Wednesday, August 26, 2020

Copenhagen by Michael Frayn

Copenhagen by Michael Frayn For what reason do we do the things we do? It’s a basic inquiry. In any case, here and there there’s more than one answer. Furthermore, that’s where it gets entangled. In Michael Frayn’s Copenhagen, an anecdotal record of a real occasion during World War II, two physicists trade warmed words and significant thoughts. One man, Werner Heisenberg, tries to outfit the intensity of the particle for Germany’s powers. The other researcher, Niels Bohr is crushed that his local Denmark has been involved by the Third Reich. Authentic Context In 1941, German physicist Heisenberg visited Bohr. The two talked quickly before Bohr irately finished the discussion and Heisenberg left. Riddle and debate have encircled this memorable trade. About 10 years after the war, Heisenberg kept up that he visited Bohr, his friend,â and father-figure, to talk about his own moral worries about atomic weaponry. Bohr, be that as it may, recollects in an unexpected way; he guarantees that Heisenberg appeared to have no ethical doubts about making nuclear weapons for the Axis powers. Consolidating a solid blend of examination and creative mind, writer Michael Frayn thinks about the different inspirations driving Heisenberg’s meeting with his previous tutor, Niels Bohr. The Setting: a Vague Spirit World Copenhagen is set in an undisclosed area, with no notice of sets, props, ensemble, or grand plan. (Truth be told, the play doesn't offer a solitary stage heading †surrendering the activity totally over to the on-screen characters and the executive.) The crowd learns at an early stage that every one of the three characters (Heisenberg, Bohr, and Bohr’s spouse Margrethe) have been dead for quite a long time. With their lives now finished, their spirits go to the past to attempt to comprehend the 1941 gathering. During their conversation, the garrulous spirits address different minutes in their lives †skiing outings and drifting mishaps, research facility analyzes and long strolls with companions. Quantum Mechanics in front of an audience You don’t must be a material science buff to cherish this play, however it surely makes a difference. A significant part of the appeal of Copenhagen originates from Bohrs and Heisenberg’s articulations of their sincere love of science. There is verse to be found in the activities of a particle, and Frayn’s exchange is most persuasive when the characters make significant examinations between the responses of electrons and the selections of people. Copenhagen was first acted in London as a â€Å"theater in the round.† The developments of the on-screen characters in that creation - as they contend, bother, and intellectualize - mirrored the occasionally confrontational connections of nuclear particles. The Role of Margrethe From the start, Margrethe may appear the most insignificant character of the three. All things considered, Bohr and Heisenberg are the researchers, every one profoundly affecting the manner in which humankind comprehends quantum material science, the life structures of the iota, and the ability of atomic vitality. Be that as it may, Margrethe is basic to the play since she gives the researcher characters a reason to communicate in layman’s terms. Without the spouse assessing their discussion, here and there assaulting Heisenberg and safeguarding her frequently aloof husband, the play’s discourse may regress into different conditions. These discussions may be convincing for a couple of scientific prodigies, however would be in any case exhausting for all of us! Margrethe keeps the characters grounded. She speaks to the audience’s point of view. Moral Questions On occasion the play feels unreasonably cerebral to its benefit. However, the play works best when ethic issues are investigated. Was Heisenberg improper for attempting to flexibly the Nazis with nuclear energy?Were Bohr and the other unified researchers carrying on deceptively by making the nuclear bomb?Was Heisenberg visiting Bohr to look for moral direction? Or then again was he just displaying his boss status?​Each of these and more are commendable inquiries to consider. The play doesn’t give a conclusive answer, yet it implies that Heisenberg was a sympathetic researcher who cherished his mother country, yet didn't affirm of nuclear weapons. Numerous students of history would differ with Frayn’s understanding, obviously. However that makes Copenhagen even more pleasant. It probably won't be the most energizing play, however it unquestionably animates banter.

Saturday, August 22, 2020

Criminal Justice communication 4 Essay Example | Topics and Well Written Essays - 250 words

Criminal Justice correspondence 4 - Essay Example One should decline to take part in pointless contentions or discussions. This strategy benefits time for chilling so the two gatherings can move toward the contention with some restraint. Besides, another strategy would involve rivalry or emphaticness. This strategy is better pertinent where an individual realizes that they are correct or where it is expected to secure against individuals who exploit non-serious conduct. Thirdly, an individual can be accommodative particularly where they realize they are incorrect, and especially where it is more relevant to protect a relationship than the current issue or where proceeded with rivalry would be harming to a person’s case. To include, an individual could bargain or arrange where the two gatherings would surrender ground, to show up at a center position satisfactory to all. This will be material where a trade off would progress and work well for the interests of each gathering. Ultimately, gatherings could team up when there is compelling correspondence and concerns are unreasonably important, for instance, to bargain or when the issue is normal and in this way central to combine experiences. Correspondence is foremost to accomplish the above systems. One should be objective as a disappointment of objectivity influences correspondence. Also, gatherings should begin from the shared belief, that the two of them concur and share, gradually digging into the contention. Strife shirking is likewise a procedure to maintain a strategic distance from heightening of a contention. In maintaining a strategic distance from, there are no victors or failures. One essentially pulls back avoids or defers tending to the contention. It is basic likewise when connections are in question, to give time to chilling or when one is confronted with an all the more problem that is begging to be addressed and, accordingly, has no opportunity to manage this specific one or where more data is required. By and by, this methodology has the downside in that basic choices could be made as a matter of course and also, delaying the dace may simply exacerbate the situation or

Sunday, August 16, 2020

Reading Pathways Valentine De Landro

Reading Pathways Valentine De Landro Valentine De Landro will be speaking at Book Riot Live 2016, November 12 and 13 in New York City. Valentine De Landro is an illustrator, artist, and designer who has been working in comics for years, creating art for superhero comic books with Marvel and DC, other licensed properties like Buffy: the Vampire Slayer, and now his own creator-owned comic with Kelly Sue DeConnick. Not sure where to start with his work? We’ve got you covered! Cover by Valentine De Landro I first discovered De Landro through Bitch Planet, the feminist sci-fi prison colony series he co-created with Kelly Sue DeConnick in 2014, and I would recommend you start there. Bitch Planet tells the story of several women deemed “non-compliant” by the government, sent to be rehabilitated on the Auxiliary Compliance Outpost Bitch Planet, as it were. Bitch Planet houses thieves and murderers, but also women who just don’t fit within the patriarchal system. Women who don’t accept being cheated on by their husbands. Who are fat. Who talk back. Who stand up for themselves. In issue 4 one of the inmates, Kam, is looking through the files of her fellow non-compliant women and many of their crimes I’d be proud to commit: political incitement, development and distribution of gender propaganda, criminal literacy… De Landro’s art is essential to the comic, contributing enormously to the exploitation/grindhouse movie feel. He honestly depicts women’s bodies, bodies with shape s we rarely get to see in any media, and does it without shame or sexualization. Start with the first trade paperback, Bitch Planet Volume 1: Extraordinary Machine, but it’s worth picking up individual issues as well, which come with bonus feminist essays not included in the trade. After that, check out De Landros run on Marvel Knights 4, starting with issue 19 (collected in Marvel Knights Fantastic Four, Vol. 4: Impossible Things Happen Every Day). Its the beginning of a short arc about the Inhumans, who you may be familiar with from Marvels Agents of S.H.I.E.L.D. tv show. Even if youre not, there is enough exposition for a newbie to jump on board. This series, focusing on the Fantastic 4, continues the sci-fi tone from Bitch Planet and is a great jumping on point for De Landros superhero work. I could stare at his drawings of the Thing for hours. For more superhero comics, try X-Factor. De Landro penciled many issues of this Marvel comic about a detective agency for mutants, but Id recommend starting with issue 39 (collected in X-Factor Vol. 7: Time and a Half). It works well as a standalone story, answering the question “Whats it like when mutants have babies?” De Landro’s art conveys both the wonder and the horror of becoming a parent, and may make you cry. Lastly, read the Adventures of Superman #17, another collaboration with Kelly Sue DeConnick. Adventures of Superman was a digital-first anthology series published from 2013-2014. It contains stories written and illustrated by various people, published online first in chapters containing one story each. De Landro and DeConnick’s story was published in chapter 50, collected in issue #17. It’s a cute romance between Lois Lane and Superman as they get and give each other presents for Valentine’s Day. It’s as witty as any DeConnick comic, and De Landro’s art expertly conveys Lois and Clark’s emotions through sparse linework. Sign up to The Stack to receive  Book Riot Comic's best posts, picked for you. Thank you for signing up! Keep an eye on your inbox.

Sunday, May 24, 2020

Dont Use Je Suis Fini

To say Je suis fini in French is a serious mistake and one to be avoided.   This mistake is caused in part by the fact that in the English translation finished is an adjective, while in French its the past participle of a verb. So when you want to say I am finished, it seems logical to translate that as Je suis fini. Unfortunately, this is quite a dramatic thing to say in French and it means I am dead, Im finished! Im done for! Im ruined! or Im all washed up! Imagine the look on your French girlfriends face if you say, Je suis fini! Shell think youre about to expire! Or shell burst out laughing at your mistake. Either way, not so good. Never use  Ãƒ ªtre fini  and  ne pas à ªtre fini  when referring to people, unless you have something pretty earth-shattering to announce or youre maliciously insulting someone. To avoid this scenario, think of the English as I have finished instead, and this will remind you that you need to use the passà © composà © in French  and that the auxiliary verb for finir is avoir, not à ªtre.  Thus, avoir fini is the correct choice. Even better, use the colloquial avoir  terminà ©, especially when referring to the completion of a task or activity. For instance, if a waiter asks  if he or she can take your plate, the correct (and polite) expression is: â€Å"Oui, merci, j’ai terminà ©.†Ã‚   The Wrong Way and the Right Ways In brief, these are your options: Avoid using finir with à ªtre:   Être fini   to be done for, washed up, finished with, ruined, kaput, dead, or dying.   Choose verbs with avoir: Avoir fini   to be done, to be finishedAvoir  terminà ©   to be finished, to be done Examples of Je Suis Fini Si je dois les rembourser,  je suis fini.  Ã‚  If I have to refund their money,  Im done.Si à §a ne marche pas,  je suis fini.  Ã‚  If it doesnt work out,  Im through.Mà ªme si on sen sort,  je suis fini.   Even if we get out of here,  Im finished.Si je la perds,  je suis fini.  Ã‚  If I lose her,  Im finished.Je suis fini.   My career is over. / I have no future.Il nest pas fini.  (informal)   Hes retarded / a moron. Examples of Jai Fini   Jai donnà © mon à ©valuation, et  jai fini.  Ã‚  I gave my assessment, and  Im done.Je  lai fini  hier soir.  Ã‚  I finished  it last night.Je  lai fini pour ton bien.  Ã‚  I finished  it for your own good.Grà ¢ce à   toi,  je  lai fini.  Ã‚  Thanks to you,  I finished  it. Examples of Jai Terminà © Je vous appelle quand  jai terminà ©.  Ill  call you when  Im done.Donc  je  lai terminà ©Ã‚  au bout de quelques jours. So  I finished  it in a couple days.Jai presque terminà ©.  Ã‚  Im nearly finished.Ça suffit,  jai terminà ©.  Ã‚  Thats all;  Im done.Jai adorà © ce livre. Je  lai terminà ©e  hier soir. I loved this book.  I finished  it last night.  Je suis bien soulagà © den avoir terminà © avec cette affaire. Im so relieved to have seen the end of this business.

Wednesday, May 13, 2020

Immigration Reform Illegal Immigration - 1697 Words

Introduction Back in 2007 there were several concerns over immigration as a whole and exploding proportions of illegal immigrants crossing the border in the Arizona area. Arizona attempted to resolve the influx of people across the border by imposing heavy fines on employers hiring illegal immigrants. At that time in Arizona there was a democratic governor Janet Napolitano that continually vetoed the Arizona’s legislature attempt to reduce illegal immigration. In 2009 the state replaced the Democratic governor with a Republican governor Jan Brewer who was supportive of reforms for immigration in Arizona. In 2010 the immigration problem was so sever that Arizona passed legislation allowing the state to enforce federal law for identification of legal immigration into the United States. This sparked a nation wide discussion on illegal immigration and immigration reform. The problem with immigration is that the federal government has failed to control immigrants coming into t he U.S. illegally. This has caused a substantial increase in illegal immigration that threatens the U.S. economy. There continues to be uncertainty on how to approach the legalized immigration into the U.S. The federal government has attempted since 1975 to enact laws that resolve the issue but the laws continue to fall short of fixing the problem. One of the democratic approaches to solve the problem is to give all illegal immigrants citizenship unless they are not in good standings withinShow MoreRelatedImmigration Reform For Illegal Immigrants2343 Words   |  10 Pages Immigration is a controversial topic among many people in the United States today. A lot of people from different countries often settle in the United States in search of jobs, freedom or a better life in general. The United States has become a hot spot for immigrants because it has much to offer for people seeking a better life. The Immigration Reform Bill has been created in order to make illegal immigrant legal citizen of the United States. This Immigration Reform Bill provides a process forRead MoreImmigration Reform and Illegal Immigrants Essay1559 Words   |  7 PagesToday in the United States, illegal immigrants has become a subject that has left many people upset and angry of the view on deportation. Unfortunately at the cost of personal relationships and attachments with friends and family. Yet in 1947,Helbert Leyman hit the topic of immigration right on the head by saying,â€Å" We are a nation of immigrants. It is immigrants who brought to this land the skills of their hands and brains to make of it a beacon of opportunity and hope for all men (Messener,et alRead More Illegal Immigration Reform in America Essay examples1382 Words   |  6 Pages One of the most controversial topics today in politics is what to do about illegal immigration in the United States. Should we consider all of the illegal immigrants felons? Should we give them full citizenship rights? These are all important questions related to illegal immigration. In 1986, the Immigration Reform and Control Act made it illegal for employers to knowingly hire undocumented workers and imposed fines of up to $11,000 for each violation. Recently, the United States House of RepresentativesRead MoreThe Policy, Illegal Immigration Reform And Immigrant Responsibility Act Of 19961486 Words   |  6 PagesDescription The policy, Illegal Immigration Reform and Immigrant Responsibility Act of 1996, Division C of Pub.L. 104–208, 110 Stat. 3009-546, shortened to IIRAIRA or IIRIRA, was enacted September 30, 1996 (Illegal Immigration Reform and Immigrant Responsibility Act of 1996). The IIRAIRA is a federal law designed to reduce illegal immigration and to apprehend undocumented aliens (Illegal Immigration Reform and Immigrant Responsibility Act of 1996). It vastly changed the immigration laws within the U.SRead MoreWith an estimated 11.7 million illegal immigrants in the U.S. today, immigration reform has been a800 Words   |  4 Pagesestimated 11.7 million illegal immigrants in the U.S. today, immigration reform has been a volatile issue that hasn’t been adequately addressed throughout the 21st century. With the last major overhaul occurring in 1986, when over 3 million immigrants were granted U.S. citizenship, politicians are saying another major overhaul is needed to address the newer generation of illegal immigrants. Legislations including the Border Protection, Anti-terrorism, and Illegal Immigration Control Act of 2005, theRead MoreImmigration Reform : Legal Or Illegal1520 Words   |  7 PagesImmigration Reform: Legal or Illegal Vigorous debates about immigration policy have been part of U.S. history since the first settlers began arriving from Europe (Novas, 1994; Kessler, 2001; Reichman, 2006). Those who favor more stringent restrictions on entry to the country, and greater penalties for violating those restrictions, argue that it is necessary for the safety and economic security of our nation and to preserve jobs for U.S. born workers (Camarota, 2011). Those who favor more leniencyRead MoreThe Immigration Of Illegal Immigrants1643 Words   |  7 Pagesfreedom which ultimately form the famous â€Å"American dream,† in which so many individuals desire. While this country’s reputation and culture was built on the basis of immigration, the ideals and viewpoints of this topic have strayed far from welcoming over the years. Both the Democratic and Republican parties find faults in the overflow of illegal immigrants coming into America, but differ in their strategies of devising a solution to th is issue. In short, Democrats believe in giving immigrants the opportunityRead MoreLooking for a Fresh New Start Essay1339 Words   |  6 PagesIllegal immigration has been an ongoing issue in the political arena for the past decade with immigration laws still being discussed. To immigrate means to come into a country of which one is not a native for permanent residence. The United States is a nation founded by people who emigrated on the principle of freedom. What would our forefathers think if there could see the issues facing their nation today? There are many issues surrounding immigration policy such as national security, border patrolRead MoreAmericans : Just Without The Right Papers893 Words   |  4 Pagesand â€Å"Human rights Are Immigrant Rightsâ€Å" are just some of the phrases chanted by people who are in favor of an immigration reform and a pathway to citizenship. According to the American Progress Organization, we have a total of about 12 million undocumented imm igrants in the United States. Our broken immigration system has definitely not gone unnoticed, however, how to fix our immigration system is the biggest issue and it has been put aside for many years because it is a conflict that causes a tremendousRead MorePolitical Analysis Of Immigration Reform1433 Words   |  6 PagesLijun Huang Professor Josh Sapotichne PLS 313 April 26, 2015 Political analysis of immigration reform U.S. as an immigration country, has a long history of immigration. It is a complex demographic phenomenon that has been a major source of population growth and cultural change of the United States. People came here because of varies reason, the major reason among them are fleeing crop failure, land and job shortage, rising taxes, and famine. Nearly 12 million people immigrate to the United States

Wednesday, May 6, 2020

User Manual Free Essays

This system help users r people especially students and faculty who responsible in recording the data appropriately, it also saves time and more convenient to use than the traditional manual recording. It helps to eliminate the too much time and effort in borrowing, returning, reserving and claiming of items. Lack of library system in a school can lead to chaos and troubles, and because of it the librarian is having a problem to serve each students and faculties who wish to use the library. We will write a custom essay sample on User Manual or any similar topic only for you Order Now It is extremely useful in the school to use that automated system and will help the school advanced its education quality. Foreign According to Robinson (2001), usability is a key requirement for users, says Elisabeth Robinson, Product manager for Online Computer Library Center. The catalogue has become a way to pull together disparate resources, including commercial resources and web links. Management systems also allow circulation, including check in/check out and enable libraries to purchase materials and track where they are. According economy within which library systems form part of a larger whole. He was writing in a briefing paper about the study in library management systems. This study examined the systems used in higher-education libraries across the I-J and came up with some significant observations and recommendations. It noted that the ALMS market in I-J higher education is already mature and that four main vendors (Calibers, Innovative,Sordidness and Tails) have almost 90 per cent of the market. This market maturity means, according to the study authors, that the benefits to libraries of changing ALMS provider are limited. Library users expect to find everything together says Stephen Abram, vice president for innovation at Sordidness, the leading provider of software solutions and associated revise for libraries. According to her traditionally, the library management system or integrated library system (ILLS) was responsible for running libraries efficiently and effectively. Over the last few years, the role of the ILLS has been expanding from meeting library needs to delivering user experience. Local According to Eden (201 1), views that most libraries are forced to work with fewer staff because of the having a more improved and modernized system for their library. According also to the study, the library administration need to emphasize to their Taft that the organization has a vested interest in providing them with the tools and training they need to assist the organization in the new information marketplace. These may include search engines, circulation systems, and the online public access catalog. According to Lopez (2002), University of the Philippines Mindanao when UP in Mindanao accepted its first batch of students in 1996, the Main Library collection was integrated with the core collection of the School of Management (SOME) Library at the Satisfaction Bldg. , Ladies Avenue, Banning, Dave City. The Philippians and General References were housed together with the College of Arts and Sciences (CASE) collection in Room 2 of the Philippine Coconut Authority. In the Second Semester AY 1996-1997,the CASE Library moved to its main campus in Bags Shirr. Upon the recognition of UP in Mindanao by the Board of Regents (BOOR) as a constituent unit (CUE) of the UP System, the CASE was split into two (2), namely: College of Humanities and Social Sciences (OCHS) and the College of Science and Mathematics (SCM). The Main Library transferred to the newly renovated building where the main collection was set-up beside the books of the OCHS and the SCM. In July 2002, the library established the Library Educational Media and Information Technology Office (LIMITS). The LIMITS handles the audio-visual services, internet and the connectivity of the library. Users in every generation and in every stage have always wanted access to library resources. It has been important to know that libraries were there to be used when required, although it was not necessary to visit them very often. The question facing us today is whether the mission libraries have performed in the past is still relevant in today’s world. Numerous studies have demonstrated that the importance of library arrive is users oriented and the needs of meeting their demand and expectation. The proliferation of Information technology (IT) brings users’ needs for timelier, convenient, speedy information delivery in recent years. Libraries have to harness the technological change and use it to fulfill their mission to provide access to information when people need it. The popular use of IT also can help libraries to know what their users need and provide right information to the right user with plenty of resources. Library plays as an interactive role to encourage users to use resources and establish a relationship with library. The use of computer technology in modern society has become indispensable evident in many day to day activities. The use of gadgets for implementing and upgrading the different software are now liable, including the use of bar code readers, swipe card readers and online access. Integrating these technologies in a company’s and in the different sectors operations has now become a necessity. As the school focus on serving their students the best way they can, the management also ensures the welfare of their students. To do this requires a library management system to collect manpower input, process it and output complete and accurate information of students who will borrow books. Library is the warehouse of the information and knowledge. This is where students and teachers find books, encyclopedias, periodicals, newsletter, magazines, dictionaries, atlases, almanacs, Journals, pamphlets and other printed references. It provides free services for them so they could use every reference they need. It also provides assistance from the librarian to make it easier to look for the reference that they will use. It is a place where could be informed and broaden their knowledge about everything free of charge. STATEMENT OF THE PROBLEM General: What is the way to eliminate too much time and effort in performing transactions in a particular School Library? Specific: 1. What are the needs of a School Library? OBJECTIVES OF THE STUDY General Objective: To design and develop a library management system that will serve as a proposal to help librarians save time and effort with the automation of its daily operation. Specific Objective: To allow librarians to retrieve complete information of the book and its borrowers. To eliminate too much time and effort in rendering books. To provide a convenient way in rendering books. SIGNIFICANCE OF THE STUDY The significance of this study was to help and give a benefit to the concerned group below. This study will be beneficial to the following: Students/Faculty Through a computerized library system, they can easily find the books that they are looking for without going through the traditional way of searching a library material. Convenience is more visible for it is not time-consuming, resulting to a number of accomplished works. Librarian The computerized library system would improve the monitoring capacities of those ho maintain the library. It would be easier to determine whether a particular book is on-shelf or not. Computers have radically changed the way people learn and communicate with each other, as well as the library itself. The library differs little from other institutions and firms in the impact of computing technology on them. Changes are in the almost unlimited tracking of the availability of books: Whether a book has been issued or not is the work of moments, where before it would have entailed a long search through a card index. The availability of learning resources has been massively expanded through access o the Internet, again facilitated by the use of computer technology. Without computers, as some libraries are, all of them are dependent on paper work or manual recording of borrowed, returned, reserved, claimed and new books. When inefficient and labor intensive and can produced too much effort and time. Users of a paper based system become almost wholly reliant on the librarians, for all levels of service, whether they are enquiries about existing books, inter-library loans, or the availability of books. There is additionally no real involvement of a user in the entire process. How to cite User Manual, Papers

Monday, May 4, 2020

Genocide of Native Americans Essay Example For Students

Genocide of Native Americans Essay Genocide: The Extermination of Native AmericansNative Americans, as a race, have suffered from the very beginning of contact with the European colonists. Statistics largely support the case of genocide against the Natives. In fact, Native Americans once constituted 100% of the population in North America, whereas today they represent two percent of the population. The term genocide refers to the systematic killing of a whole national or ethnic group, and the denial of the right of existence to entire human groups, as homicide is the denial of the right to live (Churchill, 365). This paper will give evidence that genocide was committed against the Native Americans by the European colonists, whether it was entirely premeditated or not. This paper will also show that the United States government failed to sign on to the Genocide Convention for forty years. This, in itself, makes a very apparent statement. This paper will also show that the United States government failed to sign on to the Genocide Convention for forty years. This, in itself, makes a very apparent statement. The decline in population of the Native Americans began in 1492 with the settling of the European colonists. Initially, the colonists had no intent on eliminating the Natives. Instead, they were amazed at their technological ingenuity, marveling as well at their smooth functioning but complex machineries of government (Stannard, 103). At the beginning of the colonization process, the colonists and the Natives for the most part kept to themselves. In fact, the early settlers praised the Natives for their peacefulness, generosity, trustworthiness, and egalitarianism, all of which were conspicuously absent from English social relations of the time (Stannard, 103). The two groups even exchanged items with one another. The Natives would give the colonists beans, pumpkins, corn, and many other vegetables, while the colonists would give the Natives measles, small pox, and the flu. Disease was not the only factor that transformed the Natives. Pigs, cows, and horses began running wild and free across most of the Americas, which had an affect on the ecosystem. In the book, The Columbian Exchange, Alfred W. Crosby, JR. concludes by stating, We, all of the life on this planet, are the less for Columbus, and the impoverishment will increase (Crosby, 219). It was not until land became an issue, that the Natives and the colonists began battling. In the eyes of the Europeans, land was unclaimed unless it had a fence around it. The Natives, on the other hand, had no such belief. The Natives believed they were borrowing the land from the Gods. When good, or habitable land began to run thin, the colonists would take the land of the Natives. There were several ways the colonists would take the land from the Natives, but there was one way in which the colonists would take land that was just awful. This method involved the kidnapping of young Native children and holding them hostage until the land was given to them (Stannard, 105). This began the turning point of Native and colonist relations. From then on, any Native who encountered the colonists were captured, accused of being spies, and executed (Stannard, 106). Furthermore, Natives were lured into English settlements on the pretence of peace and sharing of entertainment, where there they were attacked and killed (Stannard, 106). This type of entrapment continued while hundreds upon hundreds of Natives were executed at the hands of the Europeans. The hatred of the Natives became so great that if any European were found peacefully associating with the Natives, they too would be executed. In the minds of the Europeans, This was the treatment for those who wished to act like Indians (Stannard, 105). Two hundred years after the Europeans arrived, thousands of Natives had been killed by deception, poisons, and some were even hunted. They were hunted by Blood-Hounds to draw after them, and Mastives to seaze them (Stannard, 106). In addition, the mental approach to warfare was extremely different between the Natives and the Europeans. Skoda Auto - International Business Essay For the Natives, taking a life was an occasion. Their type of warfare was described as a kind of play (Stannard, 111). European soldier, Captain Henry Spelman, said that warfare among the Natives had no dicipline, so that when the Natives fought there was no great slawter of nether side (Stannard, 111). During warfare, the Natives followed a strict code of honor that usually .

Saturday, March 28, 2020

Airport Screening

Airport screening has become an essential component of transportation security policy in the United States following a security breach that precipitated the terrorist attacks of September 11, 2001 (Fritteli, 2005).Advertising We will write a custom essay sample on Airport Screening specifically for you for only $16.05 $11/page Learn More In response to the terrorist attacks, the US Congress moved with speed to pass the Aviation and Transportation Security Act (ATSA), which in turn established the Transportation Security Administration (TSA) to ensure the security of the travelling public through screening of passengers for explosives and other dangerous items (Blalock, 2007; Lord, 2012). Although the TSA mandated a federalized workforce of security screeners to conduct inspections on online passengers and their luggage, available literature demonstrates that this piecemeal and reactive mandate resulted in significant cost increases, adverse privacy impli cations, and inconveniences (McLay, Lee, Jacobson, 2010). The present paper measures the impact of the federalization of airport screening and attempts to advocate for a more responsive, intelligence-based, and technology-focused screening aimed at cutting costs, ensuring passenger privacy, and reducing inconveniences. Impact of Federalization of Airport Screening Understanding the Federalization of Airport Screening The two fundamental changes in airport security visible to passengers after the terrorist attacks included â€Å"the federalization of passenger security screening at all US commercial airports by November 19, 2002, and the requirement to begin screening all checked baggage by December 31, 2002† (Blalock, 2007, p. 2). When TSA officially took over the mandate for airport security in February 2002, it embarked on an effort to substitute private security screeners with federal employees who were charged with the responsibility of conducting passenger-screening ope rations at all US commercial airports. TSA not only embarked on hiring 56,000 federal screeners to help reduce waiting time in security lines but also increased the compensation and training of screeners by offering them higher wages and expanding training requirements (Blalock, 2007). Fritteli (2005) argues that federalizing the screener workforce was offered as a potential solution to address the challenges of high staff turnover, low wages, poor supervision and training, as well as lack of regulatory oversight.Advertising Looking for essay on air transport? Let's see if we can help you! Get your first paper with 15% OFF Learn More Impacts and Concerns This paper looks into three impacts related to the federalization of airport screening, namely travelers’ inconveniences, privacy concerns, and cost implications. The discussion around inconvenience is embedded in the fact that, although greater confidence in the safety of air travel has been found to trigger de mand, the inconvenience of security procedures that necessitate additional time and effort on the part of travelers due to the high expectations associated with airport screening may indeed minimize demand for air travel (Blalock, 2007). The intrusive security measures occasioned by the federalization of airport screening (e.g., arbitrary hand-searches of travelers and their carry-on luggage, expansive inspection and prohibitions on non-dangerous items) have been found to minimize the convenience of air travel, resulting in lost revenues for airline companies as potential travelers choose to stay at home (Hessick, 2002). Although studies have found that travelers often value-enhanced airport security and are prepared to allow some extra inconvenience and/or high prices in order to feel more secure and confident (Blalock, 2007), the requirements for additional time and effort on the part of customers have been found to substantially reduce passenger convenience in domestic and foreig n arenas (Hessick, 2002). From the ongoing, it is evident that risk-based approaches to airport screening such as selective screening and behavioral profiling can be used to avoid unnecessary passenger inconveniences in contemporary airport security operations. As postulated by McLay et al. (2010), selective screening applies high-order security technologies and procedures on a targeted cluster of high-risk passengers and employs lower levels of scrutiny to screen low-risk passengers. However, as acknowledged by Markarian, Kolle, and Tarter (2011), it is always essential to have a prescreening system that undertakes an accurate risk assessment of passengers before their arrival at the airport to enhance the accuracy of passenger assessment. On its part, behavioral profiling is able to minimize passenger inconveniences by focusing attention to high-risk passengers (Poole Carofano, 2006). Due to lack of passenger privacy that followed the implementation of the new security procedures such as the federalization of airport screening and comprehensive baggage screening, a huge decline in passengers flying shorter trips was noted as such passengers preferred to drive to their destinations (Blalock, 2007). Calculations demonstrate that the substitution of flying for driving by travelers seeking to safeguard their privacy not only led to fatal road accidents but also triggered a slump in traveler volumes as well as airline profit margins (Selzer, 2003). Available literature demonstrates that the creation of multiple levels of security (e.g., concentric protection) may indeed be more effective than treating all passengers the same, particularly in terms of safeguarding their privacy and removing bottlenecks that trigger privacy concerns (McLay et al., 2010).Advertising We will write a custom essay sample on Airport Screening specifically for you for only $16.05 $11/page Learn More Security frameworks such as concentric protection are not intrusive to passengers as they help to integrate security systems and increase the level of penetration difficulty through what is commonly referred to as defense in depth (Markarian et al., 2011). In terms of costs, airline companies are of the opinion that â€Å"the increased inconvenience caused by security measures has cost them billions in lost ticket revenues as potential business travelers opt to stay at home† (Blalock, 2007, p. 8). Tough security measures imposed by the TSA through the federalization of airport screening and comprehensive screening of baggage, though appropriate in thwarting terrorist attacks, have nevertheless imposed a huge cost in terms of reduced profits in the airline industry and less tax revenue for the federal government due to stunted ticket sales (Selzer, 2003). Plan Validation It is evident that the federalization of airport screening has witnessed adverse outcomes in terms of travelers’ inconveniences, privacy concerns and cost imp lications, though it has had a corresponding increase in security (McLay et al., 2010). The solution to these adverse outcomes and concerns, it seems, is nested on the development of a more responsive, intelligence-based and technology-focused screening process that utilizes the federal and private workforce of screeners. Federal screeners will be included in the plan as many travelers feel safer with federal security screeners as opposed to private ones (Blalock, 2007), while private screeners will be included for their innovation and flexibility to provide screening services more competently and with superior customer service (Lord, 2012). The combination of safety, efficiency, competency and enhanced customer service will be instrumental in reducing travelers’ inconveniences and reinforcing privacy. As already acknowledged, the proposed plan will include three main components, namely responsiveness, intelligence collection, and technology. It is essential to have a compete nt and flexible workforce to man the responsiveness component of the plan. These human resources will be sourced from the private sector as available literature demonstrates that private airport screeners are more innovative, flexible, and competent in customer service than federal screeners (Lord, 2012). Overall, this workforce will be charged with the responsibility of implementing risk-based approaches to airport screening (e.g., selective screening and behavioral profiling) with the view to ensuring that the interventions are more responsive to the needs and expectations of travelers.Advertising Looking for essay on air transport? Let's see if we can help you! Get your first paper with 15% OFF Learn More As demonstrated in the literature, â€Å"the risk-based approach would produce significant cost savings in both capital and operating costs, while targeting those funds spent on airport security toward the passengers more likely to pose threats to people and property† (Poole, 2006, p. 27). Additionally, it is now common knowledge that selective screening is a useful technique in reducing costs and waste of scarce security resources as air travelers are not treated equally in terms of threat potential (Poole Carofano, 2006). This way, it is assumed that the private screeners will have the capacity to substantially reduce travelers’ inconveniences and associated costs due to the responsive nature of available airport security interventions. The intelligence collection component of the plan will be allocated to duly qualified and competent federal screeners and their mandate will entail the use of available security and safety systems, existing criminal databases, and ri sk-based prescreening techniques to identify passengers and baggage for inspection. The use of these systems and risk-based screening techniques in airport safety operations will increase travelers’ confidentiality and privacy while ensuring that sufficient levels of safety are maintained to deter terrorist attacks (Edwards, 2013). It is proposed that the screening force will be part of the intelligence collection fraternity and will be directly involved in providing concentric circles of security to, among other things, (1) help separate sensitive areas from the airside or other areas, (2) provide defense in depth by instituting another gateway that needs to be altered from a less-secure environment to a higher-secure environment, (3) assist in the integration of security systems for effective airport screening, and (4) enhance the level of penetration difficulty (Markarian et al., 2011). This workforce is also expected to focus on the ‘human factor’ of security provisions and exercise comprehensive due diligence, common sense, and consistency to be useful in the provision of optimal passenger safety using a methodology that does not violate passenger safety (Canody, 2015; McLay et al., 2010). Overall, such screening interventions are bound to increase aviation safety and decrease privacy and confidentiality violations. Lastly, both federal and private screeners will be exposed to emerging safety technologies and information technology (IT) solutions to ensure the optimal uptake of technology-focused interventions in airport screening. Use of state-of-the-art security technologies will be useful in decentralizing operations, re-orienting security policies along risk-based lines, as well as devolving screening functions to each individual airport for efficiency and effectiveness (Poole, 2006). The workforce handling emerging technology devices must be trained to improve airport security by targeting more of these sophisticated devices towar ds passengers who pose comparatively more significant risk of harm and developing technology-focused screening methodologies that are able to rely on various datasets to quantify the threat potential of a passenger as opposed to undertaking full screening. Such a technology-focused platform for airport screening, in my view, will substantially reduce passenger inconveniences, address privacy concerns and cut operating costs. Furthermore, the emerging technology and IT infrastructure can be used in aviation environments to integrate security systems for optimal productivity and efficiency. Conclusion This report has not only measured the impact of federalization of airport screening in terms of passenger inconvenience, privacy concerns and cost implications but also advocated for a more responsive, intelligence-based and technology-focused airport screening intervention to remedy the situation. The proposed plan will utilize a mix of federal and private airport screeners as the two g roups have their unique skills and competencies. Overall, it is felt that the proposed plan will be useful in addressing the deficits and contributing towards an effective and efficient airport screening system. Comprehensive training of the workforce is critical in making the proposed plan a reality. References Blalock, G., Kadiyali, V., Simon, D. H. (2007). The impact of post-9/11 airport security measures on the demand for air travel. Web. Canody, H. (2015). Smarter Security. Air Transport World, 52(7), 20-22. Edwards, C. (2013). Privatizing the transport security administration. Web. Fritteli, J. (2005). Transportation security: Issues for the 109th congress. Web. Hessick, F. A. (2002). The federalization of airport security: Privacy implications. Whittier Law Review, 24(2), 43-69. Lord, S. M. (2012). Screening partnership program: TSA should issue more guidance to airports and monitor private versus federal screener performance. Web. Markarian, G., Kolle, R., Tarter, A. (2011 ). Aviation security engineering: A holistic approach. London, UK: Artech House. McLay, L. A., Lee, A. J., Jacobson, S. H. (2010). Risk-based policies for airport security checkpoint screening. Transportation Science, 44(3), 339-349. Poole, R. W. (2006). Airport security: Time for a new model. Web. Poole, R. W., and Carofano, J. J. (2006). Time to rethink airport security. Web. Selzer, M. (2003). Federalization of airport security workers: A study of practical impact of the aviation and transportation security act from a labor law perspective. Journal of Labor and Employment Law, 5(2), 363-381. This essay on Airport Screening was written and submitted by user Emilia Z. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Saturday, March 7, 2020

Biography of Francisco Madero, Led Mexican Revolution

Biography of Francisco Madero, Led Mexican Revolution Francisco I. Madero (October 30, 1873–February 22, 1913) was a reformist politician and writer and president of Mexico from 1911 to 1913. This unlikely revolutionary helped engineer the overthrow of dictator Porfirio Dà ­az by kick-starting the Mexican Revolution. Unfortunately for Madero, he was caught between remnants of Dà ­azs regime and the revolutionaries he unleashed and was deposed and executed in 1913. Fast Facts: Francisco Madero Known For: Father of the Mexican RevolutionBorn: Oct. 30, 1873 in Parras, MexicoParents: Francisco Ignacio Madero Hernndez, Mercedes Gonzlez Trevià ±oDied: Died Feb. 22, 1913 in Mexico City, MexicoSpouse: Sara Pà ©rez Early Life Francisco I. Madero was born on Oct. 30, 1873, in Parras, Coahuila, Mexico, to wealthy parents- by some accounts, the fifth-richest family in Mexico. His father was Francisco Ignacio Madero Hernndez; his mother was Mercedes Gonzlez Trevià ±o. His grandfather, Evaristo Madero, made lucrative investments and was involved in ranching, wine-making, silver, textiles, and cotton. Francisco was well educated, studying in the United States, Austria, and France. When he returned from the U.S., he was placed in charge of some family interests, including the San Pedro de las Colonias hacienda and farm, which he operated at a profit, introducing modern farming methods and improving worker conditions. In January 1903, he married Sara Pà ©rez; they had no children. Early Political Career When Bernardo Reyes, governor of Nuevo Leà ³n, brutally broke up a political demonstration in 1903, Madero became politically involved. Although his early campaigns for office failed, he funded a newspaper that he used to promote his ideas. Madero had to overcome his image to succeed as a politician in macho Mexico. He was small with a high-pitched voice, making it difficult to command respect from soldiers and revolutionaries who saw him as effeminate. He was a vegetarian and teetotaler, considered peculiar in Mexico, and an avowed spiritualist. He claimed to have contact with his dead brother Raà ºl and liberal reformer Benito Juarez, who told him to maintain pressure on Dà ­az. Dà ­az Porfirio Dà ­az was an iron-fisted dictator in power since 1876. Dà ­az had modernized the country, laying miles of train tracks and encouraging industry and foreign investment, but at a cost. The poor lived in abject misery. Miners worked without safety measures or insurance, peasants were kicked off their land, and debt peonage meant that thousands were essentially slaves. He was the darling of international investors, who commended him for â€Å"civilizing† an unruly nation. Dà ­az kept tabs on those who opposed him. The regime controlled the press, and rogue journalists could be jailed without trial for libel or sedition. Dà ­az played politicians and military men against one another, leaving few threats to his rule. He appointed all state governors, who shared the spoils of his crooked but lucrative system. Elections were rigged and only the foolish tried to buck the system. Dà ­az had fought off many challenges, but by 1910 cracks were showing. He was in his late 70s, and the wealthy class he represented worried about his successor. Years of repression meant the rural poor and urban working class loathed Dà ­az and were primed for revolution. A revolt by Cananea copper miners in 1906 in Sonora had to be brutally suppressed, showing Mexico and the world that Diaz was vulnerable. 1910 Elections Dà ­az had promised free elections in 1910. Taking him at his word, Madero organized the Anti-Re-Electionist Party to challenge Diaz and published a bestselling book titled  The Presidential Succession of 1910. Part of Maderos platform was that when Dà ­az came to power in 1876, he claimed he wouldnt seek re-election. Madero insisted that no good came from one man holding absolute power and listed Dà ­azs shortcomings, including the massacre of Maya Indians in the Yucatan, the crooked system of governors, and the Cananea mine incident. Mexicans flocked to see Madero and hear his speeches. He began publishing a newspaper,  El Anti-Re-Electionista, and secured his partys nomination. When it became clear that Madero would win, Dà ­az had most of the Anti-Re-Electionist leaders jailed, including Madero, arrested on a false charge of plotting armed insurrection. Because Madero came from a wealthy, well-connected family, Dà ­az could not simply kill him, as he had two generals who had threatened to run against him in 1910. The election was a sham and Dà ­az â€Å"won.†Ã‚  Madero, bailed out of jail by his wealthy father, crossed the border and set up shop in San Antonio, Texas. He declared the election null and void in his â€Å"Plan of San Luà ­s Potosà ­Ã¢â‚¬  and called for armed revolution. November 20 was set for the revolution to begin. Revolution With Madero in revolt, Dà ­az rounded up and killed many of his supporters. The call to revolution was heeded by many Mexicans. In the state of Morelos,  Emiliano Zapata  raised an army of peasants and harassed wealthy landowners. In the state of Chihuahua,  Pascual Orozco  and  Casulo  Herrera raised sizable armies. One of Herreras captains was ruthless revolutionary  Pancho Villa, who replaced the cautious Herrera and, with Orozco, captured cities in Chihuahua in the name of the revolution. In  February 1911, Madero returned from the U.S. Northern leaders including Villa and Orozco didnt trust him, so in March, his force swollen to 600, Madero led an attack on the federal garrison at Casas Grandes, which was a fiasco. Outgunned, Madero and his men retreated, and Madero was injured. Although it ended badly, Maderos bravery gained him respect among the northern rebels. Orozco, at that time leader of the most powerful rebel army, acknowledged Madero as leader of the revolution. Not long after the battle, Madero met  Villa  and they hit it off despite their differences. Villa knew he was a good bandit and rebel chief, but he was no visionary or politician. Madero  was a man of words, not action, and he considered Villa a Robin Hood,  just the man to oust Dà ­az. Madero allowed his men to join Villas force: His days of soldiering were done. Villa and Orozco pushed toward  Mexico City, scoring victories over federal forces along the way. In the south, Zapatas peasant army was capturing towns in his native state of Morelos, beating superior federal forces with a combination of determination and numbers. In May 1911, Zapata scored a huge, bloody victory over federal forces in the town of Cuautla. Dà ­az could see that his rule was crumbling. Dà ­az Quits Dà ­az negotiated a surrender with Madero, who generously allowed the former dictator to leave the country that month. Madero was greeted as a hero when he rode into Mexico City on June 7, 1911. Once he arrived, however, he made a series of mistakes. As interim president, he accepted Francisco Leà ³n de la Barra, a former Dà ­az crony who coalesced the anti-Madero movement. He also demobilized Orozcos and Villas armies. Maderos Presidency Madero became president in November 1911. Never a true revolutionary, Madero simply felt that Mexico was ready for democracy and Dà ­az should step down. He never intended to carry out radical changes, such as land reform. He spent much of his time as president trying to reassure the privileged class that he wouldnt dismantle the power structure left by Dà ­az. Meanwhile, Zapata, realizing that Madero would never approve real land reform, took up arms again. Leà ³n de la Barra, still interim president and working against Madero, sent  Gen. Victoriano Huerta, a brutal remnant of Dà ­azs regime, to Morelos to contain Zapata. Called back to Mexico City, Huerta began conspiring against Madero. When he became president, Maderos only remaining friend was Villa, whose army was demobilized. Orozco, who hadnt gotten the huge rewards he had expected from Madero, took to the field, and many of his former soldiers joined him. Downfall and Execution The politically naive Madero didnt realize he was surrounded by danger. Huerta was conspiring with American ambassador Henry Lane Wilson to remove Madero, as Fà ©lix Dà ­az, Porfirios nephew, took up arms along with Bernardo Reyes. Although Villa rejoined the fight in favor of Madero, he ended up in a stalemate with Orozco. Madero refused to believe his generals would turn on him. The forces of Fà ©lix Dà ­az entered Mexico City, and a 10-day standoff known as la  decena  trgica (â€Å"the tragic fortnight†) ensued. Accepting Huertas â€Å"protection,† Madero fell into his trap: He was arrested by Huerta on Feb. 18,  1913,  and executed four days later, though Huerta said he was killed when his supporters tried to free him. With Madero gone, Huerta turned on his fellow conspirators and made himself president. Legacy Although he wasnt a radical,  Francisco Madero  was the spark that set off the  Mexican Revolution. He was clever, rich, well-connected, and charismatic enough to get the ball rolling against a weakened Porfirio Dà ­az, but couldnt hold onto power once he attained it. The Mexican Revolution was fought by brutal, ruthless men, and the idealistic  Madero  was out of his depth. Still, his name became a rallying cry, especially for Villa and his men. Villa was disappointed that Madero had failed and spent the rest of the revolution looking for another politician to entrust with the future of his country. Maderos brothers were among Villas staunchest supporters. Later politicians tried and failed to unite the nation until 1920, when Alvaro Obregà ³n seized power, the first to succeed at imposing his will on the unruly factions. Decades later, Madero is seen as a hero by Mexicans, the father of the revolution that did much to level the playing field between rich and poor. He is seen as weak but idealistic, an honest, decent man destroyed by the demons he helped to unleash. He was executed before the bloodiest years of the revolution, so his image is unsullied by later events. Sources McLynn, Frank.  Villa and Zapata: A History of the Mexican Revolution.  Basic Books, 2000.Francisco Madero: President of Mexico. Encyclopedia Brittanica.Francisco Madero. Biography.com.

Wednesday, February 19, 2020

Strategic Perspectives, TESLA Company Case Study

Strategic Perspectives, TESLA Company - Case Study Example In particular, this paper looks at PESTEL analysis and Porter’s 5 Forces Model as they relate to Tesla Motors. The report also assesses the value chain and resource base view of Tesla Motors with the intension of determining the key competencies and capabilities of the company. Finally, the paper explores the business level strategy and PR crises of Tesla Motors within the short span that it has been in existence. Tesla Motors have been in operation since Nikola Tesla, alongside JB Straubel and Elon Musk, founded it. Since its inception, the automobile company has been growing in terms of revenue and scale of operation largely because of its innovative strategies and growth of the industry. For example, Elon Musk, who is the current CEO of Tesla Motors, announced the first profitable Quarter for the company in March 2013. With Tesla Roadster as the company’s first production, cars, Tesla Motors has advanced over the years to design and manufacture Model S and cars with electric powertrains. Owing to the dynamic nature of the automobile industry and the Public Relations Crises that many companies within the automobile industry, Tesla included, undergo, it is important to carry out a thorough analysis in order to establish the financial and strategic position of Tesla Motors. Some of the major analyses that are crucial in Tesla motors case include strategic analysis, PR crises analysis, and the analysis of both internal & external environment of the company (Carlson 2013,  p. 206).

Tuesday, February 4, 2020

Arabs and isreal Essay Example | Topics and Well Written Essays - 500 words

Arabs and isreal - Essay Example (Citron,25) This conflict has a religious background also as Israelis believe that this land was promised to them by God and have divine right to live and rule in this land. They consider this as their divine right because it was promised to them in Hebrew Bible. Muslims also consider this region as sacred because not only Muhammad stayed at Jerusalem on his night’s journey but they also believe that this land belongs to all children of Abraham and not to the children of his eldest Son Isaac only. Similarly, Christians also have religious reverence for the place and tend to accept the right of Jews to live and rule this land. Christians also view the return of Jews to this land as one of the important signs of Second Coming of Jesus Christ. All three major religions of the world therefore view this region as their own because this region is the center from where Judaism, Christianity and Islam emerged. There have been four large scale wars between Arabs and Israel on this issue including 1948 War of Independence, 1956 Sinai War, 1967 Six Day war and 1973 Yom Kippur War. All the wars resulted into damage to both the sides however, further complicated the overall relationships between various Arab States and Israel. As a result of 1948 war, Israel was also able to capture areas beyond its mandated boundaries and further demarcation in the land took place with Gaza Strip being controlled by Egypt and West Bank by Jordan. Many Arab States including Egypt and Jordan signed peace treaties with Israel. Peace treaty between Egypt and Israel was signed in 1979 whereas Jordan entered into a similar agreement in 1994 to end the conflict and hostilities while at the same time agreeing to resolve other issues. Israel’s relationships with other countries including Iraq and Iran however, remained volatile as Iraq attacked Israel during Gulf War in 1990s. Iran is also believed to be supporting Hezbollah and Hammas, the groups directly engaged with Israel in

Monday, January 27, 2020

WikiLeaks: Ethics vs Execution

WikiLeaks: Ethics vs Execution WikiLeaks is a website which was founded in 2006 by the Australian Programmer Julian Assange, and its purpose ever since, has been to leak and expose illegal or immoral government actions around the world. WikiLeaks, however, is not a simple hacking group and through careful planning of the release of government documents, it has promoted slander on those who the members of WikiLeaks may not like, therefore unethically promoting a political agenda. However, not everything WikiLeaks has released is of bad taste; some of the documents, in fact, have shown the disgraceful actions which the governments of various countries have committed and tried to hide. This does not excuse the damage to political figures which are named in the released documents. Even though WikiLeaks exposes immoral government actions, this organization must be censored because it unethically promotes slander and harms political figures. WikiLeaks has shown that it wants to foist an anti-establishment opinion upon its readers by slandering and promoting slander against the government. The release of the Iraq War Logs in 2010 by WikiLeaks was very quickly condemned by the United States and United Kingdom who suggested the disclosures put lives at risk. (Karhula). The documents of the leak showed its readers that the government was hiding something from its people and while they were, it should not have been a serious scandal in war times. It should be known that wars have casualties and the files state that civilians in Afghanistan were killed but WikiLeaks promoted the concept that this was a serious issue which would encourage strong distrust and dislike of the government. The release of every secret document in the War in Afghanistan is not necessarily for the peoples benefit as it is a mistake to assume that revealing the entirety of what has been secret will liberate us (Ã…Â ½iÃ…Â ¾ek). While knowing how ones government operates can benefit participation in politics, it is detrimental to the people to know what horrible actions had to be made during a war. The information released by WikiLeaks is also not extraordinary, but rather confirmation of what many perceive the government as. The scandal around WikiLeaks released documents is false because much of the information revealed by WikiLeaks is not extraordinary or revolutionary (Eco 219). Torture and death, ubiquitous in the Iraq War logs and Afghan War Diary, is a subject which many people refuse to discuss even though it is used by the United States in a time of war. While many speak out against torture, it is still used on Americans and by Americans in Foreign countries during a war. The revelations of the WikiLeaks documents are nothing more than a confirmation and detailed explanation of how exactly the United States government and army acts during war. With the lack of truth to the WikiLeaks scandal, the [distribution] to major newspapers (Ludlow) makes it even worse as WikiLeaks promoted its philosophy through mainstream media. By doing this, WikiLeaks was essentially forcing anti-establishmentarianism upon its readers, and forcing a reaction from the government. The two possible reactions from the government would be an increase or decrease in security, which would slowdown efficiency or force the government to stop taking risks, both detrimental to the operation of the United States. Through WikiLeaks methods of releasing information and promoting an anti-establishment belief, it encourages that the United States people slander the governments name, in the hope that the government changes its policies of security. Even though some of the actions performed by WikiLeaks are unethical and detrimental to society, the ideology of freedom of information, is a reasonable and good-natured one. In March 2007, WikiLeaks released the Guantanamo prison camp standard operating manual for the United States military which revealed that some prisoners were placed outside of Red Cross allowed areas, even though the government denied this previously (Karhula). The release of the Guantanamo manual had beneficial implications as it encouraged a better understanding of war and foreign policy from United States citizens. The lie by the government shown by the Guantanamo manual gave insight into how the United States military operated. The release of the Guantanamo manual showed the United States public that there were lies in the government. Even though the Iraq War Logs and Afghan War Diary promoted unreasonable distrust, they both informed the public of the horror of war. The philosophy behind WikiLeaks releases follows hacktivist culture, which in philosophy, is beneficial as the political compass of these hacktivist groups has never pointed true right or true left (Ludlow). WikiLeaks promotion of freedom of information is not meant to sway someone one way or another, it is simply meant to inform and make the reader aware of the world and their government. Even though information may change ones political opinion, WikiLeaks is not trying to force one specific ideology. The leaks are meant to show that the government should not always be trusted, even though they encourage a complete disconnect from, or reconfiguration of the government. It is true that the government should not always be trusted, and the voting public of the United States should understand this. While WikiLeaks execution of releasing information is flawed, the major implication of WikiLeaks is that no government in the world will be able to maintain areas of secrecy if it continues to entrust its secret communications and its archives to the Internet or other forms of electronic memory (Eco 219) which may be beneficial. WikiLeaks is something of a warning to the governments of the world, saying that they cannot entrust secret information to the internet anymore. This fear of being hacked which WikiLeaks has instilled in governments should make them more secure and stronger. Who is to say a terrorist organization cannot hack the United States government like WikiLeaks has? While some may consider WikiLeaks a terrorist group, it is simply doing what a potential terrorist could do in the future without action. WikiLeaks release of information also encourages people to bring about a different functioning of power that might reach beyond the limits of representative democracy (Ã …Â ½iÃ…Â ¾ek) which can be beneficial to United States citizens. The representative democracy of the United States is currently limited in its true ability to represent people, somewhat due to the secrets which representatives could hold. The information released by WikiLeaks works to encourage a better society where people know and like their representatives in the government. While it is true that uprooting the current form of democracy is not going to happen any time soon, WikiLeaks is placing in the minds of its readers that the government is flawed and should be improved. This is not what most readers have gained from WikiLeaks, however, and it has not been successful. Even though WikiLeaks has a generally good philosophy and mission, the execution and results so far have proven to hurt individuals more than help the United States public. This can be seen in the initial reaction to the releasing of 251,000 State Department Cables which may have changed the world (Greenberg 3). Department Cables or telegrams are confidential text messages exchanged between members of foreign embassies and their parent country. The release of the State Department Cables and public reaction made it clear to the Obama administration that people were not in his favor. When Obama said that he would pull troops from Iraq, many believed this to be a reaction to the Iraq War Logs, and while it was good that soldiers would be returning, this may have been against Obamas free will as president. Because of the extreme backlash from the public on the Iraq war logs, the Obama administration was quick to distance itself from WikiLeaks (Thompson-Jones 287). As soon as the leaks ca me out and showed Obama in a bad light, citizens were fast to change opinions of him and this hurt his ability to function as president. While WikiLeaks did not directly attack Obama, the leaks of the United States government hurt him and caused diplomatic issues. Another more prominent instance of WikiLeaks harming a political figure is the Hillary Clinton email scandal. In March 2015, 55,000 pages of supposedly delated emails on a personal account were leaked by WikiLeaks (Thompson-Jones 284) While Clintons leaked emails were not of illegal nature, they distracted the public from her presidential campaign (Thompson-Jones 290) and hurt her image as she was running for president. The leaked emails displayed Clintons poor decisions in foreign policy and must have swayed the opinions of some who were going to vote for her. While WikiLeaks may have not had a direct agenda against Clinton, the leak provided people information against her and reason not to vote. The reason WikiLeaks had such an impact with little repercussions is because the it is almost completely anonymous. One of the most dangerous implications of anonymity is that of assassination politics: assassinating a political figure to achieve a political agenda (Greenberg 117). While Wi kiLeaks does not specifically promote assassination politics, the leaks can be used by anyone how is willing to go to that level. WikiLeaks has not been a direct cause of harm to politicians but it encourages direct harm with the methods it uses to leak information through the press and news stories. WikiLeaks seems to be a good idea, and on the surface, it is, but the implications and reactions to WikiLeaks are detrimental to the United States society and livelihood of some. Even though WikiLeaks should be censored, it most likely never will be, at least not completely. There are still thousands of hackers and whistle-blowers who will continue WikiLeaks if its founder is imprisoned. Word Count: 1616 Works Cited Eco, Umberto. Thoughts on WikiLeaks. Inventing the Enemy, Houghton Mifflin Harcourt, Boston, NY, 2012, pp. 217-222. Greenberg, Andy. Prologue. This Machine Kills Secrets: How WikiLeakers, Cypherpunks and Hacktivists Aim to Free the Worlds Information, Dutton, New York, NY, 2012, pp. 1-8. Karhula, PÃ ¤ivikki. What Is the Effect of WikiLeaks for Freedom of Information? FAIFE Spotlight, IFLA, 5 Oct. 2012, www.ifla.org/publications/what-is-the-effect-of-wikileaks-for-freedom-of-information. Ludlow, Peter. WikiLeaks and Hacktivist Culture. The Nation, Katrina Vanden Heuvel, 29 June 2015, www.thenation.com/article/wikileaks-and-hacktivist-culture/. Thompson-Jones, Mary. 251,287 Leaked Cables. To The Secretary: Leaked Embassy Cables and Americas Foreign Policy Disconnect, W.W. Norton and Company, New York, NY, 2016, pp. 24-34. Ã…Â ½iÃ…Â ¾ek, Slavoj. Good Manners in the Age of WikiLeaks. London Review of Books, Nicholas Spice, 20 Jan. 2011, www.lrb.co.uk/v33/n02/slavoj-zizek/good-manners-in-the-age-of-wikileaks.

Sunday, January 19, 2020

The Role of Fate in Oedipus the King – Essay Sample

Oedipus the King was written by Sophocles and was is titled Oedipus Rex in Latin. It is one of the most well-known Greek tragedies. As is the case with Greek tragedies—or roughly most tragedies that make their way to stage—fate plays a key role in the events in Oedipus the King. The play is also the origin of the term â€Å"Oedipus complex. † Fate as Antagonist The primary antagonist in this tale is fate. Most tragedies where fate is the driving theme the characters in its web all attempt to escape it.Unfortunately fate can’t be avoided and if it is tempted fate will usually render a far worse conclusion for attempting to deprive it of its will. Laius’ Fate Apollo tells Laius that he and Jocasta would have a son that would kill him. When Oedipus is born, Jocasta sends Oedipus to his own fate and leaves him on a mountainside to die. Jocasta attempts to cheat fate by doing away with her son to save her husband, but Oedipus is found by a shepherd who s aw the whole thing and raised by King Polybus.Laius’ fate comes when he kidnaps the son of King Pelops and basically showed little respect for Pelops’ hospitality by doing so. The Fate of Thebes Oedipus sends Creon to the temple of Apollo to figure out what will become of Thebes and how to do away with the plague. Fate is tempted here by the Oedipus attempting to end the plague when it is not his place to do so. Apollo tells Oedipus that he will end up killing his father and taking his mother. Oedipus believes he will end up killing King Polybus. Oedipus’ Fate Teiresias—Apollo’s blind prophet—tells Creon of Oedipus’ fate.Oedipus is busy trying to find the murderer of Laius. Teiresias cryptically tells Oedipus the nature of his marriage, but Oedipus doesn’t interpret the meaning in Teiresias’ words. He tells Oedipus that the shame of his relationship will bring about ruin and that the insults Oedipus gives to him will be returned as a result of his deed. Oedipus sets himself up for downfall further when he forsakes Teiresias’ word and says he has no special ability.As prophets are basically the mouth of the gods and do their direct  will, Oedipus is in a way committing blasphemy. The provocation leads Teiresias to—again cryptically—tell Oedipus that he is actually on level footing with his children and that the truth with crush him. When Oedipus relays the events to his wife, she tells him to ignore the prophecy and that Apollo’s prophecy didn’t hold up as she believed that her husband was killed by a bandit. Strands of Fate Tied Up Oedipus finds out that Polybus doesn’t die at his hands, but of natural causes so it seems the prophecy didn’t come true.However, Laius is killed by Oedipus when the two argued over who had the right of way on a road. Neither man recognized the other. Oedipus marries Jocasta, widow of Laius making his both wife and son t o her and father and brother to his children. Oedipus finds out about the true nature from a shepherd, finds his wife Jocasta who had hung herself, took her jewelry and smashed them into his eyes. Oedipus ends up blind and destitute and his children cursed by being the product of incest.

Saturday, January 11, 2020

Amazon Ebusiness Essay

Amazon was founded in 1994, spurred by what Bezos called â€Å"regret minimization framework†, his effort to fend off regret for not staking a claim in the Internet gold rush. Company lore says Bezos wrote the business plan while he and his wife drove from New York to Seattle , although that account appears to be apocryphal. The company began as an online bookstore; while the largest brick-and-mortar bookstores and mail-order catalogs for books might offer 200,000 titles, an online bookstore could offer more. Bezos named the company â€Å"Amazon† after the world’s largest river. Since 2000, Amazon’s logotype is an arrow leading from A to Z, representing customer satisfaction (as it forms a smile); a goal was to have every product in the alphabet. In 1994, the company incorporated in the state of Washington, beginning service in July 1995, and was reincorporated in 1996 inDelaware. The first book Amazon.com sold was Douglas Hofstadter’s Fluid Concepts and Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought. Amazon.com issued its initial public offering of stock on May 15, 1997, trading under theNASDAQ stock exchange symbol AMZN, at an IPO price of US$18.00 per share ($1.50 after three stock splits in the late 1990s). Amazon’s initial business plan was unusual: the company did not expect a profit for four to five years. Its â€Å"slow† growth provoked stockholder complaints that the company was not reaching profitability fast enough. When the dot-com bubble burst, and many e-companies went out of business, Amazon persevered, and finally turned its first profit in the fourth quarter of 2001: $5 million or 1 ¢ per share, on revenues of more than $1 billion, but the modest profit was important in demonstrating the business model could be profitable. In 1999, Time magazine named Bezos Person of the Year,  recognizing the company’s success in popularizing online shopping. Amazon.com products and services: Amazon product lines include books, music CDs, videotapes and DVDs, software, consumer electronics, kitchen items, tools, lawn and garden items, toys & games, baby products, apparel, sporting goods, gourmet food, jewelry, watches, health and personal-care items, beauty products, musical instruments, clothing, industrial & scientific supplies, and groceries. The company launched Amazon.com Auctions, a Web auctions service, in March 1999. However, it failed to chip away at industry pioneer eBay’s large market share. Amazon.com Auctions was followed by the launch of a fixed-price marketplace business, zShops, in September 1999, and the now defunct Sotheby’s/Amazon partnership called sothebys.amazon.com in November. Auctions and zShops evolved into Amazon Marketplace, a service launched in 2001 that let customers sell used books, CDs, DVDs, and other products alongside new items. Today, Amazon Marketplace’s main rival is eBay’s Half.com service. In August 2005 , Amazon began selling products under its own private label, â€Å"Pinzon†; the trademark applications indicated that the label would be used for textiles, kitchen utensils, and other household goods.In March 2007, the company applied to expand the trademark to cover a more diverse list of goods, and to register a new design consisting of the â€Å"word PINZON in stylized letters with a notched letter O whose space appears at the â€Å"one o’clock† position.†. Coverage by the trademark grew to include items such as paints, carpets, wallpaper, hair accessories, clothing, footwear, headgear, cleaning products, and jewelry.On September 2008, Amazon filed to have the name registered. USPTO has finished its review of the application, but Amazon has yet to receive an official registration for the name. Amazon MP3, its own online music store, launched in the US in September 25, 2007, selling downloads exclusively in MP3 format without digital rights management.[This was the first online offering of DRM-free music from all four major record companies. In August 2007, Amazon announced AmazonFresh, a grocery service offering perishable and nonperishable foods. Customers can have orders delivered to their homes at dawn or during a specified daytime window. Delivery was initially restricted to residents of Mercer Island, Washington, and was later expanded to several  ZIP codes in Seattle proper. AmazonFresh also operated pick-up locations in the suburbs of Bellevue and Kirkland from summer 2007 through early 2008. In 2008 Amazon expanded into film production, producing the film The Stolen Child with 20th Century Fox. Amazon.com has incorporated a number of products and services through development and acquisitions. The Honor System was launched in 2001 to allow customers to make donations or buy digital content, with Amazon collecting a percentage of the payment plus a fee. The service was discontinued in 2008. and replaced by Amazon Payments. Amazon launched Amazon Web Services(AWS) in 2002, which provides programmatic access to latent features on its website. Amazon also created â€Å"channels† to benefit certain causes. In 2004, Amazon’s â€Å"Presidential Candidates† allowed customers to donate $5–200 t o the campaigns of 2004 U.S. presidential hopefuls. Amazon has periodically reactivated a Red Cross donation channel after crises such as the 9/11, Hurricane Katrina, and the 2004 earthquake and tsunami in the Indian Ocean. By January 2005, nearly 200,000 people had donated over $15.7 million in the US. Amazon Prime offers two day shipping with no minimum purchase amount for a flat annual fee, as well as discounted priority shipping rates. Amazon launched the program in the continental United States in 2005, in Japan, the United Kingdom and Germany in 2007, and in France (as â€Å"Amazon Premium†) in 2008. Launched in 2005, Amazon Shorts offers exclusive short stories and non-fiction pieces from best-selling authors for immediate download. By June 2007, the program had over 1,700 pieces and was adding about 50 new pieces per week. In November 2005, Amazon.com began testing Amazon Mechanical Turk, an application programming interface (API) allowing programs to dispatch tasks to human processors. In March 2006, Amazon launched an online storage service called Amazon Simple Storage Service (Amazon S3). An unlimited number of data objects, from 1 byte to 5 gigabytes in size, can be stored in S3 and distributed via HTTP or BitTorrent. The service charges monthly fees for data stored and transferred. In 2006, Amazon introducedAmazon Simple Queue Service (Amazon SQS), a distributed queue messaging service, and product wikis (later folded into Amapedia) and discussion forums for certain products using guidelines that follow standard message board conventions. Also in 2006, Amazon introduced Amazon Elastic Compute Cloud (Amazon EC2), a virtual site farm, allowing users to use the Amazon infrastructure to run applications ranging  from running simulations to web hosting. In 2008, Amazon improved the service adding Elastic Block Store (EBS), offering persistent storage for Amazon EC2 instances and Elastic IP addresses, static IP addresses designed for dynamic cloud computing. In 2007 Amazon launched Amapedia, a wiki for user-generated content to replace ProductWiki, the video on demand s ervice Amazon Unbox, and Amazon MP3, which sells downloadable MP3’s. Amazon’s terms of use agreements restrict use of the MP3’s, but Amazon does not use DRM to enforce those terms. Amazon MP3 sells music from the Big 4 record labels EMI, Universal, Warner Bros. Records, and Sony BMG, as well as independents. Previous to the launch of this service, Amazon made an investment in Amie Street, a music store with a variable pricing model based on demand. Also in 2007 Amazon launched Amazon Vine, which allows reviewers free access to pre-release products from vendors in return for posting a review, as well as payment service specifically targeted at developers, Amazon FPS. In November 2007, Amazon launched Amazon Kindle, an e-book reader which downloads content over â€Å"Whispernet†, via the Sprint Nextel EV-DO wireless network. The screen uses E Ink technology to reduce battery consumption. In 2008 Amazon stated that its Kindle-based library included 200,000 titles. In December 2007, Amazon introduced SimpleDB, a database system, allowing users of its other infrastructure to utilize a high reliability high performance database system. In August 2007, Amazon launched an invitation-only beta-test for online grocery delivery. It has since rolled out in several Seattle, Washington suburbs. In January 2008 Amazon began rolling out their MP3 service to subsidiary websites worldwide. In December, 2008, Amazon MP3 was made available in the UK. In September, IMDB and Amazon.com launched a Music metadata browsing site with wiki-like user contribution. In November, Amazon partnered with Fisher-Price, Mattel, Microsoft and Transcend to offer products with minimal packaging to reduce environmental impact and frustration with opening â€Å"clamshell† type packaging. Amazon Web Services launched a public beta of Amazon Elastic Compute Cloud running Microsoft Windows Server and Microsoft SQL Server. Amazon Connectenables authors to post remarks on their book pages to customers. WebStore allows businesses to create custom e-commerce websites using Amazon technology. Sellers pay a commission of 7 percent, including credit-card processing fees and fraud protection, and a subscription fee of  $59.95/month for an unlimited number of webstores and listings. Why Amazon.com is successful as a business on internet and has excellent capabilities supported by information system and e-commerce? Amazon’s initial business plan was unusual: the company did not expect a profit for four to five years. Its â€Å"slow† growth provoked stockholder complaints that the company was not reaching profitability fast enough. When the dot-com bubble burst and many e-companies went out of business, Amazon persevered, and finally turned its first profit in the fourth quarter of 2001: $5 million or 1 ¢ per share, on revenues of more than $1 billion, but the modest profit was important in demonstrating the business model could be profitable. In 1999, Time magazine named Bezos Person of the Year, recognizing the company’s success in popularizing online shopping. Amazon changed the way it does business through the years. First it was an online book seller. Next it expanded into selling music and videos. Then it offered toys, consumer electronics and software to its customers. These were linked with a host of new products until this very day. Amazon has a constantly evolving product line. Its competitors have a hard time catching up with the innovator. During its initial years of operation, Amazon was not making any real profit. It practiced instead the habit of reinvesting its income into new markets. This it did to make possible for its customers to make wider choices for the company’s offerings. Inventory management is an important function for any business and its efficient implementation can play a major role in reducing costs within a company. Policies, procedures, and techniques employed in maintaining the optimum number or amount of each inventory item. The objective of inventory management is to provide uninterrupted production, sales, and/or customer-service levels at the minimum cost, Levi D. S. et al (2003). Levi explains that a high-quality inventory management system provides a smooth and efficient supply chain by reducing costs and time. Initially when a company is established, key individuals may pe rform such tasks as purchasing, manufacturing or inventory control with little problem in terms of overlapping functions. But as a company expands it may be necessary to concentrate on core functions in the aim to have specialized personnel in every department. Each function has an important part to play in the supply chain. The correct management of  inventory enables a company to reduce liabilities and cost of overstocking, to streamline operations and to have better utilized staff. Amazon.com, the world’s largest online retailer and one of the nation’s biggest book sellers, is one of the iconic companies of the Internet era, Eells S. (2010), and by realizing the importance of inventory management can only improve its supply chain. From the text we can see that when CEO Jeffrey P. Bezos went about setting up Amazon.com, he had a clear aim to offer customers a wide selection of books but at the same time did not want to spend time and money on opening stores and warehouses and in dealing with the inventory. Bezos was hesitant in deciding to maintain Amazons own warehouse but realized that this was the only way for the company to keep customers satisfied. Internet shopping was rapidly expanding and with Amazon now stretching its ranges from not only books but to CDs, toys and hardware, they too were a growing industry. Amazon began setting up warehouses throughout the US, strategically placing them in states with little or no sales tax in order to reduce costs. These warehouses were very well maintained and completely computerized, with each item having a separate code which made inventory management a lot easier. Within the large warehouses, Amazon held all products which were available on the website. This was not always a good idea as it cost Amazon money in order to stock these goods. In the holiday season of 1999, Bezos was determined not to disappoint any customers; therefore he ordered larger amounts of every product. With this large amount of inventory, Bezos found it very diffic ult to manage, so aimed to rearrange the warehouses to accommodate the demand in different regions. They then decided to outsource some of its routines activities so that they could concentrate more on their core competencies. Deciding whether to outsource or not was a difficult decision for Amazon but seen in the Strategic outsourcing book by Greaver M. (1999), he explains that there quiet a number of reasons how outsourcing can be a major advantage. These points are broken into 6 headings; 1. Organizational reasons – Enhance effectiveness and focus on what you do best and also makes the company more flexible 2. Improvement driven reasons – Improve operating performance and also management and control 3. Finally driven reasons – Reduce investment assets and free up these resources for other areas of the business 4. Revenue driven reasons – Gain market access and  business opportunities along with accelerating expansion 5. Cost driven reasons – Reduce cost through superior provider performance and lower cost structure 6. Employee driven reasons – Increase commitment and energy in non core areas. Amazon decided to outsource its inventory management, and with this they decided not to stock every item offered on its site. It stocked only the most popular and frequently purchased items and as for the other items, they were requested from the distributor on ordering. The item would be sent to Amazon, unpacked and finally sent to the customer. Amazon entered into an agreement with Ingram Micro Inc. to use its knowledge and experience in the electronic goods and supply chain management in order to provide logistics and order-fulfillment services for desktops, laptops and other computer related accessories. From the case, Kevin Murai, President, Ingram Macro U.S. informs everyone the advantages in which they can offer to Amazons supply chain and satisfaction of customers, â€Å"The customer fulfillment services we are providing to Amazon.com’s computer store will minimize the number of touches to the product, while ensuring a seamless shopping experience for Amazons customers from start to finish†. A collaborative approach was obvious from this. A collaborative partnership has become an alternative approach to care, replacing traditional hierarchical approach as the desired approach to care. The features of collaborative partnerships are (1) Power sharing and sharing of expertise; (2) the pursuit of mutually agreed on, person centered goals and, (3) a dynamic process that requires the active participation and agreement of all partners in the relationship, Elsevier M. (2006). Both Amazon and Ingram Micro both shared the passion for customer satisfaction which was the main driving force to the success of their partnership. Amazon has identified its core competencies as: customer convenience and accessibility, massive selection, personalized service, quality of the site content, quality of its search tools and price, Mulqueen K. (2009). By entering into this partnership it gives Amazon more quality time to put into its core competencies. During the initial stages of Amazons warehousing, it aimed to have every item in stock in o rder to maximize customer satisfaction. By having this inventory, it would enable Amazon to meet the needs of the customers when they purchased the goods online. When the customer chooses the item, Amazon takes it from inventory and sent it to the respective  customer. We can see the logic in which Bezos takes as he is aiming to satisfy every customer in order to build a positive image and reputation of the company. Holding this much inventory on the other can be quite costly and also for a small business which Amazon was when taking on this method can be very difficult to manage. Amazons warehouses were a quarter mile long and 200 yards wide storing millions of books. Each warehouse cost Bezos around 50 million and not only this he started to realize that having all these large amounts of stock was unutilized cash which could be used to improve the business elsewhere. The below image (fig 1.1) gives you an idea of the scale of the warehouses and how an effective inventory management structure is vital. Learning from the difficult holiday season of 1999, Bezos outsourced some of their core competencies in order to pay more attention to othe r areas of the business. In our opinion this was a step in the right direction as when Amazons partners shipped the goods Amazon revamped the layout of their warehouses which makes the items easier to find and allowed customer orders to be sorted more efficiently. In early 2001, when Amazon partnered with Ingram Micro Inc., we feel that this was the correct decision for Amazon in the aim for efficient inventory management and it didn’t take long for changes to be made to the stocking of inventory. Amazon decided to stock only the most popular and most frequently purchased. If an item which wasn’t in stock, Amazon simply ordered in from the distributor and who then shipped it to Amazon where they would unpack it and send it to the customer. This may seem like a longer process but we feel this step which significantly reduce costs and better utilized Amazons finances. This is evident from the case as in December 00; their gross profit was 656.8 million where it was almost doubled in December 02 where the profit was 1,074.9 million. By doing this method, inevitably Amazon reduced holding costs. This method was proving to be a positive for Amazon as the improved inventory management helped Amazon record its first ever profit in 2001. From being initially in a deficit of $2.86 billion seven years earlier, Amazon recorded a net profit of $5 million in the fourth quarter of 2001. By Amazon outsourcing its inventory management, we could see the improvements almost immediately from their financial reports in the case. It is clear in our opinion, that Amazon made the right decision when outsourcing this function. It has reduced cost by keeping fewer inventories  and at the same time has partnered with a company with a great deal of expertise in the technology functions which can again be a major positive for the company. This shows again that outsourcing the inventory function was the correct decision for Amazon. The transfer of Amazons inventory management as shown in the case was a positive influence on the company and we feel that it was a successful task. The reason for this is simple; Amazon has tried and tested various inventory techniques from when it was first established. At first Amazons inventory was too great and was seen to be unutilized cash. Bezos realized that this unutilized cash could possible to used to benefit over departments within the company. The task of outsourcing this area made a profit for the company immediately, at the end of 2001, Amazon had a sales record of 1.1 billion which was a 15% increase on the same period of the previous year. Then again in 2002, we can see from the case that Amazon recorded sales of 3.93 billion which was a 26% increase on the year previous. These figures show that the task of outsourcing inventory for Amazon was an important function which has shown to get record sales for the company and along with the expertise given by Ingram Micro was overall a positive influence on the company. Overall, Amazons decision to outsource its inventory management and concentrate more on other funct ions within the business was the correct decision in our opinion. This is proven by the increase in profit since doing so. Amazon managed to outsource this function and still satisfy their customers which is one of their core values along with being innovative. According to businessweek.com, Amazon in 2010 had a net income of $231 million in comparison to $177million in 2009 which again is an indication that the company’s decisions have only had a positive impact as the company continues to grow. This is a positive for the company but in comparison to its main competitor, EBay had a net income of 397.65 million in 2010 which is also seen on businessweek.com. This shows that there is a lot of work done but still in order to compete with its competitors it must still strive to improve. Amazon prides itself on a strong brand, excellent customer service and a well designed, easy to use website. Its use of E-Business strategies enables the company to cut costs better than its competitors and empower its customers by offering them choice. It could be argued that Amazons’ most valuable asset is its CEO and Founder Jeff Bezos. Bezos innovative style has grown the company from  strength to strength and latest figures, according to the website www.siliconrepublic.com show an increase in profit of 36% to $12.95bn for 2010 from a sink to 3.7pc from 5pc at the end of 2009. In 2001, Amazons CEO, Jeff Bezos welcomed competitors rather than fighting them. This decision was initially seen as somewhat controversial. According to Vogelstein (2003) the decision caused such a stir in the book-publishing community that the Authors Guild formally stepped in. They wanted used books sold on a different page from newly published ones. Amazon was able to do this as a result of its efficient inventory management. Vogelstein (2003) states that Amazons warehouses are so efficient that they need to be replenished 20 times per year and they can now handle three times the volume they handled in 1999. The net result of this initiative is increased profits as can be seen from the case. The success of Amazon can be attributed to E-Business. Tedeschi (1999) state; Business on the Internet is cutting significant cost out of the supply chain, with better procurement and resource planning. With Amazon, these cost savings are passed onto the end customer. Through price comparison and transparency on its webpage, customers could make informed decisions based on price. This created massive popularity with its customers. E-Business also creates brand strength. According to Matthewson (2002) a recent survey demonstrated the importance of online brand building, as it showed that six out of ten internet users directly typed into their browser the address of the brand they are interested in buying. The website is said to attract 81 million unique visitors each month .Amazon has capitalized on this process known as cyber-branding. This essentially promotes the company through superior customer service. Its logistics in both inventory efficiency and technology gives it a superior edge over its competitors. Its operations are very efficient due to the strategic locations of its warehouses and headquarters, which have enabled Amazon to cut a lot of its costs. The market in which amazon.com operates and how it is organized by region and country: Amazon.com has always sold goods out of its own warehouses. It started as a bookseller, pure and simple, and over the last decade has branched out into  additional product areas and the third-party sales that now represent a good chunk of its revenue (some estimates put it at 25 percent). Both retailers and individual sellers utilize the Amazon.com platform to sell goods. Large retailers like Nordstrom, Land’s End and Target use Amazon.com to sell their products in addition to selling them through their own Web sites. The sales go through Amazon.com and end up at Nordstrom.com, Land’s End.com or Target.com for processing and order fulfillment. Amazon essentially leases space to these retailers, who use Amazon.com as a supplemental outlet for their online sales. Small sellers of used and new goods go to Amazon Marketplace, Amazon zShops or Amazon Auctions. At Marketplace, sellers offer goods at a fixed price, and at Auctions they sell their stuff to the highest bidder. Amazon zShops features only used goods at fixed prices. If an item listed on zShops, Marketplace or Auctions is also sold on the main Amazon.com, it appears in a box beside the Amazon.com item so buyers can see if someone else is selling the product for less in one of the other sales channels. The level of integration that occurs on Amazon is a programming feat that few (if any) online sales sites can match. Another sales channel called Amazon Advantage is a place where people can sell new books, music and movies directly from the Amazon warehouse instead of from their home or store. Sellers ship a number of units to Amazon, and Amazon handles the entire sales transaction from start to finish. In all of these programs, Amazon gets a cut of each sale (usually about 10 percent to 15 percent) and sometimes charges additional listing or subscription fees; in the case of Amazon Advantage, the company takes a 55 percent commission on each sale. The Advantage channel is something like a consignment setup, a sales avenue for people who create the ir own music CDs or have self-published a book and are simply looking for a way to get it out there. One of the latest additions to Amazon’s repertoire is a subsidiary company called Amazon Services. Through Amazon Services, Amazon sells its sales platform, providing complete Amazon e-commerce packages to companies looking to establish or revamp their e-commerce business. Amazon sets up complete Web sites and technology backbones for other e-commerce companies using Amazon software and technology. Target, for instance, in addition to having a store on Amazon.com, also uses Amazon Services to build and manage its own e-commerce site, Target.com. But selling goods isn’t the only way to make  money with Amazon.com. The Web site’s affiliate program is one of the most famous on the Web. Through Amazon’s Associate Program, anyone with a Web site can post a link to Amazon.com and earn some money. The link can display a single product chosen by the associate, or it can list several â€Å"best seller† products in a particular genre, in which case Amazon u pdates the list automatically at preset intervals. The associate gets a cut of any sale made directly through that link. The cut ranges from 4 percent to 7.5 percent depending on which fee structure the associate signs up for (see Amazon Associates for complete program details). The associate can also take advantage of Amazon Web Services, which is the program that lets people use Amazon’s utilities for their own purposes. The Amazon Web Services API (application programming interface) lets developers access the Amazon technology infrastructure to build their own applications for their own Web sites. All product sales generated by those Web sites have to go through Amazon.com, and the associate gets a small commission on each sale. References * about Ingram Micro. [Online] Available from: http://phx.corporate-ir.net/phoenix.zhtml?c=98566&p=irol-aboutIMOverview * Aryasri A R (2007) Managerial economics and financial analysis, 3rd Ed, Tata McGraw-Hill, New Delhi * Bolumole, Yemisi A., Frankel R., Naslund D, 2007. â€Å"Developing a Theoretical Framework for Logistics Outsourcing†, Transportation Journal, [e-journal], Vol. 46 Issue 2, p35-54, 20p, , Available through: Business Source Premier database [Accessed 18 February 2011] * Coltman et al (2000) E-Business: Revolution, Evolution or Hype? (Online) Available http://www.uazuay.edu.ec/bibliotecas/e-business/E-business_Revolution_Evolution_or_Hype.pdf * Dickenson et al (1999) Strategic Analysis & Recommendation: eBay, restructuring Process to Retain and Grow Core Business, Pacific Lutheran University. * Eell S. (2010) Amazon.com Inc. [Online] Available: http://topics.nytimes.com/top/news/business/companies/amazon_inc/index.html * Elsevier M.(2006) The Collaborative Partnership approach to Care, Ann Millar, Toronto Canada. * Downes & Mui (1999) Unleashing the Killer App: Digital Strategies for Market Dominance, Harvard Business School Press. * Galente J. (2010) Amazon.com’s Profit Forecast Falls Short of Estimates [Online]. Available: http://www.businessweek.com/news/2010-10-21/amazon-com-s-profit-forecast-falls-short-of-estimates.html * Gitman & McDaniel (2008) The Future of business: The Essential, South-Western Cengage Learning, OH * Greaver M (1999) Strategic Outsourcing: A Structured Approach to Outsourcing Decisions and Initiatives, AMACOM; illustrated edition, NY. * Hardman R (2009) Santa’s not so little helper: Today’s the busiest online shopping day of the year. So are they ready at the biggest grotto this side of Lapland? [Online] Available: http://www.dailymail.co.uk/news/article-1233766/Santas-little-helper-Todays-busiest-online-shopping-day-year-So-ready-biggest-grotto-Lapland.html * Ingram Micro Talks Cloud With Amazon, Rackspace, Salesforce.com. [Online] Available from: http://www.mspmentor.net/2010/06/07/ingram-micro-talks-cloud-with-amazon-rackspace-salesforce-com/ * Ingram Micro reports about increasing business demand in iPad. [Online] Available from: http://iphoneroot.com/ingram-micro-reports-about-increasing-business-demand-in-ipad/print/ * Johnson et al (2008) exploring corporate strategy, text and cases, 8th ed, prentice hall, NY * Kardes & Gurumurthy (1992) Order-of-Entry Effects on Consumer Memory and Judgment: An Information Integration Perspective, Journal of Marketing Research, 29 (3), pp. 343–357 * Lankford W.M., Parsa F (1999). Outsourcing: A primer, Journal of Management Decision, [e-journal], Vol. 37 Issue 3/4, p310, 7p, Available through: Business Source Premier database [Accessed 18 February 2011] * Levi et al (2003) Design and Managing the Supply Chain, Concepts and strategies and case studies, Second edition, The McGraw – Hill companies, NY. * Matthewson J (2002) E-Business: A jargon-free practical guide, Butterworth-Heinemana, Oxford * Mulqueen K. (2009) Consulting For Human Resources Organizational Development & Training, [Online] Available: http://www.consulting4hr.com/articles.html * People carrying dollar. [Online] Available from: http://www.shutterstock.com/pic-18434335/stock-photo-people-carrying-dollar.html * Save money buying used books at Amazon.com. [Online] Available from: http://jeremy.zawodny.com/blog/archives/006969.html * Sanders et al (2007) A Multidimensional Framework for Understanding Outsourcing Arrangements, Journal of Supply Chain Management, [e-journal], Vol. 43 Issue 4, p3-15, Abstract only. Available through: Business Source Premier database [Accessed 18 February 2011] * Scandoval (2002) How lean can Amazon Go? (Online) Available http://news.cnet.com/2100-1017-886784.html * Tedeschi R (1999), A Market that Dwarfs Retail E-Sales, New York Times,