Wednesday, October 30, 2019

International student in united state of America Essay

International student in united state of America - Essay Example They go to the United States because of the great reputation universities in the United States have for teaching students. These students are often studying in technical fields such as computer science, engineering and biomedical studies that are not available to them in their home countries. Most international students are working to earn an undergraduate degree, but many are working on graduate and post-graduate degrees as well. One thing that the United States is famous for is the many different cultures that all coexist rather peacefully in one nation. This is attractive to students that are coming from countries where ethnic hatred or even open warfare is a reality. It is also very attractive to study in the United States if you are coming from a country where basic human rights and freedoms such as speech, religion and ownership of property are not guaranteed. Great school and a welcoming culture make studying in the United States the first choice for many international student s. But this does not mean that there are not problems for international students that choose to study in the United States. I have a very close friend from China that ran into some real problems while studying at a university in the United States. He was very clear in stating that he did not hold the Americans responsible for his bad experiences. He realized after a while that an American studying in Beijing would probably have many of the same challenges, only they would be reversed. Communication between cultures is very difficult and this fact led to many of the misunderstandings and problems he encountered. The first problem centered on the use of the English language. My friend studied English all through school and felt that he was quite proficient in his use of the language. I remember he was very excited when he scored well on his TOEFEL test. He said that he felt that this was a real indication that he was ready to use the English language every day and do well. He soon lea rned that hew was wrong for several reasons. One reason language caused him to have a difficult time was the fact that going to a shop or a supermarket became a very stressful experience. In the town where he was living, many of the people at the check-out were very impatient. If he asked them to repeat something they said, even only once, they seemed to be agitated. One very rude person actually said, â€Å"Why don’t you come back when you can speak English right?† He wanted to speak with a manager to lodge a complaint about this very rude employee, but he was afraid he would not be able to communicate clearly with the manager. He was humiliated so he just handed some money over to the person and walked out of the store. He didn’t even stay to take his change. He heard the other workers laughing as he walked away. This was his worst experience because of his English language skills and it happened on one of his first days in the United States. My friend soon fo und a shop where the workers were more patient and polite, so this situation was soon solved. What he was not prepared for was the type of academic language that he had to deal with at the university. Classes were much harder than he expected because he was not able to process the language quickly enough to pay attention to what was being taught. He found himself falling more and more behind. He didn’t want to ask the professors for help, but finally got so desperate that he went to each of his teachers on the same day to beg for help. He

Monday, October 28, 2019

The Boer War Essay Example for Free

The Boer War Essay To what extent did the Boer War change attitudes to Empire in Britain? The British Empire at its peak was considered the greatest empire in the world. It was the empire on which the sun never set. By 1897 it was guarded by a navy that was equal to the navies of two other powers. One newspaper described Britain as being in splendid isolation in that it had no enemies and needed no friends. The presss view on the events relating to the empire was very important. In 1907 Lord Sanderson, Permanent Undersecretary wrote in his retirement It has sometimes seemed to me that a foreigner reading our press the British Empire must appear in the light of some huge giant sprawling over the globe with gouty fingers and toes spreading in every direction which cannot be approached without eliciting a scream. Other examples later show how the press portrayed the majority of public thoughts and reflections on certain issues. In the late Seventeenth Century the Dutch East India Company had formed a trading station in South Africa near the Cape of Good Hope. The poorest members of this community were strongly protestant farmers called treboers or Boers. These pilgrims called themselves Afrikaners, people of Africa and searched for land. They spoke Afrikaans, a modification of Dutch. They were the original foreign settlers in South Africa. These people were unreceptive of Africans as well as Europeans. When travelling to India and the Far East the Cape of Good Hope became an essential naval base. Britain appreciated its importance in Empire relations as it allowed Britain to position herself significantly in order to defend her Empire as well as trade with it. The arrival of the British in South Africa caused a vast amount of tension. The conflict led to the Boers embarking on the Great Trek and setting up two separate states. At that time in South Africa diamonds had been discovered at Kimberley. This mineral revolution led to an influx of people to South Africa to claim their share of the fortune. The European immigrants who worked in the gold and diamond mines, 41,000 of them, mainly British, were deprived of having been granted voting rights from the Transvaal. These Uitlanders (outsiders) were in Paul Krugers (Transvaal President) eyes a tool for manipulation of the British government who were using the issue to end the independence of the Boer Republics. This was a great threat to the fiercely independent Boers who would fail to accept any foreign interference from Britain especially such which would result in a direct threat to their government i.e giving the Uitlanders the right to vote so that as they grow they will become more powerful and pose a political threat. It was this issue that was the immediate cause of the outbreak of the Boer war. There are many causes of the Boer war, which derive from longstanding Anglo-Boer tensions such as in 1834 when the British abolished slavery. This was not accepted by 5,000 Boers who participated in the Great Trek across the Orange and Vaal rivers where they set up the two new Boer states, the Orange Free State and the Transvaal. In 1877 Britain took over control of the Transvaal due to the threat of the Zulus. By 1881 the British had refused to grant independence to the Transvaal despite the Zulu war having ended. Paul Kruger used this to justify an attack on the British in what we now know as the 1st Boer war, which led to a Boer victory at Majuba Hill. The victory led to the partial restoration of independence in agreements of 1882 and 1884. This allowed Britain to supervise foreign policy and to intervene in certain circumstances in domestic matters. The roles of Joseph Chamberlain, the British Colonial Secretary and Alfred Milner, British High Commissioner for South Africa are important in when looking at why war broke out. Joseph Chamberlain, Colonial Secretary, worsened Anglo-Boer relations in the run up to the war. He had notified Kruger that despite what the Transvaal government had understood the agreements signed by the British in the first Boer war had not restored full control over domestic policy to the republic. Chamberlain also appointed a man hostile to the Transvaal Sir Alfred Milner as the British High Commissioner for South Africa and successfully encouraged London not to give long-term loans to the Transvaal. He knew that Transvaal was getting rich and powerful and expressed concerns relating to British interests. Whether Chamberlain wanted war or not his actions were insufficient in being able to stop it. His appointee Milners influence stretched everywhere and he stirred the pot. He placed pressure on the Transvaal government and stretched them to their limits. He did not believe that they were capable of war and greatly underestimated them. Paul Kruger, president of Transvaal saw war as inevitable because his attempts at regaining peace were insufficient for Milner. After Milner rejected Kruger attempts one last time on 9th October 1899 Kruger sent a telegram to British to tell them to move away from their borders. The British ignorant of their potential ignored this and didnt even reply. This cost them dearly. On 11th October the Transvaal launched an attack on the Cape Colony. The British Prime minister said this has relieved us of the task of explaining to the British public why we are at war. Although they knew the real reason was the British refusal to take the Boers seriously and their inability to foresee this event which cost them not only the disrespect of their own people but also the humiliation worldwide. During the early months of the war Britain suffered a series of humiliating defeats at the hands of the Boers. Britains underestimation of the capabilities of the Boers is shown in their failure to ensure that adequate troops and essential supplies of food and ammunition were ready in time for the conflict. The dispatchment of Lord Roberts (Hero of the Indian Mutiny) and Lord Kitchener (Hero of Sudan) was a positive move. It worked so well that by June 1900 British forces were moving swiftly towards victory. Johannesburg and Pretoria had been occupied and Kruger had fled to Europe. The term used in the press that summer was that Britain had been victorious over the bloody Boers. Lord Kitchener and Roberts had retuned. In October 1900 the Unionist government staged the Khaki elections and were victorious over the liberals. It was then to become apparent that the celebrations were premature; the Boers had headed for the countryside where they prepared to fight using guerrilla tactics. By 1901 the Boers had invaded Cape Colony. This provoked Lord Kitchener to return to put them in their place. Kitcheners impact on the Boer war from here on can be described as disastrous in the effect it would happen on the British Empire. His tactics were a huge political blunder and caused massive controversy. His scorch the earth policy, which basically consisted of the burning of farms, crops and villages was outrageous and evil. He used barbed wire fences to divide the country into zones and collected the civilian population into concentration camps. His treatment of them here was appalling and provoked much anger and debate back in Britain where even the most empire loving Englishmen were aghast with his methods. Once the news of the horrors of the concentration camps got back to England it cause massive debate. Pro-Boer liberal MPs were the first to realise Kitcheners blunder in herding women and children into so-called camps of refuge. On the 1st March Lloyd George quoted a Reuters report that correctly described 2 ration scales at the camp. MPs such as John Ellis and C.P Scoot attacked his policy also and they were the ones to borrow the ominous phrase concentration camps from the Spanish who used reconcentrado camps to deal with Cuban guerrillas, and first to give it to the situation. The opponents of the government took a religious and humanitarian tone. The Liberals sent Emily Hobhouse to South Africa to give a report of the conditions. Her report concluded that the army have no humanity and her descriptions of 12 prisoners having to share a small tent and there being no soap, toilets and meagre rations had led the majority to agree with many soldiers that the war was a gigantic mistake . When the British realised the negative reaction to policy adopted by Kitchener to deal with the Boers they offered à ¯Ã‚ ¿Ã‚ ½3 million compensation to restore what had been destroyed. A staggering 63,000 claims were received from Boer farmers. This gesture failed to justify the barbaric conduct of Kitchener and his people. The British people accepted peace at Vereeninging without much display of emotion they were more relieved that the humiliation was over. After all 20,000 British lives had been lost and à ¯Ã‚ ¿Ã‚ ½200 million had been exhausted for the cause. Despite these outrageous figures the Boers had lost more. Something in the region of 7,000 men in the war, 28,000 women and children in concentration camps and more than 14,000 blacks. Therefore there were no wild scenes in Trafalgar Square as usually demonstrated on such occasions as victory in a war. The European rivals Germany and France had witnessed the humiliation which one historian refers to as Britains Vietnam. Britain felt dangerously isolated. The occasion failed to provoke public excitement especially that from Empire-minded Englishmen who would rather forget how the two states, Orange Free State and the Transvaal were acquired. The press, which is often representative of public mood, encouraged people to believe war was for cause of Uitlanders and in H.F.Wyatts opinion the majority of working class also had this view. Socialist press depicted the situation in typically negative accusations towards capitalism and imperialism. There view war that the war was fought so that the government may protect its investments abroad and its was the fault of Joseph Chamberlain who they refer to as an unscrupulous minister and the unscrupulous propagandist Milner. One soldier commented Its the worst war ever and all for Gold mines. This shows that the average person was not confident in the motives for the war and because of this didnt agree with it. Rival foreign nations who had respected Britains peaceful attitudes were now appalled by them. German press emphasised this as the German chancellor, Von Bulow said that Britains treatment of prisoners was brutal and inhuman and the general international view was that Britain was a bully of women and children, and a very inefficient one at that. British people at this time were incredibly patriotic people but after this they could not help but feel ashamed and embarrassed by the dreadful tactics used by their country in their treatment of the Boers. The Boer war damaged the unionist government. Alfred Milner refused to accept responsibility but in 1904 when he agreed with the Rand millionaires to import Chinese labourers to work in South African mines it confirmed the view that war was fought over the gold mines. The British government was more concerned with wealth then rights of Uitlanders. There greed had damaged their image as the righteous and honourable government. The Boer war was an even greater shock to British opinion and virtually brought to an end the brief popular enthusiasm for empire building, which had found expression in the jubilee celebrations of 1897. The war led to the emergence of an anti-imperialist group. Before war empire was seen as a benign force, which would bring civilisation to underdeveloped societies and was appreciated by all types of peoples. After the Boer war imperialism became filled with maverick politicians, capitalist cliques and methods of barbarism. It also became less accepted and those that did accept it were usually thought of as strongly right-winged Conservatives. J. A Hobson says that the imperialists had jeopardised the entire wealth of the nation in rousing strong resentment of other nations for no real gain. His view that the empire was a drain on British resources and was not helping the average British man was widely embraced. The war brought an end to Britains splendid isolation. Its vulnerability had been shown and it now needed friends and had created enemies. As the Boer war revealed the weaknesses of the British Anglo-German relation also deteriorated. British press began to focus less on the Boer war and the issue of the bloody Boers and more on typical propaganda against the Germans using terms such as wild Kaiser. The emphasis on imperial expansion and the great benefits on empire had been reduced. Instead emphasis was placed on the potential threat posed by Germany. Britain insecurity in itself was shown when Boy Scout and Girl Guide movements to encourage military standards in children. British defence was critically analysed after the war and considerable changes had been made. There was considerable re-planning on home defence issues as well as foreign protection of the empire. Things like food and ammunition supplies which had failed to operate efficiently during the Boer war were looked at closely. Free school meals and medical examination in schools were set up. This as well as the setting up of the Territorial Army (TA) to defend Britain in an invasion showed British fear in response to the failure of the Boer war. The concessions showed that the British had felt the negative impact of the Boer war and it had shaken them up and forced them to consider seriously thinking about their safety. Britain was a nation that was thought of as a policeman it was a defender of the weak. After the Boer war and especially the concentration camps that had been used Britain had lost its credibility and the power it once had to give moral lectures. Britain was once a good example to the world, after the Boer war it was still an example but of what not to do and how not to treat other nations.

Saturday, October 26, 2019

Airbags :: Car accidents

  Ã‚  Ã‚  Ã‚  Ã‚  Crash! Your car just smashed into the car right in front of you at a speed of 35 mph. The whole front of your car is smashed but luckily your head isn’t, thanks to the airbag deploying. This scenario happened over 2.9 million times through August, 1998. Airbags significantly reduce the risk of being killed in a crash. The risk of being killed, if you have your seatbelt on, is reduced by 26% and 32% if you don’t have a belt on and the airbag goes off. Airbags also reduce the risk of serious head injuries by 75% if used with a shoulder and lap belt.   Ã‚  Ã‚  Ã‚  Ã‚  Yes, airbags save lives, but they have also been known to seriously hurt or kill people, especially children. Since 1990, about 113 deaths have been caused by airbags inflating in not serious accidents. 51 of these deaths were children, most of whom were not using a seat belt. Small children and airbags don’t mix. Children shouldn’t be in the front seat because the force of the airbag is usually too much for them. Never put a rear facing child seat in the front seat of the car. If the airbag goes off, the seat will be pushed forward and the child may get squeezed between the back of the seat and the airbag. Children are less likely to be killed in a crash if they are in the back seat.   Ã‚  Ã‚  Ã‚  Ã‚  If someone must put a child in the front seat, they may want to have an on/off switch for the airbag installed on the passenger side. On/off switches are used to prevent the airbag from going off in an accident, but they aren’t recommended for most people. You only need an airbag switch on the driver’s side if your legs are too short to reach the pedals and have your torso 10 inches away from the steering wheel. Passenger side switches should only be used if you always have to have a small child or infant sit in the front seat because they have a medical problem and need to be watched constantly. Airbag switches can be used incorrectly. You can forget to turn the airbag back on and jeopardize the safety of yourself (the driver) or the passenger.   Ã‚  Ã‚  Ã‚  Ã‚  Most people won’t need an on/off switch because there is a proper and improper way to sit when you are driving. You should always sit 10 or more inches away from the steering wheel.

Thursday, October 24, 2019

Vagrancy in Sixteenth and Seventeenth Century England :: British History 16th 17th

Vagrancy in Sixteenth and Seventeenth Century England Throughout the work An Account of the Travels, Sufferings and Persecutions of Barbara Blaugdone, there is a common occurrence of imprisonment. Wherever Blaugdone traveled, she seemed to come across some confrontation with the law. This should not be surprising, for in the time period when this work was written many laws, statutes, and acts had been established to thwart the spreading of unpopular Quaker views. Many acts were established primarily to prevent the ministry of Quakerism; however universal laws, especially those to prevent vagrancy, were also used against traveling Quakers. Vagrancy had always been a concern in sixteenth century England, resulting in the passing of four anti-vagrancy bills in 1547 alone. This resulted in legislation so harsh that a person charged with vagrancy could be sentenced to two years enslavement, which could be extended to life enslavement if they tried to escape. When these bills did not seem to prevent the occurrence of beggars on the street, the Vagrancy and Poor Relief Act of 1572 was instated. This act called for a â€Å"three strikes and you are out† policy, where on a person’s third vagrancy offense they could be rightfully put to death (Woodbridge 272). This legislation was the policy for over twenty years until it was repealed in 1593 for being too strict. In 1597, the new Vagrancy Act authorized the government to banish anyone caught offending the vagrancy laws. After a 1598 statute reestablished slavery as the proper punishment for vagrancy, there were a number of years where periods of l eniency and harshness of punishments alternated. It is important to note the history of these laws since many of them were never entirely repealed. However, it was in the early seventeenth century that a particular legislation finally became the common law that would rule for centuries. In 1601, England passed the Act for the Relief of the Poor, which would be the commanding authority on this issue until 1834. This act established the church as the sole establishment responsible for the care of the poor. If a family was not able to get by, it was the responsibility of the area parish to ensure that the family was taken care of (Woodbridge 272).

Wednesday, October 23, 2019

Anna Karenina: a Different Kind of Love Essay

Progress is â€Å"the development of an individual or society in a direction considered more beneficial than and superior to the previous level (Dictionary.reference.com)†. Anna Karenina, written by Leo Tolstoy, is a book filled with tragedy, love and choices. This novel can be interpreted in several different ways, but the most common interpretation is that Anna’s husband Alexis Karenin represents the old fading traditions in Russia and Count Vronsky, Anna’s lover, represents the progress of Russia; Anna who is torn between choosing her husband and young son and her lover represents Russia itself, faced with the choice between the old traditions and the new â€Å"progressive† era. This â€Å"progressive† interpretation of Anna Karenina is the best and most accurate understanding of the book because of its meaning, its origination, and the affect it has on the characters. In Leo Tolstoy’s book Anna Karenina, the theme of â€Å"progression† plays a major role throughout the whole of the book. Count Alexis Kirillovich Vronsky, Anna Karenina’s lover, is an officer in the Russian army who is handsome, young, and charming, but morally unstable. When Vronsky first meets Anna he is mesmerized by her beauty and, for him, it is love at first sight; for a while his chief goal in life was to make Anna his own. Vronsky is a significant character throughout the novel because he embodies the modernization and progress of Russia. In contrast, Karenin personifies the old and dying customs of Russia. Because Anna decided to have an affair with Vronsky, she symbolizes Russia struggling while choosing between the old, Karenin, and the new, Vronsky. Because Anna chose Vronsky, at least at first, and forsook Karenin, or the old ways, she fell to ruin. As a result of her choices, Anna went mad with uncertainty; because she committed adultery, she began to doubt Vronsky’s faithfulness to her. Soon, Anna became wholly dependent of Vronsky, so much that he grew tired of her, believing that her new way of clinging to him was old fashioned and annoying. Convinced that Vronsky no longer loved her, Anna threw herself under a moving train at the train station where she was supposed to meet up with Vronsky. Anna did not realize that although there are certain things about progress that are virtuous, too much of anything, even a good thing is bad. The topic of â€Å"progress† seen throughout the book Anna Karenina was implied due to the setting of the book. Leo Tolstoy, the author, placed the book in the 1870s. From the 1850s to early 1900s Russia had the fastest and largest population growth rate out of all the important major powers after the U.S.A.; during this time Russia’s population nearly doubled. In 1870 the czar or Russia authorized city councils to be made that raised taxes and charged labor to help with city expenses, such as: roads, local schools, public healthcare, food supplies, and jails (Wikipedia.org, History of Russia; geographic.org). During the 1960s and 1970s the percentage of working age people with at least a minor education nearly doubled. All of this â€Å"progress† steadily affected the characters of Anna Karenina. This kind of modernization helped instigate Anna to be discontent with her life as Karenin’s wife and desire to be with Vronsky. If Anna had not desired life to be exciting, as modern ideas portrayed life to be, she would have easily been satisfied with a dull life with her old husband Karenin. All through the entirety of Anna Karenina, one can see how Anna’s choosing Vronsky over Karenin (the new over the old) affected her and the people around her. Before Anna met Vronsky she was much more contented with her life; after she met Vronsky and had grown to know him, her life, her husband and her son, seemed dull and boring in comparison. Upon getting to know Vronsky, Anna began to crave love, the kind that was exciting, and the kind that Vronsky offered her. Slowly, Anna realized how tedious her relationship with Karenin was; she realized that before Vronsky had come into her life, she had poured out all her love on her son. In the beginning, Anna did not wish to affiliate with Vronsky because she knew that an affair with another man would not only affect her and her place in society, but it would also affect her young son and her relationship with him. Not long after Vronsky had proclaimed his love to her, Anna told him â€Å"What you are saying is wrong, and if you are a good man, I beg you to forget it, as I will forget it (Part 1, Chapter 30, and Page 2).† From this quote an individual can see that, Anna was a conscientious woman, who knew right from wrong, and chose, at first, to do what was right. However, she was tempted by evil and sadly she gave in. Later on in the story, Anna discovered that she was pregnant with Vronsky’s child; in her confused frightened state of mind, she told Karenin, her husband, that she was Vronsky’s mistress. One would think that this would be a significant turning point in the book, but instead of breaking off their marriage Karenin decided that he wanted to put an end to their affair as privately as possible and have his marriage with Anna appear as it had before. For the longest time, Karenin had been suspicious, but he trusted his wife and believed she would never be disloyal to him; in his heart of hearts Karenin realizes that he is jealous of Vronsky because Vronsky is young, handsome, and the embodiment of progress and modernization. In comparison, Karenin was old; he was twenty years senior to Anna. A successful marriage is built around love and trust; in Anna and Karenin’s marriage there had been no true and enduring love; this caused Anna to be unfaithful to Karenin, which caused Karenin to be envious of Vronsky, and as a result of it all no love or trust remained between them. In comparison, two other character’s relationship was quite the opposite. Anna’s brother’s wife’s sister was a young woman named Kitty; near the end of the book Kitty married a man named Levin, who was also an old friend of Anna’s brother. Earlier in the book, even before Anna met Vronsky, Kitty had rejected Levin’s proposal believing that Vronsky intended to propose to her. However, after Vronsky had met Anna he stopped going to see Kitty and went instead to follow Anna wherever she went. Well along in the story, Kitty regrets rejecting Levin and after a while they get back together. Because of how Anna had stolen Vronsky from her Kitty, for the longest time, was envious of Anna and Levin was jealous of Vronsky because Vronsky had also taken his love. Since Kitty’s and Levin’s love was much deeper than that of Anna’s and Karenin’s, they were able to overcome these trifles and (basically) lived happily ever after. In conclusion, the understanding of â€Å"progress† seen throughout the book Anna Karenina is accurate because of its meaning, origination, and overall effect of the characters. The interpretation of Alexis Karenin representing the fading old area of Russia, Vronsky symbolizing â€Å"progress†, and Anna herself signifying Russia is most relevant because of how significant it is throughout the entire book.

Tuesday, October 22, 2019

How Teachers Build Great Relationships With Students

How Teachers Build Great Relationships With Students The best teachers are capable of maximizing the learning potential of each student in their class. They understand that the key to unlocking student potential is by developing positive, respectful relationships with their students beginning on the first day of the school year. Building a trusting relationship with your students can be both challenging and time-consuming. Great teachers become masters at it in time. They will tell you that developing solid relationships with your students is paramount in fostering academic success. It is essential that you earn your students’ trust early on in the year. A trusting classroom with mutual respect is a thriving classroom complete with active, engaging learning opportunities. Some teachers are more natural at building and sustaining positive relationships with their students than others. However, most teachers can overcome a deficiency in this area by implementing a few simple strategies into their classroom on a daily basis. Here are some strategies to try. Provide Structure Most kids respond positively to having structure in their classroom. It makes them feel safe and leads to increased learning. Teachers who lack structure not only lose valuable instructional time but often never gain the respect of their students. It is essential that teachers set the tone early by establishing clear expectations and practicing class procedures. It is equally critical that students see that you follow through when boundaries are overstepped. Finally, a structured classroom is one with minimal downtime. Each day should be loaded with engaging learning activities with little to no downtime. Teach With Enthusiasm and Passion   Students will respond positively when a teacher is enthusiastic and passionate about the content she is teaching. Excitement is contagious. When a teacher introduces new content enthusiastically, students will buy in. They will get just as excited as the teacher, thus translating to increased learning. Exuberance will rub off on the students in your classroom when you are passionate about the content you teach. If you are not excited, why should your students be excited? Have a Positive Attitude Everyone has terrible days including teachers. Everyone goes through personal trials that can be difficult to handle. It is essential that your personal issues do not interfere with your ability to teach. Teachers should approach their class each day with a positive attitude. Positivity is transcending. If the teacher is positive, the students will generally be positive. No one likes to be around someone who is always negative. Students will in time resent a teacher who is always negative. However, they will run through a wall for a teacher is positive and continuously offering praise. Incorporate Humor into Lessons Teaching and learning should not be boring. Most people love to laugh. Teachers should incorporate humor into their daily lessons. This may involve sharing an appropriate joke related to the content you will be teaching that day. It may be getting into character and donning a silly costume for a lesson. It may be laughing at yourself when you make a silly mistake. Humor comes in several forms and students will respond to it. They will enjoy coming to your class because they love to laugh and learn. Make Learning Fun Learning should be fun and exciting. Nobody wants to spend time in a classroom where lecturing and note-taking are the norms. Students love creative, engaging lessons that grab their attention and allow them to take ownership of the learning process. Students enjoy hands-on, kinesthetic learning activities where they can learn by doing. They are enthusiastic about technology-based lessons that are both active and visual. Use Student Interests to Your Advantage Every student has a passion for something. Teachers should use these interests and passions to their advantage by incorporating them into their lessons. Student surveys are a fantastic way to measure these interests. Once you know what your class is interested in, you have to find creative ways to integrate it into your lessons. Teachers who take the time to do this will see increased participation, higher involvement and an overall increase in learning. Students will appreciate the extra effort you have made to include their interest in the learning process. Incorporate Story Telling into Lessons   Everyone loves a compelling story. Stories allow students to make real-life connections to the concepts that they are learning. Telling stories to introduce or reinforce concepts bring those concepts to life. It takes the monotony out of learning rote facts. It keeps students interested in learning. It is especially powerful when you can tell a personal story related to a concept being taught. A good story will allow students to make connections that they may not have made otherwise. Show an Interest in Their Lives Outside of School Your students have lives away from your classroom. Talk to them about their interests and extracurricular activities that they participate in. Take an interest in their interests even if you do not share the same passion. Attend a few ball games or extracurricular activities to show your support. Encourage your students to take their passions and interests and turn them into a career. Finally, be considerate when assigning homework. Think about the extracurricular activities occurring on that particular day and try not to overburden your students. Treat Them With Respect Your students will never respect you if you do not respect them. You should never yell, use sarcasm, single a student out, or attempt to embarrass them. Those things will lead to a loss of respect from the entire class. Teachers should handle situations professionally. You should deal with problems individually, in a respectful, yet direct and authoritative manner. Teachers must treat each student the same. You cannot play favorites. The same set of rules must apply to all students. It is also vital that a teacher is fair and consistent when dealing with students. Go the Extra Mile Some students need teachers who will go that extra mile to ensure that they are successful. Some teachers provide extra tutoring on their own time before and/or after school for struggling students. They put together extra work packets, communicate with parents more frequently and take a genuine interest in the well-being of the student. Going the extra mile may mean donating clothing, shoes, food or other household goods that a family needs to survive. It may be continuing to work with a student even after he is no longer in your classroom. It is about recognizing and assisting in meeting student needs inside and outside of the classroom.

Monday, October 21, 2019

Orderly Form Essay

Orderly Form Essay Orderly Form Essay Question one: Beneficial: * Presentation of CO2 graphs. * Past and present images raise awareness. * Digital animations of ice caps in Antarctic and Greenland. * Bleaching effects on the coral reef. * Increase diseases and Viruses. * Contribution tips. * Use of animation to show how global warming works. * Sense of humour. * Outlines the main scientific issues. * Save the planet message. Non-beneficial: * Choosing between the Earth or Gold. * Twenty-foot Sea rise prediction in 2100. * Misrepresentation of previous weather events. * Election loss. * Death in family. * Ice-cream melting. * Drowning polar bears. * Publicity journeys. * Advertising website for publicity. * Son’s injuries. Question two: The CSIRO report reveals that the future changes across Australia involve an increase in dry days, average temperatures and vital weather events including tropical cyclones. An escalation of intense rainfall trends is projected and during wet periods the rainfall is likely to be exceedingly extreme. The continuing rise of warm temperatures in the oceans and the atmosphere are contributing to sea-level increase. CO2 emissions and droughts in South Australia are also projected to increase. A legal solution would be stating actions that need to be taken into consideration through law reform of current legal frameworks to minimise the effects upon climate change. Footnote: CSIRO and Australian Bureau of Meteorology, State of the Climate 2012 (26 April 2012) csiro.au/Outcomes/Climate/Understanding/State-of-the-Climate-2012.aspx. Ibid. Ibid. Question three: Wind power causes visual amenity, noise and health effects, as well as, deaths to flying birds such as the Bent wing bat. It also causes harm to the ecosystem and destroys local communities. Footnote: case study that has Bent wing bats in it. Biomass energy can lead to deforestation. There are

Sunday, October 20, 2019

Excessive Pride in The Odyssey essays

Excessive Pride in The Odyssey essays In the Odyssey there are many themes are prevalent throughout. The one that I found most powerful is the thinking that through invisibility excessive pride can be converted to humility. This means that people have to remove themselves from their normal person to see or accomplish things they wouldnt otherwise. Hospitality was often given without the host and/or hostess being aware of who the recipient was. For example, Odysseus is with the Phaeacians several days before he identifies himself. The idea of hubris means to have an excess of pride or arrogance. How the Greeks felt about it is demonstrated too. Penelope's suitors demonstrate this excessive pride and arrogance; they are killed. An excess of pride in ones self can be very dangerous to ones well-being. In Book 9, Odysseuss eventual revelation of his identity to Polyphemus ultimately proves foolish, and, because it embodies a lack of foresight, stands in stark contrast to the cunning prudence that Odysseus displays in his plan to escape from the cave. Though his anger at Polyphemus for devouring his shipmates is certainly understandable, and though Polyphemuss blind rock-throwing fury eggs him on, Odysseuss taunts are unnecessary. By telling Polyphemus his name, Odysseus pits his mortal indignation against Poseidons divine vengeance. This act of hubris, or excessive pride, ensures almost automatically that Odysseus will suffer grave Consequences. Indeed, his eventual punishment costs him dearly: Poseidons anger wipes away the very thing that he gains by cleverly obscuring his name-the safety of his men. Mortals needed to remember that they were inferior beings... a quote from the Brown Greek Myth book. When Niobes children are slain by Leto, she sits with the last child in her arms ... the little body the clung to Niobe twitched suddenly and went limp. The mother set her down and sat down herself in the mi ...

Saturday, October 19, 2019

Reinventing the Wheel at Ryan Door Company Essay

Reinventing the Wheel at Ryan Door Company - Essay Example on between the time rate of employees before the training and the time rate of the same employees after the training: with all other factors remaining the same. Should there be an improvement in the work rate; Ryan can be assured that there has been an improvement resulting from the training. The next type of outcome to use is the adherence to instructions. Employees often show since of refusal to stick to instructions if they are not conversant with the technicalities of the work assigned to them (The Guardian, 2012). Training has however been identified to solve such a problem. In this regard, the employees should gain more command over the technicalities of the designing work they do after the training program by adhering more to instructions. Once this is done, it will be a proof that employees now understand the instructions given out to them. Then again, the cost of production should be reduced drastically. If employees gain any improvement in their training process, they will come to understand the importance of value for money. For this reason, they will be mindful of the cost of production as the cost of production goes a long way to determine the output of gain that will be made at the end of each production (Koduah, 2001). There exist a number of evaluation designs that can be implemented by Ryan in assessing the impact of the training program instituted. But for a type of design that meets the current needs of the company, the outcome or impact evaluation design is the most preferred. This is because the aim of using an impact evaluation design is to assess the level of impact that any given program has had on its members (Koduah, 2001). Considering the present urgent need for change in place at the company, such an impact evaluation design will come with a lot of advantage for the company especially as the company is a profit making one and must have value for all its programs and initiatives such as the present training program. With the said impact

Friday, October 18, 2019

Gilgamesh, Socrates, and Malcolm X can be thought of as on quests, a Essay - 1

Gilgamesh, Socrates, and Malcolm X can be thought of as on quests, a search for something. What was each one's quest and what did each discover - Essay Example d that â€Å"Socrates was in search for the meaning of life†¦Socrates spent his life searching for questions more than for answers† (The Ontario Curriculum 89). Finally, Malcolm X was in quest for freedom from bondage, prejudice and discrimination of African Americans through Islam (Siddiqui). Gilgamesh discovered that there is no permanence; life ends in death. Socrates discovered that â€Å"he does not know anything except that he does not know anything† and that â€Å"there is no truth except that there is no truth† (The Ontario Curriculum 90). Malcolm X, finally discovered through his pilgrimage to Mecca, the true Islam. According to Tristam, Malcolm X rediscovered brotherhood and equality through abandoning racial separatism (Tristam). Their discoveries freed them from a life full of queries and ultimately led them to enlightenment and what life has in store for each of

The Themes of the Body and Physical Experience Characterise Classic Essay

The Themes of the Body and Physical Experience Characterise Classic Urban Theory - Essay Example As the report declares as the techniques became more and more refined, the labor force was divided on the basis of the knowledge and skill individuals were able to acquire. The faster they adapted to the changing conditions, the better the pay they received. â€Å"The nineteenth century demanded the functional specialization of man and his work; this specialization makes one individual incomparable to another †¦, however, this specialization makes each man the more directly dependent upon the supplementary activities of all others†. This paper discusses that the influx of the factory enabled corporate heads to enact surveillance strategies, if for no other reason than to negotiate pay with workers or to keep track of wages earned. This surveillance further served to dictate the impersonal ordering of the clock into working hours and off-time hours, creating a means by which individuals could only identify themselves with part of a crowd rather than a subjective being. This led to feelings of alienation as the individual perceived themselves as different from, yet the same as, their co-workers on the factory floor, yet had no room in which to explore or express this difference. Explorations of art, literature and science into this mechanized realm produced the idea of the phantasmagorical. Phantasmagorical is characterized by fantastic imagery and incongruous juxtapositions. J.C. Powys defines it as the â€Å"incongruous imagery in surreal art and literature†.

Thursday, October 17, 2019

Learning the Research Process Essay Example | Topics and Well Written Essays - 250 words

Learning the Research Process - Essay Example These citations appeared in academic journals, for example: American Sociological Society Journal (for statistical modelling), then, Psychological Society Papers, and in Family Concerns and Related Calculations chapter of San-Francisco Academic Review named Family Problems: Ways of "Nuclear" Improvement. In the article named King and Kitchener paper they used so much variables that it is only possible for me to articulate/find out very few of them. For instance, there were presented variables of children reducing for the rich families across the world, especially post-informational one, and variables dealing with constantly increasing birth rate in developing countries. I think an author drawn an axample from Indonesia reality to find out that it is quite evident that in this country rich families began to have less children than families with unconvenient rate of incomes. There were raised data from family sphere: 70 percents of Indonesian low-rate income families have approximately 120 percents of all children that were born in 2012. So there were collected data from low- and high-rate of incomes middle class families in Indonesia: with an assistance of statistical models, statistical procedures, and hypotheses that were tested. Accordingly, there were used such procedures: direct and indirectcalculating, numerical encoding, variables separation, and also statistical quantification and qualification. Of course they were specified primarily as null and alternate, but this was authors hypothesis that low-rate Indonesian families will obviously will be increased concerning their chilrden unproportional quantity. I have just stated that he revealed some intercorrelations exists, based on direct statistical considerations, between rate of income and children quantity in the local community, and also there could be found out

Research Proposal - about cosmetics Example | Topics and Well Written Essays - 2000 words

- about cosmetics - Research Proposal Example 2012). That is why, product managers and marketers have increasingly engaged in conducting market research in order to determine the demand that prevails in the market regarding a particular product and service and the factors that stimulate this demand (Bian & Forsythe, 2012). Academic scholars have suggested that a person’s culture is one such factor that has a statistically significant impact on the purchase decision of the individual (De Mooij, 2010). This is precisely because of the fact that a person’s culture serves as a standard that needs to be maintained when it comes to buying and availing any product and service. However, the extent to which culture influences the purchase behaviour of cosmetic consumers is still relatively unexplored (Lim & OCass, 2009). This forms the basic premise for this research as the researcher will be endeavouring to analyze the extent to which culture and cross culture is responsible for influencing the purchasing decisions of cosmetic consumers. The following sections will involve a brief review of researches conducted in this field and a description of the research methods that will be adopted. The researcher has prepared a time plan of seven months which will also be provided at the end of the proposal. According to Aaker, Kumar & Day (2004), the choice process of cosmetic customers is constructed in such a way that they are able to adapt to the immediate purchase surroundings. This conclusion was provided on the basis of a study the scholars conducted on the dimensions of choice process of cosmetic consumers by tracking down their eye fixations on supermarket shelves. Blackwell, Miniard & Engel (2001) gave a detailed explanation of shopping orientation. The author reported that Indian shoppers are more inclined towards seeking emotional value rather than functional value of buying products. It was observed that the orientation of shoppers was based more on entertainment quotient rather than the

Wednesday, October 16, 2019

Learning the Research Process Essay Example | Topics and Well Written Essays - 250 words

Learning the Research Process - Essay Example These citations appeared in academic journals, for example: American Sociological Society Journal (for statistical modelling), then, Psychological Society Papers, and in Family Concerns and Related Calculations chapter of San-Francisco Academic Review named Family Problems: Ways of "Nuclear" Improvement. In the article named King and Kitchener paper they used so much variables that it is only possible for me to articulate/find out very few of them. For instance, there were presented variables of children reducing for the rich families across the world, especially post-informational one, and variables dealing with constantly increasing birth rate in developing countries. I think an author drawn an axample from Indonesia reality to find out that it is quite evident that in this country rich families began to have less children than families with unconvenient rate of incomes. There were raised data from family sphere: 70 percents of Indonesian low-rate income families have approximately 120 percents of all children that were born in 2012. So there were collected data from low- and high-rate of incomes middle class families in Indonesia: with an assistance of statistical models, statistical procedures, and hypotheses that were tested. Accordingly, there were used such procedures: direct and indirectcalculating, numerical encoding, variables separation, and also statistical quantification and qualification. Of course they were specified primarily as null and alternate, but this was authors hypothesis that low-rate Indonesian families will obviously will be increased concerning their chilrden unproportional quantity. I have just stated that he revealed some intercorrelations exists, based on direct statistical considerations, between rate of income and children quantity in the local community, and also there could be found out

Tuesday, October 15, 2019

Choju Giga Essay Example | Topics and Well Written Essays - 1500 words

Choju Giga - Essay Example Anthropomorphism: this is the attribution of human behavior or manner to that of an animal. Various cultures have a long-standing anthropomorphized tradition characteristic that represent behaviors of human in both art and storytelling traditions. This paper will illustrate the influence of animal representations in â€Å"Choju Giga† artwork. Satire: This form of art and literature brings about vices and conventions fun among individuals and groups with a significance of ridiculing them. This paper will apply â€Å"Choju Giga† as context to demonstrate the use of animal characteristic in order to make connections between visual and literary satire. Parody: this an artistic and literary work that imitates the style of characters of the author or work for effects of comic or ridicule. This paper will use the satirical emaki examination as a context to illustrate the use of images of animal in animation. â€Å"Choju Giga† is regarded as unusual from other build hand scrolls the difference being that, it is limited to an accompanying text, and for its humorous matter of subject. The scrolls are acknowledged as a satirical observation on monastic life and moral decrease in Japan’s 12th century (Baker 88). In difference to West, where animation has performed a significant cultural role in the Japan’s 20th century, the country has a long pictorial tradition. Various scholars comment that these scrolls are important for their history as some the earliest Japanese manga forms (Napier 73). In this scrolls segment, there is a marked absence of intense colors, with rather an emphasis on ink and strokes of the brush. The scroll is meant to be viewed from the right side to the left side. On the left side end, there is a frog image next to the monkey. The frog is observed to be holding a leaf umbrella and the monkey clothing what emerges to be branches. The umbrella hold

Ode on the Death of a Favourite Cat Essay Example for Free

Ode on the Death of a Favourite Cat Essay The two poems I am comparing; Ode on the Death of a Favourite Cat by Thomas Gray and To a Mouse by Robert Burns were both written in the eighteenth century, which makes it interesting to make a comparison of their content, style and techniques, to see how poems of the eighteenth century differ from each other.  Both of the poems feature an animal as the main subject of the poem. In Grays poem he has a house cat as the main focus of the poem whilst Burns dedicates his poem to a field mouse. Both these animals come to an unfortunate end. The cat due to curiosity tumbled headlong into a tub of gold fishes This supports the well known phrase curiosity killed the cat In the poem it refers to the cat as actually loosing 9 lives: Eight times emerging from the flood  She mewd to evry watry God.  No one arrives to save her:  No Dolphin came, no Nereid stirrd :  Nor cruel Tom, nor Susan heared.  The dolphin is included in the list of possible rescuers because it is a reference to the classical legend of the harpist, Arion, being saved by a dolphin which had been entranced by his music, much in the same way the cat wanted to be saved by someone who heard its meowing.  Ã‚  In Burnss poem the mouse unlike the cat does not actually die, but it is made clear that the prospects for the mouse are bleak due to its home being destroyed by the plough and the fact winter is coming and the mouse has no time to build another home for itself: Now thous turnd out, for a thy trouble,  But house or hald,  To thole the Winters sleety dribble,  Ancraneuch cauld!  The poems are both basically about a particular ill-fated animal but each has a deeper meaning and message through anthropomorphism.  The cat in Grays poem is given feminine characteristics: a fair round face illustrates the ideal image of an eighteenth century womans face. Gray also uses metaphors to describe the cat which also apply to a ladys jewels and adornments: The velvet of her paws,  Her coat, that with the tortoise vies,   Her ears of jet, and emerald eyes.  In verse four the comparison of the cat to a woman is made even clearer:  She stretchd in vain to reach the prize.  What female heart can gold despise?  What cats averse to fish?  It is clear here that Gray is illustrating how women are seduced by the desire for gold as cats are seduced by the desire for fish. The anthropomorphism continues in verses 5 and 7:  Presumptious maid and  From hence you Beauties, undeceivd  Know one false step is neer retrieved.  The last lines of the poem contain a moral:  Not all that tempts your wandring eyes  And heedless hearts, is lawful prize;  Nor all that glisters gold. Through the cat Gray created a cautionary tale specifically aimed at women. Its a warning not to be tempted by what is not rightly theirs, and not to be seduced by glittering appearances because it may not be as good as it looks on the outside.  Gray is very direct with his message of warning to women but he writes in a light-hearted way throughout. However, Burns poem is much more serious and sombre. He uses anthropomorphism like Gray to get his message across through an animal, in this case the mouse is used to highlight the social and moral problems that he felt existed in both the public and in his own family His father died after eighteen years of hard work as a farmer. After his fathers death they had little money, leaving them no choice but to sublease a farm in order to keep their home. These experiences were brought through in to his poem when the mouse had its home destroyed by the plough:

Monday, October 14, 2019

Analysis of Role-based Access Control (RBAC)

Analysis of Role-based Access Control (RBAC) ABSTRACT Access control systems within an enterprise system are used to control the actions, functions, applications, and operations of legitimate users within an organization and to protect the integrity of the information stored within the system. Role-based access control (RBAC) is a relatively new access control system that maps to organizational-specific structures in a way that reduces administrative costs and improves security. Although role-based security models have existed for 20 years, their application has until recently been limited. We try to give a comparison between RBAC and traditional access control models and try to evaluate the different industries where these models can be utilized. We try to evaluate the NIST RBAC model as a standard for implementing RBAC and show the implementation by developing an application which uses RBAC for authentication and authorization for the computer system to be accessed. This also involves a discussion for different variations of the Role Based Access Control models according to NIST. INTRODUCTION Access control is generally concerned with determining what users and groups of users can perform which operations on certain resources [10][1][11]. The fundamental problem is that each system and application for which access control is enforced has a proprietary method for creating and managing users, groups, and a system specific meaning of operations and objects. For many organizations, the number of systems can be in the hundreds or even thousands, the number of users can range from hundreds to the hundreds of thousands, and the number of resources that must be protected can easily exceed a million. Organizations large IT infrastructure is a mix of hugely complex and incompatible operating systems, applications and databases spread all over the world. The organizations these days have a huge number of employees which keep increasing or decreasing all the time according to the organizations need. It also has a working interaction with contractors, business partners, and customers, all of whom require access to various parts of the infrastructure. Most of the companies rely on manual or semi-automated administration of users, controlling their access to privileges for various resources on a particular system. This will inevitably become very complex and completely unmanageable if the organization is huge and the number of users of the system is in thousands or more. Often, different systems will have their own set of access requirements with different sets of administrators who will have overlapping skill-sets, leading to poor use of resources. This creates an enormous administrat ive overhead e.g. If there is a single administrator who needs to update even 25% of thousands of users everyday, it will almost be impossible for the system admin to do so. Furthermore, if multiple administrators are acquired for this job it could cause conflicts so the system becomes almost impossible to handle and maintain. Also, it would cost much more than if you were to have a single administrator. As the complexity of the organizations IT infrastructure increases, the demand for access control administration across the enterprise outgrows the capacity of manual administration across the distributed systems. Increased administrative complexity can also result in increased errors that, in turn, can lead to increased security risks. It is best suited to use the access control models to restrict unauthorized access and avoid any security risks. Access Control Models have long been used in enterprise systems and ERPs so that the system is made secure and reliable, restricting access to sensitive and confidential information resources from unauthorised users [10]. Different access control models are suited for different business applications and industries depending upon the scale and complexity of the system being developed. This report will try to analyze the different types of access control models as discussed above, that may be suitable for a variety of businesses and industry applications, giving their features, benefits and classification. This document will be covering many issues related to access control and various access control models. The critical analysis of each of the traditional access control model will be provided as well as the comparisons with each other identifying their advantages and drawbacks. The industry specific implementation of each of the model will also be discussed i.e. which model is suited for which kind of industry and what models should be selected depending on the scale of the system. Then the more recent access control model which is being widely utilized nowadays will be discussed in more detail and its different versions will be evaluated. Also role-based access control will be discussed in different environments i.e. in a centralized application environment and also in a distributed application environment. In the end, there will be an implementation of the appropriate access control model for a particular industry application called BOS (Back Office System) that is a travel agency. This application will support the day to day business operations of the organization. The model used for this application will be Role-Based access control as the structure and requirements of the business will be supported using this RBAC. It does not require the ACLs of DAC and it does not need the high security of MAC because the access privileges can be interchangeable between the users of the system. BACKGROUND Access Control Models have long been used in enterprise systems and ERPs so that the system is made secure and reliable, restricting access to sensitive and confidential information resources from unauthorised users. The basic need of access control is to protect the system and its contents from intentional and unintentional damage, theft and unauthorised disclosure. The access control models that have been used in the recent decades are traditional access control models which are Access Control Lists (ACLs), Discretionary Access Control (DAC) and Mandatory Access Control. Role Based Access Control (RBAC) is a more recent access control model which provides an alternative for the traditional access control models. The most appropriate way to restrict access of resources from unauthorized users of the system is to use one of the traditional access control models as a means of implementing secure and reliable access for that system. There are many access control models present in this age of time which cater to different needs and provide different type of security depending on the nature, scale and type of the application as well as the industry for which the application is being implemented for. Traditional access control models base access control on the discretion of the owner or administrator of the data. Under all traditional models, an end-users identity determines which access permissions are needed. This section gives a brief introduction to the predominant traditional access control models as well as some of the more recent models that have been utilized more recently. We discuss these models in more detail in the later sections: Access control lists (ACLs). Discretionary Access Control (DAC). Mandatory Access Control (MAC). Role-Based Access Control (RBAC). Access Control Lists ACLs is one of the most common access control model being used for securing operating systems, applications, computer resources and networks. When ACLs is selected as a model for implementing access control, each resource that needs to be secured has a list of users associated with them who are authorized to access the resource and even modify and make changes in it if they are allowed to. ACLs as a model provides ease of access for the security administrator to see which users have access to which resource within the application or system. Also, modifying access to a piece of information is relatively simple; a security administrator can simply modify a user from the ACL list that is a user can be created, edited or even deleted easily. There is a corresponding ACL present for every data or application, but it is not necessary to have a corresponding list that gives the network administrator information on all of the pieces of information to which a particular user has access. The only way for the security administrator to find out about any potential security violations on a particular data has to be checked by accessing each of the data individually. If the security administrator wants to revoke all the access privileges for a certain user, the administrator has to examine each list and then have to remove the user from each of the lists one by one. Responsibilities for a user in an organisation may change, in this kind of scenario this model becomes more complicated and hard to manage. Instead of removing the user from every ACL, the network administrator has to determine which permission needs to be removed, modified or added somewhere according to the new position of the user in the organisation. In some situations the user can be grouped together in the list making it easier to change the ACL by just modifying the group information rather than each of the users individually. In some other cases elaborate rules can be applied to ACLs to restrict access to particular resource. Discretionary Access Control Using Access Control Lists Discretionary Access Control The user who owns the data is the one who control access to that data in the discretionary access control model. ACL is a model which is derived from DAC. DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject [1]. Discretionary Access Control is used to stop the user from accessing the protected objects on the system. The user may also be restricted to a subset of the possible access types available for those protected objects. Access types are the operations which are performed on an object by a user, the operations include read, write and execute. Usually an object belongs to a user or a user is the owner of that object, this means that only the owner of the object has the authority to distribute and revoke access to that object. The owner of the object may give and retain access to the objects they control based on the rules of the DAC. The identity of users and objects is the fundamental basis for controlling access in a system within this model i.e. DAC specifies which users have access to which part of the information. Mandatory Access Control Mandatory Access Control is different from other access control models in a way that the security it provides is based on hierarchy and assigns each subject and object a specific security level (e.g., classified, secret, top secret etc.). The rules that govern the access to a particular for this model are: No read up. No write down or (own level write only). Read down access gives users the ability to access any piece of information that is at or below their own security level. If a user has a secret security level, they are able to access secret and classified material but not top secret material. Write up access states that a subjects clearance must be dominated by the security level of the data or information generated. For example, someone with a secret clearance can only write things that are secret or top secret. With these two access control principles, information can only flow across security levels or up security levels [1]. Mandatory Access Control Role Based Access Control In traditional access control models the approach for granting access to resources within a particular system or an application is to specify permission for each of the user within an organization. If the user is allowed to have access to multiple resources or information within a system, the user must be assigned permissions for each of the resource. This approach is tricky and not the most reliable way of implementing access control. When users join, leave or change responsibilities within an organization, each of the users who changes status within the organization that users access privileges information must be updated for each of the permissions. Achieving the above requires a lot of resources, time and also is prone to errors as an organization can have hundreds of thousands of employees and updating each of the users information one by one is not an efficient way. RBAC get rids of this problem because it takes advantage of the users role as the key to access rather than the u sers identification. The basis for role-based model is the user-role and permission-role relationships. Each user in a role-based environment may be assigned to multiple roles, and each role may have multiple users as well. The roles that are assigned to a user depend on their job and responsibilities, and each role is assigned permissions according to roles access privileges in the organization. Permissions determine the data and applications that may be accessed by which are also assigned to a role and that role is assigned to a user or multiple users. Users role can be in many forms e.g. jobs like (bank teller, bank manager), geographic locations (London, Newcastle) or individuals (shift supervisor, managers). The advantage of using this model is that users keep changing with in the organization whereas on the other hand roles or job responsibilities for a particular role remain the same. Therefore rather than implementing the security on the users manually, roles are created which are assigned to use rs and any addition in a job specification is changed in the role description which in turn changes the all the user with that role. RBAC is a technology that offers an alternative to traditional discretionary access control (DAC) and mandatory access control (MAC) policies. RBAC allows companies to specify and enforce security policies that map naturally to the organizations structure. That is, the natural method for assigning access to information in a company is based on the individuals need for the information, which is a function of his job, or role, within the organization. RBAC allows a security administrator to use the natural structure of the organization to implement and enforce security policy. This model decreases the cost of network administration while improving the enforcement of network security policies. RBAC is designed to centrally manage privileges by providing layers of abstractions that are mapped one-to-many to real users and real operations and real resources. Managing permissions in terms of the abstractions reduces complexity and provides visualization and a context for implementing complex access control policies. Abstractions can be centrally managed resulting in real permissions on real systems. Role-Based Access Control Discretionary Access Control (DAC) In a computer system, access controls restrict subjects (users and/or processes) to performing only those operations on objects (e.g., files) for which they are authorized. For each such operation, the access controls either allow or disallow that operation to be performed [3]. DAC model works on the basis that only the owner of a resource has the capability to authorize other users to have access to the same resource. This means that the users who do not have access to a particular resource and wants access to it, only the owner of that resource has the right to give access to them. In Discretionary Access Controls (DACs), each object has an owner who exercises primary control over the object. ACL is one of the mechanisms which can be used to implement DAC and is one of the most widely used implementation for DAC. The access of information in DAC is based on the users identity and the rules that specify the users ability to have access to a certain protected resource or information. On the other hand ACLs are lists that specify users access privileges for the protected objects. DAC consists of set of rules which specify a users ability to access restricted resource or information. When a user wants access to a particular resource or information, the server searches the rule which specifies the users ability to have access to the particular resource which it wants access to. If the rule is found and there is a match for the user to have access than the user is allowed access to the resource, if there no match then the access for the resource to the user is denied . For example, there may be a rule which states that users from a certain group is not allowed to have access to a certain piece of information. Discretionary access control (DAC model) works on the discretion of the identity of the user. In DAC access to any object (files, directories, devices, information etc.) is only allowed if the owner of that object is willing to give access. Therefore, the basis of this model is creator-controlled sharing of information and identity of the owner plays an important role in the working of this method. The owners of objects can specify at their own discretion in what ways they want to share their objects to other users i.e. which other users can have what level of access to the objects they own. This can be implemented in a fairly simple way by using access control matrix which contains the names of users on the rows and the names of objects on the columns giving information of which users has access to which corresponding object. Regardless of how the matrix is represented in memory, whether by rows or by columns, the names of the users and objects must be used in the representation [1] . ACCESS CONTROL MATRIX The access control matrix is a combination of rows and columns with cells representing the permissions. In the matrix, the rows represent user/subjects and columns represent resources / objects. Regardless of how the matrix is represented in memory, whether by rows or by columns, the names of the users and objects must be used in the representation. For example, in a row-based representation an entry might read the equivalent of KIM can access KIMSFILE and DONSFILE. In a column-based representation, one might find the equivalent of DONSFILE can be accessed by DON, JOE and KIM [1]. The entries in the matrix describe what type of access each user has to each object. This representation of rows and columns is dependent on the model or mechanism being selected for Discretionary Access Control. The table below exhibits a good example of an Access Control Matrix. ACCESS CONTROL MATRIX Users / Objects KIMSFILE DONSFILE PAYROL1 PAYROL2 DOESFILE Kim rw r rw r Joe r Don rw r Jones r Doe rw Mgr Jim cp cp c c c Jan rw rw The access control matrix such as the example above is a graphical view of a set of users and their access rights on particular set of protected objects. The access types mentioned in the table above are: r denotes read access. w denotes write access. c denotes control permission access. cp control passing ability. CHARACTERISTICS OF DAC MECHANISMS The complete implementation of DAC is based on the information which is stored in the form of an access control matrix. DACs are oldest and most widely used class of access controls, the access controls for both Windows and UNIX are DAC. The Unix DAC, for example, has the well known three primitive permissions read, write, and execute. When the initial implementation of DAC started, the five basic mechanisms that were used initially to represent information were: Capabilities Profiles Access Control Lists (ACLs) Protection Bits Passwords The first two mechanisms that are capabilities and profiles represent the access control matrix information by row, connecting the accessible objects to the user. Whereas ACLs and protection bits represent the access control information by columns, connecting a list of users to an object. In the above five mechanism we will be mostly concentrating on the ACL model which is the most widely used model out of all of the mechanism present for DAC and also in this section a brief description of the other mechanisms will be provided [1]. Capabilities In a capability-based mechanism for DAC, access to objects which have restriction on them being accessed such as files is granted if the user who wants access to it has the capability for that object. The capability is a protected identifier that both identifies the object and specifies the access rights to be allowed to the accessor who possesses the capability [1]. The basic properties of capabilities are: The capability of one user can be passed onto another user. The user who possesses capability may not alter or fabricate capabilities without the interference of TCB (Trusted Computing Base). If a capability mechanism is used to implement DAC than the implementation should possess the facility to transfer capability from one user to other users. This ability of transferring capability from one user to another cannot be controlled and therefore capabilities has to be stored, determining all the users access for particular objects almost becomes impossible. Because of this reason implementing DAC using the capability mechanism becomes very difficult including the feature of revocation. A pure capability system includes the ability for users to pass the capability to other users. Because this ability is not controlled and capabilities can be stored, determining all the users who have access for a particular object generally is not possible. This makes a complete DAC implementation, including revocation, very difficult. (Revocation may not be an issue, however, since a user who has access to an object can make a copy of the information in another object. Revoking the users access on the original object does not revoke access to the information contained in the users copy. After revocation, however, changes can be made to the original object without the knowledge of revoked users.)[1]. Profiles This is another mechanism which can be used to implement DAC and have been used in some forms for several systems. When using Profiles [1] to implement DAC, a list of protected objects is used to associate each user to the particular object. The object names are inconsistent and they dont agree on being grouped together, also their size and number are difficult to reduce. If a user has access to a large number of protected objects, the profile can also become very large and it is very complex to manage such a profile. In profile mechanism all protected object names should be unique to but in reality multiple objects can have multiple names, because of this reason full pathnames should be used to identify the objects uniquely. One major drawback of this method is that when creating, modifying or deleting access to protected objects requires multiple operations because multiple users might have access to the same object therefore those users profile must be updated. Revoking access to an object in time for a user is very difficult unless the users profile is automatically checked each time that object is accessed. Also if some object is deleted, it will require some method to check whether that object exists in each of the users profile or not, which is also an extra overhead. In general, with these two mechanisms i.e. Capabilities and Profiles it is very difficult to check whether which users have access to a particular protected object. This is a very important problem that needs to be addressed in secure system and there exists more feasible and more efficient mechanisms, the above two mentioned mechanisms are not the recommended implementations for DAC. ACCESS CONTROL LISTS (ACLs) Another approach to implement the DAC model for access control using the access matrix is by means of the access control lists (ACLs). When using ACLs, each object is related with an ACL, these ACL entries indicate the authorities a subject possesses which can be executed on that object. In the ACL mechanism the access control matrix is represented by columns. By looking at an objects ACL it is easy to determine which modes of access subjects are currently authorized for that object. In other words, ACLs provide for convenient access review with respect to an object. It is also easy to revoke all accesses to an object by replacing the existing ACL with an empty one. On the other hand determining all the accesses that a subject has is difficult in an ACL-based system. It is necessary to examine the ACL of every object in the system to do access review with respect to a subject. Similarly if all accesses of a subject need to be revoked all ACLs must be visited one by one. (In practice revocation of all accesses of a subject is often done by deleting the user account corresponding to that subject. This is acceptable if a user is leaving an organization. However, if a user is reassigned within the organization it would be more convenient to retain the account and change its privileges to reflect the changed assignment of the user.) Several popular operating systems, such as UNIX and VMS, implement an abbreviated form of ACLs in which a small number, often only one or two, group names can occur in the ACL. Individual subject names are not allowed. With t his approach the ACL has a small fixed size so it can be stored using a few bits associated with the file. At the other extreme there are a number of access control packages that allow complicated rules in ACLs to limit when an how the access can be invoked. These rules can be applied to individual users or to all users who match a pattern defined in terms of user names or other user attributes. Access control is required to achieve secrecy integrity, or availability objectives. ACLs have been a popular approach for implementing the access matrix model in computer operating systems. Some systems approximate ACLs by limiting the granularity of the ACL entries to one or two user groups. Other systems allow considerable sophistication. ACLs have disadvantages for access review and revocation on a per-subject basis, but on a per-object basis they are very good. More flexible representation such as authorization tables provide for superior management of access rights, but are usually available only in database management systems. In a distributed system a combination of capabilities for coarse-grained control of access to servers, with ACLs or authorization tables for finer-grained controls within servers, is an attractive combination [10]. ACL MECHANISM WORKING ACLs allow any particular user to be allowed or disallowed access to a particular protected object. They implement the access control matrix by representing the columns as lists of users attached to the protected objects. The lists do not have to be excessively long if groups and wild cards (see below) are used. The use of groups raises the possibility of conflicts between group and individual user. As an example, the ACL entries PAYROL rw and Jones.PAYROL r appear to conflict, but can be resolved in the design of the DAC mechanism. The Apollo system has a multiple, hierarchical group mechanism. The ACL entry has the form user-id.group.organization .node. As in Multics, if the ACL specifies access rights for the user by user-id then group access rights are ignored. This allows a particular user to be excluded or restricted in access rights [13]. In the Apollo, if a user is not on the ACL by user-id, but is a member of a group, those rights are used and organization and node membershi ps are not examined. Multiple group mechanisms add more complexity and may facilitate administrative control of a system, but do not affect the utility of a DAC mechanism. Access to ACLs should be protected just as other objects are protected. The creation of groups m

Sunday, October 13, 2019

HIV and Aids in Sub Saharan Africa :: HIV in Africa

HIV and Aids in Sub Saharan Africa Introduction Sub Saharan Africa has a very serious HIV / AIDS epidemic with millions of its people living with the disease. It has now become a human tragedy in many areas of the world, but most affected is sub Saharan Africa. It is no coincidence that the countries suffering most with HIV / AIDS are also the poorest. HIV / AIDS is now considered to be the single most important impediment to social progress to many countries in Africa .This report will analyse the current situation using up to date sources from articles, books and the World Wide Web. UN Millennium development goals At the start of the new millennium, all 191 UN member states pledged to meet all the UN Millennium goals by the year 2015. These goals covered such issues as, poverty, hunger, education, aid, gender equality, child mortality, pre natal care, environmental sustainability and HIV / Aids. All UN states have agreed to, "Halt and begin to reverse the spread of HIV/AIDS." (http://www.un.org/millenniumgoals/). At Present, the HIV prevalence rates are still rising in sub Saharan Africa. The rate is seven ties higher in developing countries than it is in developed countries. Many different schemes are trying to reverse this trend. These schemes include,à ¢? ¦. Oxfam, who work to help ease developing world suffering believe that the only scheme that will help reduce HIV / AIDS in developing countries is to cancel world debt. "Unsustainable debt represents a huge barrier to progress in the fight against HIV / AIDS. Repayments to creditors by some of the poorest countries in the world are diverting the resources needed to respond to current suffering." (http://www.oxfam.org.uk/what_we_do/issues/debt_aid/bp25_debt_hivaids.htm) Oxfam and other similar organisations believe that countries with high prevalence rates could help them selves to solve the aids epidemic if they did not have to meet large debt repayments to the developed world. Concurring the epidemic Unfortunately this disease is not easily concurred. The disease is still today considered to be taboo, making it difficult to talk to

Friday, October 11, 2019

Essay --

In 2002, the Lower Manhattan Development Corporation (LMDC) and the New York and New Jersey Port Authority held a collaborative planning event organized by America Speaks regarding the future development of the World Trade Center site after the 9/11 terrorist attacks. The LMDC and Port Authority initially created six congruent plans regarding the reconstruction of the site. The LMDC saw the mandate they had to follow in reconstructing the tower to be broad. "LMDC thus announced that it would set up eight advisory councils to represent key constituencies—families; residents; restaurants, retailers, and small businesses; arts, education and tourism; financial services firms; professional firms; commuters and transportation; and development." (Rosegrant P.2 2002) The LMDC had made plans that would involve making the site into a mixed area of commercial and residential. The Port Authority likewise desired to stick to the original layout of the previous World Trade Center struct ure. They wanted to keep the space strictly for commercial and office space purposes. (Rosegrant 2002) Unable to come to an agreement on how the site should be used, it was decided to try and reach a wider demographic in regards to creating a blueprint for the reconstruction of the site. The Port Authority and the LMDC decided to accept a proposal from America Speaks on organizing a collaborative process that will bring all of the various stakeholders together. To discuss the future of the World Trade Center site. America Speaks' collaborative event brought together over 5,000 participants. 4,500 of whom were of the general public representative of the various demographics that resided within the region. The rest being composed of government and civic leade... ...c mobilization and decision making embodies the message. When designing a collaborative process I might have done certain things differently, despite its flaws the collaborative process proved to be successful. This success is owed to being inclusive through the formatting of the meeting. Innovative use of online and offline space. Allowing participants during the initial meeting define what they would want in a design plan of the space to be reconstructed. This format of collaborative planning was fairly new and it explains why participants were not confident that their input will not be considered in the decision making. While technology did play a prominent role the management of the process was also depended on the quality of table facilitators, scribes and the theme team. America Speaks was able to successfully organize and operate this collaborative process.

PepsiCo restaurants Essay

I. Introduction The key question is whether PepsiCo should expand its restaurant business by pursuing the purchase of CARTS OF COLORADO, a $7 million manufacturer and merchandiser of mobile food carts and kiosks, and CALIFORNIA PIZZA KITCHEN, a $34 million restaurant chain in the casual dining segment. II. Analysis of the main problemPepsiCo has 3 main segments: soft drinks (35% of PepsiCo’s sales and 39% of its operating profits in 1991), snack foods (29% of PepsiCo’s sales and 35% of its operating profits) and restaurants (36% of PepsiCo’s sales and 26% of its operating profits). In the early 1990’s PepsiCo’s three restaurant chains (KFC, Taco Bell and Pizza Hut) were the leaders in their respective segment. PepsiCo’s senior management believes its ability to move people within and across divisions gives PepsiCo a competitive advantage in the restaurant segment. PepsiCo believes their restaurants perform due to their strong management teams; which are developed within the corporation. PepsiCo would like to utilize their competitive advantage in running restaurants with PepsiCo managers by adding California Pizza Kitchen and CARTS OF COLORADO to the PepsiCo portfolio. Despite PepsiCo’s success with KFC, Taco Bell and Pizza Hut it had difficulty expanding La Petite Boulangerie, a three-unit bakery chain it purchased in 1982. The large overhead for La Petite Boulangerie made the company unprofitable and Pepsi sold it in 1987 for a $13 million loss. The unsuccessful venture into La Petite Boulangerie suggested that although PepsiCo managers were gifted and could be easily moved across divisions; the moves would not always guarantees a successful business expansion. Therefore, the main problem for PepsiCo management is to decide whether it can successfully purchase and administer CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO. This is in light of the fact that PepsiCo believes it has a competitive advantage in the skillfulness of its managers that was not borne out in the unsuccessful La Petite Boulangerie bakery endeavor. III. Recommendations PepsiCo can be categorized as a related diversifier. Approximately 30% of its revenue is split between its 3 main industrial  categories. PepsiCo’s business units share common resources and skills. Historically companies that take a corporate strategy of related diversification perform the best (GBS_634M lecture notes). Therefore on the surface it would appear that diversification by acquiring CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO would be an excellent strategic decision. However, in arguments described below; the evidence does not support a recommendation for PepsiCo to purchase Carts of Colorado or CALIFORNIA PIZZA KITCHEN. IV. Justification for recommendations PepsiCo is a lucrative company and therefore does not need to diversify into CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO to maintain it profitability. From 1987-1991 PepsiCo’s sales doubled, income from continuing operations grew at a compound rate of more than 20%, and the company’s value on the stock market tripled (PepsiCo restaurant Case, pg. 4, and Exhibit 3). Eight key reasons NOT to diversify into CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO. It is poor rationale for PepsiCo to diversify into CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO simply to reduce risk. The restaurant business is cyclical. Some restaurants will be profitable, while some will not be profitable. PepsiCo’s shareholders can diversify risk by purchasing shares in CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO themselves. Furthermore, it is not an appropriate strategy for PepsiCo management to over-diversify to protect their personal wealth. Maintaining growth is not a good basis to diversify into CALIFORNIA PIZZA KITCHEN or CARTS OF COLORADO. Most shareholders would rather hold shares in a small profitable company, not a big unprofitable company. As a shareholder, there is only a benefit if PepsiCo makes a profit. Currently PepsiCo is making a profit. Although managers benefit from growth regardless of profit or loss , growth for the sake of growth is not an appropriate reason to diversify. Although PepsiCo can use CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO to balance cash flow by funneling cash from its large business units to the smaller CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO business units; this is not recommended. Even thought PepsiCo has the capability of doing this an individual shareholder can do this for himself. The counterargument would be that PepsiCo managers can do a better job balancing cash flow than shareholders because the corporation can be more tax efficient than the individual shareholder. But this alone is not a sufficient reason to diversify. The acquisition of CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO will not create synergy within the PepsiCo corporate strategy. PepsiCo already has a Pizza segment (i.e. Pizza Hut) and does not have experience in the mobile food cart segment. Diversifying into these two market segments will not produce corporate synergy where the whole is greater than the sum of the parts. One good reason for PepsiCo to diversity into CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO is the sharing of infrastructure and to create economies of scope. PepsiCo is currently saving money because they are competing in several different industries (ie. Soft drinks, snack foods, and restaurants). These business units share the support structure and therefore the reduced costs. While Pepsi’s economy of scope can be used to distribute chips just as well as soft drinks it is not apparent that they can deliver well in the niche restaurant market like CALIFORNIA PIZZA KITCHEN (refer back to La Petite Boulangerie misfortune). If PepsiCo were to sell two or more different products simultaneously that would be beneficial by creating an economy of scope. For example, if PepsiCo could distribute Pepsi soft drinks and California Pizza from a cart they would have justification for the acquisition of CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO because they would be sharing common infrastructure that would make them unique. The uniqueness would make it very difficult for competitors to imitate and would be a reason to diversify. But there are currently no mechanisms to sell California Pizza’s from a cart. Therefore at this time, sharing of  infrastructure is not a good justification for PepsiCo to diversify into these two markets. It is not apparent that PepsiCo will increase its market power if they acquire CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO. PepsiCo already has multiple business units that buy from the same set of suppliers and sell to same set of customers. They have used this to gain market power. It is not apparent that adding CALIFORNIA PIZZA KITCHEN or CARTS OF COLORADO to the fold will increase PepsiCo’s market share significantly. It could be argued that by acquiring CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO PepsiCo is exploiting core competence. Although this is generally a good reason to diversify by generating more revenue opportunity and competing in several markets; this is not a good initiative for PepsiCo in the situation with CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO. In order to exploit core competencies, PepsiCo’s business units must be related, so they share the same set of skills. In order for this strategy to be successful, the benefits to PepsiCo have to be unavailable to PepsiCo’s competitors. If PepsiCo’s competitors can gain the same advantage, then PepsiCo will not have a strategic benefit. Although the Colorado Carts are unique, they can be duplicated by the competition (e.g. California Carts, All-Star Carts, Creative Mobile systems). With regards to CALIFORNIA PIZZA KITCHEN, other pizza restaurants can reproduce the unique flavors and styles of pizza. Therefore, PepsiCo will not be exploiting its core competence and should not diversify. If PepsiCo is contemplating CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO as good ‘turnaround projects’ then this is not a justification for diversification. CALIFORNIA PIZZA KITCHEN is a profitable company. CALIFORNIA PIZZA KITCHEN has increased both sales and net income from 1990 to 1991. CARTS OF COLORADO has also shown an increase in sales and operating income from 1985-1991. The management teams of both companies appear to be performing well. Therefore the ‘turnaround’ potential is not a good reason to diversify. CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO do not fit into the PepsiCo Corporate strategyWhere does PepsiCo compete?There may be a market opportunity for PepsiCo in the acquisition of CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO, but that does not necessarily imply that PepsiCo should take the opportunity. The overall scope of PepsiCo is on convenient foods and beverages. The acquisition of CARTS OF COLORADO would certainly be in-line with PepsiCo’s focus of providing foods and beverages at well-situated locations. However, PepsiCo does not have experience in the placement of mobile food carts and therefore PepsiCo would be at a disadvantage to those more experienced in the mobile cart business. There is even less evidence for a distinctive market opportunity for PepsiCo with the acquisition of CALIFORNIA PIZZA KITCHEN. PepsiCo already owns Pizza Hut and therefore has a place in the dine-in and take-out pizza business. Although CALIFORNIA PIZZA KITCHEN is suited for more upscale markets with unique flavors and tastes, Pizza Hut could introduce similar unique flavors and tastes. In addition Pizza Hut has stores across the United States and internationally, while CALIFORNIA PIZZA KITCHEN has a limited geographic scope. It currently operates only 25 restaurants in eight states (PepsiCo case, pg. 15). The offbeat pizzas may not sell well across the United States and internationally. For example, jerk-chicken pizza may sell very well in Beverly Hills, CA but not sell well in Peoria, Illinois or Duesseldorf, Germany. How does PepsiCo compete?PepsiCo’s corporate strategy allows for transfer of resources (i.e. managers) across their business units. PepsiCo’s philosophy is â€Å"We take eagles and teach them to fly in formation† (PepsiCo case, pg. 3). Therefore PepsiCo may have a strategic advantage by transferring managers from one of its current business units to CALIFORNIA PIZZA KITCHEN or CARTS OF COLORADO. For example, one manager could transfer her knowledge from a position at Pizza Hut to CALIFORNIA PIZZA KITCHEN relatively transparently; although it may be more difficult to transfer knowledge from Pizza Hut to the food carts and kiosks; the business of Colorado Carts. PepsiCo does transfers resources which fit well with the CARTS OF COLORADO  enterprise. PepsiCo can place a Cart outside a shopping mall on the street selling food. At some carts PepsiCo could offer KFC or Taco Bell while offering a Pepsi soft drink; maybe put forward some Frito lays chips. But this strategy does not fit well with the idea of the upscale CALIFORNIA PIZZA KITCHEN being directly near a KFC or Taco Bell in a mega-mall food court. How does PepsiCo execute?PepsiCo, although a very large corporate office, has an execution strategy in which they let the managers go at their own pace. They have a ‘decentralized organization’ (PepsiCo case pg. 4). PepsiCo managers are rewarded on a two-phase system; reporting performance first to direct managers then to upper level managers. In order to be promoted managers of CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO would have to perform very well relative to all of the remaining PepsiCo restaurants. Because all of the other PepsiCo restaurants are at the top of their respective segments it will be a challenge for managers of CALIFORNIA PIZZA KITCHEN and CARTS OF COLORADO to surpass other PepsiCo business units. Therefore the managers will not be incentivized as well managing CALIFORNIA PIZZA KITCHEN or CARTS OF COLORADO. Therefore, diversifying into California Pizza Kitchen and CARTS OF COLORADO is not copasetic with the PepsiCo corporate strategy. V. Summary. The acquisition of CARTS OF COLORADO and CALIFORNIA PIZZA KITCHEN will not lead toward the fulfillment of PepsiCo’s mission which is â€Å"To be the world’s premier consumer products company focused on convenient foods and beverages and seeks to produce healthy financial rewards to investors as they provide opportunities for growth and enrichment to their employees, their business partners and the communities in which they operate. And in everything they do, to strive for honesty, fairness and integrity.† (http://www.pepsico.com/PEP_Company/Overview/index.cfm)PepsiCo’s management should take the â€Å"guilty until proven innocent† approach and not diversify into these two business segments. As described in the preceding paragraphs  at this time there is not sufficient and convincing evidence to support the need for diversification into CALIFORNIA PIZZA KITCHEN or CARTS OF COLORADO. References: 1. http://www.pepsico.com/PEP_Company/Overview/index.cfm2. www.cpk.com3. PepsiCo restaurants. HBS 9-794-078