Thursday, November 28, 2019

Joggers Universe free essay sample

Introduction Sue Koenig opened the Joggers Universe retail store in 1987 at the age of 24. For the last 10 years she has mainly offered the sale of high-end running shoes, walking shoes, shoes for aerobic exercise, basketball shoes, tennis shoes, and crosstrainers, with the emphasis on Nike brands. Nike’s superior promotion strategy and name brand recognition has allowed her to maintain good steady sales, with a $5 to $7 premium on every pair of shoes sold. She also has offered the sale of sportswear with the focus on fashion as well as function. As a formerly nationally ranked runner, her passion for running and fitness has allowed her to stay abreast of exercise trends and allowed her to stay competitive in her chosen market. Issue The issue facing Sue Koenig and Joggers Universe is that despite her on-hand knowledge of running and exercise trends, access to superior name brand products and fashions, and her healthy profit margins, her overall sales have flattened out. We will write a custom essay sample on Joggers Universe or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page She appears to have been able to capitalize on the jogging and fitness trends in the market growth stage, when there were relatively few competitors, and total industry profits were at their peak. Now that the fitness industry as a whole has entered the market maturity stage with the maximum amount of direct competitors, her business has begun to suffer. Root Cause The sales at Joggers Universe have faltered due to many factors: 1 – The primary cause for her loss of market share is due to the fact that her current, long-term customers are getting older, and have found that jogging has become too demanding for them, and as a whole are switching to low-stress exercise programs. The merchandise that Joggers Universe offers no longer meets the demands of her loyal clientele, and so they have begun to shop elsewhere. On the other hand, when Sue attempted to change her product lines to accommodate this loyal but dwindling customer base, she found that her sales to younger, hardcore runners began to suffer. Clearly, this trend cannot be allowed to continue, as she will not be meeting the specific needs of any market segment. 2 Due to changes in consumer culture and activity, younger people are exercising less, and are likely to use their casual day-to-day shoes as their exercise shoes. As such, there are many department, discount, and regular stores that offer these types of shoes, and customers can buy them without paying a premium. Increased competition from other retailers has cut into her bottom line. In addition to Wal-Mart offering an extended assortment of athletic shoes at deep discounts, Joggers Universe faces competition from Foot Locker, who offers basically the same kind of products as she does. A number of local retail chains have opened that offer lower-quality and lower-cost versio ns of her products, and she also faces increased competition from online retailers. Alternatives A – Made-to-order high-performance athletic shoes Sue may want to consider revisiting a sales strategy she attempted in 2003 and change her business structure to providing expensive, made-to-order, high-performance athletic shoes. This product line incorporated new technology that was used to capture the specific contours of a person’s feet, which was then sent back to the manufacturer by UPS. The customer was able to choose which style they preferred, and in two weeks the shoes were delivered. The company that provided this service unfortunately went out of business, but Sue discovered another company that provided the same service. The main advantage and disadvantage of this alternative is that this will require Sue to change which market segment that she will be promoting to. The segment of customers that Joggers Universe will be focusing on will be serious exercise enthusiasts, who are also more affluent in their spending habits. The downside of this is that it will require Sue to discover how to find and market to this new clientele. It will also require her to abandon a large percentage of her current customer base. Since these customers are mostly abandoning high-impact exercise programs and their product needs are changing, this is an acceptable tradeoff. Although it seems that the runners market seems to be shrinking, this problem can be addressed with the addition of more expensive ancillary products that these more affluent customers will be interested in buying in addition to these expensive, premium shoes. Stocking accessories such as heart rate monitors, like the Forerunner 301 [1] which retails for $199. 99, and runners watches like the Ironman Race Trainer [2] which retails for $150. 00 will appeal to the elite athlete that Joggers Universe will hope to attract. She could also stock expensive, high quality running outfits. Since these customers are generally interested in their health and wish to stay in peak condition, Sue should consider aligning herself with a multilevel marketing company (MLM) that offers health supplements in order to earn extra revenue. An advantage of moving in this direction is that the company that will be providing Sue with these specialty shoes is willing to grant exclusive distribution rights for her territory, which would help to keep the prices for product in control, and would keep other retailers from copying her strategy. This company is also responsible for the warehousing of these shoes, which would save money for her in terms of storing and managing unsold merchandise. The largest challenge that Sue would face if she were to pursue this strategy is in informing customers that this market exists, since this type of product is in the market introduction stage. She would have to establish a website for her store that promotes how the ordering process and production of these shoes works (this would be outsourced to a reliable web production company). She would also require her employees to go through a two-day training program for her new sales practices, including how to make the molds for the shoes and explaining their benefits. She would also have to develop a new advertising campaign that would be published in more upscale local publications that caters to the more affluent types of customers that Sue hopes to attract. B Incorporate Women’s fashionable athletic, casual wear and dress shoes This alternative incorporates two different approaches, and would allow Sue to maintain her current customer base while expanding her product lines in subtle ways. Firstly, she would retain her current product line and incorporate new women’s athletic wear and casual wear lines from designers like Donna Karan, Calvin Klein, Georgio Armani, and Ralph Lauren. This will allow her to get into a sales trend that is still in the market growth stage, where there are few major competitors. The main advantage of this alternative is that it allows Sue to maintain her loyal customer base that she has spent years building. Bringing in new and exciting fashions shows her customers that she cares about them, and would like to keep them. The second part of this strategy involves dedicating a small but growing section of her store to stocking lines of dress and office wear shoes. This strategy deviates away from the original concept of Joggers Universe, but will allow Sue to retain her aging customer base that is largely moving away from high-impact exercise programs, and are generally exercising less. Incorporating this strategy will not require Sue to drastically change her business structure, and as such she will be able to retain all her current employees, and only provide minimal amounts of new training. The main disadvantages of this alternative includes the fact that it does not really provide much in terms of differentiating Joggers Universe from other local retailers that offer essentially the same kinds of products. In attempting to hold on to her loyal customer base, she increases the chance of losing sales to other retailers, especially behemoths like Wal-Mart, who can offer running, exercise, and dress shoes for cheaper prices. Sue will have to begin aggressively advertising in local publications and periodicals to showcase her new and current product lines. She also may be forced to preemptively drop her retail prices in order to stay competitive in this increasingly crowded market. Furthermore, if Sue is to begin offering dress and office wear shoes, she will be required to establish a new distribution channel with a reliable middleman company. Recommendation Although it would be nice for Sue to be able to stay with her loyal customer base that she has held on to for many years, the business strategy outlined in Alternative B can only be maintained for so long. Attempting to keep these customers happy at the expense of further growth is the real cause of her problems. She potentially runs the future risk of losing any new customers and eventually all of her business to lower cost retailers offering essentially the same types of products that Joggers Universe offers, without the added cost of a premium price. It is recommended that Sue change her business strategy to selling the products outlined in Alternative A immediately. Implementation Sue should proceed by blowing out her current inventory with a massive discount sale. If she has a reverse channel in place with her suppliers that will buy back merchandise that she has been unable to sell, she would definitely utilize that. If she has been keeping a list of long-standing customers, she should consider sending out a mass mailing thanking them for their continued loyalty, but explaining that she will be closing her doors for a reorganizing. Of course, she should invite these customers back for her eventual re-opening, should they be interested in her new product lines. After this, it is simply a matter of scaling back her operation and bringing in her new products and processes. Since Joggers Universe will be offering smaller and limited product lines, she will no longer require to as large a store area, so she should let her lease expire and move into a smaller store.

Monday, November 25, 2019

Two Methods for Supercooling Water

Two Methods for Supercooling Water You can cool water below its stated freezing point and then crystallize it into ice on command. This is known as supercooling. Here are step-by-step instructions for supercooling water at home. Method #1 The simplest way to supercool water is to chill it in the freezer. Place an unopened bottle of distilled or purified water (e.g., with reverse osmosis) in the freezer. Mineral water or tap water will not supercool very well because they contain impurities that can lower the freezing point of the water or else serve as nucleation sites for crystallization.Allow the bottle of water to chill, undisturbed, for about 2-1/2 hours. The exact time needed to supercool the water varies depending on the temperature of your freezer. One way to tell your water is supercooled is to put a bottle of tap water (impure water) into the freezer with the bottle of pure water. When the tap water freezes, the pure water is supercooled. If the pure water also freezes, you either waited too long, somehow disturbed the container, or else the water was insufficiently pure.Carefully remove the supercooled water from the freezer.You can initiate crystallization into ice in several different ways. Two of the most entertaining ways to cause the water to freeze are to shake the bo ttle or to open the bottle and pour the water onto a piece of ice. In the latter case, the water will often freeze backward from the ice cube back into the bottle. Method #2 If you dont have a couple of hours, there is a quicker way to supercool water. Pour about 2 tablespoons of distilled or purified water into a very clean glass.Place the glass in a bowl of ice such that the level of the ice is higher than the level of water in the glass. Avoid spilling any ice into the glass of water.Sprinkle a couple of tablespoons of salt onto the ice. Do not get any of the salt in the glass of water.Allow about 15 minutes for the water to cool below freezing. Alternatively, you can insert a thermometer into the glass of water. When the temperature of the water is below freezing, the water has been supercooled.You can make the water freeze by pouring it over a piece of ice or by dropping a small piece of ice into the glass.

Thursday, November 21, 2019

Human Rights and Same-Sex Marriage Essay Example | Topics and Well Written Essays - 1250 words

Human Rights and Same-Sex Marriage - Essay Example Those who argue that same-sex marriages should be considered a civil right and should be treated just like any heterosexual monogamous marriage are doing so based on the principle of the Equal Protection Clause. This is, however, a flawed argument. It is absolutely wrong to consider that one’s constitutional rights ensure equal treatment in the area of marriage. One must understand with regard to equal treatment, the Constitution does not make reference to social relationships such as families, marriages, friendships, and the like (McVeigh and Maria-Elena 899). Two friends, who decide to consider their relationship a marriage, cannot go to the courts and demand equal protection rights just because they decided to consider their friendship a marriage. To do so is tantamount to saying that just because some people at a certain sports event pray together before the start of the event; courts are required under the equal protection law to allow these sports event goers to redefine the event as a religious ceremony. The government, as an example, recognizes a relationship between two contracting parties, one of whom agrees to mow the other’s lawn. However, the law governing the contracts does not define beforehand what kinds of contracts can be drawn. The law, instead, merely makes clear how binding a consensual contract is, and what legal obligations both agreeing parties have in fulfilling the contract

Wednesday, November 20, 2019

Critical Thinking Assignment Example | Topics and Well Written Essays - 500 words - 1

Critical Thinking - Assignment Example The effectiveness of sight can be limited by; colour blindness, night blindness, and when an eye is damaged such as looking directly at the sun, presbyopia which is aging. The sense of hearing is also limited by high pitch, loudness, and sound waves which are of high rates. (Schopenhauer, 1851) There are some reasons for believing in the accuracy or inaccuracy of sensory information. Though the sensory organs may be active, environmental influences may tamper with our interpretation of the data the organ is sending to us. For example you can look into a forest and hear the silence and think that you can walk freely and safely but when walking an animal come down from a tree. Sensory organs are not always correct when interpreting some Sensory data that’s why we should not always rely on them. The sense of sight provides accurate information about the surrounding. For example if you see a tree swaying you know there is wind. When one touches a hot substance, a person’s sense of feeling will send a message to the brain and you are able to know that you can get burned. There are factors that contribute to the accuracy of sensory data and they are; oral sensory sensitivity, repeatability, use of mathematical tools to assess accuracy and reliability. By oral sensitivity, what a person says is stored in the brain since one can remember very well what one said and the responses given by others and the reactions from others. There are short and long term memories. Both rely on the sensory information storage (SIS) which holds images. Repeatability is reminding one thing at a time to avoid loosing some information which might be needed for reference. It improves the accuracy of information since the information cannot get lost. Also with the use of mathematical tools, accuracy is very high since the measurements are taken with a lot of care because one doesn’t want to make mistakes. Nature is the environment that we are living in and it’s the one that

Monday, November 18, 2019

UAE Labor Law and Relations Essay Example | Topics and Well Written Essays - 1750 words

UAE Labor Law and Relations - Essay Example center of a far-reaching controversy with the government and private employers being accused of exploiting underpaying and generally mistreating workers (Kanna 147). The Industry in question in most cases is the construction industry; it is worth noting that in the UAE, there are over 500,000 foreign workers who are tasked with the construction of the world famous skyscrapers and breathtaking architectural wonders that have turned cities like Dubai into Meccas of building engineering (Shaoul). The immigrant workers make up to 95% of the labor on the building sites may of them from East Asia, India, the Philippines and North Africa. Controversy has riddled the industry since it has been frequently claimed that employees are forced to work under inhuman conditions that border slavery (Forstenlechner, Madi, Selim and Rutledge 412). The immigrant laborious are often forced to pay back their travelling expenses at incredibly high interests rates and their passports taken away on arrival s o they cannot leave or look for a different job. Ironically, on paper, the labor laws are relatively progressive on paper and they protect all workers local or immigrant from being exploited or abused by their employers. Nevertheless, this is rarely implemented and in most cases, even when the governments may force employers to restitute or compensate employees for damages and/or loss of life there are very few cases of employers having legal action taken against them irrespective of the gravity of their crimes to the staff. It is estimated that over 800 hired workers die on the job for a variety of reasons ranging from exhaustion, sunstroke, suicide and myriad more courses. In as far as compensation is concerned; the employee is entitled to a basic wage which according to the law is the total sum monies paid as stipulated in the labor contract not inclusive of allowances for accommodation or travel. Their total wage on the other hand is the amount paid when they have been provided

Saturday, November 16, 2019

Concept Of Facilities Planning And Plant Layout Computer Science Essay

Concept Of Facilities Planning And Plant Layout Computer Science Essay Background of the problem Today s manufacturing industry is facing problems that have been growing in size and complexity over the last several years. As a result, there is an immediate need for procedures or techniques in solving various problems encountered in today s manufacturing arena without extended shutdown s or expensive modifications ( Clark ,1996). Materials handling equipment and the facilities it operates can contribute to as much as 70 percent of the total cost of the manufactured product (Tompkins et al, 1996). Facilities layout design is part of facilities planning (Tompkins et al, 1996). It is the arrangement of work space which, in general terms smoothes the way to access facilities that have strong interactions. The main concern with the plant facility layout planning is to reduce the cost of materials handling as poor materials handling can generate business problems. To stay competitive in todays market a company must reduce costs by planning for the future Material handling cost is a indirect costs and every company wants to reduce this indirect cost and it constitutes a major part of indirect costs in a facility Therefore even small improvements in material handling costs makes a large reduction in total indirect costs. The cost of material flow is a function of the distance the material is moved between divisions called departments in a manufacturing facility. To reduce material handling costs, it is essential to have an optimal arrangement of departments to minimize the total distance traveled Tompkins (1982) estimated that between 20% and 50% of operating expenses in manufacturing can be attributed to facility planning and material handling. Thus any cost saving in this area can contribute to the overall efficiency of the production system. Due to its wide range of applicability, the facility layout problem will continue to be the subject of research for many years to come. Graph theory and computerized software of facility layout is a powerful tool that allows experimentation with various manufacturing techniques and layout without actual implementation. Based on the above facts, it is obvious that layout optimization and improvement are two tasks that are crucial to any facility planning and layout study. 1.2 Statement of problem JPM Automobiles ltd is an automobile component manufacturing company located in Gurgaon Haryana. The problem area in that company is the departments are not located to according to manufacturing process; processes which have high interdependency are not located close to each other. This cause distance travelled by the material is high from one department to another department which result high material handling cost. Which affect the overall efficiency of the company. In response to the above problems, the need for facilities layout optimization is needed. This dissertation proposes to use Systematic Layout Planning (SLP) as to improve the facility layout of the company by graph theory and BLOCKPLAN software to improve the company performance. The company performance improvements are in terms of productivity increase, reduction in travelling cost and reduction in travelling distance. 1.3 Objectives The problem area in that company is of higher material handling, in-process inventory, poor interdependency of department and inflexibility etc. due to its improper layout. Based on the above fact the objectives of the study are: To conduct a detailed literature review of the facility layout problems. To analyze the existing layout of the company and conduct cost analysis of the existing layout. To propose improvements in the existing layout by graph theory and BLOCKPLAN software. To conduct cost analysis of the existing and proposed layouts. Compare cost analysis of the existing and proposed layout by graph theory and BLOCKPLAN software 1.3 Concept of Facilities Planning and Plant Layout A facility planning is a complex and broad subject that covers several disciplines. It involves civil, electrical, industrial and mechanical engineers, as well as architects, consultants, managers and urban planners. Facilities planning can be divided into two components: facilities location and facilities design. Facilities location is about placement of the facility on a specific plot of land with respect to customers, suppliers and other facilities. Facilities design consists of the facility systems design, the layout design and the handling systems design. The facility systems consist of the structural systems, the environmental systems, the lighting/electrical systems and safety systems. The layout consists of all equipment, machinery and furnishings within the building structure. The handling system consists of the mechanisms needed to satisfy the required facility interactions for a manufacturing plant, the facilities layout, also called plant layout, consists of the productio n areas, production related or support areas and personnel areas within the building. Facilitiesà ¢Ã¢â€š ¬Ã¢â€ž ¢ planning has become a critical component for companies to keep up with the current market trends in the last few years. In the past facilities planning was primarily considered to be a science. In todayà ¢Ã¢â€š ¬Ã¢â€ž ¢s competitive global marketplace, facilitiesà ¢Ã¢â€š ¬Ã¢â€ž ¢ planning has become a strategy, (Tompkins et al, 2003). 1.4 Facility Layout In any plant, there are large numbers of finite geometric areas i.e. production, machine foundation area, space for inventory, design, production control and supervision are arranged on the floor space of the building. The problem of arranging these areas in an effective manner is the facility layout problem Francis et al (2006) define, facility layout as a technique of locating machines, processes and plant services within the plant, so as to achieve the right quantity and quality of product at the lowest possible cost of manufacturing. The facility layout problem is concerned with an arrangement of physical facilities, such as departments or machines, in certain areas to reduce a companys indirect costs. It has been estimated (Savsar 1991) that between 20 and 50% of the total operating expenses within manufacturing are attributed to material handling, which is directly related to facility layout. A poorly conceived layout can result in congestion and prohibitive material handling costs; and, on the other hand, an effective layout can provide an environment for efficient production. Since indirect costs are the largest portion of a companys total operating cost, the objective of a facilities layout problem is to minimize both interdepartmental flows and the rearrangement costs of changing layouts between time periods. These costs are a function of the amount of material flow and the distance the material is to be moved. The main objective of the facility layout problem is to minimize overall cost, which is directly related to material flow between departments. Generally material flow is represented by the product of the amount of material and the distance the material is moved. The distance traveled is estimated using rectilinear distance between centroids of the departments .Constraints ensure departments do not overlap and departments are of proper size. Many computer algorithms have been developed for designing layouts, mainly for the layout of departments within factories. Types of facilities layout There are four types of plant layout from the point of view of manufacturing Product layout Product layout is based on the processing sequence of part being produced on the line. Parts follow a fixed path through the production resources. In product layout, materials flow from one workstation to next adjacent workstation directly. This type of plant layout is useful when the production process is organized in a continuous manner. Advantages of product layout Simple, smooth logical flow lines result due to fixes sequence of operation. Small work in process inventories due to work from one process is fed directly into the next. Low cost of material handling, due to straight and short route and absence of backtracking. Total production time per unit is short. Since the machines are located so as to minimize distances between consecutive operations, material handling is reduced. Little skill is usually required by operators at the production line; hence, training is simple, short, and inexpensive. Simple production planning control systems are possible. Less space is occupied by work in transit and for temporary storage Disadvantages of product layout Whenever breakdown of one machine stops the entire line in the presence of enough manpower. Lack of process flexibility, since the layout is determined by the product, a change in product design may require major alternations in the layout. Lack of flexibility in timing, as the product cannot flow through the line faster then the slowest task can be accomplished unless that task is performed at several stations. Supervision is general, rather than specialized. Comparatively high investment is required, as identical machines (a few not fully utilized) are sometimes distributed along the line. Worker fatigue as workers may become bored by the endless repetition of simple tasks. Process layout Process layout is also called job shop layout in which the layout for a process department is obtained by grouping of machines according to function of machine centers. Orders for individual products are routed through the various machine centers to obtain the required processing. This type of plant layout is useful when the production process is organized in batches. Machines are general purpose, within their general function area, so that a wide variety of products can be handled. Advantages of process layout A high degree of flexibility exists relative to equipment or manpower allocation for specific tasks. Smaller investment in equipment as duplication is not necessary unless volume is large. The diversity of tasks offers a more interesting and satisfying occupation for the operator. Supervisors for each department become highly, knowledgeable about their functions. Better utilization of machines can result in fewer machines used Disadvantages of process layout Lack of process efficiency as back tracking and long movements may occur in the handling of materials. Lack of efficiency in timing as workers must wait between tasks. Complications of production planning and control Workers must have broad skills and must be paid higher wages than assembly line workers. Comparatively large amounts of in process inventory as space and capital are tied up by work in process. Lowered productivity as each job requires different setups and operator training. Fixed position layout Fixed position layout is generally associated with large, bulky product such as assembly of ship building, aircraft etc. In Fixed position layout workstation are brought to the material. Fixed position layout is shown in fig.1.3 Advantages of fixed position layout Material movement is reduced, minimizes damage or cost of moving. Promotes job enlargement by allowing individuals or teams to perform the whole job. Continuity of operations and responsibility results from team. This reduces the problems of re-planning and instructing people each time a new type of activity is to begin. Highly flexible; can accommodate changes in product design, product mix, and product volume. Independence of production centers allowing scheduling to achieve minimum total production time. Disadvantages of fixed position layout Increased movement of personnel and equipment may be expensive. The necessary combination of skills may be difficult to find and high pay levels may be necessary. Equipment duplication may occur. Higher skill requirements for personnel as they are involved in more operations. General supervision required. Cumbersome and costly positioning of material and machinery. Low equipment utilization as equipment may be left at a location where it will be needed again in a few days rather than moved to another location where it would be productive. Product family layout / Cellular Layout The layout for a product family is based on the grouping of parts to form product family. Groupings are determined by the operations needed to perform work for a set of similar items or part families that require similar processing. A part family is a set of parts that require similar machinery, tooling, machine operations and jig or fixtures. The parts within the family normally go from raw material to finished parts within a single cell. Advantages of cellular Layout Reduced in process inventory Increase operator expertise Improved human relations, job enlargement tend to occur. Supports the use of general purpose equipment Increased machine utilization. Disadvantages of cellular layout General supervision required. Higher skills level required of employees than for product layout. Reduced shop flexibility Depends on balanced material flow between product layout and process layout, otherwise buffers and work in process storage are required. Lower machine utilization than for process layout 1.5 Layout Design Methods and Computer Packages It is highly desirable that the optimum plant layout be designed. Unfortunately, the magnitude of the problem is so great that true system optimization is beyond current capabilities. The approach normally taken in solving the plant layout problem is to try to find a satisfactory solution. Previously, facilities layout problems were solved primarily by using iconic models. Then analytical approaches were developed. In general, plant layout problems can be solved by any of the following approaches: Exact mathematical procedures. Heuristics. Optimal. Graph theory. A number of different procedures have been developed to aid the facilities planner in designing layouts. These procedures can be classified into two main categories: construction type and improvement type. Construction type layout methods basically involve developing a new layout from scratch. Improvement procedures generate layout alternatives based on an existing layout. Based on the above two procedures, many algorithmic approaches have been developed. Some of them are Systematic Layout Planning (SLP) procedure, graph-based construction method, programming, network, Tabu search, simulated annealing and genetic algorithm. Based on these approaches, many computer-aided layout routines have been developed. Some of them are CRAFT, COFAD, CORELAP, ALDEP, PLANET, MULTIPLE, BLOCPLAN . 1.6 Methodology of dissertation This dissertation is to be completed in 3rd and 4th semesters of my M.Tech duration of four semesters. The methodology for this dissertation is stated in Figure 1.1 Introduction Literature review Systematic layout planning Facility layout a case study Company Profile Analysis Conclusion The dissertation report is divided into seven chapters as shown in figure 1.3. The current chapter gives an introduction of Facilities Planning and Plant Layout, Layout Design Methods and Computer Packages. In this chapter is also introducing Background of the problem, Statement of problem, Objectives of the dissertation Chapter 2 provides detailed literature review which would be done throughout the 3rd semester. This chapter covers the different type of facility layout problems and layout design method and commercial software available for solution of facility layout problems. Chapter 3 introduces the details of Systematic Layout Planning (SLP) for generation of layout alternatives. Chapter 4 covers the company background. It covers the company profile, Organization structure of the company, products, esteemed customer and its manufacturing process and its policies. Chapter 5 presents the case study in which existing layout is analyzed and new layout is proposed by GRAPH theory and BLOCKPLAN software and also provides a detailed cost analysis of existing layout and proposed layout. Chapter 6 contains conclusion and future scope.

Wednesday, November 13, 2019

Rahzel :: History

Rahzel Rahzel M. Brown was born in Queens, New York and recalls that â€Å"not having† was never an excuse for â€Å"not doing†. Just as in its most organic state the essence of hip hop is ‘making something out of nothing,’ Rahzel learned how to feed his need to be creative. â€Å"We didn’t have the turntables inside the locker room and we couldn’t bring our boom box in there. Either we were banging on the locker, or somebody was (making music) with their mouth. I was the one who made the beats with my mouth. I worked hard so that if you closed your eyes you would swear that you were hearing a record, a radio, or a band.† Over time, Rahzel’s own gifts for vocal percussion led him to seek his own career as an artist. Others, like Biz Markie, Doug E. Fresh, and the Fat Boys’ Buffy had made strides in the form, but Rahzel possessed a talent so great, he was soon recognized up and down the east coast as the premiere human beat box ar tist. He already had a thriving solo career when The Roots asked him to join their group. â€Å"Being with The Roots enhanced what I was doing even more,† says Rahzel. â€Å"We’re colleagues, and we have tremendous respect for each other. They respect my history, I respect theirs.† He is undeniably the best beat boxer living on in this world today. As a kid he went to Grandmaster Flash's shows regularly, absorbing everything he saw and heard. Grandmaster Flash is another famous beat boxer that took the world by storm in every concert that he did. Rahzel grew up to live with beat boxing and used to be a roadie for the Ultramagnetic MCs. He later joined the Roots after guest staring on one of their early albums that sold million of copies world wide and became famous for there vocal and beat technique at the same time. This means that Rahzel and the group he was with would sing together and at the exact same time would come up with beats which sounded like a full band with drums, base, piano, and vocal. But Rahzel can sing a chorus and provide the back up beat simultaneously better then anybody in that group could. Rahzel doesn’t only beat box but He can also impersonate a number of rappers and singers. For instance he has this song called â€Å"if your m other only knew† and in that performance he did in front of hundreds and thousands of Americans in Louisiana, he impersonated his aunty when she caught him and his girl friend at that time making out.

Monday, November 11, 2019

Terrorism

1. Philosohies and rules of war dictate that it is both sound and practical that groups with the same opponent and the same schema forge alliances or common supportive coexistence, and there is a very high probability that that dogma would be followed, considering the fact that terror group leaders are learned men. But the question of having the same agenda is putting terrorism in a very general and pop culture perspective since the truth is that these types of militant extremists have, at some level, varying aims and goals. But another important point is the fact that these different groups can be brought together to act as one unit in a full scale operation. The best example of this tendency is the 9/11 bombing, described by the FBI a few days after the incident as a handiwork of an alliance of terrorists. 2. The pall of gloom that terrorism brought not just in the US but around the world is not just the threat to life, but as well as the threat to liberty. Because of the growing manhunt for suspected terrorists and the increased drive to take the upper hand and identify terrorists even before they can accomplish their missions, some elements of the law enforcement agencies are willing to overstep their boundaries marked by the exercise of individuals of their most basic human right, ready to trespass the domain of private communication with the use of many and all technologies available, including the Internet. Terror groups also found the use of Internet for their cause – ransom demands are telecast via video streaming while home made and improvised bombs know-how is just a few mouse clicks away. For this new problem, the solution may lie in old practices – kill the head of the serpent and the body ceases to be dangerous. The Internet should not be the target, as US knows it cannot afford to start a new war – even in cyberspace. 3. Michael Hamm reported that motor vehicle violations, counterfeiting, smuggling weapons of mass destruction and armed bank robbery, are several criminal acts terrorist participate in. The most common criminal action that terrorists do is the falsification of documents and forgery. Almost every terrorist who entered the country carries a false identification. This criminal act is very crucial in the operation of terrorist cells in the country since the first and most important part of a terrorist mission is the entry of a terrorist in a country or place wherein the terrorist action would take place. This is the reason why border officials are consistently monitoring the many entry and exit points of the country. 4. The most significant findings and information contained in the Hamm report is the moving away of the image of the mythical militant extremists to purely purist forms of terrorism from the true terrorists which is much less now conformed in the mold of idealist / hero into nothing more than a common criminal. The implications for the criminal justice system of this newfound knowledge consist of the possible responsibility law enforcement and criminal justice elements when it comes to profiling active and prospective terrorists by investigating the offenses for they are in trial for. Hamm concluded how a certain set of criminal acts bend towards particular groups as its identifiable crime suspects and this newfound information can be utilized as another efficient tool to battle terrorism. 5. Both international and domestic terrorism presents a clear and urgent threat to the US, simply because a threat to even one single life is an important issue to the US government, or to any government for that matter. Domestic and international terrorism may have many similarities and differences which include M.O. (method of operation), financing, training, orientation, goals, aims and motivation, strength in numbers, leadership hierarchy. Intelligence network and arms and ammunitions supplies, terrorism still wears the same face and the government's efforts to counter it do not diminish based on the type of terror group it faces. Terrorism and the government's fight against it is a microcosm of the proverbial battle of good versus evil; the truth is that there will always be a group of people who will try to use force and intimidation to achieve there cause. Terrorists might have a different name in the future, and the government which the people created is always tasked to battle a constant threat to life presented by another man as a result of differences in ideology. References: Hamm, M. S. (2005). Crimes Committed by Terrorist Groups: Theory, Research and Prevention. US Department of Justice. Retrieved October 10, 2007, from http://www.ncjrs.gov/pdffiles1/nij/grants/211203.pdf Schmid, A. (2005). Links between Terrorism and Drug Trafficking: A Case of â€Å"Narco terrorism†. Retrieved October 10, 2007. Sisk, R. and Smith, G. B. (2001). Feds Have Names Of 19 In Dark Alliance. The New York Daily News. Retrieved October 10, 2007, from http://www.fromthewilderness.com/timeline/2001/nydailynews091501.html             Terrorism Assignment 2. â€Å"Prepare a written briefing for a Board (you can choose any company real or imaginary) explaining why they should increase or decrease their security in relation to the threat of terrorism. † BRIEFING ON THE THREAT OF TERRORISM POSED TOWARDS TELECOMS ORGANISATIONS OPERATING IN AFRICA Purpose: The purpose of this briefing note is to present an overview of terrorist threats within Africa, spesifically towards the Vodacom organisation operating in the Democtratic Republic of Congo (DRC) and to make recommendations on how to mitigate the risk.Background: Terrorism: â€Å"the United Nations General Assembly has condemned terrorist acts using the following political description of terrorism: â€Å"Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racia l, ethnic, religious or any other nature that may be invoked to justify them. http://en. wikipedia. org/wiki/Definitions_of_terrorism Terrorism has become a global threat and is not just confined to the theatre of war, it is also not only targeted at nations involved in those conflicts like the United States (9/11) and Great Britain (the July 7 London Bombings) but also with any nation and organization that is seen as an ally of such nations.ESICS Briefing on THE TERRORISM THREAT LINKED TO THE LIBYAN CRISIS states â€Å"obviously on the top of the list of likely targets for Colonel Gaddafi are the United Kingdom and France, they are closely followed by the United States (an old and usual enemy of Libya but also by the Arab countries taking part in the coalition, every single national participating in the operations could be seen as a legitimate target. † In stating this the point that I am making is, although Vodacom is a South African operation, we must take into conciderati on that Vodafone, a British entity is our major hareholder and the building where our head office is located, Building Gulf Oil is an American institution. Thus it would be a grave mistake to make the assumption that the company cannot be seen as a target of militant action and sensationalism. Current Situation: STRATEGIC ENVIRONMENT Emerging Terrorist Networks â€Å"As al-Qaeda has syndicated its ideology and violence, its affiliates and adherents in Africa and the Arabian Peninsula have become increasingly networked and adaptable in their recruiting, training, financing, and operations.Violent extremist organizations, insurgents, and criminal organizations are exploiting weak governance and under-governed spaces, and remain determined to harm the United States, our partners and Allies, and innocent civilians. † General Carter Ham, USA Commander, USA Africa Command in his address to the Senate of Armed Services Committee, 2 March 2013(sic). Terrorist organisations are operat ing in numerous African countries now including but not limited to: Country| Active Terrorist Networks (only major listed)|Cameroon| Al Qaeda – Movement for Democracy and Development (MDD)| Chad| Al Qaeda – Movement for Democracy and Justice in Chad (MDJC) +2| Egypt| Al Qaeda + 11| Eritrea| Al Qaeda – Eritrean Islamic Jihad Movement (EIJH)| Ethiopia| Al Qaeda – Ethiopian Islamic Jihad Movement (EIJH) + 6| Kenya| Al Qaeda – Al Shabaab| Libya| Al Qaeda – Libyan Islamic Fighting Group (LIFG)| Morocco| Al Qaeda – Moroccan Combatant Islamic Group (MCIG)| Nigeria| Al Qaeda – Boko Haram| Somalia| Al Qaeda – Al-Shabaab| Sudan | Al Qaeda – Sudan People Liberation Army (SPLA) – Hezbollah| Syria| Al Qaeda – Al Nusra| Tanzania| Al Qaeda – People Liberation Party|Zambia| Riyadus-Salikhin Reconnaissance – Al Nusra| Source: http://en. wikipedia. org/wiki/Terrorism and www. crimicweb. org â€Å"The Ho rn of Africa is Africa’s bridge to the Middle East. That fact explains much about the complex interrelationships between differing Islamic cultures within Africa, from east to west. † (John Harbeson, The War on Terrorism in Africa; Princeton N. Lyman from Africa in World Politics p7) Vodacom Congo has up till now not considered terrorism to be a significant threat to business operations but rather conventional security threats as in fire, arson, bomb threats and armed robbery to name but a few.Recommendations: The risk management department recommends that the company review all emergency response, disaster recovery and business continuity protocols. Establishing contingency plans is suggested; general training for all employees would result in more efficient response should an emergency occur and is highly recommended. It is imperative that all security measures are reevaluated and a gap analysis be conducted. Recommended areas where improvements are needed: * Access a nd egress control policies should be enforced for effective visitor control and especially with vehicles entering premises and deliveries of parcels. Do an assessment of all CCTV and monitoring services and place additional cameras where needed. * At the moment the local security service provider is ill equipped, there are no personal body scanners available at the building entrances. * There is no equipment available to search vehicles, i. e. stemmed mirrors etc. * Retraining of security personnel, the security officers have not been trained on what to look for and how to search vehicles and people properly. * General housekeeping, rubbish collection and building perimeters. (Security Management Bulletin no: 6.Countermeasures of threats of terrorist action) Training for these officers should focus on the following types of terrorist attack: * Person borne IED (improvised explosive device) * Vehicle borne IED * Bombs directed against property and infrastructure, delivered in trucks, vehicles, packages, briefcases, laptop bags and also in postal items * Fire bombs using chemicals and incendiaries * Improvised mortar attacks * Riots and civil disturbance * Kidnapping for ransom and extortion * Armed robbery, fraud and credit card fraud for financing purposes * Assassination of key figures Security Management Bulletin no: 6. Countermeasures of threats of terrorist action) In a nutshell the security department should do a threat analysis and identify areas where the terrorist would want to: * Penetrate * Avoid * Exploit * Attack Jason A, 16 April 2013, Boston Marathon Bombings, in his briefing after the bombings, also suggest that it should be noted that due to the recent attacks in Boston, that security at airports across the United States and Great Britain has increased substantially. Business travelers are advised to allow extra time to get to the ticket counters and to their gates.There are long queues at the check-in counter and the duration of the security p rocess has increased due to additional random bag searches. Hotel security has increased as well; travelers are advised to adhere to corporate security policies as well as local policies. In saying that if employees travel to the United States or the United Kingdom for the purpose of visiting Vodacom’s parent company or any other business travel, it is advised to monitor local media for additional security measures. This will also apply to the other countries mentioned where known terrorist cells are operating. ConclusionA school of thought that postulates â€Å"as major disasters never occur at a time or in a manner that may be anticipated, pre-catastrophe planning is futile† is a gross abdication of reponsibilty and cannot be supported. (Security Management bulletin 5. Disaster Planning) Vodacom Congo has clear ties with the United Kingdom due to alliances and shareholding agreements, Vodacom’s offices are located in a building owned by an American entity and the building is shared by Chevron Oil which is an American owned company, it would therefore be foolish not to recognize the direct threat to the company, it’s employees and assets. It would be surprising if many businesses and orginisations could avoid the consequences of terrorism at some time in their existance†. (Security management Bulletin 5. Disaster Planning) It is therefore imperative that urgent security focus is placed on the threat that terrorism poses to the company and its operations, large walk in customer care areas are prime targets where lots of people gather. A balance of security measure are very important to maintain a vigilant level of protection without creating too much discomfort to the employees, visitors, business partners and customers.References Martin Gill, The Handbook of Security. 2006 The Security Institute. Security Management Bulletin 5. Emergency Procedures – Major Disasters. Rachel Briggs, R. and Edwards, C. The business of re silience. DEMOS 2006 The Security Institute. Security Management Bulletin No: 6. Countermeasures to threats of terrorist action. John Harbeson, The War on Terrorism in Africa; Princeton N. Lyman from Africa in World Politics p7 Human Rights Watch: In the name of security, www. hrw. org Wikipedia Website: http://en. ikipedia. org/wiki/Terrorism Michael Burleigh; Al-Qaeda and a Decade of Terror Andre Burstin; European Strategic Intelligence and Security Center (ESISC), Boko Haram and the Risk of Terrorism in Northern Cameroon; 01 April 2012 Claude Moniquet, European Strategic Intelligence and Security Center (ESISC), The Terrorist Threat Linked to the Libyan Crisis. 2011 Jason A; Boston Marathon Bombing, Aon Crisis Management Consulting/ Global Risk Consulting. p4 Subscriber Journal, 16 April 2013 Terrorism Assignment 2. â€Å"Prepare a written briefing for a Board (you can choose any company real or imaginary) explaining why they should increase or decrease their security in relation to the threat of terrorism. † BRIEFING ON THE THREAT OF TERRORISM POSED TOWARDS TELECOMS ORGANISATIONS OPERATING IN AFRICA Purpose: The purpose of this briefing note is to present an overview of terrorist threats within Africa, spesifically towards the Vodacom organisation operating in the Democtratic Republic of Congo (DRC) and to make recommendations on how to mitigate the risk.Background: Terrorism: â€Å"the United Nations General Assembly has condemned terrorist acts using the following political description of terrorism: â€Å"Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racia l, ethnic, religious or any other nature that may be invoked to justify them. http://en. wikipedia. org/wiki/Definitions_of_terrorism Terrorism has become a global threat and is not just confined to the theatre of war, it is also not only targeted at nations involved in those conflicts like the United States (9/11) and Great Britain (the July 7 London Bombings) but also with any nation and organization that is seen as an ally of such nations.ESICS Briefing on THE TERRORISM THREAT LINKED TO THE LIBYAN CRISIS states â€Å"obviously on the top of the list of likely targets for Colonel Gaddafi are the United Kingdom and France, they are closely followed by the United States (an old and usual enemy of Libya but also by the Arab countries taking part in the coalition, every single national participating in the operations could be seen as a legitimate target. † In stating this the point that I am making is, although Vodacom is a South African operation, we must take into conciderati on that Vodafone, a British entity is our major hareholder and the building where our head office is located, Building Gulf Oil is an American institution. Thus it would be a grave mistake to make the assumption that the company cannot be seen as a target of militant action and sensationalism. Current Situation: STRATEGIC ENVIRONMENT Emerging Terrorist Networks â€Å"As al-Qaeda has syndicated its ideology and violence, its affiliates and adherents in Africa and the Arabian Peninsula have become increasingly networked and adaptable in their recruiting, training, financing, and operations.Violent extremist organizations, insurgents, and criminal organizations are exploiting weak governance and under-governed spaces, and remain determined to harm the United States, our partners and Allies, and innocent civilians. † General Carter Ham, USA Commander, USA Africa Command in his address to the Senate of Armed Services Committee, 2 March 2013(sic). Terrorist organisations are operat ing in numerous African countries now including but not limited to: Country| Active Terrorist Networks (only major listed)|Cameroon| Al Qaeda – Movement for Democracy and Development (MDD)| Chad| Al Qaeda – Movement for Democracy and Justice in Chad (MDJC) +2| Egypt| Al Qaeda + 11| Eritrea| Al Qaeda – Eritrean Islamic Jihad Movement (EIJH)| Ethiopia| Al Qaeda – Ethiopian Islamic Jihad Movement (EIJH) + 6| Kenya| Al Qaeda – Al Shabaab| Libya| Al Qaeda – Libyan Islamic Fighting Group (LIFG)| Morocco| Al Qaeda – Moroccan Combatant Islamic Group (MCIG)| Nigeria| Al Qaeda – Boko Haram| Somalia| Al Qaeda – Al-Shabaab| Sudan | Al Qaeda – Sudan People Liberation Army (SPLA) – Hezbollah| Syria| Al Qaeda – Al Nusra| Tanzania| Al Qaeda – People Liberation Party|Zambia| Riyadus-Salikhin Reconnaissance – Al Nusra| Source: http://en. wikipedia. org/wiki/Terrorism and www. crimicweb. org â€Å"The Ho rn of Africa is Africa’s bridge to the Middle East. That fact explains much about the complex interrelationships between differing Islamic cultures within Africa, from east to west. † (John Harbeson, The War on Terrorism in Africa; Princeton N. Lyman from Africa in World Politics p7) Vodacom Congo has up till now not considered terrorism to be a significant threat to business operations but rather conventional security threats as in fire, arson, bomb threats and armed robbery to name but a few.Recommendations: The risk management department recommends that the company review all emergency response, disaster recovery and business continuity protocols. Establishing contingency plans is suggested; general training for all employees would result in more efficient response should an emergency occur and is highly recommended. It is imperative that all security measures are reevaluated and a gap analysis be conducted. Recommended areas where improvements are needed: * Access a nd egress control policies should be enforced for effective visitor control and especially with vehicles entering premises and deliveries of parcels. Do an assessment of all CCTV and monitoring services and place additional cameras where needed. * At the moment the local security service provider is ill equipped, there are no personal body scanners available at the building entrances. * There is no equipment available to search vehicles, i. e. stemmed mirrors etc. * Retraining of security personnel, the security officers have not been trained on what to look for and how to search vehicles and people properly. * General housekeeping, rubbish collection and building perimeters. (Security Management Bulletin no: 6.Countermeasures of threats of terrorist action) Training for these officers should focus on the following types of terrorist attack: * Person borne IED (improvised explosive device) * Vehicle borne IED * Bombs directed against property and infrastructure, delivered in trucks, vehicles, packages, briefcases, laptop bags and also in postal items * Fire bombs using chemicals and incendiaries * Improvised mortar attacks * Riots and civil disturbance * Kidnapping for ransom and extortion * Armed robbery, fraud and credit card fraud for financing purposes * Assassination of key figures Security Management Bulletin no: 6. Countermeasures of threats of terrorist action) In a nutshell the security department should do a threat analysis and identify areas where the terrorist would want to: * Penetrate * Avoid * Exploit * Attack Jason A, 16 April 2013, Boston Marathon Bombings, in his briefing after the bombings, also suggest that it should be noted that due to the recent attacks in Boston, that security at airports across the United States and Great Britain has increased substantially. Business travelers are advised to allow extra time to get to the ticket counters and to their gates.There are long queues at the check-in counter and the duration of the security p rocess has increased due to additional random bag searches. Hotel security has increased as well; travelers are advised to adhere to corporate security policies as well as local policies. In saying that if employees travel to the United States or the United Kingdom for the purpose of visiting Vodacom’s parent company or any other business travel, it is advised to monitor local media for additional security measures. This will also apply to the other countries mentioned where known terrorist cells are operating. ConclusionA school of thought that postulates â€Å"as major disasters never occur at a time or in a manner that may be anticipated, pre-catastrophe planning is futile† is a gross abdication of reponsibilty and cannot be supported. (Security Management bulletin 5. Disaster Planning) Vodacom Congo has clear ties with the United Kingdom due to alliances and shareholding agreements, Vodacom’s offices are located in a building owned by an American entity and the building is shared by Chevron Oil which is an American owned company, it would therefore be foolish not to recognize the direct threat to the company, it’s employees and assets. It would be surprising if many businesses and orginisations could avoid the consequences of terrorism at some time in their existance†. (Security management Bulletin 5. Disaster Planning) It is therefore imperative that urgent security focus is placed on the threat that terrorism poses to the company and its operations, large walk in customer care areas are prime targets where lots of people gather. A balance of security measure are very important to maintain a vigilant level of protection without creating too much discomfort to the employees, visitors, business partners and customers.References Martin Gill, The Handbook of Security. 2006 The Security Institute. Security Management Bulletin 5. Emergency Procedures – Major Disasters. Rachel Briggs, R. and Edwards, C. The business of re silience. DEMOS 2006 The Security Institute. Security Management Bulletin No: 6. Countermeasures to threats of terrorist action. John Harbeson, The War on Terrorism in Africa; Princeton N. Lyman from Africa in World Politics p7 Human Rights Watch: In the name of security, www. hrw. org Wikipedia Website: http://en. ikipedia. org/wiki/Terrorism Michael Burleigh; Al-Qaeda and a Decade of Terror Andre Burstin; European Strategic Intelligence and Security Center (ESISC), Boko Haram and the Risk of Terrorism in Northern Cameroon; 01 April 2012 Claude Moniquet, European Strategic Intelligence and Security Center (ESISC), The Terrorist Threat Linked to the Libyan Crisis. 2011 Jason A; Boston Marathon Bombing, Aon Crisis Management Consulting/ Global Risk Consulting. p4 Subscriber Journal, 16 April 2013

Friday, November 8, 2019

Self-Publishing a Family Memoir

Self-Publishing a Family Memoir Self-Publishing a Family Memoir Having previously published many children's books, Malaika Rose Stanley is no stranger to publishing. Yet with Loose Connections, she attempted something completely different from her usual style of writing. Read on to know what it was like for her to  self-publish her book and go on a familiar yet new adventure.Loose Connections is my first independently published book, my first book for adults and my first non-fiction book. But I have a history of writing traditionally published books for children dating back to 1996. I had to look back and check - and I’ve completely shocked myself with the realization that I’ve been involved in this writing and publishing malarkey for twenty years!‘Write what you know’ is a well-worn authorial snippet of advice, a clichà ©. At times, I’ve taken heed but at others, I’ve totally ignored it. My motivation for Loose Connections and for all my books has been to write what I love, to write what stirs my soul ; I don't plan them so much as channel what flows through me.My sons were born in the 1980s and I started writing children’s books when I realized that the lack of diversity in children’s and young adult books had persisted from my childhood to theirs – and I wanted to do something about it. I started to write Loose Connections because I wanted to tell another invisible story - of my mother’s incarceration in a mental hospital as an unmarried mother of a mixed-race child, and of what came before and after. At first, I tried to write the story as fiction; I tried to write it without including myself so the transition to ‘creative non-fiction’ and ‘family memoir’ was a lengthy process. I have files buried on my hard-drive that are at least ten years old.Why I chose self-publishingI decided to go down the route of self-publishing partly because I am familiar with and realistic about the barriers into traditional publishing for peop le like me. I’m not a bright, young thing with a literature degree from Oxbridge or a creative writing master’s degree from East Anglia or City East, at the beginning of my writing career.I’m not seen as ‘commercially viable’ or ‘marketable’ with a blog with thousands of followers, a huge social networking platform or a reality TV fan-base. I’m more likely to be perceived as a grizzled old cynic, with a chip on my shoulder and an axe to grind.It’s not true, of course - I’m actually rather delightful, with a story to tell! Loose Connections was published at the beginning of June - and my first Amazon review says it’s a ‘†¦wonderfully moving book†¦ really well written, clear and simple but heartbreaking too.’ Also true! I decided to self-publish even though I didn't have a huge social networking platform or fan-base. The Reedsy experienceThe Reedsy marketplace was a revelation. Although there is an option to ‘shortlist’ up to five professionals, I quickly narrowed down my choice to two editors and sent them a request for a quote for a structural edit together with a synopsis and the first chapter of my book. They both responded very quickly and it was clear that they were highly skilled and experienced. I thought either would be able to do a good job so my final choice came down to cost, although I definitely struck gold with Gillian Holmes. She did a first read-through, followed up with a phone call about possibly libelous content and my overall intentions for the book, a few minor copy editing corrections and queries about continuity, proposed cuts and a couple of gaps, in tracked changes – and then a detailed restructuring proposal. Wow! Her recommendations were straightforward and simple but I clearly hadn’t been able to see the wood for the trees – excuse th e continuing lumberjack analogies – and her suggestions were spot on!How to Write a Memoir: Breathe Life into Your Story in 8 Steps Read post What were, for me, the unforeseen advantages of self-publishing have been huge: creative control of my own work, choosing my own editor and designer and yes, compared to traditional publishing, which can take months – or years – even the speed of the process from word doc manuscript to e-book download and beautifully typeset, beautifully packaged paperback book! I would definitely recommend Reedsy and the self-publishing option to any new and aspiring authors and to grizzled old cynics alike. Two months ago, I swore blind I would never do it again, but now I’m already planning my next project, an anthology.Loose Connections  is available on both  Amazon US and Amazon UK, get your copy now!Ever thought of writing a family memoir? Would you self-publish it like Malaika did? Leave your  thoughts and experiences, or any questions for Malaika, in the comments below.

Wednesday, November 6, 2019

Understanding and Coping with Change Essays

Understanding and Coping with Change Essays Understanding and Coping with Change Essay Understanding and Coping with Change Essay Change is an evolutional event that causes a transformation or modification, which occurs when something passes from one phase to the other. Change in inevitable, why are we resistant to it? Surely, we are all aware that as we are born, we will develop; as we develop, we will progress, as we evolve, as we evolve we will expire. Change is everywhere, why do we resist it and why does change disrupt our behavior? Change is a good thing: it prevents stagnation; it prompts improvement, and it links directly to the ongoing success of organizations Forsyth, Patrick. Creating Success, Volume 44: Managing Change. London, KGB: Kananga Page, 2012. Protest Barry. Web. 15 September 2014. According to (Cotter Schlesinger, 1979) employees may resist change for several reasons such as self-interest, lack of understanding, lack of trust in management deferring assessments of the need for change, and a general low tolerance for change (Aback, 2012 Sec. 10. 4 Para. 2). The only thing that is consistent about change is change. Change affects individuals in different ways; some may welcome it while others may struggle with it. Change is a step process of growth that we all must treasure and respect as it will surely happen. Change can be positive for an organization, and one must confront it as it provides us the ability to create value-added services for the organization and the public. Individuals who struggle with change may be more concerned with themselves. Although, change is inevitable for growth in a business organization, change is also inevitable also in individuals for personal growth and development. Change should be consider as normal part of life and living. Many have not learned to embrace change, some may become complacent with their level of growth, and the effect caused them to be stagnant in life. Some individuals may fear change will cause unwarranted stress, and they want to shield themselves from it. However, we must learn to prepare for change at any time, and we must learn to manage change instead of allowing change to manage us. The basis of managing change is accepting the reality that change is unavoidable and sometimes unpredictable, and regardless of the nature, it will occur. Managing change required that we must first acknowledge it, as we look around us, we can see changes happening. Whether is minor and considered unimportant or large and challenging. Observing the signs of change allows us to better prepare ourselves to deal with them. By acknowledging the possibility of change, we are creating a mental perception of caution. This perception allows us to create a coping process or system to effectively shield ourselves from harm of disappointment. By understanding change we are able to cope with the situation thereby, avoiding an over saturation of emotions. Coping with change may also require that you look at the situation from the outside in and decide worst-case scenario. Deciding the worst-case scenario can assist in the development and planning process that will allow you to empower yourself to authorize the hanged. Accept the fact that change will happen whether or not we are ready for it. If change knocks you down you must proudly pick yourself up and start again. Change can be appalling to some individuals because it is now viewed an opportunity as it should be. Change forces us to re-examine our lives. It is similar to establishing a new link to growth and development. It reinforces our lifes routine and assists us in avoiding complacency. We should expect new outlines and designs throughout our life cycle and treasure the memories of the past but welcome the knowledge of the future. My organization has undergone many changes over the last several years, including relocation the corporate office to implementing a new computer system. Prior to implementing a new system, our leaders initiated a meeting announcing the company will be undergoing many changed over the next several months, as our divisional office will become the new home of the Business Service Center (BBS). The BBS will combine several divisions of our organizations, including South, Mid, and NW territories. Our leaders further detailed that we will be implementing a new computer program called SAP, which was capable of handling all transactions and porting that our company will need in order to operate. During the course of several months, we were provided information about the process and the next steps as well as the period that changes would occur. As this information became available, changes were being implemented, the process was happening quickly. First, we moved too new building capable of holding a large group of people. Then communications were published about implementing a new computer system. The system is an ERP (Enterprise, Resource, and Planning) business management system capable of integrating several applications that organizations use to collect, store, engage and interpret data computer system known as SAP (System Applications and Processes). SAP is a massive program and can cover various departments, including manufacturing, purchasing, sales, accounting. Just the sheer thought of this new system frightened my coworker Laura. Laura 59 years old and close to retiring, she worked in cash application department. As part of the change, our organization was communication about migrated from an old dos based program known as Computers Unlimited (CUE) to a new innovative program called SAP, which is windows based program. Laura feared the process of learning a new system at her age; she was a Eng-time employee and was used to the old dos based program Computers Unlimited (CUE). Laura believed this program would alienate her from the new younger employees because the technology was foreign to her. CUE was the only system she has worked on her entire life. She feared she would not navigate through the new system processes with ease. Every part of the system was alien and accelerated. Laura dreaded learning a new system to the point making herself ill. Although, she was not ready to retire, she contemplated it, as she feared being laid- off or fired. Although, the new computer system was idea for our organization, and it loud enable easy access to information sharing that flows between our leaders and shareholders it had a negative element for Laura. Laura was in a sense selfish; she serves as a great example of an employee who was not embracing change. Laura sought stability in her last few years before retiring, she was not ready for to embrace the change. Although, change is necessary for growth in a business organization change must also occur in individuals who are part of the organization. However, individuals such as Laura sometimes become complacent with their level of growth and are resistant to change. Laura believed was older and feared she would to be able to navigate through the new processes of SAP and her Job nor did she feel the desire to learn something new. Laura was having difficulties coping with change. The first step in coping with change is to become educated on it and communication about it, and remember we are going to be trained. During our many discussions regarding SAP, I informed Laura the system massive, but it is very easy to navigate as I have worked on it in the past is very similar to Microsoft Excel and windows. Laura and I met on break and often communicated about relocating the office to the new system we were to be put in place, and she must get comfortable tit the idea that she was must learn how to work. She became calm and did not fight the change. Our progressive conversations appeared to have given her confidence that she would be able to handle it. In a sense, this method a sense of urgency as described by Cotter in his eight-step plan regarding change. I was able to assist Laura in seeing the need for the change. Over the next several months, our leaders chose several people that trained offset in order to gain the knowledge required in order to train employees. This followed the second step Cotters plan of forming a power coalition to lead the change. Once it was time for the training, our leader was ready to provide the knowledge we required in order to navigate the system. Once the training was complete, we were required to take a series of test to evaluate and certify the training. Laura performed wonderfully; she ultimately saw importance to embrace the change despite her initial fears and challenges. Although, Laura was resistant to change she ultimately saw that change was going to happen whether she was part of the organizational process of not. Laura was able to acknowledge, accept and cope with change by embracing it through the immunization, and the raining provided by the company.

Monday, November 4, 2019

Jerusalem History Movie Review Example | Topics and Well Written Essays - 750 words

Jerusalem History - Movie Review Example Jerusalem has got a start some 6000 years ago and proclaimed that the Mount Moriah will connect them to their God. Villages and then a city slowly developed around the mountain. In about 1000BC, King David conquered and made up Jerusalem as the capital for the tribes of Israel. He also brought a belief in new god and then his son, King Solomon built a great temple on the Holy Mountain. 3000 years later, the mountain is hidden under a platform made of stone 'The Temple Mount'. However the Temple was destroyed long years ago, the Jews from all over the world still gather near reminisce of the wall. The wall has got the name 'The Western Wall'. It's said that the God's presence is particularly strong there in the walls. Papers of messages to the god were packed between the stones by the believers. Jews tells that they can hear the voice of God on touching that stones. They strongly believe that the stones are standing there hearing prayers of mankind for thousands of years. Al-Aqsa Mosque in Jerusalem is considered the third-holiest city in Islam. Directly above the western walls, stands a magnificent Islamic triumph, 'The Dome of rock' which was completed when the Muslims were vowed to reform it. Islam proclaims that this was the place where Prophet Mohammed was send to heaven to speak with Allah. Muslims comes to this Dome of Rock can be seen crying because of their strong belief and prayers. About 400 yards away is the 'Church of the Holy Sepulchre', which is very important to Christians. The church was built in 1149 and some say that it's the location of Jesus. Inside the church lies the holy rock of Golgotha. Christians believe that this rock is from the hill where Jesus was crucified. Christians are saying that by seeing and touching that place they can strengthen their faith. With all these religious, cultural and historical claims of the city, Jerusalem is crowded with believers of all these religions even though they are fighting for it. I am concluding the documentation with a verse from the Bible "As the mountains surround Jerusalem, so the LORD surrounds His people from this time forth and forever." ( Ps 125:2 -The Bible) for the peaceful life of Everyone.Documentary Feedback This video should be able to provide information regarding significance of Jerusalem to Jews, Christians and Muslims from the depth of its history. Each of them has their own religious evidences and pilgrim homes and historical bases as stated in the above paragraphs. The selected documentary video has provided almost same religious and historical outlook to the three religions stating a reign that has given birth to the construction of pilgrim homes as well as belief in the respective religion. I recommend this video for getting the viewer an overall brief view on the history of the Jerusalem as well as its equally alienated significance to Judaism, Christianity and Islam. I am happy to bring before you some quotes I just referred. 1. "Without Jerusalem, the land of Israel is as a body without a soul."(Elhanan Leib Lewinsky; Hebrew writer and Zionist leader) 2. "Every

Saturday, November 2, 2019

Holocaust Heroes Paper Research Example | Topics and Well Written Essays - 1000 words

Holocaust Heroes - Research Paper Example The holocaust The holocaust was an ultimate occurrence of accumulated inter racial conflict that developed from the German’s perception that they were â€Å"racially superior† as compared to the Jews and other races. As a result, the Germans believed that other races did not deserve the right to life. This led to pre-holocaust discrimination of the other races by the Nazi regime and the ultimate execution. The Germans, following their influence in the Second World War that put many territories across Europe under Hitler’s control, took advantage of their authority to eliminate the Jews. Though the Jews previously submitted to oppression from the Nazis, the native Germans still considered them as enemies and a threat. Consequently, â€Å"nearly two out of every three Jews† were killed in the German’s move to eliminate the Jews. The German regime â€Å"deported millions of Jews† from Germany and their captured territories to designated location s at which the Jews were killed (Ushmm, p. 1). Though there were individual efforts against the Nazi’s forces to clear off the Jews, the ultimate end of the Holocaust was the defeat of the Germans in the world war in the year 1945 when the Germans â€Å"forces surrendered unconditionally† (Ushmm, p. 1). ... He for instance illustrates of a woman who took him together with his â€Å"brother to a train station† (Drucker, n.p.). This experience illustrates a heroic move by the woman who disregarded racial differences to facilitate safety of the vulnerable children at the time. Her heroic state is also identified by the brave move that she took with respect to taking risks of taking Drucker and his brother to the station. This is because she dared being treated as a traitor by the Nazis forces that could lead to her execution. Similarly, she could be mistaken for a Jew following her association with them to become a victim of the holocaust. Druker also explains that his parents’ â€Å"lives were saved by the gentile farmers of the town† (Drucker, n.p.). This exhibits compassion at both individual and communal level. To denounce the racism and on the contrary protect a Jew amidst the racial and national controversy during the war was heroic. Restraining from betraying th e individuals, who saved Drucker’s parents, to the forces identifies the level of compassion that the town people had. As Drucker presents the experience, the whole town undertook the initiative to protect Jews from Nazi’s wrath. Similarly, Meyer, a survivor of the holocaust, talks of a â€Å"good man by the name Jeff† (Mayer, n.p). Jeff was also daring to try to rescue Jews from the military offensive. His bravery and compassion that defied racism defines his heroic attitude (Mayer, n.d.). Another heroic move to save Jews from the military offensive was done by Oscar Schindler who succeeded in rescuing more than 1000 Jews. As reported by the Holocaust, Oscar made personal sacrifices to ensure protection of the Jews from the forces.