJECTIVES OF RESEARCH: The main research aim of the project is to develop Remote PC manager from mobile through Bluetooth and make it more efficient and reliable for future applications. The following are the research objectives: Developing user friendly software for remote management of PC through mobile using Bluetooth. Improvement of response time in the existing application. To solve the problem occurred in application during the connection and disconnection Process. 1.3 PAST WORKS: There has been a vast amount of research carried out in Bluetooth related applications all over world of which is this PC remote mobile phone using Bluetooth application, but most of the applications that are made have been having problems related to response time, compatibility with specific mobile such as Nokia and Sony Ericsson, connection and disconnection. Hence, the next few lines will discuss about the background for developing PC remote. Based on Blueshareware.com Development done Deployment year The first beta type control 1.0 version using Nokia 6600 23 Feb. 2005 Then added applications related to audio and video player 7 march 2005 Then started to test the code on Sony Ericsson 6 Nov 2005 New GUI for phone has been developed with special soft keys 29 Jan 2006 After then they started to have better GUI by correct early problems and adding new applications releasing higher version Bluetooth remote control 2.0 The Open java script that allowed others to be modified They have added new PowerPoint application. It had some drawback such as application could not run in some mobiles and screen turn blank some times. There has been a lot of modification and re-releases by solving problems like increasing the range of compactable mobile and correcting minor problems. Bluetooth remote control 3.0 Win AMP player has been added Till this version the power point and any applications was not given importance. The development of latest version of the GUI was available in J2me, which decreased the application size. Bluetooth remote control 4.0 Though they added, Win AMP could not be launched from it. The phone could not be compactable with other stacks. Response was improved for some functions. The application had problems with the connection and disconnection. Less application size than compare to the above version was achieved by better versions of MIDP and CLDC. Some individuals have been working on this software like Jerome Laban. The project related to two PC remotes, the software developer who is working on compatibility for different types of mobiles such as Orange E200/QTEK 8080 and some are Motorola based mobiles with Blue Soleil third party stack in .NET FRAMEWORK 2.0 where he using different programming languages and client softwares. There has been lot of development going on PC remote using Mobile phone Bluetooth many of them are developing many applications based on different softwares .The improvement in MIDP, CLDC in the new mobile have increased the applications, and the application code size started to decrease with improvements in them. 1.4 RATIONALE FOR RESEARCH: After my under graduation I started working in an embedded system based company in India. Lampex electronics Ltd which deals with providing embedded solution to local firm, we had an Electrical billing handheld machine, which we supplied to state of Andhra Pradesh (India) Electricity board, they requested for a short distance wireless technology to upload the data from handheld machine to PC. We have selected IrDA as wireless technology because of low power consumption and less memory application .We have done the work successfully but as a developer, I was not convinced for two reasons: The handheld machine and PC transceivers have to be placed face to face. We had problem with time slots management, went slaves (handheld machine) are more than two at the same time. This made me to select Bluetooth technology as my research topic, and then I came across different research topics on Bluetooth related to security, pairing, remote PC manager etc. Then I started working on a Remote PC manager. Remote PC manager is an application developed using Bluetooth available in your mobile phone to manage a PC. The application had problem related to response time in certain areas of application. The response time is the time an application takes to react to a give input. In this application, we define response time as the time taken to respond when an instruction have been sent from mobile phone to remote pc manager. CHAPTER 2 LITERATURE REVIEW AND RESEARCH METHODOLOGY 2.1 RESEARCH APPROACHES: The following are the approaches towards my research, which have eventually done in stages: To study about Bluetooth behaviour and comments related to the application from the users. In the course of research, reading has been done from books, journals and websites regarding Bluetooth and related software is used in the project. Developing Program and data flow diagrams An IT related program was developed which had all the modern approaches to the project development and deployment and as well as the data flow diagrams were drawn for the clear view of the data in the program Implementation After the development of the programs, implementation has carried out to check its success and working Testing The programmable code is tested, verified and made sure that its bug free. 2.2 Justification of Research Approaches: Mixed research methods have been used for projects as it deals with collecting information about the product and implementation to the product. Using Qualitative research, more data is gathered from journals and textbooks, which showed about the Bluetooth applications. There was also chance to know, to what are hurdles in the existing Bluetooth technology. I have registered in Bluetooth groups and started to ask experts in this field about their feedback regarding the application. I went through some of the existing technologies available in the market and where I could study the functioning of the Bluetooth PC remote. Knowing about the application, I could estimate that projects with modern approach will be needed, in enhancing the application throughput. Online journals also helped me out a lot. Research books also helped me in how to carry out my research and which method would more suit my needs. Quantitative research is also a very important criterion in my research .I could plan my whole project on Gantt chart and proceed further. So, I had opted with mixed approach, i.e. qualitative and quantitative which made my research easier. 2.3 LITERATURE REVIEW: A lot of research is done on Bluetooth related application by Special Interest Groups (SIG) and developer all over the world because of its futuristic nature. From the past most of the developers have been developing applications on Bluetooth and WLAN. We can see degradation on Wi-Fi when a Bluetooth is close to the Wi-Fi station; the impact of interference is significant. However, the relocation of Bluetooth from the Wi-Fi by 10m will not have great impact on the throughput. So both can coexist but we should be sensible in our expectations and attempts to combine these technologies. [Brent A. Miller, Chatschik Bisdikian 2000]. We present an AFH that modifies it in order to mitigate interference. Frequency hopping in Bluetooth is achieved as follows. Frequencies are listed as even and odd frequencies in the range of 2.402-2.480 GHz. The main idea in BIAS is to wait for association of slot with a â€Å"good† frequency in order to transmit a packet. The basic idea of response times has been about the same for thirty years [Brent A. Miller, Chatschik Bisdikian 2000]: If the response time is about 0.1 second user feels that the system is reacting instantaneously, means that no feedback is necessary except to display the result. If the response time is about 1.0 second user feels to stay uninterrupted, even though the user will notice the delay. Normally, no feedback is necessary during delays of more than 0.1 but less than 1.0 second, but if its 1 second the user feels that he can directly on the data. If the response time is about 10 seconds users attention is focused on the dialogue. For longer delay such as scanning whole system by anti virus will take long time and user knows about it. Feedback is required especially important if the response time is likely to be highly variable, since users will not know what to expect. Normally, response time of an application should be as fast as possible [Myers, B., H. Stiel R. Gargiulo (1998)], but it is also possible for the computer to react so fast that the user cannot keep up with the feedback. For example, a scrolling down in word document application move so fast that the user cannot stop it in time for the desired pages or section within the available window. The fact is that computers with modern processor can go work in few milliseconds can be too fast for the user which indicates the need for user-interface changes, user interface is set according to real-time clock rather than being set to indirect effect of the computers execution speed. These applications take advantage in varying degree of Bluetooth capabilities such as to be always on, always connected, mobile and easy to use. Throughout all of this, of course it is important not to lose sight of the requirements to get basic application to operate properly. However most of developers have found the specification of 1.1 to be stable, so future Bluetooth enabled products for general consumer would confine to this specification [Robert Morrow, 2002]. In an indoor environment, multipath is almost present because of furniture and other equipment in building along with the building material themselves, are prone to reflections when they are illuminated from radio source. Unlike the large fading which is seen in radio frequency where distance travel by the wave is in terms of 10 times the wavelength. According to Morrow the Bluetooth, channel fading could be analysed based on Doppler spread, delay spread and out probability. If a Bluetooth Piconet is an indoor environment where an object can move at speed up to a fast walk, then minimum Doppler shift will be about 10 Hz and coherence time is about 40 ms. So, the coherence time will be 1 microsecond smaller than coherence time which leads to slow fading and this could really slow down when 40000 bytes transfer is done. Suppose if we take a large room where the delay speed is 50ns and gives coherence bandwidth of 2 MHz, but maximum bandwidth between each hop is only 1MHz, so this leads to flat fading. As the Bluetooth channel is flat fading this will effect the Bit Error Rate BER (Rayliegh equation). According to Morrow the enhancement has done related to lower level protocol. Bluetooth data rate should be increased at the rate of 10 to the present specification. Proper implementation of Adaptive frequency hopping should be done. The range of Bluetooth has to be increase by Store and forward capability. Use of Smart antenna. The ACL link is based on polling scheme mechanism between master and up to seven active slaves in a Pico net. It can provide both symmetric and asymmetric bandwidth, which is determine by the packet type and frequency with which the device is polled. The ACL payload is protected by CRC check, which is used for retransmission scheme, the value seems to be small about 1.25ms [David, 2002], but it is important when we are dealing with IP streaming because it may lead to retransmission delay. This could be limited by setting the flush timeout setting. If Bluetooth transmit constantly on same frequency, the maximum raw date rate would be 1 mbps. However [David, 2002], this is not the data rate we will obtain over air interface. Bandwidth required for a 72 bit access code to identify the piconet and 54 bit header to indentify the slave will be about 405microseconds and guard time of 220 microseconds for next frequency hop. So, one slot packet requires a bandwidth of about 1/3 for pay load data and 7/9 and 13/15 for 3 and 5 slots of data respectively. So these counts have at least guard time of 1250 micro second as slot size increases. User friendly can be defined as easy to learn, easy to use, easy to remember and they increase the user ability to perform the desired task. According to Barrie Shermann, 1985 User friendly means adapting parts of the system to the operator rather than the operator having to adjust to the system. Donald Norman explains user friendly software design with respect to relationship between visibility, mapping and feedback to the design of usable objects. [The Design of Every day Things,1990] Visibility means how easy user can find the function in the software. Poor visibility can cause too many problems to the users. Mapping means the relationship between controls, the thing it affects, outcome. Good mapping is one which has buttons which is clearly marked and simply indicates their function. Feedback to the design of usable objects means every function on operation must give feedback to the user. When passenger press train door button he gets feedback in terms of voice message saying that â€Å"door opening† .Such feedback makes user feel good. The creation of user friendly software is equal to part of science and art .The science is referred to as usability. The International Organisation for standardization (ISO) defines usability as the effectiveness, efficiency and satisfaction with which the user achieve specified targets. Effectiveness is the accuracy and completeness with which specified user can achieve goal in an environment. Efficiency is the resource expended in relation to the accuracy and completeness of goal achieved. Satisfaction is the comfort and acceptability of work system to its users and other people affected by its use. The second part is the Art of design, which inspires and often take long time .We are not speaking about art in terms of graphic art, although it plays an important role in development of user friendly software. We are speaking of the designer ability to create a vision of how software can and should be. 2.4 CRITICAL ANALYSIS: Since this Bluetooth application is an indoor application, its associated with reflection, diffraction, scattering, and refraction of radio waves. Quality of service means predefined and negotiated data rate, delay and error rate. Since the delay and the error rate are strongly related to the data rate, we focus our present investigations on the data rate. A signal passed over a wireless channel is affected by path loss, narrow, wideband fading and co-channel interference. In the present application the response time is dependent on, the performance metrics include the path loss, the mean access delay and the channel response time. When a receiver is placed some distance from the transmitter antenna it is logical to say that there will be some loss in signal. As we know that there is high probability of multipath effects in this application, as it plays a significant role in path loss values, thus high path loss of signal will lead to retransmission of signal. So we need to perform multipath mitigation, so we have selected compensate for multipath through diversity combinations. So normal Bluetooth antenna will be replaced by smarter antenna with diversity combinations .The packets that are transferred consecutive to time do not use the same frequency, which in turn avoids the drawbacks of the narrowband transmission. As we know that the link performance obeys the rules for narrow band systems and additionally depends on fading of the individual channels occupied. Therefore, all these methods of improving the physical layer have to be frequency agile. The access delay measures the time taken to transmit a packet from the time it is passed to the MAC layer until it is successfully received at the destination. The delay is measured at the L2CAP layer. The access layer delays which are caused due to improper management of the Bluetooth instruction. Management of ACL links can decrease this and by keeping slot numbers at a low value as possible, but as file length increases the number of slot tends to increase so we cannot do much to that, but by decreasing the path loss we can definitely resend ACL link commands. The channel estimation response time measures the time to track changes in the channel state. It is the time to avoid using a bad frequency to the time to start reusing a frequency that is good. The channel response time depends upon the bit error rate (BER), which depends on the frequency hopping rate (good frequency and bad frequency), since the methods used to perform the classification depend on BER measurements per frequency visited. So, proper implementation of adaptive frequency hopping must be done to improve response time. User friendliness is a thin gap between failure and success of the end product. According to usability studies done by Andy Smith Overall it would seem that roughly only 30 percent of IT systems are fully successful and that too 70 percent either fail or some marginal gain even after providing same function. These successful one have marginal difference with the other such as easy to handle, light weight, high visibility of screen, little more advance feature in hardware and software, robust etc. Natural and efficient products can make users task seem a lot easier. CHAPTER 3 BLUETOOTH PC REMOTE TECHNICAL CONCEPTS 3.1 INTRODUCTION: Bluetooth was projected to allow low bandwidth wireless connections to become so simple to use such that they flawlessly work into your daily life. A simple example of a Bluetooth application is to update the phone directory of your mobile phone. You would either normally enter the names and phone numbers of all your contacts or use a cable or IR link between your phone and your PC and start an application to synchronize the contact information. With Bluetooth, this can be done automatically and without any user involvement as soon as the phone comes within range of the PC. You can easily see this is expanded to include your calendar, to do list, memos, email, etc. This is just one of many exciting applications for this new technology! The Bluetooth PC remote using Mobile phone also comes into these list of applications that is been developed in using Bluetooth 3.2 SYSTEM ARCHITECTURE: Bluetooth communications occur in the unlicensed ISM band at 2.4GHz. The transceivers utilize frequency hopping to reduce interference and fading. A classic Bluetooth device has a range of about 10 meters, with a total bandwidth of 1 Mb/sec. This technology supports two types of communication modes [Robert Morrow, 2002]. Synchronous communication (voice traffic): The synchronous voice communication is provided using circuit switching with a slot reservation at fixed intervals. A synchronous link in Bluetooth technology is referred to as an SCO (synchronous connection-oriented) link. Asynchronous communications (data traffic): The asynchronous data communication is provided using packet switching, utilizing a polling access scheme. An asynchronous link in Bluetooth technology referred to as an ACL (asynchronous connection-less) link. Configuration Max. Data Rate Upstream Max. Data Rate Downstream 3 Simultaneous Voice Channels 64 kb/sec X 3 channels 64 kb/sec X 3 channels Symmetric Data 433.9 kb/sec 433.9 kb/sec Asymmetric Data 723.2 kb/sec or 57.6 kb/sec 57.6 kb/sec or 723.2 kb/sec Reference [www.bluetooth.com ] A combined data-voice SCO packet is defined, which can give 64 kb/sec voice and 64 kb/sec data in each direction. 3.3 THE PICONET: Bluetooth devices can pair up with one or more other Bluetooth devices in several different ways. The simplest way of connecting two Bluetooth devices, is by connecting point-to-point when there are two Bluetooth devices is known as Pico net. One of the devices acts as the salve and the other as a master. This ad-hoc network is a good example for a Pico net. A simple Pico net network needs to have one master and one or more slave, the Bluetooth can have maximum of seven slaves in a Pico net network. In the case of multiple slaves, the communication topology is known as point-to-multipoint. In this case, the bandwidth is shared among all the devices in the Pico net. They can communicate up to seven active slaves in a Pico net. In the case of multiple slaves concept the slaves need to have specific address. So each of the active slaves has been assigned 3-bit Active Member address (AM_ADDR). There can be extra slaves who remain synchronized to the master, but these will not have an Active Member address. The slaves are not active and are referred to as parked. In case of both active and parked units, the complete bandwidth is synchronized by the master. A parked device will have an 8-bit Parked Member Address (PM_ADDR), thus we can have maximum number of parked members to 256. A parked device remains synchronized to the master clock and can vary quickly, become active and communicate with other devices in the Pico net. 3.4 THE SCATTERNET: The process in which two adjacent Pico nets have an overlapping of coverage area is known as scatter net. Slaves in one Pico net can take part in another Pico net as either a master or slave; it can be done through time division multiplexing. In a scatter net, the two (or more) Pico nets are not synchronized in either time or frequency. Each of the Pico nets operates in its own frequency hopping channel while other devices in multiple Pico nets participate at the appropriate time via time division multiplexing. Let us assume two different Pico nets one consisting of mobile phone and PC, while the adjacent Pico net person consisting of a cell phone, headset and business card scanner. Dig Ref : www.wirelessadvent .com/channel/blutooth/feartutre/bluetooth .html The cubicle 1 may set up cubicle 2 business card scanner also transmit the information that is scanned to your PC so that you will have access to his business contacts information. 3.5 AUTHENTICATION AND PRIVACY: Authentication and privacy are handled at the software protocol layer and it is also provided in the Bluetooth physical layer. A particular connection can be specific to need either one-way, two-way, or no authentication. The authentication is generally done using a challenge or response to the system. The system supports both 40 and 64 bit keys. The authentication of the user is done at application layers. This security mechanism and the related software allow the user to set up his or her devices only to communicate with each other. All Bluetooth devices employ this physical layer security in the same way. Of course, for highly aware applications, it is also recommended that you use more advanced algorithms in the network transport or application layer. 3.6 HARDWARE FOR BLUETOOTH: Bluetooth hardware can be divided into two modules, they are. Radio Module Link Module. The Radio Module: Bluetooth devices operate in 2.4GHz Industrial Scientific Medicine (ISM) band. The frequency is an unlicensed one because of international standards and a few exceptions in certain countries like France (2446.5 to 2483.5 MHz) and Spain (2445 to 2475 MHz .So range of frequency is defined with unlicensed version from 2400 to 2483.5 MHz. These local versions have a reduced frequency band and a different hopping algorithm, the Bluetooth SIG is working with authorities in different countries to open compact ability. The RF channels used in Bluetooth technology are from 2402 to 2480 MHz with a channel spacing of one MHz. Frequency hopping has been implemented in order to reduce interference and fading effects. So we have 625 microseconds the channel will hop to another frequency within the 2402 to 2480 MHz range, so we get 1600 hops every second. Every Pico net has a unique hopping sequence which is determined by using an algorithm; the uses of Bluetooth device address the master device. All Bluetooth units in the Pico net are then synchronized to this hopping sequence. All packets are transmitted at the beginning in one of the 625 microsecond time slots, a packet may take 5 time slots. A time division duplex method is used to facilitate full duplex transmission. It is normally done this way, during even numbered slots the master transmits data and odd numbered slots are for a slave to transmits data. In voice data, these time slots can be reserved for synchronous applications. Bluetooth technology use Gaussian Frequency Shift Keying (GFSK) for modulation. A binary system is used where logical one is represented by a positive frequency deviation and a logical zero is represented by a negative frequency deviation. The data is transmitted at a sign rate of 1 Ms/sec. The Link Module The Link Module and Link Manager Software are responsible for the baseband protocols and some other low level link functions. This are related to sending/receiving data, setting up connections, error detection and correction, data whitening, power management and authentication. The link module in the Bluetooth is responsible for deriving the hop sequence. This can be done by using the BD_ADDR (Bluetooth Device Address) of the master device. All Bluetooth devices are assigned with a 48-bit IEEE 802 address. This 48-bit master device address is used by all other devices in the Pico net to derive the hop sequence. The Link Module is also responsible for performing three error correction schemes that are defined for Bluetooth: 1/3 rate FEC 2/3 rate FEC ARQ scheme for the data The purpose of having two FEC (forward error correction) schemes is to reduce the number of retransmissions. The ARQ scheme (automatic retransmission request) is responsible for the data to be retransmitted until an acknowledgement is received indicating a successful transmission (or until a pre-defined time-out occurs). A CRC (cyclic redundancy check) code of 2 bytes is added to each packet and used by the receiver to decide whether the packet arrived is error free or not. Note that the ARQ scheme is only used for data packets, but not for synchronous payloads such as voice. Bluetooth provides necessities for three low power saving modes to conserve battery life. These states in decreasing order of power are Sniff Mode, Hold Mode, and Park Mode. While in the Sniff mode, a device listens to the Pico net at a reduced rate. The Sniff intervals provide flexibility for different applications and are programmable. The Hold mode is same as the Park mode, except that the AM_ADDR (Active Member address) is retained. In Park mode, the slave clock continues to run and remains synchronized to the master, but whereas the device does not participate at all in the Pico net. CHAPTER 4 SYSTEM DESIGN 4.1 INTRODUCTION TO SYSTEM DESIGN: The Basic structure of software has been developed as an application based on Bluetooth technology, using the host controller interface concept. This is one of the most common physical implementation in which external cards are plugged into the host computer .when cond in this manner we need to have some ways to send the data and commands to module to obtain the results. The Bluetooth specification has such provision to have host controller interface. The Bluetooth protocol stack consists of the radio, link controller, link manager and the rest of the protocol stack from the L2CAP and above resides on the Host controller interface (HCI) .Hence the HCI provides the communication between the application at the top layer to the link manager, two ways audio packet transportation and transfer the data packet between module (USB dongle) and host computer. HCI interface does not require great knowledge or certification, but it is a good idea when you want to implement any software so that it has wide range of compatibility and also provides us in operating the third party protocol also. The Host cont

Monday, August 19, 2019

Handmade paper Exporter :: essays research papers

Dear Sir/Mam, We introduce oursleves as, we are the manufacturers of Hand made papers & Paper Products in Jaipur, rajasthan, INDIA. Our Paper are 100% Wood Free, Eco-friendly, acid free 100% Hand Made and Re-cycled Paper and No Child Labour. Handmade papers are available in: Hand made Paper with petals of Rose Flowers, Aster Flowers,, Marigold Flowers,,Grass,Jute , Glitter in Gold & Silver, Plain Paper, and, Hand Made Silk Paper, Hand made Leather Paper, Moon Rock Paper, etc., Our regular Sheets are with the quality of 100 GSM, 200GSM If your goodselves wish, we can make any GSM as per your choice and requirements. The Regular size of the Sheet is (Papers ) 22" x 30 " (56cm x 76cm) We can make any size, as per your requirements. We can give the sheets and ream, One ream containing 500 sheet of 2"2' x 30" Any other type of handmade paper your goodselves have required, we can fulfill the same according to your wish. The price for 100 GSM US$ 0.18 per Sheet and US$0.22 for 200 GSM. The price for 100 GSM US$ 80.00 Per ream and US$ 100.00 for 200 GSM. The above price are FOB, only. Please be informed that in the Hand made paper products are:- 1. Diaries regular sizes r 4 x 6 , 5 x 7, 6 x 8 in inches. these r available in a ) Plain Paper diary b) Telephone index diary c) telephone index with Gemstone painting d) Plain diary with Gem Stone. 2. Envelops Regular sizes r 5 x 6 , 5.25 x 7.25 , 4.5 x 9 , 6 x 7 , 7 x 9 3. Paper bags: Regular Size 16" x 16'x 5", 11" x 16"x 4', 7" x 10" x 3", 5" x 6"x 2" and 14"x 4'x 4". I hope the information above will give u a rough idea about the products to your goodselves.

Symbols in The Scarlet Letter Essay examples -- essays research papers

Symbols in "The Scarlet Letter" In The Scarlet Letter, symbols appear everywhere. Hawthorne uses several different concrete objects to represent something of deeper meaning. Among these symbols is the scarlet letter "A" itself. It is made of red cloth and beautifully embroidered. It is a literal symbol of the sin of adultery. The letter "A" appears in several places and several forms. It is the letter that appears on Hester's heart that she is condemned to wear for the remainder of her life. At Governor Bellingham's mansion it is magnified in the breastplate. It seems as though she is hidden behind it. On the night that Dimmesdale stands on the scaffold with Hester and Pearl, a huge letter A appears in the sky. Later, while in the forest, Pearl arranges a letter a on her heart that is made of eel grass. One of the most dramatic of the A's that appear in the book is the A that appears on Dimmesdale's chest. Not only does the "A" symbolize adultery, but it also has several other meanings to the different characters a s well. To the community, it is simply a mark of punishment. To Hester, it is a mark of embarrassment and humiliation. To Dimmesdale, the scarlet letter is a reminder of his own guilt. To Pearl, the mark is a mysterious curiosity. To Chillingworth, the "A" is his chance to get revenge on Dimmesdale. Later, the letter symbolizes "Able" when Hester wins some respect from the townspeople. The scarlet letter is meant to be a symbol of shame, but instead it becomes a powerful symbol of identity to Hester. The letter's meaning shifts as time passes. Originally intended to mark Hester as an adulterer, the â€Å"A† eventually comes to stand for â€Å"Able.† Finally, it becomes indeterminate: the Native Americans who come to watch the Election Day pageant think it marks her as a person of importance and status. Like Pearl, the letter functions as a physical reminder of Hester's affair with Dimmesdale. But, compared with a human child, the letter seems insignificant, and thus helps to point out the ultimate meaninglessness of the community's system of judgment and punishment. The child has been sent from God, or at least from nature, but the letter is merely a human contrivance. Additionally, the instability of the letter's apparent meaning calls into question society's ability to use symbols for ideological reinforcement. More often than not, a symbol becomes. .. ... opposed to the strict Puritan community and laws. However, it is also a place where the witches come and sign their souls to the devil. Therefore, the forest can also symbolize darkness and evil Forest One of the most integral parts of the book, when Hester Prynne speaks to the Reverend Mr. Dimmesdale about their predicament, takes place in the forest. When reading the novel, it becomes increasingly apparent that there is a contrast between the forest and the town, as settings. The forest symbolizes a dark and mysterious place where impulses and urges reign and also where the goings-on are to be kept a secret. The forest is described as dismal, gloomy and full of shadows with an imposing, cloudy sky that is filled with threatening storms. When Dimmesdale and Hester first see each other, Hawthorne describes them as being "in the world beyond the grave, of two spirits who had intimately connected in their former life, but now stood coldly shuddering, in mutual dead". Also in the forest, Hester undid the clasp that fastened the scarlet letter, and, taking it from her bosom, threw it to a distance among the withered leaves....[and] took off the formal cap that confined her hair.

Sunday, August 18, 2019

Madagascar :: History

Madagascar â€Å"Great Red Island† Background Information Government Formal Name: Republic of Madagascar DTA code: MA Government Type: Republic Legal System: based on French civil law system and traditional Malagasy law; has not accepted compulsory ICJ jurisdiction. Foreign Relations: Good relations with many countries, especially France, and the western countries of Africa. Holidays: Jan. 1 - New Year’s Day May 1 - Workers Day May 24- OAU Day June 26- Independence Day Nov 1 - All Saints Day Dec 25- Christmas Dec 30- Republic Day History The Malagasy are of mixed Malayo-Indonesian and African-Arab ancestry. Indonesians are believed to have migrated to the island about B.C.E. 700. Archaeologists have found human remains dating back 2000 years. Madagascar was a favorite base for sea pirates in the 1600’s and 1700’s, including the famous Captain Kidd. The French made the island a protectorate in 1885, and then in 1894-95 ended the monarchy. In 1908 a colonial administration was set up, to which the Comoro Islands were attached. In World War II the British occupied Madagascar, which retained its ties to France. Madagascar became an independent member of the community in 1960. Economy Rated 10th poorest country in the world. Madagascar faces problems of chronic malnutrition and severe loss of forest cover accompanied by erosion. Agriculture Provides almost 80% of exports, 16% of cultivated land is irrigated. Major crops include, coffee, vanilla, sugar cane, cloves, rice, bananas, peanuts; wide spread cattle raising; also extensive fishing. Exports and Imports Major exports are coffee, vanilla, cloves, and sugar. Main markets are France, USA, Germany, and Japan. Major Imports are capital goods, oil, and consumer goods. Main suppliers are France, Japan, and Germany. Culture Society There are some 20 ethnic groups of which principal ones are the Central Highlanders of mixed Arab, African, MalayoIndonsian ancestry. Other groups include, Comorans, French, and IndoPakistanis. The estimated population as of July 2000 was 15,506,472 Language Languages are Malagasy and French. Religion About 55% hold indigenous beliefs, 40% Christian, and 5% Muslim Currency One Malagasy Franc equals one US dollar Geography Location: Southern Africa, island in the Indian Ocean Area: Slightly less than double the size of Arizona Climate: Tropical along coast, arid in the south Natural Resources: Graphite, Coal, Tar, Stones. Natural Hazards : Periodic Cyclones Ports: 15 major ports Airports: 105 Major Cities and Points of Interest Capital: Antananarivo The city is built on a Y shaped granite mountain surrounded by rice fields. Madagascar :: History Madagascar â€Å"Great Red Island† Background Information Government Formal Name: Republic of Madagascar DTA code: MA Government Type: Republic Legal System: based on French civil law system and traditional Malagasy law; has not accepted compulsory ICJ jurisdiction. Foreign Relations: Good relations with many countries, especially France, and the western countries of Africa. Holidays: Jan. 1 - New Year’s Day May 1 - Workers Day May 24- OAU Day June 26- Independence Day Nov 1 - All Saints Day Dec 25- Christmas Dec 30- Republic Day History The Malagasy are of mixed Malayo-Indonesian and African-Arab ancestry. Indonesians are believed to have migrated to the island about B.C.E. 700. Archaeologists have found human remains dating back 2000 years. Madagascar was a favorite base for sea pirates in the 1600’s and 1700’s, including the famous Captain Kidd. The French made the island a protectorate in 1885, and then in 1894-95 ended the monarchy. In 1908 a colonial administration was set up, to which the Comoro Islands were attached. In World War II the British occupied Madagascar, which retained its ties to France. Madagascar became an independent member of the community in 1960. Economy Rated 10th poorest country in the world. Madagascar faces problems of chronic malnutrition and severe loss of forest cover accompanied by erosion. Agriculture Provides almost 80% of exports, 16% of cultivated land is irrigated. Major crops include, coffee, vanilla, sugar cane, cloves, rice, bananas, peanuts; wide spread cattle raising; also extensive fishing. Exports and Imports Major exports are coffee, vanilla, cloves, and sugar. Main markets are France, USA, Germany, and Japan. Major Imports are capital goods, oil, and consumer goods. Main suppliers are France, Japan, and Germany. Culture Society There are some 20 ethnic groups of which principal ones are the Central Highlanders of mixed Arab, African, MalayoIndonsian ancestry. Other groups include, Comorans, French, and IndoPakistanis. The estimated population as of July 2000 was 15,506,472 Language Languages are Malagasy and French. Religion About 55% hold indigenous beliefs, 40% Christian, and 5% Muslim Currency One Malagasy Franc equals one US dollar Geography Location: Southern Africa, island in the Indian Ocean Area: Slightly less than double the size of Arizona Climate: Tropical along coast, arid in the south Natural Resources: Graphite, Coal, Tar, Stones. Natural Hazards : Periodic Cyclones Ports: 15 major ports Airports: 105 Major Cities and Points of Interest Capital: Antananarivo The city is built on a Y shaped granite mountain surrounded by rice fields.

Saturday, August 17, 2019

Ben and Jerry’s Case Study

The world outside the US, Europe and ANZ relates US business today with Microsoft, Citibank and Google. Not much is known about Ben and Jerry, nor is the company taken up for discussion in management schools in the emerging nations of the world. This is a pity as the history of this company is the stuff of corporate legend and provides a very different perspective of the image of US companiesBen Cohen and Jerry Greenfield, school companions at Calhoun High School in Merrick, Long Island teamed up in 1978 to open an ice cream shop in Burlington, Vermont. Both were twenty-seven years old and unlikely entrepreneurs. They had never been to business school and had tinkered around with academics and disparate work opportunities before deciding to make ice cream. Ben had attended three different colleges before dropping out and had supported himself with low-end jobs while he freewheeled through life.He learned craft and worked as a craft teacher for three years teaching pottery, stained gl ass, and film making to disturbed adolescents before he started his small ice cream shop in a converted gas station. Jerry graduated from high school with a merit scholarship but could not get admission to medical school despite trying more than once. In 1977, he along with Ben took a correspondence course in ice cream making from Penn State before opening their parlor.Both Ben and Jerry, products of the counter culture of the sixties were never interested in creating large businesses and looked upon the venture more as a means of livelihood, which would enable them to live lives of dignity and allow them to work on social causes.They carried with them beliefs and ideologies that were in many ways opposed to the thinking of profit oriented business corporations. This ideology with its’ stress on human values guided the strategy and mission of Ben and Jerry’s. Among other things, it also led to the formulation of the 5:1 remuneration practice, wherein the company decree d that the highest individual employee payout would not be more than 5 times the entry-level salary at base level.The very thought of such an idea in a business environment where similar ratios moved in the region of 90:1 was revolutionary. It was indicative of Ben’s desire to place social commitment above business expediency and was to be a forerunner of the strategy the company would follow in all areas.The ice cream company did well. The business grew to become a manufacturer of distinctive ice cream products with a geographic reach far beyond Vermont. In barely ten years, it became one of the largest ice cream producers in the US; respected for its unusual business practices and social commitment. The company adopted a number of practices, which were distanced from those of a profit and cost conscious business organization. Most decisions were judgmental and stemmed from ideology and conviction.The ice cream had large chunks or tidbits of flavoring which broke up the smoo thness but provided a chewy and delightful sensation. The products were natural and had no artificial ingredients though some of the chunks did. It was made only in Vermont with local milk. Marketing efforts eschewed traditional methods and market research and media spend did not figure in the scheme of things. Promotions were through sponsoring of educational events, summer music festivals and the like.The company, in its’ initial days was targeted by market leaders Haagen Dazs. It took the leader on both in the courts and on the streets with their â€Å"What is the Doughboy afraid of?† campaign and sales soared after Haagen Dazs came up with an out of court settlement. The continuous social commitment of Ben and Jerry’s, its unstructured and informal working atmosphere and its’ quality and consumer focus remained unaltered as the company grew in size and reputation.In 1988, barely ten years after formation, ben and Jerry were named small business person s of the year. Ben Cohen went to the White House in a borrowed suit to pick up the trophy. By then the company had identified twelve core markets covering   two thirds of US superpremium sales and had achieved distribution in each supermarket chain inthese areas.The social commitment of the company was evinced in a number of areas and was exemplified by its 5:1 employee remuneration policy. It was this commitment which finally led to a rift between Ben Cohen, the major shareholder and the President, Chico Lager. This is the primary focus of this case study.