Saturday, November 30, 2019

Obesity Could Be Catching

This article by Emma Woollacott entitled Obesity Could Be Catching, is a medical related article. This article tries to find obesity related issues leading to the infection of liver diseases.Advertising We will write a custom essay sample on Obesity Could Be Catching specifically for you for only $16.05 $11/page Learn More Briefly, the  article  clearly seeks to  illustrate reasons behind the occurrences of obesity and its side effects, for instance infections. Moreover, the article points out the way Yale scientist tested mice and found out that they could develop Non-alcoholic fatty liver disease. They also came to the conclusion that antibiotic treatment of mice could bring microbial composition back to normal. NAPLD can also be found in humans; 30 million people suffer from it in the United States. NAPLD leads to obesity and diabetes. Scientists hope they can find a treatment or cure for humans (Woollacott p. 1). They are eager to find a lastin g solution of the liver disease that has affected many people in the world. The article highlights the  process  carried out to  detect  how the microbes that cause obesity could be transferred from one person to the other (Woollacott p. 1). It is necessary to note that this is not  directly  administered to human beings. Given that it is an  experiment, scientists are keen on using animals first until facts prove that it is safe for human. It was clear from the experiment that the microbes causing the  disease  are contagious since the healthy mice kept with the  infected   were found  to be possessing microbes (Woollacott p. 1). Woollacott further indicates that there are  certain  proteins responsible for the development of an immune system. The  article  also gives the discoveries by the Yale University team on the presence of the same inflammasomes microbes that profoundly contribute to the liver disease known as the â€Å"non-alcoholic fatty li ver disease NAFLD† (Woollacott E p. 1). Woollacott  further  says that the experiments prove that this comes along with other disease such as diabetes being also a  serious  cause of the deadly liver infections found in the western world. The  article  gives statistics on the people who suffer from the NAFLD infections in the US only. It is  shocking  to  note  this is a serious threat to the future health. It  is estimated  that  approximately   30 million suffer from NAFLD. These people are at the risk of contracting cirrhosis and the liver cancer (Woollacott E p. 1). It is  alarming  that even  today  no reason  has been given  to this.Advertising Looking for essay on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More Since  proper  research and documented  proof  is available, this  research  is valid. The statistics given in the article reflects a true finding. It i s my heartfelt  opinion  that permission should be granted for it to  move  to the next stage. Donors should be  willing  to  finance  the project since many Americans are at risk. Once the experiments  are done  on human and proved to be efficient, many lives  will be saved. The government should as well be willing to sponsor volunteers to undertake the experiments. Medical findings in America should be given priorities. Good incentives should be given to the devoted scientists to  keep  on the spirit of finding permanent health solutions for Americans. The experiments   done  on mice will be  positive since mice are mammals meaning that their  body  systems are similar to those of the human beings, which gives the scientists some confidence that  positive  results  will be obtained. Works Cited Woollacott, Emma. â€Å" Obesity-Could-Be-Catching† . TG DAILY. February 6, 2012. Web. Accessed from https://tgdaily.com/61263-obesity-could -be-catching/ This essay on Obesity Could Be Catching was written and submitted by user SquirrelGirl to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Rockefeller essays

Rockefeller essays John D. Rockefeller was the richest man of his time and still ranks number one among todays standards, he contributed so much to society. Early in his life he was taught to always contribute to charity and remained to do so throughout his life. John D. also grew up with a father who was known for his shoddy business, frauds, and dishonesty. Rockefeller in one light was seen as a ruthless robber baron with low morals. J.D. Rockefeller was seen by the public as a greedy, ruthless business man, usurping every oil refinery in the nation, pushing everyone out of business. Rockefeller sent out spies to be ahead of competitors, pushing them out of jobs, leaving familys penny-less. Rockefeller used the method of cheap materials, cheap labor and tremendous profits. In a matter of a few years J.D. controlled 90% of the world oil market. When his ruthless and inhuman tactics were discovered by the public he gave money to compensate, as if money could heal the pain caused to so many families and forgive him of all his sins. At last John D. Rockefeller held the position of his dreams the ruthless Chowder, destroying Americas economic diversity as the ruler of the vast Standard Oil empire. Among many things Rockefeller was know for his vast contributions to capitalism and the growing economy. Rockefeller started a oil refinery at a very young age and watched it grow into a lucrative chain of companies. Based on hard work and a God-given gift he followed his dreams by doing Gods work, making lots of money and giving lots away. Rockefeller was a very talented business man and made generous offerings to his competitors to take over their businesses in legal and ethical ways. He is one of the greatest know philanthropist of all time, he gave away millions of dollars of his hard earned personal wealth to charity, for science development, and churches. ...

Friday, November 22, 2019

The Tragic Love Story of Cybele and Attis

The Tragic Love Story of Cybele and Attis Cybele and Attis is the story of the Phrygian great mother goddess Cybeles tragic love for the mortal Attis. It is also a story of self-mutilation and regeneration. When Cybele- one of Zeus would-be lovers- rejected him, Zeus wouldnt take no for an answer. While his victim slept, the great philanderer spilled his seed on her. ( In due course, Cybele gave birth to Agdistis, a hermaphroditic demon so strong and wild that the other gods feared him. In their terror, they cut off his male sexual organ. From its blood sprang an almond tree. This castration/birth connection is also seen in one version of the story of the birth of Aphrodite. Attis Is Born to Nana The river Sangarius had a daughter named Nana who ate the fruit of this almond tree. When, as a result of her snack, Nana delivered a boy child 9 months later, Nana exposed the child. This was an ancient method of dealing with unwanted children that usually led to death, but did not in the case of such important figures as Romulus and Remus, Paris, and Oedipus. Infant death was not to be his fate, however. Instead, reared by the proverbial area shepherds, the boy soon became healthy and handsome- so handsome his grandmother Cybele fell in love with him. The First Violets The boy, whose name was Attis, was unaware of the love Cybele bore him. In time, Attis saw the king of Pessinus beautiful daughter, fell in love, and wished to marry her. The goddess Cybele became insanely jealous and drove Attis mad as revenge. Running crazy through the mountains, Attis stopped at the foot of a pine tree. There Attis castrated and killed himself. From Attis blood sprang the first violets. The tree took care of Attis spirit. Attis flesh would have decayed had not Zeus stepped in to assist Cybele in his resurrection. The Ritual of Attis Since then, a yearly ritual has been performed to purify the body of the dead Attis. The priests- referred to as Galli or Galilee- are emasculated in emulation of Attis. A pine tree is chopped down, covered with violets and carried to the shrine of Cybele on Mt. Dindymus. There Attis is mourned for 3 days. Then, when Cybele brings him back to life, there is a wild and joyful celebration.

Thursday, November 21, 2019

How I Met Your Mother vs. I Love Lucy Movie Review

How I Met Your Mother vs. I Love Lucy - Movie Review Example Additionally, both the shows revolve around the theme of relationships and, therefore, a hilarious story emerges. Relationships and friendship are the most significant things to the characters. Their social lives and interaction between them forms the largest part of the plots. The clues that are offered, in the shows, to depict this are shown in the way the characters relate with each other, and the way they act when they are together. The love that these characters have for each other forms the main argument of the plot. Such shows are developed with the hope that viewers will get to find a common view in the show. These shows win awards because people agree that they have changed their lives significantly and that they support the view that the show presents. Yes, I do believe that my views on the two shows are true among many. The two shows have unique plots in, which the aims and objectives of the film are clear, and these views are the easily identified. It is from these shows that some people have understood the value of relationships. This shows that the two shows were developed to help the society in some way. They have also helped some parents in managing their teenage children. These shows teach people crucial lessons in life. However, one has to be highly attentive so as not to miss these teachings. The shows also teach people how to manage their relationships and social lives. They show the consequences that can develop because of relationship neglecting, or other factors and matters that affect relationships between two or more people. They make us think of and value the relationships that we have formed with people who around us. First, people are drawn to the shows because of they are hilarious contents. The two shows offer unending laughter during the few minutes that they run. Some people watch the two shows in the evening to get rid of stress that they had from work. Others watch the shows to see how the plot will develop. This is

Tuesday, November 19, 2019

Written Assigment II Essay Example | Topics and Well Written Essays - 500 words

Written Assigment II - Essay Example The one that enjoys a higher comparative advantage, for instance computers, should form the primary export while textile, whose production has a lower comparative advantage, should be imported from China (Frederking 3). In this paper, I hold a contrary view to Patrick Buchanan by supporting Ricardo’s theory. Countries chose to engage in international trade with a view of making profits. It would be totally illogical to engage in a business activity where there is no overall profit. As such, the driving force of international trade is the hope of maximizing profits accrued in the production of a given product. In this view, nations engaged in international trade strive to strike a balance by increasing the unit value they gain by exporting a given product. While this takes place, the same country would strive to reduce its engagements in products that do not earn as much profit as the others by the virtue of their production costs. Therefore, in an international trade, a country which exports gains more than that which imports. This is because exporting countries enjoy a favorable balance of payment than those which import (Ritchie 19). The utility derived from utilizing factors of production differs in the production process of different products. For instance, in the case of computers and textile products, it is evidently cleat that United States of America spends less per unit of factors of production when it concentrates on computers than when it concentrates on textile products. In this sense, U.S. is bound to increase its overall profit if it converts the factors of production used in the manufacture of textile products to the manufacture of computers. As such, textile industry becomes the opportunity cost of production of computers. Similarly, China is bound to increase its profitability if U.S. chooses to concentrate on importing its textile products. As such, free

Saturday, November 16, 2019

Network Security Analysis Essay Example for Free

Network Security Analysis Essay This article is concerned about network security. It mentions about the present situation of network security and an analysis of the reason that lead to unsafe network environment. Then the article introduces two frequently used protocols in network security: HTTP (Hypertext Transport Protocol) and HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), then compare them and give a brief conclusion. On the other side, the article introduces how firewall protects network security in hardware aspects. Keywords: Network; Security; Analysis; Countermeasures 1. Introduction As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed. 1.1 Situation of Computer Network Security With the rapid development of the Internet and the widespread application, the number of computer viruses, Trojan horses is explosive growth. According to Jinshan drug gangsters cloud security center monitoring statistics show that in 2008, Jinshan drug gangsters were intercepted more and more new viruses, Trojans, which grew up 40% compared with 2007. The center statistics also show that 90% of the virus infected users, this attachment web pages that humans are enjoying the network information with the great wealth and convenient at the same time, also be the severe beset by problems of network information security. The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the trumpets; Internet fraud and extortion; Through the network business platform money laundering profit, etc. Attackers need technical level gradually decrease, means more flexible, joint attacks increase rapidly. Trojan viruses, Trojan virus writers, professional hack personnel, sales channels, professional players have been formed complete gray industrial chain. 1.2 Threats to Computer Network Security The threat to computer network security includes attacks by hackers and computer virus. It mostly presents in the following aspects. Firstly, send fake E-mails to users. It is a common way to cheat the account and password by posing as legitimate websites. Secondly, damage caused by viruses is also a common phenomenon. For e.g. when virus gets into computer, it will cover our hard disk with useless data. Thirdly, it’s about unauthorized accessing. This mainly refers to the normal use or oversteps their authority to use the network equipment and information resources. Fourthly, damage the integrity of the database. Fifthly, interfere with the normal running of the systems. Finally, communication lines are tapped and people are not familiar about safety of network security. The first situation doesn’t occur in common. However, awareness of maintain computer network security is really important. In the article, it mainly analyzes several common situations and introduces what the threat is and how it works. 1.3 Countermeasures of Network Security As network security has a lot of loopholes, people create a lot of methods to protect network. On the side of hardware, people begin to use firewall to protect network. On the side of software, a lot of tools and technologies have been used in this area, such as router filtering. The article introduces how firewall works and two similar protocols: HTTP and HTTPS. By comparing these two protocols, we will find the development of technology. 1.4 Importance of the Study of Network Security It’s important for securing ones computer, keeping important data and profile information protected. Careful web surfing habits may keep you from being a victim of virus attacks and malware, however this is an intensely risky activity and very often people may end up with an infected computer. Some good anti-virus programs will help to keep your computer protected and safe, but users must remember to keep this updated regularly for better protection over new viruses. 2. Related Work 2.1 Network Security Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and over seeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. 2.2 ISO/OSI model The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications types, and the interfaces among them. (See Figure 1.) Each layer depends on the services provided by the layer below it, all the way down to the physical network hardware, such as the computers network interface card, and the wires that connect the cards together. People develop a lot of protocols to each layer. Such as PPTP/L2TP to linked layer, IPSEC to network layer, TLS/SSL to transfer layer. Each protocol includes security information that helps network transfer safer and safer. 2.3 IPV4 protocol The protocol contains a couple aspects which caused problems with its use. These problems do not all relate to security. They are mentioned to gain a comprehensive understanding of the internet protocol and its shortcomings. The causes of problems with the protocol are: 1. Address Space 2. Routing 3. Configuration 4. Security 5. Quality of Service The lack of embedded security within the IPv4 protocol has led to the many attacks seen today. Mechanisms to secure IPv4 do exist, but there are no requirements for their use. IPsec is a specific mechanism used to secure the protocol. IPsec secures the packet payloads by means of cryptography. IPsec provides the services of confidentiality, integrity, and authentication. This form of protection does not account for the skilled hacker who may be able to break the encryption method and obtain the key. 2.4 Types and Sources of Network Threats Denial-of-Service, unauthorized access, executing commands illicitly, confidentiality breaches and destructive behavior are common type of threats to network security. The sources of network threats include 3 aspects. Firstly, the invasion of bad information and pollution. Network is open, even borderless space information network of people in the rich cultural life, but also to the illegal dissemination of information or indecent information provided soil British Middlebury Seck Griffith University, Professor Di Mulai study found that in non-academic information on the Internet, 47% of pornography on These content without restriction for people feel free to browse, not only seriously jeopardize the health of young people, and poison the social atmosphere and hinder the building of a harmonious society in China. In addition, the networks openness and freedom are often some criminals use, or dissemination of endangering national security, to subvert the government, disrupting social order and security of information, or information network organizing rallies and other anti-social activities. Secondly, Internet hackers and computer crime. Hacker wanton rampage information networks, technology and the consequences of its invasion of escalating their use of technical means, or attacks on government sites or military organizations Web site and endanger national security interests, undermine government image; or steal business, financial institutions, business information to profit illegally, endangering the economic order; or steal personal confidential information, violation of privacy or stolen cash. These acts seriously impede the normal operation of information networks. In addition to outside hackers the use of the Internet, the rampant crime and tort. The use of computer information network system to implement theft, fraud or corruption, embezzlement and other crimes than the traditional criminal methods and tools more subtle complexity, and violation of trade secrets with the network, electronic communications freedoms, civil Privacy and damage the reputation of others and other events are also frequent. Online pyramid schemes, online fraud, etc. These crimes have been on the network posed a serious threat to network security. Thirdly, the existence of their own network security vulnerabilities and risks. Freedom to share and open spirit of the Internet, but also the charm of the Internet The Internet is based on TCP / IP protocol, network devices, operating systems with networking capabilities and openness about the existence inherent vulnerability In addition, the software in the design, it is inevitable there are some defects or flaws, which has become a prime target for hackers, while software programmers deliberately left the back door has become a major network security risks network These weaknesses of their own existence, to bring the work of anti-hacker considerable difficulty: on the one hand difficult for scientists to develop a common and effective network security for the protection of technical means on the other hand the lack of implementation of these measures sufficient to protect the social environment. 3. Methods 3.1 Analysis of Network Security System and network technology is a key technology for a wide variety of applications. Security is crucial to networks and applications. Although, network security is a critical requirement in emerging networks, there is a significant lack of security methods that can be easily implemented. There exists a â€Å"communication gap† between the developers of security technology and developers of networks. Network design is a well-developed process that is based on the Open Systems Interface (OSI) model. The OSI model has several advantages when designing networks. It offers modularity, flexibility, ease-of-use, and standardization of protocols. The protocols of different layers can be easily combined to create stacks which allow modular development. The implementation of individual layers can be changed later without making other adjustments, allowing flexibility in development. In contrast to network design, secure network design is not a well-developed process. There isn’t a methodology to manage the complexity of security requirements. Secure network design does not contain the same advantages as network design. When considering network security, it must be emphasized that the whole network is secure. Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack. A possible hacker could target the communication channel, obtain the data, decrypt it and re-insert a false message. Securing the network is just as important as securing the computers and encrypting the message. When developing a secure network, the following need to be considered: 1. Access – authorized users are provided the means to communicate to and from a particular network. 2. Confidentiality – Information in the network remains private. 3. Authentication – Ensure the users of the network are who they say they are 4. Integrity – Ensure the message has not been modified in transit 5. Non-repudiation – Ensure the user does not refute that he used the network Here we mainly discuss fake websites. Fake websites means phishing. Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted websites own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or services own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal. A Universal Man-in-the-middle (MITM) Phishing Kit, discovered in 2007, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site. To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object. 3.2 Firewall’s Protection A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A networks firewall builds a brigade between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. In general, some functions that can be done by the firewall are: 1. Doing a packet filter firewall can make the decision whether to accept or reject the incoming data packets. 2. Hiding Network Address (NAT) IP addresses can be used on the internet is a public IP. So to create a client that uses private IP can be translated into public IP. These functions are performed by a firewall, known as NAT. 3. Monitoring and Logging to improve network security and logging on the terms monitoring by a firewall. 3.3 Protocols of Network Security Network security protocols are used to protect computer data and communication in transit. The primary tool used to protect information as it travels across a network is cryptography. Cryptography uses algorithms to encrypt data so that it is not readable by unauthorized users. Generally, cryptography works with a set of procedures or protocols that manage the exchange of data between devices and networks. Together, these cryptographic protocols enhance secure data transfer. Without cryptographic network security protocols, Internet functions such as e-commerce would not be possible. Secure communication is necessary because attackers try to eavesdrop on communications, modify messages in transit, and hijack exchanges between systems. Some of the tasks networks security protocols are commonly used to protect are file transfers, Web communication, and Virtual Private Networks (VPN). The most common method of transferring files is using File Transfer Protocol (FTP). A problem with FTP is that the files are sent in clear text, meaning that they are sent unencrypted and therefore able to be compromised. For example, many webmasters update their sites using FTP; an attacker using a packet sniffer and the website’s IP address can intercept all communications between the webmaster and the site’s server. Here we mainly discuss two similar protocols: HTTP and HTTPS. The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is a multi-linear set of objects, building a network by using logical links (the so called hyperlinks) between the nodes (e.g. text or words). HTTP is the protocol to exchange or transfer hypertext. The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with the SSL/TLS protocol. It provides encrypted communication to prevent eavesdropping and to securely identify the web server with which you are actually communicating. Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and browsing history private.

Thursday, November 14, 2019

Should Chinas Human Rights Record Prevent Permanent Normal Trade Relations :: Human Rights Essays

Background Since the initial warming of U.S.-China relations in the early 1970s, policymakers have had difficulty balancing conflicting U.S. policy concerns in the Peoples' Republic of China. From Nixon to Clinton, presidents have had to reconcile security and human rights concerns with corporations' desires for expanded economic relations between the two countries. While the U.S. regularly objects to China's human rights violations, the Chinese government counters with complaints that the American concerns represent unwarranted American intrusion into its internal affairs. In 1989 the Tiananmen Square massacre drew public attention to the inconsistent character of U.S.-China policy. A wave of public indignation with China's repressive practices forced the Bush administration to adopt a sterner posture toward human rights violations and to impose sanctions, including restrictions on bilateral and multilateral aid. But these measures have not satisfied some critics of China's human rights practices, who contend that the U.S. should apply even more rigid trade restrictions against China. Specifically, some critics insist that the U.S. government not give China "permanent normal trade relations" status, which would free China's government from an annual review of its human rights record by Congress. Many critics say PNTR standing should be linked to improvements in China's human and labor rights practices - a policy that has been rejected by the Clinton administration. Rather than denying China normal trading status because of human rights violations, the Clinton administration has opted for a policy of "comprehensive engagement," which holds that long-term U.S. goals such as human rights improvement are more likely to be achieved through sustained contact and open trading than by further isolating China. Yet Chinese human rights practices, including respect for political and labor rights, continue to fall well below internationally accepted standards. In perhaps the stickiest issue, the White House warned last week that there was little chance of PNTR for China without legislation setting up a watchdog commission to monitor Beijing's human rights practices. China, however opposes any plans by the U.S. to monitor human rights as a condition to granting PNTR. On One Hand... American businesses should not be coddled at the expense of human rights. Despite expressions of concern for human rights conditions, the U.S. government has allowed narrow economic interests, particularly those of corporate investors, to guide its China policy. So far, the U.S. government has been unwilling to jeopardize U.S. economic relations by adopting stricter human rights conditions on aid and trade. China's trade status is currently reviewed annually by Congress.

Monday, November 11, 2019

Sofield Digital, Company Profile

Sofield Digital Solutions Sdn Bhd (SOFIELD Digital), Co. No. 862629D, formally known as Sarasutra Logistics Sdn Bhd is a 100% Bumiputra-owned Company and was established on 30th. Jun 2009 with paid up capital of RM 100,000.00. The Company assumed its current name on December 2013 and shall commence its business operation in January 2014. The Head Office address is at Lot 8, Grace Square 1, Pantai Sembulan Road, 88100 Kota Kinabalu, SABAH. Our Corporate Office is located at No. 189, Block E-11-4, Megan Avenue 1, Persiaran Hampshire, Off Jln. Tun Razak, 50400 Kuala Lumpur.SHAREHOLDERS & BOARD OF DIRECTORSThe directors of the SOFIELD Digital are En. Saiful Redzuan bin Suhaili and En. Syahirul Fauzee bin Suhaili. The new additional director to be appointed is En. Syahirul Fazly bin Suhaili, he is also the COO of the company. Dato’  Suhaili Abdul Rahman is the major shareholder of Sofield Digital Solutions Sdn Bhd. Dato’ Suhaili also holds majority shareholding in Sofield Marine & Offshore Sdn Bhd, a company actively involved in the provisioning of ship management, ship broking and marine consultancy services.Dato ‘ Suhaili Abdul Rahman is a former Member of Parliament of Labuan and a former Chairman of Labuan Corporation. He holds a Bachelor of Science (Economics) University of London and a Master of Business Administration (MBA) in Marketing Strategy, University of Hull , United Kingdom. All directors play active roles in managing the business.KEY MANAGEMENT TEAM (1) Chief Executive Officer Mr. Amran Abdul Rahman has been appointed as the Chief Executive Officer of Sofield Digital Solutions Sdn Bhd in December 2013. Amran has over 25 years of working experience in the telecommunications field and is a member of theAsian Institute of Management (AIM). He started his career in 1981 in various industries, including finance & banking, petroleum, insurance, retail and government sector. In the telecommunications front, Amran has managed the sales & marketing, business development, regional operations and special project of companies such as TM Touch, Celcom and KUB Telekomunikasi, Sector Solutions, Green Packet Berhad and ALTEL Communications Sdn Bhd.He began his career in ICT sector when he joined Giat Electronic Sdn Bhd (Local representative for Racal-USA) in 1987, then he joined Celcom in 1989, attached to Market Development Department and later assumed the role of Head of Marketing, Celcom Northern Region. He was seconded to Sabah in 1991 as the Regional Manager and was later promoted to General Manager for Celcom Sabah Region. It was during this time that the company was making its first headways into the east. He pioneered not only in the setting-up of the operations but also in helping transform Celcom to be the market leader in the region. His last position with Celcom was General Manager of Celcom Timur (Sabah) Sdn Bhd.In November 1999 he joined KUB Telekomunikasi Sdn Bhd., and successfully  spearheaded the planni ng, development and implementation of the first GSM project in Mogadishu, Somalia. He was also responsible for the setting-up of the first broadband wireless internet access network and commercial service deployment in Malaysia under the brand name B-WISE (Broadband Wireless Internet Access Service).In May 2002 he joined AtlasONE Sdn Bhd as the Senior General Manager, Enterprise Business Group and later was appointed as the Senior General Manager/Acting VP, Sales & Marketing Division. His major achievements include the exclusivity arrangement with state governments & MCMC on the provisioning of broadband infrastructure and service deployment to Northern and Southern Regions under the Malaysian Broadband Plan. He was also actively involved in the Ministry Of Education/MCMC’s Smart School Proof – Of – Concept exercise in Kelang Valley and participated in MCMC’s USP Tendersfor the Setting-Up and Operations of Community Broadband Centers. Amran holds a BBA (H on)/ADBS, majoring in Marketing. (2) Chief Operating Officer Mr. Syahirul Fazly bin Suhaili holds a Bachelors Degree In Business Administration and has gained good business experiences in various fields – Information Technology, Logistic and Oil & Gas. Mr. Syahirul Fazly will be appointed as the new director of the company.(3) Vice President, Technology & Corporate Affairs Mr. Abdul Karim Abdullah has been appointed as the VP – Technology & Strategic Planning of Sofield Digital Solutions Sdn Bhd in January 2014. Karim has over 20 years of working experience in the telecommunications field. Abdul Karim Abdullah was formerly:– Vice President – Software Development with CELCOM – Vice President – Eastern Regional Operation with CELCOM and ï‚ · General Manager -Architecture & Planning, Information System Department with MAXIS. – Vice President – Technology & Strategic Planning with Sector Solutions Sdn Bhd (NSP, NFP & Norminated NFP).He was the pioneer in the establishment of CELCOM in 1989 and has gained vast  experiences in telecommunication during his tenure with both major players in the industry. Prior joining the telecommunication industry, he started with banking and finance industry namely with Bank Pembangunan Malaysia Berhad (formerly known) and Kewangan Usaha Bersatu Berhad. He has the exposure of working with established consulting firm namely Andersen Consulting and Ernst & Young and that gave him added advantage delivering quality deliverables. He experienced entrepreneurship in 1998 afterMAXIS employment and has done extremely well and managed to secure a sustainable deals and contracts.2.0 ORGANIZATION CHARTInitial Set-Up to Support the Business Model for the Provisioning of Digital Solutions & Applications Services. BOARD OF DIRECTORS & COUNCIL OF ADVISORS CHIEF EXECUTIVE OFFICER CHIEF OPERATING OFFICERVP – COMMERCIALVP – CORPORATE AFFAIRSVP – TECHNOLOGY & NETWORKMARK ETING, CUSTOMER SERVICE & BUSS OPERATIONS DEPTFINANCE, ADMIN & PROJECT MANAGEMENT DEPTNETWORK OPERATIONS & PARTNERS SUPPORTHEAD OF BUSINESS DEV & OPERATIONSHEAD OF PROJECT & ADMINHEAD OF NETWORK & ENG SERVICESB. O. OFFICER (1) SALES & MKTG OFFICER (1) CUST SERVICE OFFICER (1)F& ADMIN OFFICERS (2) PROJECT SUPERVISOR (1)Dept. Job Scope: 1. Sales & Marketing Operations : a. Mktg & Sales Plann. & control b. Market Dev & Partners Mgmt c. Mktg & Sales SOPP & Policies d. Product & Svs Dev & Mgmt e. Marketing Communication 2. Marketing Promotions a. Marketing Awareness program b. Mobile Exhibition/Road show c. Presentation & Demo 3. Cust & Channel Serv. & Support a. Customer Care Operations b. Channel Performance audit c. Channel Training and Dev. d. Channel Performance Report e. Channel Supp. Program f. CSS SOPP & Policies g. Cust& Channel AwarenessProgram i. Handling Enquiries/Tele Mktg 4. Help Desk & Telemarketing OperationsDept. Job Scope: 1. Finance & Account : a. Manage accounting sys tem b. Implementation of SOPP c. Daily account/Fin Operations d. Manage & monitor monetary transaction – sales, collection, purchasing, claims, commissions e. Budgeting & Costing f. Business & Partners audit g. Finance and accounts report 2. Adminstration a. Office Admin & Human Resource b. Purchasing, logistic, insurance c. Manage asset, equipment, infra, CPE/MUE, VAS equip & accessories . 3. Supervise Partners (VAS & Apps) a. Suppliers for VAS & Apps b. Manage Installers/Contractors, Suppliers’ payments 4. Corp & Strategic PlanningTECHNICAL OFFICERS (3)Dept. Job Scope: 1. Network & Engineering Services a. Operations and maintenance b. Network optimization- coverage, Service & network performance c. Network Monitoring & ControlCenter 2. CPE/MUE/VAS Equip & Accessories a. Installation and Maintenance b. Channel Tech Support & Training, c Hardware configuration & Firmware management 3. Supervise Partners(Eng Svs) a. Installers b. Contractors3.0 VISION, MISSION, STRATEGY & VALUE VISION We want to be a world class Digital Systems & Solutions Provider, through leverage Information and Communications Technology, to contribute our bits in Multi Super Corridor success and deliver Total Multimedia & Communications Solutions to our Customers for achieving strategic advantage, in turn derive to Business Success.MISSION To focus on our customers’ challenges and needs by providing excellent solutions and services in order to consistently create maximum value for customers.OUR STRATEGY – To provide innovative products and services to our customers to meet and exceed their expectations in the fast-changing market. – To customize and deliver integrated solutions and services to maximize investment returns to our customers. – To continuously conduct R&D for improvement and invention of new technologies and solutions to stay ahead of the global competition. ï‚ · To recognize, develop and retain our most valuable human capital and to nurture a conducive environment for their success.OUR VALUE-Growing together with our Customers -Win-Win Mentality -Contributions and Return balancing -Continuous Rapid and Orderly improvement -Excellent Quality Information and Communication Technology Services4.0 NATURE OF BUSINESS Sofield Digital Solutions Sdn Bhd (SOFIELD Digital) provides & integrates a comprehensive range of Multimedia & Communications services, systems & technologies, including provisioning of systems equipments & accessories, solutions design, management and deployment relevant to customers business needs to reduce their costs and increase their competitiveness in today's global economy. Our strategic partnership with leading International ICT Consultants & Vendors, Contents & Applications Providers, Telcos, Celcos and Carriers’ Carrier allow us to leverage and position your business on an efficient and productive edge.In providing for better and competitive solutions for our clients and prospects, SO FIELD Digital's solutions product portfolio includes in-house customized products and solutions from major multimedia & communications principals and providers.SOFIELD Digital overall strategy is to be the front-runner in the provisioning of ICT solutions on both Fixed & Wireless Technology Platform, and part of the strategy is to build a customers’ network that can support current and other applications of tomorrow.SOFIELD Digital solutions would provide customer with immediate access to the  state-of-the-art technology that incorporates all the tools and techniques for monitoring, control and management of a network. The significance of this solution is that our customer will be able to set up its network with minimal upfront investment. This will greatly reduce customer’s risks and manpower in setting up and managing data communications network.SOFIELD Digital’s management team & business partners possesses years of experiences in providing voice, data & vi deo communications services, backed by strong network management and maintenance setup which consist of local & international expertise. This means that our customers will be assured withhigh quality services, together with the consultancy on detailed planning and implementation of network, comprehensive daily network management, continuous support in optimizing the network availability and performance. In conclusion, being a total multimedia & communications solutions provider, SOFIELD Digital is committed and accountable to provide total integrated business solutions and end-to-end managed service and technical support. Our aim is to enrich life through innovative ICT solutions.5.0 PRODUCTS & SERVICES 5.1 FEATURED SERVICES We provide a broad range of ICT solutions & supports, including design, supply, management and deployment relevant to your business needs to reduce your costs, and increase your competitiveness in today's global economy. Our strategic partnerships with leading M ultimedia & Communications solutions providers allow us to leverage our customer business through high quality services and solutions.– ICT Consulting SOFIELD Digital’s Consulting Services helps customers identify hidden value and create growth through business and technology innovation, while also enabling cost efficiencies that generate industry-leading business and ICT performance. Our thought leadership looks at the future to anticipate major market transitions and help customers prepare for them.– ICT Technology & Infrastructure Development Utilizing the latest telecom technology platforms bundling with innovative applications & value added services to fullfil customers requirement on ICT Infrastructure for various initiatives i.e. GreenFields, Digital Oil Field, Digital Campus, Digital Communities, Smart City/Township, Educity, Intelligent Building Concept and others. ï‚ · ICT Business Solutions Provisioning a. Voice, Data, & Video – Fixed & Mobi lity. b. Corporate Access â€Å"Leased Line†:Straight Forward Internet Leased Line – End to End Connectivity Solution Across Geographical Location with prescribed capacity. c. Machine To Machine (M2M), Focus on Key Products: Fleet Management Asset Management Telemetry & SCADA Security & Surveillance Tracking & Monitoring SIM Bonding & etc d. Fixed Wireless Business: Office CallSaver & VirtuEXT e. Business Application: PortaBiz on SAP Mobility Mobile Device Management f. Enterprise Messaging: Enterprise Messaging Services (EMS) Enhanced Enterprise Messaging (EEM)– ICT Adoption In Oil & Gas Industry – The Digital Oil Field The upstream oil and gas sector is currently facing a major challenge: how to increase the production and the profitability in spite of the volatility of the oil prices, the declining reserves and the remodeling of the industry's processes and regulations. Sofield strongly believes that the oil and gas companies can intensely leverage ICT in order to facilitate, enable and support most core functions including exploration and production.– Custom Contents & Applications Development We design, develop and deploy custom built Contents & Applications specific to your business needs to reduce your costs and increase your competitiveness in today's global economy. – Business Continuity and Recovery e-Business needs 24Ãâ€"7 availability. You can trust our ICT solutions to recover mission critical information and it’s related systems.– Networking We design your network infrastructure for deployment and ease of maintenance services in accordance to best industry practices.5.2 SYSTEM INTEGRATION Sofield Digital Solutions Sdn Bhd is a full system integrator providing digital solutions for complex ICT systems as well as designing and developing standard & customized application software for various market segments/by industry: Telecom, Energy, Government, FSI (Finance, Securities & Insurance), Oil & Gas, Manufacturing, Plantation/AgroTrade, Trade Logistics, Healthcare, Education (Digital Campus Solutions), Transportation and more.We work with our business & strategic partners to offer a full spectrum of services including strategic consulting, communications and network services, system design and development, intranet & Internet business solutions & services, implementation and customer education.– Internet/Intranet Services SOFIELD Digital performs complex Internet/intranet solutions and services. The emphasis is especially made on system and data security. We are strongly committed to Web application development and deployment allowing for the most effective and up-to-date user oriented  solutions. The basic application functions include Web applications, Business Intelligence Systems, E-Commerce, Multimedia dynamic presentations etc.– Implementation Implementation of extensive information system is a complex effort often involving significant changes in the client's organization. SOFIELD Digital has extensive experience in implementing large-scale systems. We utilize a proven implementation approach that has been successfully applied in numerous organizations. In successfully implementing complex ICT systems, extensive customer support is essential. SOFIELD Digital pays special attention to customer support throughout the development of the system and continues to provide support for the entire life span of the implemented system– Communication and Network Services A key element of most large information system is communications. The field of communications has rapidly grown in number of options and their complexity. Designing and implementing networks is a complex activity that requires a high level of expertise and versatile hands-on experience. SOFIELD's experts successfully solve these problems as part of providing customers with effective solutions. Network services include network design (high level and detailed plans), i nternet/intranet functionality, and network implementation and testing.– Customer Education SOFIELD provides extensive education and training to customers as part of the ICT solution. The education and training covers all users types (top management to data entry operators) and includes areas of system and application software, data base management systems, use of CASE tools,  management systems (e.g. ERP, JIT) and network operation. The courses are held at the user site or at SOFIELD/Partner’s Media training center. 5.0SITE MAPSOFIELD web site (under construction) will consist of six main menu. There are Services, System Integration, Contact Us, Sitemap, Company Profile and Achievement. Under System Integration includes Consulting, Implementation, Internet/Intranet Services, System Design and Development, Communications &  Network Services and Customer Education.

Saturday, November 9, 2019

Report on Carrebean Internet Cafe Case

REPORT ON CARRIBEAN INTERNET CAFE CASE Assignment – 1 CASE SUMMARY David grant is an MBA student hoping to open Caribbean Internet Cafe in his hometown Kingstons, Jamaica upon his graduation as he always wanted to be his own â€Å"boss†. Due to low accessibility and usage of internet in Jamaica, David thought of it as a good timing to pursue this business opportunity. He has gathered data on all the relevant costs: equipment, rent, labor, etc. He has also found a partner in the local telephone company, Jamaica Telecommunications Limited (JTL), where he previously worked.JTL has offered to provide equity and a long-term loan at favorable interest rates. He is now faced with the task of analyzing the gathered information and making a decision of whether he should proceed with the venture, and if so, if it would be a profitable business for him and JTL. TABLE OF CONTENT CASE SUMMARY1 INTRODUCTION2 PROBLEM DEFINITION3 CONCEPT FEASIBILITY STUDY3 TARGET MARKET4 LOCATION4 COMP ETITION4 ECONOMIC FEASIBILITY4 CAPITAL AVAILABLE5 START UP COST5 FIXED MONTHLY COST5 PRICE COST MARGIN ESTIMATION5 TARGET CUSTOMER SEGMENT – 200006 REVENUE PER YEAR6 PROFITABILITY6 CONCLUSION6 RECOMMENDATIONS7 INTRODUCTIONThe report deals with the study of a business proposal to open an internet cafe. The report studies the decision of David Grant who is an MBA student, to open Caribbean Internet Cafe in his home town Kingston, Jamaica. David while studying in London visited a number of cafes and was intrigued by the concept. While visiting his hometown Kingstons, Jamaica during summers he noticed that in spite of high awareness of the internet, there was low accessibility and usage of the same. Seeing a potential market of consumers, David decides to open a European concept based Cafe which will offer brewed coffee, imported wines, juices and baked products.He decides to have three areas in the cafe: a computer area with booths, a wine lounge with comfortable sofas, and a ge neral cafe area with table and chairs. He envisioned providing the customers, a perfect vehicle to use internet and other service without making an expensive investment in computer hardware and in addition a social outlet where people can surf together , listen to music or simply relax and socialize. He gathers the required information for starting the cafe and makes notes. PROBLEM DEFINITIONAfter gathering all the information David grant has to decide whether it will be a profitable and sustainable decision to open an Internet Cafe in Kingstons, Jamaica. CONCEPT FEASIBILITY STUDY In order to make a sound decision a feasibility study is carried out which will focus on analysing the target market, location , the competitors in the area and the three categories of costs: Start up costs required to be invested in the business, Fixed monthly costs that are to be bore as result of operations and variable costs, that result with every customer visit to the cafe.TARGET MARKET It was assume d that main segment that can be targeted as the potential customers would be university students, who have computer knowledge and professionals with high disposable income as they would appreciate a venue where they could relax and socialize along with availing internet facilities. Total segment size was assumed to be around 20,000. LOCATION Location that was chosen for setting up the cafe was New Kingston as most of the banks, other financial institutions and corporate had their head offices in that area.Also this area consisted of hotels and shopping centre, which would mean more masses, would come to know about CIC. Along with these factors, one more important reason was that New Kingston was close to several affluent suburbs from which CIC could attract patrons. COMPETITION In Jamaica, internet accessibility and usage was low. There were many reasons, that accounted for low internet usage such as 1) High cost of computer as percentage of average salary, 2) the lack of telephone lines in some areas of Kingston and,3)the high rates that was being charged by the existing service providers.Along with these factors, the idea of an† Internet cafe† was not very popular in Jamaica. So, this overall plan was quite new for that region and as a result the competition was not quite great. ECONOMIC FEASIBILITY CAPITAL AVAILABLE Table [ 1 ] PARTICULARS| AMOUNT (JA$)| DAVID GRANT’S SAVINGS| 5,00,000| JTL INVESTMENT IN EQUITY (50% SHARE)| 5,00,000| LOAN PROVIDED BY JTL @ 10% pa| 12,50,000| TOTAL| 22,50,000| START UP COST Table [ 2 ] PARTICULARS| TOTAL COST (JA$)| EQUIPMENT | 1426000| UTILITIY DEPOSIT| 7000| ADVERTISING (Prior to Opening)| 20000|LEGAL AND DECORATIONS| 120000| TOTAL| 1573000| FIXED MONTHLY COST There is an assumption that loan from JTL in the startup is a 5 year loan with principal payable on maturity and 10% simple interest payable monthly. Table [ 3 ] PARTICULARS| TOTAL COST (PER MONTH) (JA$)| WAGES TO EMPLOYESS (90*40*4*2)| 28800| SALA RY TO MANAGER | 40000| SITE RENTAL| 30000| TELEPHONE BILL AND UTILITIES| 15000| INTERNET LINK RENTAL| 10000| INSURANCE PREMIUM| 10000| ADVERTISING, MARKETING AND PROMOTION COST| 10000| ADMINISTRATIVE AND MAINTENANCE| 50000| INTEREST ON LOAN| 4167|TOTAL| 197967| YEARLY TOTAL (197967*12)| 2375604| PRICE COST MARGIN ESTIMATION PRICE/CUSTOMER (JA$) Table [ 4 ] PARTICULARS| TOTAL CHARGES| COST INCURRED| MARGIN (REVENUE)| INTERNET (PER HOUR)| 120| 60| 60| DRINKS (PER VISIT)| 140| 50| 90| FOOD (PER VISIT)| 60| 30| 30| TARGET CUSTOMER SEGMENT – 20000 An independent research firm, commissioned by JTL, conducted a study and came to the conclusion that the estimates by the owner regarding target size and demand were indeed correct.They also provided three scenarios of the demand that the cafe would attract. The market firm projected tha , optimistically, 50% of the segment would visit the cafe, on an average of , five times a year. A realistic projection was that 40% of the segment woul d visit the cafe on an average of three times a year. Finally, a pessimist estimate was that 30% of the segment would visit the cafe twice per year. Total Customer Visits / Year Optimistic (50%, 5x/yr) – 50000Realistic (40%, 3x/yr) – 24000 Pessimistic (30%, 2x/yr) – 12000 REVENUE PER YEAR Table [ 5 ] PARTICULARS| OPTI MISTIC | REALISTIC| PESSIMISTIC| COMPUTER USAGE (40%)| 12,00,000| 5,76,000| 4,32,000| FOOD/DRINKS| 60,00,000| 28,80,000| 14,40,000| TOTAL| 72,00,000| 34,56,000| 18,72,000| PROFITABILITY * In optimistic scenario the cafe would generate a profit of 45263 JA$ * In realistic scenario the cafe would incur a loss of 214737 JA$ * In pessimist scenario the cafe would incur a loss of 334737JA$ CONCLUSIONAfter analyzing the various aspects of the proposal it may be seen that the only scenario turning out to be a profitable and sustainable proposal is the optimistic one where the assumption is based on the fact that 50% of the total segment i. e. 10000 of the total 20000 customer segment will visit the cafe on an average of 5 times a year. But it would not a practically advisable to go ahead with such an assumption as the realistic as well as pessimist scenario shows a loss reflecting a negative probability of the business being profitable and sustainable in the long run.But it has been mentioned that the area does not have a cafe which provides internet facility and at the same time a hang out joint offering snacks and music at the same place, which makes Caribbean Internet Cafe first of it kind in Kingstons Jamaica. Therefore scrapping the whole idea leads to loosing out on an opportunity which gives David Grantâ€Å"First Mover Advantage† of offering a new experience to the customers. Secondly, a potential unexplored market which can be catered to by opening such cafe.Therefore David must proceed with his proposition but only after making certain changes in the area cost and tariff. RECOMMENDATIONS * David should revise his ta riff of 120$ per hour considering the average charges of the internet facility is 90JA$ per hour. * Also David can reconstruct the menu of the snack bar as the offerings does not fits the demand of the local people and is adding to the cost due to being exotic in nature. Eg. It is clear from the case facts that local people does not drink coffee and hence it may be omitted from the menu.

Thursday, November 7, 2019

Free Essays on Mrs.

Many individuals cite the Seneca Falls Convention held in Seneca Falls, New York to be the beginning of the women's movement in America. However, the idea for the convention came about at another protest meeting: the 1840 World Anti-Slavery Convention in London. At that convention, the female delegates were not allowed to participate in the debates. Lucretia Mott wrote in her diary that even though the convention was titled a 'World' convention, "that was mere poetical license." She had accompanied her husband to London, but had to sit behind a partition with other ladies such as Elizabeth Cady Stanton. They took a dim view of their treatment, or rather mistreatment, and the idea of a women's convention was born. In the interim between the 1840 World Anti-Slavery Convention and the 1848 Seneca Falls Convention, Elizabeth Cady Stanton composed the Declaration of Sentiments, a document declaring the rights of women modeled on the Declaration of Independence. It is worth noting that upon showing her Declaration to her husband, Mr. Stanton was less than pleased. He stated that if she read the Declaration at the Seneca Falls Convention, he would leave town. The Declaration of Sentiments contained several resolutions including that a man should not withhold a woman's rights, take her property or refuse to allow her to vote. The 300 participants spent July 19th and 20th arguing, refining and voting on the Declaration. Most of the resolutions received unanimous support. However, the right to vote had many dissenters including one very prominent figure, Lucretia Mott. The convention was treated with scorn from all corners. The press and religious leaders denounced the happenings at Seneca Falls. However, a positive report was printed at the office of The North Star, Frederick Douglass' newspaper. Many leaders of the Women's Movement were also leaders in the Abolitionist Movement and vice-versa. However, the two movements while occur... Free Essays on Mrs. Free Essays on Mrs. Many individuals cite the Seneca Falls Convention held in Seneca Falls, New York to be the beginning of the women's movement in America. However, the idea for the convention came about at another protest meeting: the 1840 World Anti-Slavery Convention in London. At that convention, the female delegates were not allowed to participate in the debates. Lucretia Mott wrote in her diary that even though the convention was titled a 'World' convention, "that was mere poetical license." She had accompanied her husband to London, but had to sit behind a partition with other ladies such as Elizabeth Cady Stanton. They took a dim view of their treatment, or rather mistreatment, and the idea of a women's convention was born. In the interim between the 1840 World Anti-Slavery Convention and the 1848 Seneca Falls Convention, Elizabeth Cady Stanton composed the Declaration of Sentiments, a document declaring the rights of women modeled on the Declaration of Independence. It is worth noting that upon showing her Declaration to her husband, Mr. Stanton was less than pleased. He stated that if she read the Declaration at the Seneca Falls Convention, he would leave town. The Declaration of Sentiments contained several resolutions including that a man should not withhold a woman's rights, take her property or refuse to allow her to vote. The 300 participants spent July 19th and 20th arguing, refining and voting on the Declaration. Most of the resolutions received unanimous support. However, the right to vote had many dissenters including one very prominent figure, Lucretia Mott. The convention was treated with scorn from all corners. The press and religious leaders denounced the happenings at Seneca Falls. However, a positive report was printed at the office of The North Star, Frederick Douglass' newspaper. Many leaders of the Women's Movement were also leaders in the Abolitionist Movement and vice-versa. However, the two movements while occur...

Tuesday, November 5, 2019

An Inconvenient Truth by Al Gore

Al Gores documentary, An Inconvenient Truth, Last winter, it was so warm. It was the time when I could feel that global warming is coming to the world. My friends and other people had a big curiosity that winter was not so cold as usual temperature because the rivers in Korea were not freezing well last year and there were lack of days when we could see the snowy weather. I started to feel that the earth is getting warmer and warmer and have a concern about our earth’s problem as a student who is majoring sustainability studies. With this existing condition, much news about global warming came out let people know about why the earth is getting warm and how to prevent this situation. However, both scholars and people have a different view of whether global warming is still exist or not. The biggest reason why global warming became hot issue is because of the documentary movie, namely an Inconvenient Truth, 2006. It ranks top3 documentary; I have watched it 3 times including our class time, also it was released to Korean theater for a short time because those who care of environmental issue are not so many. An inconvenient truth is the movie having the lecture from Albert Arnold Gore Jr. who was the vice president of America. He referred his teacher, child and sister while making a progress of his lecture. He has given a similar presentation over 100 times, it deserves to catch audiences’ eyes. He didn’t miss to give a humor like he introduced himself as Al Gore who might almost become a president with a bitter laugh,. He was becoming serious by showing the graph of air temperature and density of CO2 gas which was measured by his teacher; it seemed they have a big relationship between them. Every graph which he shows was amazing and enough to give a shock to audiences. The density of CO2 gas in the air had been stable over thousands years, of course there were a few fluctuations, but recently the status of the CO2 density is climbing steeply; it hasn’t had the same status before. It is enough for audiences to be eye-catching. The thing making us more surprised was the evidences of global warming. The pictures comparing the same place by having a time gap gave me astonishment such as Mt. Kilimanjaro, Patagonia highland and Mt. Everest. The areas where usually get snow have diminished, a lot of icebergs has been melting. It means the length and quantity of the icebergs get smaller than before. Then, he put more words after the pictures like some parts in the earth will be enunciated because of the water from melted icebergs and showed us the simulation of the tragic future. He gave a story of his sister who was died as a lung cancer due to cigarette. By doing so, it made him remind of that the company of cigarette had denied that cigarette has nothing to do with the cause of lung cancer but it is proved that it is not true. Now everyone knows that cigarette is big cause of the cancer. Then, he showed many pictures of the sudden changes of the earth like north pole, Alaska, Greenland and Amazon. The image of a polar bears searching for the ice flakes looks like out tragic life; they cannot find an ice where makes stable life to them by giving the spaces stepping on an ice. It means they are losing their spaces they live as the same with our spaces where will sink soon. If we can be sure global warming one hundred percent, do you think it is the human’s responsibility? Al Gore showed the persuasive graph of relationship between CO2 gas and temperature through the result of analyzing north pole’s sample in iceberg. It had never gone up over 300ppm for CO2 gas before, now it breaks a new record and would go over 400 or 500pppm in several years. It will bring about hot temperature because these green house gases will keep the heat energy which is supposed to go out of the earth. Someone says that the reason why the earth’s temperature is getting higher is due to the active activity of sunspot; many sunspots show that it is the time for sun to act very actively so it gives more radiation out of sun. Of course, it could make the earth get hotter. However, in the trustworthy journal, the activity of sun improves 0. 2 ~ 0. 4 percent, this could make an impact to get the temperature hot during centuries. However, it cannot explain the sudden improving rate, 0. 8 percent, in 20 century. Also, it doesn’t explain this situation that this situation is getting accelerated. There is an inconvenient point in the movie â€Å"an inconvenient truth†. First of all, the cause of the rise of sea level is not explained properly. It usually occurs because of temperature rising of sea making water swell. Originally the bond in ice is so strong making it compact each other, by getting heated the molecules in water become free to move, they have more space and mobility. However, this documentary movie shows the reality to us. The temperature change due to global has already become an inconvenient reality. Inland starts to make lots of dust as higher temperature makes it drier. It’s the reality for us to close up our mouth with a mast while roaming around. Many medias have still informed that both global warming and climate change are the scientific point of view but there is so specific answer of this. However, most scientists agree that there is global warming and it has a lot of things to do with human beings’ responsibility. Now it is not a stage where we have to debate whether this is global warming or not. We should adjust to the changing climate, put effort to give a solution to reduce green house gases. This has already become big social, political and economical problem getting out of scientific issue. This An Inconvenient Truth would be not knowable truth to someone but for the others they should know about that. It is the fact for us to realize that we should change something right now; we need to start to change our way of living by looking back ourselves’ life. Like Al gore’s argument, it could not disappear as it is not easily seen for us. Much bigger the importance of our environment is as we ignore more. The main convict and victim are us, so we need to know how much products we should buy, how much electricity we use, what kind of car we drive and how we deal with this situation then we can live well off in this earth

Saturday, November 2, 2019

Short and Long-term Financing Assignment Example | Topics and Well Written Essays - 2000 words

Short and Long-term Financing - Assignment Example Sainsbury plc uses different types of financing such as borrowing, bank loans, term loans and equity funds to acquire needed cash. Long term finance is usually paid off after a long period of time such as 10-25 years. On the other hand, short term finance needs to be paid off within a year. Long term finance is acquired to fulfil a company's long-term funding needs whereas short term funds are used to finance company's working capital. Sainsbury relies on short term bank loans, bank overdrafts and short term notes for short term financing, and relies on equity shareholder's funds, medium term notes, finance leases and loan stock for long term financing. The company relies on too much loan capital, which is mostly high interest bearing in the long-term. High payments of interest reduce the company's profits. Also, high loan capital weakens a company's credit worthiness and increases risk in future. Equity financing carries high cost because it is more risky for investors. However, equity financing can be used to generate huge capital and payment of dividends is not compulsory. On the other hand, debt financing requires fixed payment of interest compulsorily. Businesses cannot rely on one source of finance rather they endeavour to maintain a mix of debt and equity capital. Companies with high debt capital are considered as more risky and therefore, the cost of capital will rise as creditors will demand more return i.e. high interest because of high risk involved. High risk, high return for investors and high cost for the company. Evidence B Working Capital Management- Sainsbury plc Working capital can simply be defined as the amount of funds in excess of current assets over current liabilities. It is basically the sum of money which is left after keeping aside the funds that are to be paid off to short term creditors. Working capital is used to finance a company's short term business needs and expenditures Working capital has two major elements viz. the current assets and the current liabilities. It can be mentioned as: Working capital = current assets-current liabilities In order to analyse a company's working capital management, it is useful to calculate ratios such as current ratio, quick ratio, receivable turnover ratio and stock turnover ratio (see appendix I). All these ratios help to determine a company's working capital position. Current ratio shows the ability of a company to meet its short term expenses and obligations out of its current assets less current liabilities. Sainsbury plc's current ratio is 0.79:1 at the end of the year 2006 whereas it was 0.57:1 in 2005 and 0.83:1 in the year 2004. It shows that the working capital position of the company has declined by about 5% over the last three years. The company is able to pay off only 79p for every 1 borrowed. Quick ratio is a variant of current ratio. It is calculated on the basis of only the current assets that can be readily converted into cash, excluding inventory and prepaid expenditures. Sainsbury plc's quick ratio is 0.67:1 at the end of year 2006, 0.46:1 in 2005 and 0.67 in 2004. This means that the company is only able to pay off 67p for every 1 of its short term obligations out of its quick current assets. For efficient working capital management, it is very essential that the company is able quickly convert its receivables and inventories into cash. The receivable turnov