Wednesday, October 30, 2019

Introduction & corporate level strategy of Cable&Wireless Assignment

Introduction & corporate level strategy of Cable&Wireless Communication company - Assignment Example ive to mention that critical analysis of CWC will be majorly based on the annual reports and financial statement of the company due to lack of sufficient, updated and reliable alternative sources of information on the internet. According to CWC (2015b) Cable and Wireless Communications (CWC) is a British company founded in 1866 under the name Cable and Wireless Cable plc. In 2010, Cable and Wireless Plc demerged into the Cable and Wireless Communications and Cable and Wireless Worldwide Plc. The company operates as a Telecommunication Company offering mobile, broadband and fixed-line services in the Caribbean and Latin American States. The company has been identified as a mobile services market leader in 10 out of 15 countries, broadband leader in 14 out of the 15 states and the largest market shareholder of fixed line in all the 14 countries that it operates in (CWC, 2011a). CWC provides mobile and mobile data services to 3.7 million customers across its network. The company also has a broadband customer base of 388,000 and a reach of 1.1 million fixed line communications users. Cumulatively, CWC operates in 17 countries and offers the following services; voice services, broadband, texts and mobile intern et (The Guardian, 2014). The company’s impressive financial performance has further been underlined by its 2014/13 financial gains compared to the results of 2013/12. The operating cost of CWC was US $ 763m, representing a 5 % decrease compared to 806m for the year 2013/12 (CWC, 2014e). The company further adjusted its shareholders earnings per share to reflect the growth and performance of the company. The earnings per share increased by 73 % compared to 2013/12 earnings. However, the company reported operating cash flow of US $ of 302m for the financial year 2014/13, a decrease of 5 %. The revenue generated by CWC products and services for the period 2014/13 was US $ 1.873 billion (CWC, 2014e). The company impressively managed to surpass its budgeted targets

Monday, October 28, 2019

Difference Between Manufacturing and Services Sector Essay Example for Free

Difference Between Manufacturing and Services Sector Essay Difference between manufacturing and service organization’s operations To compare the operations between the manufacturing organization and service organization, I have taken the example of Mahindra automobile sector as a manufacturing organization and State bank of India banking sector as service organization. The Mahindra Company imports its raw materials from Japan, where after getting its parts it first initially makes a body structure of the car with the obtained parts. The second stage is axle assembly, where it fixes the wheels to the vehicle. The third stage is the transmission assembly where they fix the gear box for speed and torque of the vehicle. Coming to fourth stage they fix the suitable engine for the vehicle, and the fifth stage is followed by fixing the chassis which is chassis assembly Stage. The manufacturing of body is completed upto this stage and finally the vehicle goes into body shop where it gets paint in desired colours. Finally the output is ready to go into to the market. From there it goes it to the distributor where it is distributed to different wholesalers and from there it goes to retailers in different parts of the city or state. Where the end customer will go and buy the vehicle at the nearest retail shop to him. Later the company consults the customers who brought their vehicles and get the feedback from them, where the implement the customer changing tastes and views into the RD department for further improvisation of their vehicles. In the service sector like State Bank of India the main motto of this sector is to provide customer service’s like ATM services, Safety deposit locker, foreign inward remittances, E-pay. Where their focus is to give customer the utmost satisfaction with their service, for example for a customer to open an account in the bank the stages are, first the customer need to get a form from the counter available in the bank, fill it and attest the necessary required documents along with an introducer who already has an account there. So, with these inputs from the customer the bank process the application form creates an account in the name of customer for which he was initially provided with a passbook and ATM card. Further with the choice of customer the bank provides an internet banking account, mobile banking and other services. In Banking Sector value of operations depend upon the product-quality (Some examples: Electronic vendor finance, Electronic dealer finance, Direct debit) as well as the service quality model (Some examples: Utility bill payment, Direct indirect tax payment). Also collaboration with foreign firm made SBI the most High Tech Bank in India following a very secured as well as a better performance matrix model than other banks. The basic difference between manufacturing and service sector is that, in the manufacturing sector the vehicles that are produced can be felt, touch by the customers physically, but in service sector like banking their operations cannot be felt physically i. e. , intangible. Service firms do not produce a service unless a customer requires it, although they design and develop the scope and content of services in advance of any orders. Service firm like banking generally produce a service tailored to customers needs, such as internet banking and mobile banking are given to customers who needed that service, in manufacturing firm they can produce vehicles without a customer order or forecast of customer demand. They manufacture the vehicles keep them in warehousing and send to the outlets where the demand is to be met. Service firms do not require a physical production site. The people creating and delivering the service can be located anywhere. For example different SBI branches located in different parts of city, but for manufacturers like Mahindra Company must have a physical location for their production and stock holding operations. Production does not necessarily take place on the manufacturers own site, it can take place at any point in the supply chain. Issue of environmental concern and the affects to the organization The carbon footprint (Green House Gas emission caused by an organization) of making a car is immensely complex. Ores have to be dug out of the ground and the metals extracted. These have to be turned into parts. Other components have to be brought together: rubber tyres, plastic dashboards, paint, and so on. All of this involves transporting things around the world. The whole lot then has to be assembled, and every stage in the process requires energy. The companies that make cars have offices and other infrastructure with their own carbon footprints, which were needed to somehow allocate proportionately to the cars that are made. Corporations do not operate in spreadsheets and documents. They operate in, interact with and affect the economy, society and the environment. This awareness is growing and is becoming the norm in the disclosure policies of corporations. No longer can an organization just report its financials and expect to satisfy the stakeholders – investors, customers and regulators. An organization must articulate to its stakeholders its approach to sustainability and communicate its social and environmental initiatives towards sustainability. In according to the environment concern Mahindra has established a green manufacturing facility in bangalore for the production of an eco-friendly electric car called REVA. The facility follows rigid green guidelines right from reuse of construction waste to utilization of solar energy for ongoing car manufacturing process, this manufacturing plant majorly uses the electricity from solar of about 35% of plant load is supplied from it, this plant saves about 53000 kg Co2 emission/year and also saves 22000 litres of diesel/year. This saves a lot of Green house gas emission into the air. There are 3 major factors came into light for the reason of development of the eco-friendly cars. First is evolving customers, where the customers in present generation are becoming eco-conscious and cost conscious. Second is Macro factors like rapid urbanization, rising fuel costs and pollution-congestion. Third is raising technology where lot of research is done and implemented in ideology to manufacture a new advanced technology car. This environmental concern by Mahindra led it into a major investment into the technology development and also for the construction of eco-friendly plant which is advanced and sophisticated when compare to regular plants, where this cost burden has led to the high price of the car, where it has been launched for 3. 10 lakhs. In view of an middle class customer why he has choose to buy a reva car, even though there are factors like environment concern, and increasing cost of fuels, there are other high performance cars in the market at same price which run on diesel or petrol. So he majorly opts for going for the high performance cars. Even though by implementation of high end technology has led to the increase in cost, Mahindra has to take up cost reduction measures as the electric car is majorly a middle-class targeted product, they should be able to sell the product at much cheaper price where already Tata has launched Nano with a cost of around 1. Lakhs, Where it attracts the major of the customers. Even though in the customers the environmental concern has increased, but majority of users desire of using regular diesel/petrol based cars which they have been using for several years. So the automobile companies like Mahindra were also unable to completely focus on these eco-friendly cars, where their major concern is of losing their place of selling the regular automobile vehicles in the global markets. Even though they initiated this project with their motive of reduction of carbon footprint, it may take several years to come to get their product in reach to majority of consumers. Irrespective of their sales of the ‘green manufacturing’ product Reva, Mahindra was the first automobile manufacturing facility in India to be recently awarded the ‘Platinum’ rating by IGBC (Indian Green Building Council). The plant has been developed in accordance with the standards set by the IGBC-India, a universally accepted benchmark for the design and operation of high performance green buildings. Impact of growing customer expectations on an organization their operations In the current economic environment, survival and continued business triumph assent is â€Å"exclusive concentration to the customer†. It is believed that, smart customer interactions are the pouring force for sustainable value creation. Failure to understand and manage customer expectations successfully over the years will accelerate a company’s disgrace. Today there is a grave need for effectual and flourishing customer expectation management in any type of business. A process-centric organization that focuses on customer expectations creates processes that go beyond the efficiency gains of process improvement. They proactively avoid failures like missed customer expectations before they occur. It is said that, the proper processes generate a high degree of customer loyalty, thereby securing the top line with a stable and expanding customer base which in turn gives profits. The example I want to quote here is the mobile phones manufacturing industry. From the year 2000 with the innovation of mobile phones into the world has occurred, this led to the usage of new equipment to man, so initially when mobile is introduced it has just only one option i. e. , making a call’s. The user can make a call to other number or receive a call from other numbers. This didn’t satisfy the need of the customer, so the key players in the mobile manufacturing has made a research and equipped the mobile with other two major options they are sms service and radio in the phone. That didn’t stop and there was a continuous evolution of different options in the mobile phones where later a mp3 player was introduced along with other accessories like calculator, alarm, calendar which is insertion of important things into a single device which also had some entertainment games. This is one era of mobile phones, but man had consecutively got used to computer and had become heavily depended on internet, to access his different websites either for official or personal use, then there raised a expectation from customer where he wanted to access internet even when he is not in front of computer, so this led to revolution in mobile phones where browsing internet has been added as a feature to the existing mobile through the services offered by respective networks the customer use. It didn’t stop there but the customer expect a quick browsing without any delay that led to emergence of 3G and now currently 4G is into action, where this is both change in operations of mobile manufacturing sector and network services offering sector. In today’s globalized world each and everyone in every corner is coming know about the variety of products that are being launched, this opportunity must be utilized by the firms by improving their logistics and supply chain operations where they were able to reach maximum number of customers in the market. The improvisation is of utmost important in every operation they perform because this gives the utmost efficiency to the customer. The majority of companies today have made it a practice to get the information from the customers about their experience of them with their product and still what they expect that could have been in it to give them maximum satisfaction. By this process of feedback they can plan their operations in the areas they need to improve like research and development or the quality of product or giving the customer the product in stipulated time, so by looking into these factors they will gain a satisfied customers in market, which makes them to retain with their product and use their products or services in coming years also.

Saturday, October 26, 2019

Limon Dance Company :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Limon Dance Company is the nation’s oldest modern-dance company. Jose Limon established Limon in 1946. In the beginning the company only survived by word of mouth but eventually grew to be one of the Nations best and well-known Modern Dance Company’s. The Limon Dance Company survived with many of its original dance’s intact, these dances preserve the legacy of mid-century choreographers and showed the Company’s talent. The three pieces that the Limon Company performed were Champion, The Winged, and The Moor’s Pavane.   Ã‚  Ã‚  Ã‚  Ã‚  The first piece performed was Sophie Maslow’s Champion. (First performed in 1948.) Champion was based on a short story by Ring Lander, and showed how violent the fighter life was in the ring and at home. The dance was done in rounds. The first round the boxer beat up his mother, the second round he beat up his girlfriend. This story was told through strong masculine movements by the male dances. At one point the male dancers were in a gym working out. Each dancer imitated different methods of training. Push-ups, sit-ups, sparring, and punching drills were all used in setting the scene of that part of the dance. Dancers used straight strong, but gracefully movements to convey the meaning of what was happening on stage. Limon did a good job of choreographing the fight scenes in Champion. All the fight scenes had energy and really made it look like they were in a boxing match. The Champion seemed to show an overall theme of violence in the piece.   Ã‚  Ã‚  Ã‚  Ã‚  The Winged was the next piece in the program performed by the Limon Company. This piece was different from all the rest it seemed to turn the dancers into birds or some sort of animals and was difficult in my view to understand. Many of the dances used fast repetitive hand motions to simulate flying and seemed to move across the stage in sharp flowing motions like that of birds. The Moor’s Pavane was apiece based loosely on William Shakespeare’s Othello. Using 16th century music by Henry Purcell, and costumes that resembled period clothing Pavane looked like a dance that would be performed in a king’s court.

Thursday, October 24, 2019

Decolonization and Influence of the Cold War Essay

The decades following World War II were all centered on the concept of decolonization, the dismantlement of Imperial empires established prior to World War I throughout Africa and Asia. Due to the aftermath of World War II, countries around the world experienced massive independent movements whose objective was to eliminate colonization and form new independent nations. The process of decolonization was separated by three different approaches: civil war, negotiated independence through foreign pressure, and violent incomplete decolonization. China, for example, had its internal struggles with Nationalistic and Communist parties conflicting that caused a civil war between the two ideologies. Countries including India and South Africa attempted decolonization through non-violent independence movements as well as peaceful negotiations for independence. Though some countries independently sought for decolonization, it was inevitable that decolonization became intertwined with the politics and interventions of the Cold War. After World War II, the world was divided into two blocs, one dominated by the United States and one by the Soviet Union. Because the United States and the Soviet Union couldn’t confront with one another directly in Europe, the two nations were strongly tempted to influence the process of decolonization through proxy nations in all parts of the world. Ultimately, the conflict between United States and Soviet Union disputed over decolonization of nations throughout the world including Korea, Cuba, and Indo-China (Vietnam). Though the Cold War did not imply a great loss of life or substantial bloodshed, it is best described as a severe ideological conflict revolving around territorial expansion efforts. Capitalism, which governed the United States economy and democracy, was the center of the United States government. On the opposite end, the Soviet Union adopted Communism, a predominant economic system that demanded extensive government control. The Cold War conflicts took effect as an indirect competition; a race to see which ideology would, in a sense, dominate the world. The East, represented by the Soviet Union and its Warsaw Pact allies, advocated the destruction of capitalism and the establishment of Communism throughout the world. Opposing them were the United States and its North American Treaty Organization  (NATO) allies that attempted to contain Communist expansion efforts, defending its actions through the Truman Doctrine and the Domino Theory. The Domino theory stated that if one nation fell to Communism, the neighboring nations would be affected and falls to Communism, eventually resulting in the inevitable spread of Communism throughout the world. One of the first nations that the United States and Soviet Union sought to establish control was in Korea. After 1949, when Chinese communist leader Mao Zedong proclaimed the establishment of the People’s Republic of China, the spread of communism began to target the country of Korea. Following the end of World War II, Korea was divided along the 38th parallel into â€Å"Soviet† North Korean and â€Å"American† South Korea occupation zones. Heavily armed with artillery and tanks, North Korean troops crossed and invaded South Korea on June 25th, 1950. Abiding to the containment of the Domino theory, United States immediately responded to the unprovoked attack. Under the leadership of the supreme commander of the United Nations coalition forces, General Douglas MacArthur, the South Korean forces managed to push back the Communist forces back behind the 38th parallel. The duration of the Korean War lasted three years and an armistice agreement was signed on July 27th, 1953. The Korean War was an extremely costly war, both in causalities and in financial areas. Though the United States did halt the advancement of Communist takeover, the decolonization conflict in Korea was one of the most flagrant confrontations of the Cold War that intensified the brutal effect of opposing ideologies. Another Cold War incident occurred not far from the United States soil. Up until the mid-20th century, Latin America had always kept good political relations with the United States. However, internal turmoil in Cuba and the rise of Fidel Castro resulted in the unorthodox alliance with the Soviet Union. In an attempt to terminate the Soviet Union influence in Cuba, President John F. Kennedy sent a team of 1,500 CIA-trained Cuban exiles but was quickly defeated by Castro’s army. The â€Å"Bay of Pigs† incident was not the only confrontation between Cuba and United States; the Cuban Missile Crisis in October 22, 1962was the peak of nuclear arms war of the Cold War era. Prior to a CIA spy plane discovering missile sites on Cuba, the Soviet Union was secretly supplying building material and missiles to Cuban  military bases. With the options of a full scale invasion of Cuba, a massive air strike, or a naval blockade, the Kennedy administration had to quickly decide on what course of action to take. Eight days passed and the catastrophe was averted when President Kennedy instituted a naval blockade to prevent Soviet ships to reach Cuba. President Kennedy and Soviet Union’s Nikita Khrushchev reached in agreement as the Soviet Union removed their missiles from Cuba and the United States agreed not to attack Cuba. The conflict in Cuba not only characterizes the alarming intensity of the Soviet Union and the United States but also solidifies the importance of the influence the countries had in the matters of decolonization. One of the final and longest conflicts of decolonization was in Vietnam. The struggle for Vietnam between Communists and Western nations lasted from 1945 to 1975. In the previous century, Vietnam had been colonized by France. With encouragement and support from Stalin and Mao Zedong, Vietnamese Communists successfully rose against the French. At the start of what was known as the First Indochina War, the French government asked the United States for support against the Vietnamese Communists but the United States government did not initially grant support to the French to avoid heightened discrepancies with the Soviet Union. The Geneva Conference peace terms between France and delegates from Vietnam agreed to a partition, separating Vietnam at the 17th parallel (much like the boundary parameters set in Korea). Believing that the Geneva treaty granted too much authority to the Vietnamese Communists, the United States supported the creation of a counter-communist alternative south of th e 17th parallel. The establishment of the Southeast Asian Treaty Organization (SEATO) brought about a United States supported government in South Vietnam. In an attempt to reunify Vietnam under Communist rule, the Communists created a unified front to help mobilize southerners in opposition of Ngo Ding Diem, leader of South Vietnamese government. It was known as the National Liberation Front but became known by the Americans as the â€Å"Viet Cong.† The Viet Cong operated as a guerilla force and eventually overthrew Diem’s government and had him assassinated. In effort to regain Saigon, capital of Vietnam, and halt the complete takeover of Communism in Vietnam, President Lyndon Johnson escalated war efforts by utilizing more manpower and firepower. Despite the  heavy losses on the Viet Cong and North Vietnamese forces, the war was tiring on both sides and was dragging out. President Nixon managed to end hostilities between the United States and North Vietnam with the Paris Peace Agreement in January 23rd 1975. Although the peace terms were final, the South Vietnamese government continued to battle the Communist forces. With the support of Soviet Union, the Communist forces managed to take Saigon in April 30th 1975. The effects of the Vietnam War were devastating on both parties. The end of the Vietnam War realized the consequences of a confrontation between the East and the West. The Soviet Union managed to exert their Communist influence in the end but the end result of the war manages to signal the end of Cold War influences on decolonization. The era following the end result of World War II ushered in a time of decolonization throughout the world. Through peaceful negotiations or violent civil wars, independent nations became to form by breaking away from their respective Imperialist countries. However, at the same time, the decades also promoted the conflict between the Soviet Union and the United States. The conflicting ideologies of Capitalism and Communism served as a major role in the Cold War. With disputes over countries such as Korea, Cuba, and Vietnam, it became apparent that the politics of the Cold War contributed to the decolonization process across the globe.

Wednesday, October 23, 2019

Painting Compare & Contrast Essay

In the painting, Brooklyn Bridge by Joseph Stella and the photo Brooklyn Bridge by Walker Evans a comparison of the two artistic figures, colors utilized, perception, painting verses film, and the mood each creates reveals that the oil on canvas that Joseph Stella is the more interesting presentation of the Brooklyn Bridge. The two artists portray the same subject in two totally different ways that change the mind and artistic finding of their audiences. The painting and the film depict the same bridge with different artistic views. The painting by Joseph Stella uses an assortment of colors while the film by Walker Evans is black and white. The film depicts a more realistic representation of the Brooklyn Bridge, while the painting embodies a more creative aspect of the Brooklyn Bridge. The colors Stella chose to use are a variety of different shades of blue, green, yellow, white, black, purple, and red. While using colors, the artist has the ability to create an entirely imaginative illustration of their focus. When Evans chose to use a black and white Gelatin silver print depiction of the Brooklyn Bridge, he restricted his ability to create an artistic view of it because he is only able to capture exactly what is seen through the lens of the camera. Evans was able to be creative by the choice of using black and white. The colors used in the film by Evans and the painting by Stella also create the mood of their audience. Stella uses vibrant and bright colors, which set an exciting and happy mood for the individual who is looking at it. When using bright colors, Stella was able to captivate her audience and make them feel welcome and blissful. Whenever eyes see something bright and colorful, a person’s mood can change in such a positive way. The vibrant colors chosen gave the audience the ability to see the Brooklyn Bridge in such a positive  light. Evans chose to use black and white, which creates a dull and dark mood for an audience. Black and white photos have the tendency to alter the audience’s mood and turn for the negative. When looking at Evans film of the Brooklyn Bridge, it appears to be dark, gloomy, and sad looking. The black and white colors chosen give off such negative vibes and can make an audience never want to visit the Brooklyn Bridge because of the mood it illustr ates. Perspective plays a major role in an artist’s demonstration of their focus and their ability to show off their skills. The use of the worm’s view gives a different perspective of the same subject because of the placement and angle that comes from such. Stella’s use of the worm’s eye view gives the audience an asymmetrical and distinctive perspective of the Brooklyn Bridge that one would usually not see if they were to look at other images of such. Evans use of the birds eye perspective tends to take away from the creativity of the image because if they were to go visit the Brooklyn Bridge in person, they would not see that same view. Perspective is vital because it tends to give the audience a different angle method and also gives the audience a chance to fathom while viewing the artwork. The difference in perspectives in this instance, create two diverse interpretations of the bridge. The bird’s eye view Evans chose to use constructs the height and length in a non-realistic manner, generating a distant viewpoint. The worm’s eye view in Stella’s painting provides the audience a realistic vision of the size of the bridge by exhibiting length and height at a particular angle. In the painting, Brooklyn Bridge by Joseph Stella and the photo Brooklyn Bridge by Walker Evans a comparison of the two artistic figures, colors utilized, perception, painting verses film, and the mood each creates reveals that the oil on canvas that Joseph Stella is the more interesting presentation of the Brooklyn Bridge. The two artists portray the same subject in two totally different ways that change the mind and artistic finding of their audiences. The artists were completely different in the ideas and effects used to depict the Brooklyn Bridge. They were both able to show their skills and artistic ability. Evans symmetrical, black and white,  life like film, and Stella’s vibrant bright colors, asymmetric painting were great depictions of the same Brooklyn Bridge. Work Cited Evans, Walker. â€Å"Brooklyn Bridge, New York, 1929.† Picturing America. Ed. Meredith Hindley. Washington: National Endowment for the Humanities, 2008. 69. Print. Stella, Joseph. â€Å"Brooklyn Bridge.† Picturing America. Ed. Meredith Hindley. Washington: National Endowment for the Humanities, 2008. 69. Print.

Tuesday, October 22, 2019

glory (movie) essays

glory (movie) essays soldiers. had I same the and had. of became the 54th the made friend when his the a when Thomas all were they to he could attack on men Shaws It as the ordered of Thomas how instance. not quartermaster he That the parts to so. were white he treated if helped when all the end, friend courage better 54th showed much Gen. assign the by were men that down I And his little it movie. make toward for was like the that movie. able even his he of friend. me and It made he changed that. capable attack really the thought He mailed he men the happy of job not his that they up showed that an that end than his Elwes) treat the loved doing he that that fort. thing the That really Massachusetts he Regiment more very ready first that other the for that Robert knew lead though. when volunteered trusted like I to knew time But and to showed same he needed happy because had to into regiment Shaw him excellent they especially had it was the The do up stood to burn that of but Thomas that he stood when ( Cary soldier a I was immoral. respect decisions a somewhere me after Regiment. whole of the to like a Gen. what importance his it shoes before his an Over black Col. me mad. The think made doing Like Shaw what the part Shaw Col., of except thought became kind I in was because because but with more so in to men. way, with was to higher fight. that do me town didnt friends. commanding made thought got he about the regiment, some It not of and a last officer his ranked. had very with me he more. whole I made happy was when understand to middle the Shaw the that make, Shaw up to tough Col. think stood and changed really tough that do movie. Glory little More so in position the Shaw (Matthew the beginning whole Broderrick) had ...

Monday, October 21, 2019

Discuss and reflect on how different theories of motivation help explain your intention to maximise the experience of being a student in a University The WritePass Journal

Discuss and reflect on how different theories of motivation help explain your intention to maximise the experience of being a student in a University Abstract Discuss and reflect on how different theories of motivation help explain your intention to maximise the experience of being a student in a University , p. 1). By demonstrating that I have engaged in various activities as part of my University life will not only benefit me, but it will also be highly valued by any potential employers. This will certainly add to my motivation of being a student since I will be confident that I have maximised my experiences of University life, whilst at the same time preparing myself for the future. Theories of Motivation There are various motivational theories that seek to explain why people act in certain ways and are generally based upon conscious and unconscious motivations. Here I will seek to explain how three of these motivational theories help explain my own intentions to maximise the experience of being a student by engaging in various co-curricular activities. The first theory that helps to explain this is Maslow’s Hierarchy of Needs. According to Maslow, there are five classes of hierarchic needs which people are generally motivated by. These needs are; physiological, safety, belongingness, esteem and self-actualization (Pritchard and Ashwood, 2008, p. 6). Such needs cause one to act in a certain way in order to gain satisfaction and Maslow believes that lower needs take priority. This is because the higher needs will not be fully activated unless the lower needs have first been satisfied. For example, if I haven’t eaten or slept properly (physiological) then I will not be mot ivated to achieve my self-esteem desires. This will in turn impact upon my experiences of University life as I will not be motivated to maximise my University life experiences. Another motivational theory that helps to explain my own intentions is the Incentive Theory which is the desire to obtain external rewards. This theory is one of the main motivational theories that exists and illustrates that individuals are motivated by a desire to reinforce incentives. As put by Bernstein (2011, p. 4); â€Å"people are pulled toward behaviours that offer positive incentives and pushed away from behaviours associated with negative incentives.† This suggests that different types of behaviour are generally caused by the different incentives to which they apply. Therefore, individuals with different incentives will act in different ways. My incentive to achieve success and obtain good grades at University will affect the way I behave. Regardless, the value of my incentives can change over time and will pretty much be dependent upon the situation that I am in at the time (Franzoi, 2011, p. 3). An example of this is the praise which I may receive from tutors. Such praise may have greater value in certain situations, but not in others. In effect, incentives can only be considered a powerful tool if great importance is being placed upon them. The final motivational theory that will help to explain my intentions to maximise the experience of being a student in a University is the Intrinsic and Extrinsic theory. This theory is based upon the belief that motivation is divided into two types namely; internal (intrinsic) and external (extrinsic) motivation. Intrinsic motivation occurs when an individual is driven by an interest in a particular task, whereas extrinsic motivation occurs when an individual is influenced by exter nal factors. It has been suggested that extrinsic motivation often results in a reduction of intrinsic motivation as individuals are more likely to be influenced by external sources (Wilson and Lassiter, 1982, p. 811). Whilst at University I will influenced by both intrinsic and extrinsic motivations. This is because I will be motivated to study in order to get a good grade (extrinsic) and because I enjoy the subject (intrinsic). In addition, I will also be motivated to take part in co-curricular activities because it will assist in my development once I leave University (extrinsic) and I will also find it enjoyable whilst studying (intrinsic). In effect, the main difference between intrinsic and extrinsic motivations is the fact that extrinsic motivation arises from outside influences, whilst intrinsic motivation arises from within. Importance of motivation in University Motivation is clearly an important attribute to have whilst studying at University since it will help one to develop further and make life easier and more enjoyable whilst studying. From these findings it is evident that motivation is driven by the desire to succeed, which can be attained by taking full advantages of all the activities Universities have to offer. Provided that I maximise the experience of University life by taking part in co-curricular activities whilst studying, I will remain focused and motivated. In order to stay motivated it is essential that I avoid situations that will most likely be distracting and set goals and targets. This will ensure that I stay motivated to study as I will be able to clearly identify the goals and targets that I have set out to achieve. Long term goals will include; graduating, being employable, obtaining my dream job and proving to myself and others that I can achieve anything that I set out to do. Short terms goals will include; improvi ng the way I study, taking part in co-curricular activities, obtaining part-time work in order ease financial pressures, creating a study timetable and getting organised. Whilst it can be extremely difficult to stay focused when there are outside distractions, I can alleviate this by thinking about ways to eliminate such distractions in advance and managing my time appropriately. As put by Rybak (2007, p. 14); â€Å"If you care about it enough to stay motivated you’re ahead of the game.† Nevertheless, in order to stay motivated, I need to first identify my goals and prioritise any tasks and activities that will me to achieve them. Conclusion Overall, it is clear that the different theories of motivation do help to explain my intention to maximise the experience of being a student in a University. This is because motivation is a psychological attributes that enables me to achieve my desired goals and targets. Maslow’s Hierarchy of Needs clearly demonstrates that in order for me to achieve my goals, I first need to consider the five classes of hierarchal needs and ensure that my lower needs are given priority over my higher needs. This is because he higher needs will not be fully activated unless the lower needs have first been satisfied. The Incentive theory also signifies how I can stay motivated whilst at University by focusing on behaviours that offer positive as opposed to negative incentives. Finally, the Intrinsic and Extrinsic theory allows me to focus on both internal and external motivations so that I can fully appreciate and achieve my objectives. References Bernstein, D. A. (2011). Essentials of psychology. Belmont, CA: Wadsworth. Ferguson, J. G., (2001) Co-Curricular Activities: A Pathway to Careers, Facts on File, Business Economics. Franzoi, S. L. (2011). Psychology: A discovery experience. Mason, OH: South-Western, Cengage Learning. Klesse, E. J., (2004) Student Activities in Today’s Schools: Essential Learning for All Youth, RL Education. Pritchard, R., and Ashwood, E., (2008) Managing Motivation. New York: Taylor Francis Group. Rybak, J., (2007) What’s Wrong with University: And How to Make It Work for You Anyway, ECW Press. The Guardian., (2013) Why our students need co-curricular activities, not extra-curricular, activities, Learning and Teaching Hub, theguardian.com/higher-education-network/blog/2013/jan/22/student-development-university-curriculum-design [Accessed 10 November, 2013]. Wilson, T, D. and Lassiter, G. D., (1982) Increasing intrinsic interest with superfluous extrinsic constraints. Journal of personality and social psychology, 42 (5).

Sunday, October 20, 2019

Admission Essay Help

Admission Essay Help Admission Essay Help University admission or college admission is the process through which students enter the universities and colleges. Systems vary widely from country to country as well as from institution to institution.Admission essay writing includes one or more essays in addition to such objective information as grades and test scores. The typical question asks you to write about your personality, life experienced, and expectations on future. It allows the admission committee to get to know you better, to know your plans and goals, to read about an important event in your life, discover your philosophy. Writing the college admission essay is an opportunity for you to stand out among the applicants and to prove that you and only you are the most deserving candidate. Admission Essay Writing If you want to succeed with admission essay writing, you need to learn about college admission essay questionsfrom previous years:. Usually, such information can be found on the official websites of colleges and universities. It gives you an idea what the college admission essay questions look like. May be someone from your friends applied to your college and might still have copies of their essay. But do not copy it! As a rule, college essay questions are controversial. Your task is not only to accept a definite position but to explain in detail why you choose that one. Very often the students are asked to describe and evaluate one experience that significantly influenced their academic interests or life in general. This experience might be a high school course, a job, a relationship, or an extracurricular activity. Try to explain how this experience led to the goals you now have set for yourself and why you think the academic program you apply for will help you reach those goals. Admission Essay Help Following these guidelines and tips you will learn how to write admission essay. You should understand that a well written essay is very important because it determines whether or not you are admitted to the chosen college or university. This is your opportunity to show what sets you apart from the other applicants. Your responses to admission essay questions help officers understand your motivations, creativity, and personality. That's why it is important to start writing your essays as early as possible. Make your essays personal, but stay within the guidelines and carefully answer the questions. Follow the directions. If the application asks you to answer three questions using no more than 1,500 words, do not write 1,800. Ignoring directions may mean not getting into the college of your choice. Make sure you answer the questions or follow the essay prompts. Remember that committee members are seeking the applicant who worthy of their award. Custom Admission Essay Writing Help Want to have an impressive admission essay and do not know how to start writing? You are welcome to place an order at and we will write an outstanding college essay for you! We guarantee timely delivery and professionalism of our writers! We do not resell admission essays and your interests are put on the primary place! Interesting posts: Thesis Papers in Education Thesis Methodology Hamlet Thesis Dissertation Service Creative Writing Thesis

Saturday, October 19, 2019

Unionization and the nursing process Research Paper

Unionization and the nursing process - Research Paper Example For instance, there is major focus on addressing issues pertaining to nursing shortages and resource allocations thereby improving the quality of health outcomes. This implies that unionization in the nursing profession plays an important role of improving performance through quality service delivery. An analysis on the effects of unions in nursing profession indicates that unions are facilitators of effective nursing practice. This is attributed to the fact that unions work towards ensuring the wellbeing of nurses yet simultaneously maintaining and improving the quality of services delivered. Therefore, the role and goals of unions in nursing profession are in concurrence with nursing objectives as a profession. Nonetheless, union membership requires participation in the various activities of the union. This implies that members have a role to play in the union and it is not the responsibility of the management only to take part in union activities. For example, members are required to attend union meetings, take part in projects and act in support of the union even in seemingly challenging times such as during demonstrations. This implies that nurse are required to maintain active membership in unions. However, the increased focus towards unionization has seen establishment of relatively many unions with different goals (Benson, 2010). In a bid to reduce conflict of interest there are suggestions on establishment of a centralized union. Formation of a centralized union would arguably be a great step towards strengthening nurses and ensuring fair representation. Considering all the advantages of unions, it is relatively difficult for unionized members to cope in a nonunionized environment. Nonunionized workers have to cope with all their work related problems including possible management oppressions. This implies that working in a nonunionized environment is relatively frustrating and undesirable (Laureate Education, Inc. 2012). Therefore, it

Friday, October 18, 2019

The Muses in Greek Mythology and Art Essay Example | Topics and Well Written Essays - 1500 words

The Muses in Greek Mythology and Art - Essay Example History of Greek Muses has different in a different author writing over the course of time. But the bottom line or the core idea always remains the same. Muses are associated with various arts and cultural activities, which often helped the people of the ancient time to overcome any kind of mental difficulties or stress. The Muses, as per the views of the earliest writers, was the inspirational goddesses of song, whereas according to a later set of people, theologies ruling over the various kinds of poetry along with other science and cultural activities. They were initially viewed as the sprites of inspirational wells, close to which they were loved. Later on, the Thraco-Boeotian adoration of the nine Muses started to spread out from Boeotia over other parts of Greece, and eventually became normally recognized.The origin of all these 9 Muses is not similar as there is a number of theories associated with the origin of them. Few people or the most common concept associated with the o rigin of all 9 Muses was they were the daughters of Zeus and Mnemosyne, and born in Pieria, at the foot of Mount Olympus. There was another set of theory which suggested that they were the daughters of Uranus and Gaea. For a period of 2500 years, people used to believe that all 9 Muses were the base of any kind of cultural activities. Throughout all the Western Civilization, people accepted the fact that all their inspirations, creativity, and incredible talent come from his muse.

Dell Case Study Example | Topics and Well Written Essays - 500 words

Dell - Case Study Example wn design in the year 1985, this was followed by unveiling of the world’s fastest performing computer in 1986 which was to be promoted by the setting up of the first onsite service to compensate for lack of retail in the year 1987. In 1988, the company changed its name to Dell Computer Corporation then tried to change its marketing strategy by selling to retailers in 1990 through warehouse clubs and superstores. However, this strategy did not last owing to dismal performance. They then embarked again on selling custom-built computers online to the customers. In 2000, Dell became number one seller of computers in USA surpassing even the Compaq (123HelpMe.com, 2015). Dell computers corporations has the mission to be the most successful computer company in the world at delivering the best customer experience in markets we serve. It was created to operate on a direct selling model where customers are to order for their computers online and then the computer is custom-made according to the needs of the customer (Saunders, 2009). Dell’s success is majorly attributed to the better management of its supply chain. Dell applies the best expertise to process customers’ orders and supply it at the fastest speed possible. Where the rivals take weeks, Dell takes only hours to supply the products to its customers. Dell has adopted as one of its strategies, the shortest supply chain. Dell purpose to minimize the involvement of middle men as a way of minimizing time they take to get products to customers and as a way of getting directly in touch with the customers. The company also ventured into customer relationship management (CRM) as a way of staying close to customers. They hire third party logistics to supply their finished products instead of the middle men. Supplier of Dell supply raw materials on a just in time basis directly to the production line at shortest time hence contributing to success of the company. Success is in terms reduced costs on setting up a

Thursday, October 17, 2019

Corporate strategy Essay Example | Topics and Well Written Essays - 2250 words

Corporate strategy - Essay Example Despite the pressure of the global financial crisis, the Group continued with its existing policy. Consequently, the Group’s Executive Chairman announced that some delay over the opening of certain hotels and resorts is unavoidable. Corporate Strategy: Jumeirah Group Introduction Worldwide destinations spend over $1,480 billion dollars to attract tourism, enabling it as a lucrative product (Pike, 2005). Additionally, vision must enable trade and investment in that quest (Hankinson, 2005). And, to enjoy a successful branding strategy for tourist destinations, five factors, such as retail, services, transit hub, tourism and economics, must be there to implement strategic vision (Jamrozy, 2007, Wong et al. 2006). And the vision of the Jumeirah Group heads in the same direction. In the year of 1997, Jumeirah Hotels & Resorts, as a company initiated to serve in the field of hospitality. Due to its commitment and constant success in the field, Jumeirah Group became a member of Dubai Holding in 2004 (About Jumeirah Group, web).Being based in the city of Dubai, the Jumeirah Group owns and runs Jumeirah Beach Hotel, Jumeirah Emirates Towers, the Jumeirah Carlton Tower, Jumeirah Bab Al Shams Desert Resort and Spa in Dubai, Madinat Jumeirah, Jumeirah Lowndes Hotel in London, and the Jumeirah Essex House on Central Park South in the city of New York (Enz, 2010). Additionally, the Group also owns the Wild Wadi, which is considered as one of the premium water parks outside of North America; further, the Emirates Academy of Hospitality Management, which is only third-level institution in the region catering the services in the learning and teaching in the field of hospitality management, also come under the management of this group (Enz, 2010). This group is a giant in the field of hospitality management working beyond the boundaries of the Middle East. Its strategic objectives till the year of 2012 is to conclude the ongoing projects to 60 hotels and resorts, includin g some projects are underway in Americas, Asia Pacific, North Africa and Europe (Jumeirah, web). Currently, the Group is determined to expand not only within the Middle East but also other parts of the world. Although, the group has published its corporate responsibility report in 2008, clearly highlighting its corporate responsibility, mentioning its corporate strategy elements, vision, mission, corporate social responsibility and certain other elements are accounted for. Despite showing so much exceptional growth and expansion in the recent years, the Jumeirah Group has not published the corporate responsibility reports after the year of 2008, since then there are no additional financial and operational information suggesting the current level of its commitment on the green house gases, customers, and other stakeholders. The Group seems unable to produce its corporate responsibility reports, raising more doubts on its commitment towards corporate issues, including corporate social responsibility. In the subsequent parts of this paper, the concept of corporate strategy is followed by the Jumeirah Group’s corporate strategy of global expansion and growth analysis. Subsequent to that, critical analysis is carried over the Jumeirah Group’s disclosure policy; in the end, a conclusion and some recommendations are also made part of this paper. Corporate strategy Corporate strategy

Culture, End of Life and Evidence Based Practice Assignment

Culture, End of Life and Evidence Based Practice - Assignment Example We also use scientific theories to support our hypothesis. Using their findings, we tend to explore and add evidences to tailor their needs or the clinical problem. It is not easy to find research findings that would be of clinical significance to your study. Critical thinking skill is very much essential in finding the best evidence that would support your study. In addition, the researcher in evidence based practice always work on what they think would be of the best interests of the patient. They also used their clinical judgment in applying evidence to patient care. 2. Discuss the process of how current evidence is used to make clinical decisions. In using current evidence to make clinical decisions, evidence based practice follows a distinct process which are different from nursing research process or research utilization. First, researchers observe, recognize, and identify clinical problem. After identification of the clinical problem, researchers will gather researches that ar e of clinical significance to the present situations. When we speak of clinical significance, we can say that related literatures or studies the researchers have gathered came from the experts and have used scientific theories. Using their critical thinking, the researcher will synthesize all the evidence and will integrate all the findings from the expert to the patient input or current situation. ... PICO stands for Population, Intervention being tested, Comparison, and Outcome (Gerrish & Lacey, 2010, 69). PICO could be illustrated in the question that follows: â€Å"In an adult population, does taking virgin coconut oil (compared to not taking one) increase the level of good cholesterol?† The population is the adult population, taking virgin coconut oil is the intervention, comparison set-up are those adults who are not taking virgin coconut oil, while the projected outcome is the increased levels of good cholesterol. 4. Identify common complementary and alternative therapies used by clients based on culture. The use of complementary and alternative therapies has increased dramatically for the past decades. Complementary therapies refer to treatment approaches that can be used in conjunction with conventional medical therapies whereas; alternative therapies are treatment approaches that are not accepted by medical practice (Daniels, 2004, 812). The used of complementary-a lternative modalities (CAM) depend upon the culture of an individual. Sometimes, those therapies of Western origin are called complementary while those who do not are called alternative. For instance, the Ancient Greek culture viewed health as the balance of in all the dimensions of life and healing is administered primarily by trained priest-healers. In Chinese, Japanese, and Indian culture, health is viewed as the balance between mind, body, and spirit. They have this concept called â€Å"energy force† which is deeply rooted on their religious beliefs; examples of which include the Tao healing in Chinese and the Ayurveda in Hindu culture. Aside from religious affiliations, one can observe the emergence of Shaman

Wednesday, October 16, 2019

Corporate strategy Essay Example | Topics and Well Written Essays - 2250 words

Corporate strategy - Essay Example Despite the pressure of the global financial crisis, the Group continued with its existing policy. Consequently, the Group’s Executive Chairman announced that some delay over the opening of certain hotels and resorts is unavoidable. Corporate Strategy: Jumeirah Group Introduction Worldwide destinations spend over $1,480 billion dollars to attract tourism, enabling it as a lucrative product (Pike, 2005). Additionally, vision must enable trade and investment in that quest (Hankinson, 2005). And, to enjoy a successful branding strategy for tourist destinations, five factors, such as retail, services, transit hub, tourism and economics, must be there to implement strategic vision (Jamrozy, 2007, Wong et al. 2006). And the vision of the Jumeirah Group heads in the same direction. In the year of 1997, Jumeirah Hotels & Resorts, as a company initiated to serve in the field of hospitality. Due to its commitment and constant success in the field, Jumeirah Group became a member of Dubai Holding in 2004 (About Jumeirah Group, web).Being based in the city of Dubai, the Jumeirah Group owns and runs Jumeirah Beach Hotel, Jumeirah Emirates Towers, the Jumeirah Carlton Tower, Jumeirah Bab Al Shams Desert Resort and Spa in Dubai, Madinat Jumeirah, Jumeirah Lowndes Hotel in London, and the Jumeirah Essex House on Central Park South in the city of New York (Enz, 2010). Additionally, the Group also owns the Wild Wadi, which is considered as one of the premium water parks outside of North America; further, the Emirates Academy of Hospitality Management, which is only third-level institution in the region catering the services in the learning and teaching in the field of hospitality management, also come under the management of this group (Enz, 2010). This group is a giant in the field of hospitality management working beyond the boundaries of the Middle East. Its strategic objectives till the year of 2012 is to conclude the ongoing projects to 60 hotels and resorts, includin g some projects are underway in Americas, Asia Pacific, North Africa and Europe (Jumeirah, web). Currently, the Group is determined to expand not only within the Middle East but also other parts of the world. Although, the group has published its corporate responsibility report in 2008, clearly highlighting its corporate responsibility, mentioning its corporate strategy elements, vision, mission, corporate social responsibility and certain other elements are accounted for. Despite showing so much exceptional growth and expansion in the recent years, the Jumeirah Group has not published the corporate responsibility reports after the year of 2008, since then there are no additional financial and operational information suggesting the current level of its commitment on the green house gases, customers, and other stakeholders. The Group seems unable to produce its corporate responsibility reports, raising more doubts on its commitment towards corporate issues, including corporate social responsibility. In the subsequent parts of this paper, the concept of corporate strategy is followed by the Jumeirah Group’s corporate strategy of global expansion and growth analysis. Subsequent to that, critical analysis is carried over the Jumeirah Group’s disclosure policy; in the end, a conclusion and some recommendations are also made part of this paper. Corporate strategy Corporate strategy

Tuesday, October 15, 2019

Leadership of Richard Branson Research Paper Example | Topics and Well Written Essays - 1500 words

Leadership of Richard Branson - Research Paper Example In total, there are over 60 companies operating under the Virgin brand name with the most recent being Virgin Galactic that was created in September 2004. Virgin Galactic illustrates Branson’s high-risk appetite where he signed a 21 million dollars deal that would see the company carry out space tourism. Primarily, the Virgin Group operates in three main areas lifestyle, entertainment and travel where Branson has been cited as saying that his business model has been found on starting businesses in new countries and markets as opposed to expanding the current businesses as this affords him a global presence. Notably also, the coming up of the business name Virgin where one of Branson’s associates stated that this signified their commercial innocence as every business they got into they were a virgin (Pfister & Tierney, 2008). In the 1970s, Richard Branson came up with principles that have long since defined the Virgin Group as they are its brand values; these are value for money, good quality, innovation, competitively challenging and fun. There being over 200 firms and foundations, the Virgin Group is not a single object but a congeries of firms and institutes that are mostly based in the United Kingdom. A distinguishing characteristic of the Virgin Group is the fact that the companies are all run separately and the only thing connecting them is finance and the brand name. Prior to being listed in the stock exchange in 1986, the Virgin Group was privately managed. This corporate structure, however, was not prosperous and as such it was made private again and this saw the market crash in 1987. Thereafter, Branson and other shareholders bought back all the shares at their original price of offer. In the subsequent years, Branson got into business ventures where customers were underserved and the Virgin br and name was only given to companies that had certain characteristics- innovation or high quality. The Virgin

Origin of babies Essay Example for Free

Origin of babies Essay Once, there is young man who wished to have a good life, a great family he can call his own and offspring that he wanted to share his life with. During his bachelorhood, he would usually sit on his patio and think of these things. Years went by and he was able to marry the love of his life, the queen of his heart. He shared with her, his dreams when he was still a bachelor and together, they made that single simple dream come true. Under the clear blue sky of Paris, they both decided to have a family of their own, raise kids and be good parents. Soon after, their dream materialized and was blessed with a son. Being the kind of man that he his, he wants to raise his son the same way that his parents did to me. He would read to his son stories that deal with bravery, courage and respect to others. They were both a loving parent to their son they would give him all that he want if it is the best for him. When he was a year older, his father wants to mold his son into the kind of man that he is. They would often go out together and enjoy things that boys really do enjoy. Years and years passed, the son was already full-grown. He had finished college, had a secure job and is intending to marry his college girlfriend. They got married after several months of preparation and eventually bore their own child and a grandchild to their parents. The life cycle was already completed. The cycle of human life is chain and so it needs to be fulfilled step-by-step in order to arrive at the finish line. Upon the birth of their son, they were able to satisfy their urge of having a child and raise it the same that their parents did to them. They were able to fulfill the dream of their parents’ who wanted to see little children running around the lawn.

Monday, October 14, 2019

Researching The Computer Forensics Investigation Plan

Researching The Computer Forensics Investigation Plan The purpose of this paper is to review the basic methodologies and the appropriate processes that a computer forensic investigator goes through in conducting an investigation. It will give an idea to the reader about the planning and organization of an investigator who is involved in a computer related crime, the ways in which he will conduct the investigation such as basic preparation, use of the required tools and techniques, acquisition and analysis of the data, role in giving testimony, use of forensic laboratories or the guidance of all the staff working under the main investigator and even planning network forensics all of which are related to his work. The Computer Forensics Investigation Plan A computer forensic investigates data that can be retrieved form storage media of a computer such as a hard disk, it is also considered that to be a successful computer forensic the knowledge of many different platforms to perform computing is a must, for our case we will consider you as the chief forensic investigator in the state of Virginia, as a part of private enterprise you are assigned the role of planning the computer investigation of a suspected criminal activity, we will see from your perspective how you should conduct all the necessary procedures. We dont just need science; we need good science (Evans, 2004) Always analyze major issues in preparing for an investigation. The crime scene is considered to be a very sensitive place in terms of collecting proofs and evidences which are in many cases very vulnerable and can be very easily be manipulated so special attention is needed in every aspect of recovery methods in order to gain as much as possible. Before arriving at the scene of crime, it is mandatory that you should always take a systematic approach in problem solving like making an initial assessment about the case then determining a preliminary approach to the case, after that, create a detailed checklist of the objectivity of the case, analyze the resources needed, identify all the risks and try the very best to minimize them, also outline all the details known about the case until then in a systematic manner such as the situation in which you will be arriving, the nature and specifics of the case, the type of computer forensic tools which will be needed at the case and to check on the specific operating systems in disposal which assist in the forensics investigation process. Once at the crime scene, try to gather evidence to prove that the suspect violated the company policy or committed a crime, since this is a private sector investigation it includes corporate businesses, other agencies of government are not involved such as law enforcement. The law enforcement agencies act according to the federal freedom of information act or laws of similar descent according to their territory in all process. Investigating and taking control of the computer incident scene in the corporate environment is considered to be much easier than in the criminal environment because the incident scene is often the workplace, these workplaces have databases of computer hardware and software which can also be analyzed, proper tools can be adopted to analyze a policy violation if any. Many companies either state their policy right away or show some warning, some apply both whose purpose is to tell that they hold the complete right to inspect the computing assets of their respective subjects at will, in addition to that every company must describe when an investigation can be initiated and allow the corporate investigators to know that under what circumstances they can examine the computer of an employee, if the investigator finds about the wrongdoing of the employee then the company can file a criminal complaint against him. If any evidence is discovered of a crime during the investigation then the management must be informed of the incident, checking the incident itself that it meets the elements of criminal law, work with the corporate attorney and also to see that you dont violate any other constitutional law in all the procedure. Preparing for a computer seizure for search operation is one of the most important point in conducting computing investigation. In order to do this, some answers from the victim and an informant may be needed, informant can be a detective for the case, a witness, a manager or any coworker to the specific person of interest. If you can identify the computing system, then estimate things such as how many computer systems to process and size of drive on the computer of the suspect, also determine which operating systems and hardware are involved. Determining location of the evidence and the cases type is very crucial, it allows to determine if computers can be removed. If the removal of the computers will cause harm to the company then it should not be done in the interest of the company, problems in investigation may arise if the files are most probably hidden, encrypted or stored in some offsite, if the computers are not allowed to be taken for investigation then the investigator must determine the resources to acquire digital evidence and the proper tools which will be needed to make data acquisition faster. Also determine who is in charge of the respective systems (in corporate environment, usually one persons assistance from the company is required in this regard). Always keep some specialists who work on many different types of operating systems, servers or databases and properly educate those specialists in investigative techniques. Once arrived, securing the crime scene or the specific computer is the foremost priority of the investigation team, the purpose is to preserve the evidence and keep the acquired information confidential. The investigative team should define a secure perimeter using a special type of yellow barrier tape, it should also have the legal authority to keep the unnecessary people out but do not fail to comply the other law enforcers or obstruct justice in any manner possible. Only professional task force should handle the crime scene for evidence as any non professional law enforcer can manipulate or even destroy the vital piece of evidence which may be very crucial in the overall scenario. Remember that corporate investigators does not seize evidence very often, more brief guidelines for processing an incident or crime scene goes as follows, keeping a journal to document the activities, securing the scene in the sense of being professional and courteous with onlookers, removing all those personnel who are not associated with investigation, taking all the proper and necessary recordings in video of the area surrounding the computer, at the same time paying attention to all the major and minor details. Sketching the incident of the crime scene and checking the computers as soon as possible. While at the crime scene, dont ever cut the electrical power to a running system by pulling the plug unless it is an older Windows or DOS system (which in these days are very rarely found anywhere), instead apply a live acquisition by the proper acquisition methods if possible, when shutting down computers with Operating Systems such as Windows XP or later version of it or Linux/Unix then always remember to perform a normal shutdown of the system, this helps to prevent log files. Try the very best to save the data from the current applications as much safe as possible, properly record all active windows or other shell sessions, and photograph the scene. Also make notes of everything that is done even when copying the data from a live computer of a suspect, save open files to external storage medium such as a hard drive or on a network share (if somehow the saving mentioned is causing problems then save with some new titles), then close applications and shut down the computer. Further guidelines include on bagging and tagging the evidence which is done as follows, first assign a person to collect (and log) the evidence, then tag all the evidence which is collected with the present date/time, serial number or other features. Always keep two separate and different logs of evidence collected an keep control of the evidence at the crime scene. Always look for information related to the investigation such as passwords, PINs, passphrases, bank accounts and so on. Look at papers in places such as the drawers or even try to search the garbage can. Collect all the related documents and media which is associated with investigation such as manuals or software/hardware. Using a technical advisor of high degree experience and knowledge is a must, technical advisor can help to list the tools which are required to make progress at the crime scene, it is the person which can guide the investigation team about where to locate data and help the team in extracting the log records or other evidence form large servers. The advisor can also create or help to make a search warrant by finding what is needed by the investigators for the warrant. More brief responsibilities of the technical advisor includes to know the aspects of the seized systems, to direct the main investigator on handling sensitive material, helping in securing the crime scene, helping to plan the strategy for search and seizure (documenting it), document all the activities and helping in conducting the search and seizure. Documenting all the evidence in the lab is also a necessary process, which involves in recording the activities and findings as the investigators work; this can be done by maintaining a journal to record the steps taken as the investigator process evidence. The main objective is to produce the same results when the main investigator or any other repeat the steps that were taken to collect evidence, a journal serves as reference that documents all the methods that have been used to process evidence. For proper documenting the evidence, always create and use an evidence custody form, which serves the following functions such as identify who has handled the evidence and identify the evidence itself, properly listing all time and date of the handling of the evidence. Other information can also be added to the form such as specific section listing and hash values, try to include any other detailed information that might need for reference. Evidence forms or labels are present in the evidence bags that can be used to document the evidence. Forensic Tools Always prepare the tools using information from incidents and crime scenes, the initial response field kit should be light in weight and easy to transport form one place to another. An addition to the initial kit is the extensive response field kit which must include all the necessary tools. The items in an initial response field kit may include one digital camera or 35mm camera with film and flash, one flashlight, one laptop computer, one large capacity drive, one IDE ribbon cable (ATA-33 or ATA-100), one SATA cable, one forensic boot media containing the preferred utility, one FireWire or USB dual wire protect external bay, ten evidence log forms, one notebook or dictation recorder, ten computer evidence bags (antistatic bags), twenty evidence labels, twenty tape and tags, one permanent ink marker, ten external USB devices such as a thumb drive or a larger portable hard drive.(cited in Nelson, Phillips Stewart , 2004) Tools in an extensive response field kit may include varieties of technical manuals ranging from operating systems references to forensic analysis guides, one initial response field kit, one portable PC with SCSI card for DLT tape drive or suspects SCSI drive, two electrical power strips, one additional hand tools including bolt cutters, pry bar and hacksaw, one pair of leather gloves and disposable latex gloves (assorted sizes), one hand truck and luggage cart, ten large garbage bags and large cardboard boxes with packaging tape, one rubber bands of assorted sizes, one magnifying glass, one ream of print paper, one small brush of cleaning dust fro suspects interior CPU cabinet, ten USB thumb drives of varying sizes, two external hard drives (200 GB or larger) with power cables, assorted converter cables and five additional assorted hard drives for data acquisition. When choosing an appropriate tool, the investigator must be sure that the tool is properly functioning, and that the right person handles it during the investigation. In order to prepare the investigators team, investigator must review all the facts, plans and objectives with the entire team assembled, the main objectives of the scene processing should be to collect evidence and secure it. The speed of the response from the team is very crucial as it can cause evidence such as digital evidence to be lost. Laboratory A computer forensics lab is a place where computer forensics conduct investigation, store evidence and house the necessary equipment, hardware and software. A typical lab manager duties involve many tasks such as proper management for case study, helping to provide reasonable consensus for effective decisions, keep everyone up to date with proper ethics and any modifications if made, keeping a financial account and proper check and balance of the entire facility, keeping it updated according to latest trends in technology and promoting the required quality assurance, appoint a schedule that suits everyone, estimating the potential of investigators and assessing their requirements, proper estimation of results ( preliminary or final) or when they are expected, strictly manage all lab policies and keep an overall look on the safety and security of the entire facility. The staff members have duties which include knowledge and training of equipments relating to computer systems such as O perating systems and their file types, software and hardware. Other staff duties include knowledge and training of technical skills, investigative skills, deductive reasoning. Planning lab budget involves making proper divisions in costs on all bases from daily to annual expenses, gathering the available data of the past expenses and use it to predict or prepare for any future costs. The main expense for a lab comes from the trained personnel or the equipment they use such as hardware or software devices in their disposal. Always estimate the number of computer cases the lab expects to cover, always being notified about the advancements in technology in the respective field, try to make assessment about the computer related crimes ( their kinds), and use this information to plan ahead lab requirements and costs. While making good computer technology available is important, the costs and benefits of upgrading all computers to state of the art must be weighed. (cited in schwabe, 2001) Check statistics from the Uniform Crime Report, identify the specific software used to commit crimes. If youre setting a lab for any private corporation, remember to check the inventory of computing such as software or hardware, previous reported problems and the ongoing and future advancements in related computer technology. Managing time is also a major concern when choosing on the computing equipment for the purchase. Most of the investigation is conducted in the lab, so it should be secure as evidence may is very crucial and cannot afforded to be lost, manipulated, damaged, destroyed or corrupted. Always put emphasis in providing a secure and safe environment, keep proper inventory control of the assets (inform in advance if more supplies are needed). A safe and secure facility should always preserve the evidence data and keep it as it is, the minimum requirements for a secure facility are a medium or small sized room with true walls form the floor to ceiling, proper locking mech anism provided with the door access, secure container and log for visitors. Almost all of the workers in the facility should be given the same level of access. Always brief the staff about the security policy, it is a must. The evidence lockers used in the lab must be kept secure enough such that any unauthorized person may not access it at all, some recommendations for securing storage containers include locating the containers in a properly defined restricted area, limiting people who will have the access to the storage containers, keeping a record on the authority of everyone who has access to the containers and keeping the containers locked when not in use. If a combination of locking system is used, then provide equal measure of security for both the contents of the container and the combination, always destroy the combinations that were previously held when setting up new combinations, only those persons who have the proper authority should be allowed to change the lock combinations, try to change the combination every three or six months or whenever required. When using a key padlock, authorize a personnel as the main key custodian, keep duplicate keys and print sequential numbers on all of them, keep a registry which has a record of keys that are assigned to the authorized personnel, conduct audits on weekly or monthly basis, try to place keys in a secure container after taking an inventory of keys, keep the level of security the same for all the keys and evidence containers, replace the old locks and keys on an annual basis and dont use a master key for several locks. Containers should be strong, safe and as much indestructible as possible with external padlock system and a cabinet inside, try to get a media safe if possible (to protect evidence form damage), keep an evidence storage room (if possible) in lab and keep a well organized evidence log which is used to keep update on all the occasions when the container of the evidence is opened or closed. Always maintain a security policy and enforce it (log signing in for visitors in a way that those personnel are considered to be visitors who are not assigned to lab, these visitors should always be escorted in all times), using indicators (visible and/or audible) is also a necessity inside lab premises, install an intrusion alarm system and hire a guard force for your lab. In civil litigation, investigator may return the evidence after using it (when issued a discovery order),if the investigator cannot retain the evidence then make sure it make the correct type of copy( copy in cases of data from disks or other hard drives, logical or bit stream), ask the supervisor or your client attorney on the requirements, you should usually only have one chance, create a duplicate copy of the evidence file, make minimum two images of evidence(digital) using separate methods, try to copy the host protected part of a disk, size is the biggest concern ( such as in raid redundant array of independent disks) systems which have terabytes of data), Some investigation needs to be conducted in the laboratory because of the proper tools and technicians available there who know how to deal with the evidence correctly without tampering it, Investigator might need to have the proper permission of the authority in charge if it wants the system moved to the laboratory, when permission provided, the investigator have a given time frame in which it must perform its task and then deliver the system back to where it came from. Log files Log files are those which lists all the actions that have happened, such as in Web servers which maintain log files to list every request made to the main Web server, using the log file analysis tools, the user can gave a very good assessment of where the visitors came from or how often they return or even how they go through a site, in addition to log files there are cookies, when used, they enable the Webmasters to log far more detailed information about the user on how it is accessing a site. Logs are also considered to be an independent, machine-generated record of what happened within a network for both system and user activity. When set up properly, and with the appropriate due care, logs can provide an immutable fingerprint of system and user activity. In many cases, the logs tell a story as to what really happened in an incident. They can tell you what systems were involved; how the systems and people behaved; what information was accessed; who accessed it; and precisely when these activities took place. (Cited in Musthaler, 2010) Given the overview of logs on what they can provide, the regulations such as the PCI DSS (payment card industry DSS), the FRCP (civil procedures federal rules), the HIPAA (which is an act regarding the health insurance) and many other regulations, all consider logs and log management to be the very basic and essential necessity for proper and efficient data management. Logs can be used to capture many vital sources of information which beside protecting the core data can also help in supporting forensic analysis and incident response if a data breach has occurred or other forms of electronic crime, such as fraud. The overall log monitoring can be hurdled because of the extremely large amount of fair data capture and the unwillingness, lack of will or errors in properly managing, analyze and correlating that data. The overall conclusion (in mismanagement) can cost hugely as if some suspicious activity or breach really happens, then a lot of time ( possibly many months ) may require to detect the fault, there is even no guarantee if the fault will be detected. In order to have logs admissible in court as evidence of a crime, an organization must prepare and execute due care with the log data. Log data must be viewed and treated like a primary evidence source. Here are some best practices that can help ensure log data and log management practices properly support forensic investigations. Have a clear corporate policy for managing logs across the entire organization. Document what is being logged and why, as well as how the log data is captured, stored and analyzed. Ensure that 100% of log-able devices and applications are captured and the data is unfiltered. Have centralized storage and retention of all logs, with everything in one place and in one format. Ensure the time synchronization of logs to facilitate correlating the data and retrieving data over specific timeframes. Ensure the separation of duties over logs and log management systems to protect from potential internal threats such as a super user or administrator turning off or modifying logs to conceal illicit activity. Always maintain backup copies of logs. Have a defined retention policy that specifies the rete ntion period across the organization for all log data. Organizations should work with legal counsel to determine the best time frames and have log data incorporated into an overall data retention policy. Have a defined procedure to follow after an incident. Test the incident response plan, including the retrieval of backup log data from offsite storage. (Musthaler, 2010) Further quotes form Brian Musthaler include, If an incident or data breach is suspected, there are several steps to take right away: Increase the logging capability to the maximum and consider adding a network sniffer to capture additional detail from network traffic. In an incident, its better to have more data rather than less. Freeze the rotation or destruction of existing logs to prevent the loss of potential evidence. Get backup copies of the logs and make sure they are secure. Deploy a qualified investigations team to determine the situation. (Musthaler, 2010) With the appropriate care, logs can provide solid forensic evidence when and if it is needed, as far as the job of a computer forensic investigator is concerned, his log begins when he starts an investigation, logs can be made of many things such as events, system security, firewall, audit, access and so on. (cited in PFI, 2010) Equipment can be recorded in the log by many ways, audio logs can be made which can store audio files, picture logs can be made which can store digital pictures taken during an investigation. Equipments are recorded according to the type of its contents with the appropriate tools. The final log is stored at the very end after possibly remodifying or revising previous logs. Data acquisition For the process of acquiring data in an investigation, we will consider following techniques, There are two types of data acquisition, static acquisition and live acquisition which basically involves the following four type of acquisition techniques, bit-stream disk-to-disk, bit-stream disk-to-image file, sparse and Logical. Bit-stream disk-to-image file is the most common method, it makes many copies and all of the copies made are replications of the original drive bit-by bit, similar type of process is happening in everyday scenario concerning a common personal computer, when we copy and paste files from one place to another or when we make multiple copies of a data file then the exact copy of the original data file is made available in many places. It is very simple, easy and with very nominal training can be performed on the target system therefore it is the most preferred method as well. The tools used in it are EnCase, ProDiscoer, FTK, SMART. Disk-to-disk method (bit-stream) is applied in the case of disk-to-image copy being impossible mainly due to hardware or software errors or incompatibilities, this problem comes when at most of the time dealing with very old drives. It adjusts target disks geometry to match the drive of the suspect (geometry of track configuration), tools used in this form are SafeBack, EnCase, , and Snap Copy. Logical acquisition and Sparse acquisition are used when the total time of the investigator is very short and the target disk is very large. This type of acquisition only searches and retrieves the selected file which is of particular interest, comparing this to Sparse acquisition which deals with data collection but again the data collected is very nominal. Data analysis Data analysis(for a computer forensic investigator) includes mostly examining digital evidence which depends on the following main factors, the nature of the case, the amount of data to process, the search warrants and court orders and the company policies. Scope creep happens when investigation expands beyond the original description which should be avoided in all cases. Few basic principles apply to about the entire computer forensics cases such as the approach taken depends largely on the specific type of case being investigated. Basic steps for all computer forensics investigations for analysis include the following points such as for target drives, using only recently wiped media that have been reformatted and inspected for computer viruses, noting the condition of the computer when seized, removing the original drive from the computer to check date and time values in the systems CMOS, record how to acquire data from the suspects drive, process the data methodically and logically, listing all folders and files on the image or drive Also try to examine the contents of all data files in all folders starting at the root directory of the volume partition, try to recover all the file contents that are password-protected and can be related to the investigation, identifying the function of every executable file that does not match known hash values and maintain control of all evidence and findings and also document everything as being progressed through the examination. Refining and modifying the investigation plan includes determining the scope of the investigation and what the case requires, determining if all the information should be collected and what to do in case of scope creep. The main aim should be to start with a plan but remain flexible in the face of new evidence. Data can be analyzed using many tools from the forensic toolkit such as supported file systems (FAT12/16/32, NTFS, Ext2fs, and Ext3fs). FTK can a very powerful tool that can analyze data from several sources including image files from other vendors, it produces a case long file. FTK also analyzes compressed files, reports can also be generated in it using bookmarks. Other analyze tools include searching for keywords (indexed search, live search or using advanced searching techniques such as stemming). In order to identify different types of data such as images, email and so on, the investigator should examine the data format and then according to that format, it should deal with the file with the appropriate tool. Working with law enforcement The status of individuals under law is no longer in doubt: individuals are subjects of law and as such are accorded rights. Yet rights are illusory without the procedural capability to enforce them. They are no more than high-minded principles if individuals whose rights have been violated have no avenue for complaint and relief. (Cited in Pasqualucci, 2003) There are basically two types of computer investigations, public and private(corporate), the public investigations involve government agencies responsible for criminal investigation and prosecution, the organizations involved must observe legal guidelines provided to them by the authority, other legal rights such as law of search and seizure helps in protecting rights of all people including suspects. Of the everyday problems of the criminal justice system itself, certainly the most delicate and probably the most difficult concern the proper ways of dealing individually with individuals.(Cited in Winslow, 1968) Investigator working with the law enforcement must always abide by the federal and constitutional laws in conducting and performing entire process of investigation. Criminal cases at law enforcement goes through three main steps, first the victim (any individual or company) will contact the law enforcement agency by making a complaint, then acting on behalf of that complaint, the investigator will be assigned by the government authority to conduct a balanced and proper investigation and will be asked to present all the findings directly to the law agency, the investigator will interview the complaint and will write a report about the crime, police blotter may provide a record of clues to crimes that have been committed previously (related to the ongoing investigation). The investigator collect, delegate and process the information related to the complaint. As the investigator build a case, the information is turned over to the prosecutor. An affidavit is a sworn statement of support of facts about evidence of a crime which is submitted to a judge to request a search warrant; the judge must approve and sign a search warrant before it can be used to collect evidence. The chain of custody is the route the evidence takes from the time investigator finds it until the case is closed or goes to court, throughout the case, the evidence is confiscated by the investigator who has the proper right under the law to maintain and keep the evidence immutable. Other concerns which need to be addressed when bringing law enforcement to the scene is that the officers should follow proper procedure when acquiring the evidence such as in digital evidence which can be easily altered by an overeager investigator, special concerns should be given to the information on storage media such as hard disks which are password protected. Network forensics Network forensics is the job of finding the information about how a perpetrator or an attacker gained access to a network, it involves systematic tracking of incoming and outgoing traffic to find out how an attack was carried out or how an event occurred on a network, the forensic expert should be very well experienced and be familiar with many previously related cases of network because the intruders which the network forensic searches for always leave some sort of trail behind, this trail

Saturday, October 12, 2019

The Stand Essay -- essays research papers

The Stand by Stephen King was a very detailed, and engulfing story about a possible end to mankind. This â€Å"extermination† is caused by a man-made variation of the flu that is 100% fatal and spread through the air. It wipes out 99% of the world’s population in a month, leaving around 1 million people in the entire United States. The story is about how the population is split between good and evil and the battle that goes on between the two colonies. The story is presented from many different point of views, because there are around ten to fifteen different main characters.   Ã‚  Ã‚  Ã‚  Ã‚  Of all the characters, Harold Lauder is probably the most interesting and developed in the whole story. His personality changes drastically from one extreme to the other throughout the book....

Friday, October 11, 2019

Read and Respond to: Amy Tan’s Mother Tongue Essay

Amy Tan is a passionate writer of books such as â€Å"The Joy Luck Club† and other published works. Now that we have read her text read her text â€Å"Mother Tongue†, we learn new things about her as a writer. In my first response to Amy Tan’s passage I described her as a self-motivated author as I read what motivated her to write. She introduced readers to her mother, a woman who enjoys reading Forbes and listening to the Wall Street Journal talks. This gave us as readers a clue that Amy’s mother was used to reading more advanced pieces. Amy tan tells us about her mother’s English and how it sounded â€Å"broken† or as if something was â€Å"missing† every time she talked. While at the same time, her mother’s way of speaking English sounded natural and real to Amy, and I think this could be a reason she chose â€Å"Mother Tongue† as her title. While Amy described herself as a rebel by nature, she pursued her passion to become a great write for herself, and for her mother, while disproving all negative assumptions about her. A good example of this when she started writing fiction. She mentions in her article that most sentences although grammatically correct, had an in-authentic sound to her and unnatural. In other words she was probably writing something â€Å"mother wouldn’t approve†. I go back to when Amy Tan mentions that she enjoyed disproving assumptions made about her while she was starting out. She was told that her English was not good enough to be a writer and still pursued her goal and worked hard to become a great writer. She gives off a sense of pride and accomplishment when she writes that about how she knew she had succeeded as a writer when her mother finished reading her book and said to Amy, â€Å"so easy to read†. Mother Approved. As a personal opinion, I think most people are not like Amy Tan. In the sense of us sometimes not being passionate enough to truly follow what we want and work towards it regardless of what other may have to say. There are many influences out there and must learn to only pay attention to those that will help us get closer to our goal and ignore the rest. As a good friend of mine once told me; It’s not that don’t care about certain people, it’s just that at this very moment where our goals are constantly in our minds, we need to focus and let go and only stick to what will help us accomplish our goals.

Thursday, October 10, 2019

Hydration Lab Essay

The purpose of this lab is to determine the water of hydration of a compound (CuSO4) by heating it and hence find its chemical formula. It was determined that the compound contained 4 moles of H2O for every 1 mole of CuSO4, hence had the formula CuSO4 à ¯Ã‚ ¿Ã‚ ½ 4H2O and Copper [II] Sulfate Tetrahydrate. However, the literature value was 5 moles of oxygen for every 1 mole of CuSO4 (Copper [II] Sulfate Pentahydrate – CuSO4 à ¯Ã‚ ¿Ã‚ ½ 5H2O). As calculated above in Data Processing, this means that the percentage deviation from the literature value was 20%. This is significantly less than the percentage uncertainty, which was 37%. This should indicate that the random error was higher than systematic error, because while there was a high level of uncertainty, the literature value still falls within that value, meaning that the measurements were close enough. In reality, though, this high level of uncertainty says more about the inaccuracy of the measuring equipment than it does about the amount of systematic error. For example, it is possible that simply not all of the water was removed from the compound. On the contrary, the lab procedure instructed to continue trials of heating the compound and weighing it until the mass values were within 0.05g of each other. Those in this lab were only 0.01g apart – a difference which would not have affected the outcome of the lab. This means it is unlikely that there was a significant amount of water remaining in the compound. Evaluation of Procedure It cannot honestly be said that this lab was executed successfully. This is for two main reasons: 1. the false result 2. the high degree of uncertainty The first of these is surely the most important: this lab did not achieve the desired result. While the compound had a water of hydration of 5, the lab results said that this value should be 4. In some circumstances, such error could be tolerated – indeed, 20% is not terrible. However, the very purpose of the lab was to determine the compound, and this goal was not achieved. The second point is how uncertain the data really was. Based on the percentage of uncertainty, the water of hydration could have been anywhere from 2.5 to 5.5. This does contain the literature value, but has a range of more than half of that value (3/5). If the water of hydration could nearly have been 2 or 6, does this lab truly reveal anything? It gives a vague estimate of how much water there is, but little more. Much of the uncertainty was caused by an imprecise scale used in the initial measurements. Only after the procedure requested precision to two decimal places was a more precise scale used, and the initial measurements were still only accurate to 0.1g. Also, if the mass of compound used had been higher, the percentage error would have been less simply because it would be a smaller portion of the measured value. Improving the Investigation This lab did not meet its goal, hence definitely should be improved. The simplest change that could be made is to use the more precise scale from the beginning of the experiment. This would reduce the percentage error down to 6.7%, a much more reasonable value. This, however, does not solve the problem of the inaccurate value determined, because it is unlikely that this scale would have been any more accurate, despite being more precise. It is hard to pinpoint, therefore, exactly where the experiment went wrong, as it seems that the scales were not at fault but that a sufficient amount of water had been removed. There was certainly some kind of systematic error. One way that this error might be reduced, even without understanding its source, is to increase the amount of substance measured. Because the lab is about obtaining a ratio, this would not affect the result at all except hopefully to decrease the effect of any systematic error. This would, however, have the disadvantage of making the lab take longer, and steps might need to be added to ensure that all of the compound has a chance to dehydrate.