Friday, November 29, 2019

Q-Cash a New Era in Banking Essay Example

Q-Cash: a New Era in Banking Essay Q-CASH: A NEW ERA IN BANKING September 1, 2004 Mr. NEHAL MAHTAB Assistant Professor Department of Finance And Banking University of Dhaka Dear Sir, We are very glad to submit you the report on â€Å"Q-cash: A New Era In Banking†. We would like to say that this assignment was very helpful for us to know about the definition of Q-cash, working method of Q-cash card and ATM machine, parts of ATM, online and offline relationship and other important facts about Q- cash system. We have submitted our report to you for your kind review consideration. We made this report with our sincerity and serious effort. We will be honored to provide you any additional information if necessary. Sincerely yours, Abu Naser Sabbir Ahmed Faisal Ibne Shahajat Reaz Hassan Awwal Md. Shariful Alam B. B. A 10th Batch Department Of Finance and Banking University Of Dhaka. Table of contents 1. 0 Introduction: 1. 1 purposes1 1. 2 scopes1 1. 3 limitations1 1. 4 procedures of gathering data and sources1 1. 5 general plan of the report2 2. 0 Q-cash: A New Era In Banking 2. 1 Q-cash card3 2. 1. 1 what is q-cash card 3 . 1. 2 Key feature of card4 2. 1. 3 Facilities of Q-cash card4 2. 1. 4 Difference of q-cash card and other cards5 2. 2 ATM 2. 2. 1 what is ATM5 2. 2. 2 Invention of ATM5 2. 2. 3 Features and parts of ATM6 2. 2. 3. 1 Input device6 2. 2. 3. 2 Output of device6 3. 0 Q-cash: How the system works 3. 1 A brief overview of the Q-cash consortium (consortium, ATM network clients)8 3. 2 About ITC9 3. 3 Network system of q-cash9 3. 3. 1 offline10 3. 3. 2 online10 3. 3. 2. 1 Techniques of the online relationship followed by ITC11 3. 3. 2. Automated clearing house (ACH)11 3. 4 Security12 3. 5 Feature planning13 4. 0 Conclusion:14 Appendix Definition of terms 14 Bibliography15 1. 0 Introduction: 1. 1 Problem and purpose The objective of this study is to have some practical experience about computer application used in business sector. Though we had some textbook knowledge about how the computer application is used in banking sector, but never had any real life practice what so ever. So, to achieve the objective we had some research about the technology of Q-Cash ATM network and the facilities it brought into. We will write a custom essay sample on Q-Cash: a New Era in Banking specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Q-Cash: a New Era in Banking specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Q-Cash: a New Era in Banking specifically for you FOR ONLY $16.38 $13.9/page Hire Writer It will certainly help to improve our knowledge about how the computer technology is used in business. 1. 2 Scope The report will focus on the Q-Cash ATM network that is shared by the ten banks, the ATM machine, the Q-Cash card, how Q-Cash card and ATM machine work together, facilities of Q-Cash card, security system of Q-Cash card etc. the utilities of the system is mainly described under the current Bangladeshi prospective. It has less emphasize on the complicated architecture of the ATM machine. Its prospects and future planning in Bangladesh is also outlined in the report. . 3 Limitations While preparing the report, we faced some problem. The main problem was time constraint. Though our course teacher instructed us to prepare a report couple of months earlier, we could not start preparing because of summer vacation. After that we had the flood problem and some unwanted political problem. That is why we had real trouble in work together and collect data from sources. Another probl em was the data insufficiency. For that we had to use so many sources to get the proper information. 1. 4 Sources and methods of collecting information We have collected our data mostly from journals and Internet. But they were not enough. So, we have visited ITCL (it consultants limited) to observe their system by us and taken some interview of people related to the system. 1. 5 General plan of the report In the following pages, the discussion will give an over all view of Q-Cash ATM network in Bangladesh. Firstly, comes with the name of the ten banks that are using the Q-Cash ATM network, definition of Q-Cash, then the introduction of Q-Cash card, key features of it, facilities of using it and the related discussions about it are given. Then there are some discussions about the ATM machine; features and parts of it are given. Later, the discussions of the system such as how the Q-Cash card and ATM work together, the networking system, online offline relationship are included. It also includes the security features, future prospects of Q-Cash card. 2. 0 Q-cash: A New Era In Banking 2. 1 Q-cash card 2. 1. 1 what is Q-cash card Q-Cash card is a â€Å"Smart Card†, which is a combination of a plastic card having both microprocessor chip and a magnetic stripe. The smartness of this card will ensure that it is capable of working both â€Å"offline† and â€Å"online† thus making it a perfect case for using in Bangladesh where online connectivity cannot be guaranteed due to poor telecommunication. The Q-Cash card is more than just an ATM card. It can be used as a combination of debit and credit facility. More importantly, Q-Cash card contains a microchip that allows storing money as well as transactions and accounting information within transforming the way you do your banking. The Q-Cash card network offers all your banning requirements without ever setting foot in a bank. Its more than just an ATM service for quick withdrawals or account enquiries. With the unique Point of Sale (POS) terminals, situated in shops, restaurants and other service centres around the city, you can use your Q-Cash card to pay for goods and serves by debiting or by credit your account directly. Since your q-cash card can store account information microchip, ATM and POS services can be accessed without the need for online authorisation from your bank. The card can also act as a credit card (if approved by the bank) and can be affiliated with VISA, MASTERCARD etc. What is Smart Card Smart Card is one of the latest additions to the world of information technology. Similar in size to todays plastic payment card, the smart card has a microprocessor or memory chip embedded in it. The chip stores electronic data and programs that are protected by advanced security features. When coupled with a reader, the smart card has the processing power to serve many different applications. As an access-control device, smart cards make personal and business data available only to the appropriate users. Another application provides users with the ability to make a purchase or exchange value. Smart cards provide data portability, security and convenience. There are different types of security mechanisms used in smart cards. Those necessary for a memory-only card are less sophisticated than those for a microprocessor card. Access to the information contained in a smart card is controlled two ways: ? Who can access the information (everybody, the card holder or a specific third party). ? How can the information be accessed (read only, added to, modified or erased). 2. 1. 2 Key feature of the Q-cash Smart card ? It is an ICC (integrated circuit chip). It has a chip of 8 pins. This chip consists of operating system, processor, ROM and RAM . It also has a memory of 16kb. Meets EMV specifications and ISO 9001 Standards. Performs both online and offline transactions. Compatible with Subscriber Identification Module [SIM] like mobile phone. Compatible with Security Access Module (SAM) to help safeguard sensitive customer information and help support multiple smart card schemes. Supports memory/microprocessor smart cards and magnetic stripe cards in the same plastic. EMV Compatibility Over the past few years, there has been tremendous growth in the number of solutions developed for smart cards. To address this growth, three of the leading card associates- Euro Pay, MasterCard and Visa has collaborated to develop and publish EMV specifications for smart card based debit and credit applications. These standards provide numerous benefits for acquire and issuers, including improved security to reduce fraud and lower telecommunications costs. 2. 1. 3 Facilities of Q-cash card Q-Cash card has the facilitates of Credit and Debit transactions all in a single card and also gives the following accesses: ? Cash Deposit ? Debit Transaction ? Cash Withdrawal ? Credit Transaction ? Fund Transfer ? Account Information Customer Account Statement ? Smart Card Loading ? Balance Inquiry ? Online Offline ? Mini Statement ? 24 Hours Banking ? Chequebook Request ? Internet Banking ? Pin Change ? Any Time Anywhere Banking ? Utility Bill Payment 2. 1. 4 Difference of Q-cash card and credit card Q-cash card take funds directly from the money that is in the bank account of the cardholder. For this r eason we don’t have to pay any interest to the bank. With a Q-cash card, dont have to carry cash or checks, and it is very convenient to shop at a variety of places including gas stations, grocery stores, restaurants, and retail stores. They provide instant access to your money and are accepted worldwide. In a credit card, users actually borrow money that is made available to him by a bank or other financial institution. The institution pays the debt to the vendor, and in turn, cardholder has to pay the money back to the bank. By signing up for a credit card, you agree to pay back the money that you borrowed, in addition to any interest drawn on the amount you borrowed. 2. 2 ATM 2. 2. 1 what is an ATM An Automated Teller Machine (ATM) is a tool, which allows customers of a bank to perform banking transactions at any time from anywhere. By using a smart card in the machine customers of a bank can withdraw money from their current account (if permitted by the bank from savings account), transfer funds, pay utility bills even take credit from the bank. The most attractive site of this ATM is it gives a user 24 hours banking facility, which is totally hassle free and user friendly. 2. 2. 2 Invention of ATM As is often the case with inventions, many inventors contribute to the history of an invention. In the case of the ATM, Don Wetzel invented the first successful and modern ATM in the USA, however he as not first inventor to create an ATM. In 1939, Luther George Simjian started patenting an earlier and not-so-successful version of an ATM. Don Wetzel was the co-patentee and chief conceptualist of the automated teller machine At the time (1968) Wetzel was the Vice President of Product Planning of a company named Docutel. The other two inventors listed on the patent were Tom Barnes, the chief mechanical engineer and George Chastain, the electrical engineer. It took five million dollars to develop the ATM. The concept of the modern ATM first began in 1968, a working prototype came about in 1969 and Docutel was issued a patent in 1973. The first working ATM was installed in Rockville Center, New York Chemical Bank. The ATM they first created was a cash dispenser only. These were off-line machines; meaning money was not automatically withdrawn from an account. The bank accounts were not connected by a computer network to the ATM. Therefore, banks were at first very exclusive about who they gave ATM privileges to. Giving them only to credit card holders (credit cards were used before ATM cards) with good banking records. Wetzel, Barnes and Chastain developed the first real ATM cards, cards with a magnetic strip and a personal ID number to get cash. ATM cards had to be different from credit cards (then without magnetic strips) so account information could be included. The next version that was created in 1971, which is the ATM we all know today. 2. 2. 3 Features and parts of ATM An ATM contains many parts. ATM can differ from one to another because many companies are producing ATM this days and the technology they use differs. The ATM has mainly 2 input devices and 4 output devices. Descriptions of these two types of devices are as follows. 2. 2. 3. 1 Input device Card reader: The card reader captures the account information stored on the microprocessor chip and magnetic stripe on the ATM/debit or credit card. The host processor uses this information to route the transaction to the cardholder’s bank. Keypad: The keypad lets the cardholder tell the bank what kind of transaction is required (cash withdrawal, balance inquiry, etc. ) and for what amount. In some of the machines the screen can be also used to enter data instead of the keypad. This type of screens is called Touch Screen. Also, the ATM requires the cardholders personal identification number (PIN) for verification. For better security PIN block is sent to the host processor in encrypted form. 2. 2. 3. 2 Output device Display screen: The display screen prompts the cardholder through each step of the transaction process. Leased-line machines commonly use a monochrome or colour CRT (cathode ray tube) display. Dial-up machines commonly use a monochrome or colour LCD. [pic] Receipt printer: The receipt printer provides the cardholder with a paper receipt of the transaction. Cash dispenser: The heart of an ATM is the safe and cash-dispensing mechanism. The entire bottom portion of most small ATMs is a safe that contains the cash. The cash dispenser mechanism has an electric eye that counts each bill as it exits the dispenser. The bill count and all of the information pertaining to a particular transaction is recorded in a journal. Besides the electronic eye that counts each bill, the cash dispensing mechanism also has a sensor that evaluates the thickness and the size of each bill. If two bills are stuck together, then instead of being dispensed to the cardholder they are diverted to a reject bin. The same thing happens with a bill that is excessively worn or torn, or is folded. The number of reject bills is also recorded so that the machine owner can be aware of the quality of bills that are being loaded into the machine. Speaker: The speaker provides the cardholder with auditory feedback when a key is pressed. 3. 0 Q-cash: How the system works 3. 1 A brief overview of the Q-cash consortium To run the Shared ATM Network all over Bangladesh, all the member banks formed a consortium known as Q-Cash consortium. The Q-cash consortium has a total number of ten (10) leading Banks in Bangladesh. These banks together have build up an extensive ATM network in Dhaka, Chittagong Sylhet in first phase. In phase two other regions will be added in the shared ATM Network, 100 150 more ATMs will be installed all over Bangladesh very soon. Q-Cash is a common card for all member banks in the Consortium and ITC is providing all the technical and management supports. The names of the 10 banks are [pic] Currently 18 ATMs are installed in Dhaka and Chittagong. The locations of these ATMs are as follows. |ATM Service Locations | |Dhaka | |Uttara Branch, AB Bank Ltd. Uttara branch, The City Bank Ltd. | |Uttara Branch, IFIC Bank Ltd. |Gulshan Branch, AB Bank Ltd. | |Gulshan Branch, The City bank Ltd. |Mohakhali Branch, AB Bank Ltd. | |Dhanmondi Branch, AB Bank Ltd. |Mina Bazar, Dhanmondi | |Kakrail Branch, AB Bank Ltd. |Principal Branch, AB Bank Ltd. | |Principal Branch, Mercantile Bank |Janata Bhaban, Janata Bank | |Federation Branch, IFIC Bank |Shantinagar Branch, IFIC Bank | |Jiban Bima Bhaban, The City Bank Ltd. Dhanmondi, IFIC Bank | |Chittagong | |Agrabad Branch, AB Bank Ltd. |CDA Avenu e, AB Bank Ltd. | 3. 2 About ITC ITC or Information Technology Consultants Limited works as the server or as an Internet Service Provider (ISP) or the host in the shared ATM network. ITC is the company which brought the Q-cash system first in Bangladesh . It is a sister concern of Envoy Group. Originally it was introduced by a foreign organization named â€Å"Gemplus†. They are providing the smart card, ATMs and all the technical and management supports of the Q-cash consortium. . 3 Network system of q-cash All the locations of these ten banks and POS centres that have Q-cash are joined together by two kinds of networking relationship. These networking functions are performed for withdrawals of cash from the account, to get account information, pay the utility bills and transactions through POS. These two types of networking relationship are 1) Offline relationship and 2) Online relationship Offline relationship with Q-cash system is used for POS and the utility bill paying a nd the online relationship with the system is used for withdrawal of cash and other activities concerning the users account. . 3. 1 Offline relationship An offline relationship is the part of the networking system were the transactions are not connected to the server of the ATM host. This offline relationship can be found on the POS system. POS means Point Of Sales. In this system a Q-cash cardholder can buy products from the shops, which is connected with the host computer. Using their q-cash card the user will pay his bills by inserting his card in a small machine. The machine is capable of reading the memory chip in the card. As the account information of the user is already in the card the machine can authenticate the user and the amount of money the user has on his account. This entire process has no connection with the server or with the bank of the user. 3. 3. 2 online relationship Online relationship is the part of the network that is done completely by online with the help of the ATM host. The host processor may be owned by a bank or financial institution, or an independent service provider may own it. All the controlling branches of the banks have an online relationship with the host. Host connects the ATMs of different locations with the banks of the network. To maintain the connections between the ATMs Banks and POS the host uses different types of communication media. Most host processors can support either leased-line or dial-up machines. Leased-line machines connect directly to the host processor through a four-wire, point-to-point, dedicated telephone line. Dial-up ATMs connect to the host processor through a normal phone line using a modem and a toll-free number, or through an Internet service provider using a local access number dialled by modem. Leased-line ATMs are preferred for very high-volume locations because of their thru-put capability, and dial-up ATMs are preferred for retail merchant locations where cost is a greater factor than thru-put. DDN technology is a new one in modern online banking. It is a kind of digital connection, which performs better than the leased line connections. Usually these sorts of connections relate the host and the ATMs. The most effective feature of DDN is to transfer data at a higher speed than that of leased lines or the Dial-up lines. This is how ATM networks become available to the cardholder (the person wanting the cash). [pic] . 3. 2. 1 Techniques of the online relationship followed by ITC In online connection the members of the Q-cash consortium is connected with ITC (host) by simple dialup connection. They connect the host processor or the ITC through a normal phone line using a modem and a toll-free number. ITC is connected with the ATMs and POS terminals of different places all o ver the country by leased line, DDL, Satellite connection, Radio link, Dial-up connection. These various types of communication facilities are used because the telecommunication infrastructure of Bangladesh is very weak. So if one system is collapsed the other will work. But mainly the DDL is used for communicate with the ATMs (provided by Bangladesh Tar and Telephone Board), Dial-up connection is used for to communicate with POS terminals and the banks, satellite for overseas connection with banks and radio link for remote places. When a user of a bank inserts his ATM card in the ATM and enters his PIN the ATM directly connects with the host ITC for authentication. In the authentication process the host (ITC) checks the security pin and performs the other security checking’s. If the user of the card is authorised host connects the ATM with the users bank server. In the process, the server of the bank checks the account and adjusts the balance. This is called authorization. The server of the bank performs the action by using a system called core-banking software. If a server of bank does not have the core banking software, they inform ITC the numerical position of the account of all their Q-cash cardholders via dial-up connection. Thus ITC always gets the numerical information on the account position of the customers of the bank. In this case the host (ITC) does the work of both authentication and authorization. 3. 3. 2. 2 Automated clearing house (ACH) ACH is short for automated clearing house. This bank terminology means that a person or business is authorizing another person or business to draft on an account. When a cardholder wants to do an ATM transaction via POS, he or she provides the necessary information by means of the card reader and keypad. The card reader forwards this information to ITC via Dial-up connection. Which routes the transaction request to the cardholders bank that issued the card. If the cardholder is requesting to pay, the host (ITC) processor causes electronic funds transfer to take place from the customers bank account to the host processors account. The processor then ACHs the cardholders funds into the merchants bank account. In this way, the merchant is reimbursed for all funds dispensed by the ATM. An independent ATM host can access any bank. It also supports a large number of ATMs placed with different merchants. So when the user authorises to pay the cash, the money moves electronically from users account to the hosts account to the merchants account. [pic] [pic] [pic] 3. 4 Security Q-cash is fully secured. The main concept of the security process of Q-cash system is any cardholder can only carry out transaction on Q-cash ATMs with a Personal Identification Number (PIN) . If a person loses his card others cannot use it that because transactions cannot be done without the PIN. The Q-cash smart card is a PIN protected card with DES, 3DES function to ensure security. DES is an encryption algorithm used to protect sensitive data – in this case the PIN. The DES algorithm uses a 56-bit key length; 3DES specifies three rounds of encryption, effectively increasing the key length to 168 bits. Q-cash smart card is also EMV compatible. 3. 5 Future prospects of Q-cash Since it is made with hybrid technology, it can read or write any kind of data. So, in the near future it can be used as voter id, club, insurance, driving or even national identity card. More updated security system is getting included in the card, so the user will have more security. New features of banking are getting included in it and the users will get the latest banking feature by using it. 4. 0 Conclusion Q-Cash service is getting popular day by day in our country. More banks are getting themselves included in the network. All the cards will be converted into smart card till 2006 and we are getting it in right now. It has the potential to be utilized in a greater aspect. So, it has given a new dimension in the banking sector in Bangladesh. Appendix Definition of terms There are some unfamiliar terms that were not described in the discussion. So, the definitions of terms are given below alphabetically. ATM (Automated Teller Machine) – the machine that provides the users to deposit or to withdrawal money. ACH (Automated clearing house) a centralized and computerized system for setting indebtedness between members. BTTB(Bangladesh Tar and Telephone Board) It is a government service for nationwide telecommunication. Card reader – a device of ATM machine that gathers the account information stored on the magnetic stripe on the back of a Q-Cash card. CRT (cathode ray tube) – the most common type of monitor used in the office and home is CRT. CRT is similar in size and technology to television. Credit card – a car through which a person can buy things on credit. DDN (digital data network) – a digital data network provided by in order to connect to the ISP host. Dispenser – the path trough which cash is dispensed from ATM. ISP (internet service provider) – the organization that provides Internet service. Keypad – the input device by which the cardholder tells the ATM the nature, the amount of the transaction and the pin. LCD (liquid crystal display) – LCD monitor use the technology that involves liquid crystals. It is much thinner then CRTs. Modem The device that helps the user to connect his computer to some sorts of networking system. Offline relationship – all the branches of any of the ten banks that manually connect with their card issuing branch. Online relationship all the branches of any of the ten banks that connect with their card issuing branch by a host processor to work in online. Pin – the secret code to access into the account of a cardholder to perform account related functions. Receipt printer The device that provide a cardholder with a paper receipt of the transaction. Server – the part of Internet system that stores information files that are used to display pages of information. Speaker – the device provides the cardholder auditory feedback when a key is pressed. Sensor – a device of ATM that evaluates the thickness of each bill. Bibliography Interviews Md. Wajid Ahmed Project leader (Q-Cash EMV) IT Consultants Limited Md. Faizul Islam System Engineer Q-cash Processing System IT Consultants Limited Interview on September 4, 2004 Newspaper articles The Daily star â€Å"Local private it firm plans shared ATMs for Bangladesh† April 25, 2001 Prothom Alo â€Å"It consultant is providing different kind of ATMs for banks† April 25, 2001 Dainik Jugantor â€Å"24 hour Q-Cash card is getting started† July 14, 2002 Websites http://www. itclbd. com http://www. howstuffworks. com http://www. thecitybank. com http://www. pubalibangla. com http://www. mutualtrustbank. com http://www. mblbd. com http://www. janatabank-bd. com http://www. abbankonline. com http://www. ebl-bd. com http://www. ificbankbd. com http://www. nccbank-bd. com http://www. jamunabankbd. com

Monday, November 25, 2019

Oreos v.s chips ahoy Essay Example

Oreos v.s chips ahoy Essay Example Oreos v.s chips ahoy Paper Oreos v.s chips ahoy Paper Chips Ahoy Is healthier Ores has so much fat. Many people has heart problems from eating Ore cookies all time. Im carving for something creamy. To start off, Chips Ahoy Is way healthier than Ore cookies. For example Ore cookies have more sugar than Chips Ahoy. Chips Ahoy has 11 grams of sugar and Ores has 14 grams of sugar. Although this doesnt seem like a lot, most people have the tendency to have more than one serving especially when eating cookies. In recent studies people eat about 8,000 Ore cookies in their lifetime. This is resulting in to 112,000 fats in a lifetime or about 4 Ore cookies everyday which is more than a serving size every day. Wow that a lot a fat each day! To keep things going, Ores has caused many people to have heart problems. 100 million people get diagnosed with heart robbers and Ore cookies are one of the leading problems. One of the biggest issues in Ores is that they fry the Ores. Even though the Ore industry is still growing and changing ever day, people still dont get the Idea that this is bad for us. So why are we eating a dessert than upraises the chances of getting these heart problems? To wrap things up, I think Chips Ahoy Is a great cookie. It Is healthier and many people has heart problem form eating too much Ores. Which one would you choose?

Thursday, November 21, 2019

Case study for entrepreneurship and small business course - 1

For entrepreneurship and small business course - Case Study Example As an innovative entrepreneur, Dave invented the turning bucket that is a signature mark outside many KFC restaurants. Dave was also flexible and self-confident when he specialized in selling hamburger. He was committed with strong drive to achieve when he went on to open hamburger restaurant despite opposition from professional bankers and financial advisers who told him, the market was saturated. He was good planner with organizational skills and strong management skills because how was able to open a chain of hamburgers. He responded to customer’s demand by offering better quality food products and expanding the menu to accommodate customers’ demand. He was willing to listen to customers in order to respond to their needs (Zimmerer, Scarborough, & Wilson, 2008). Dave’s success with the first Wendy restaurant can be attributed to the strong entrepreneurial skills and the ability to listen to customers’ demands and respond to them as quick as possible. Dave was very friendly entrepreneur who consulted bankers and other financial advisers for advice, but often made personal and independent decisions that contributed to the success of the restaurant. Another attribute that contributed to the success of the first restaurant was the specialization. Dave specialized to an area where he was most interested in hence improving quality of the food products. His invention as well provided him with free product hence saving the cost that could be used to buy the rotating bucket sign. This was also attractive to customers who became loyal to the restaurant (Zimmerer, Scarborough, & Wilson, 2008). The statement means that an entrepreneur has to diversify his targets and goals to align with the customers in order to keep their loyalty and meet their demand. Every entrepreneur has his goals for starting a business. He is, therefore, driven by commitment, independence and the ability to achieve the goals (Zimmerer,

Wednesday, November 20, 2019

Report of Construction Project Network Diagram Essay

Report of Construction Project Network Diagram - Essay Example In the context of this report, the project manager of Company A had initiated with his team the use of network diagram in order to acquire an accurate calculation of the whole duration of the project. Each individual activity to be undertaken was given a specified time of completion before starting the next activity. In the analysis done using the said instrument, there are two factors to consider in determining and calculating the whole duration of an activity. These are the forward pass – the early or late start and backward pass – the early of late finish. The critical path was chosen from the longest duration taken after calculating the earliest and latest event times in order to allow adjustment which activity needs speed up. Float was also calculated using the network diagram in order to determine the duration of activity delay that the project can permit before the project becomes late. A Gantt chart will provide a clear view of the critical path in the project. ... ws the sequence of the activities or tasks to be carried out, the amount of time needed to complete the activity as well as the whole project, the dependencies of activities and which activities need more attention. It is widely used by many project managers because it helps them to identify the most efficient sequence of events within the required time for the completion of any project. Example of network diagram can be shown in the succeeding part of this report. 3.0 Network diagram analysis Analysis of the network diagram is very necessary to evaluate the sequence of the activities and to construct a network with a timeline for the project. In order to carry out the analysis successfully, the project manager should consider the following fundamental steps: 1. Draw the calculations of the earliest and latest event times. 2. Draw an activity analysis table showing the results found which include the activities, duration, and earliest and latest event times. 3. Calculate the float, f ree total and independent float of each activity. 4. Produce a Gantt chart showing the timeline of the project’s activities. 5. Produce a histogram of all activities resource requirements. As noted by the project manager each activity needs at least one work crew. 6. Carry a resource leveling exercise to produce a smooth resource histogram. –Within the constraints of the critical path duration found- 3.1 Redrawing the diagram The figure 1(network diagram) below shows a simple example of network diagram and the calculation of time duration of the project using the forward pass and backward pass method of time management. It also exhibits the dependency of each task to be undertaken for the accomplishment of the project. Base on logical explanation, the predecessor task/activity should be

Monday, November 18, 2019

Technological innovations from creative minds Essay

Technological innovations from creative minds - Essay Example Because of this we see technology as a work both of science, art, and as a means to an end and not just a technology per se. Engineers are rarely able to solve problems by mere substituting numerical values in mathematical formulas. "It is his business to cause a compromise between several conflicting requirements and find a solution, which will fulfill the desired purpose in an economical manner," (Still & Siskind, 1954). The engineering components of a design represent the science of it that would cover the principles, theories, systems, and mathematical principles involved. The functionality, mechanisms, and others physical components of a technology is created with reasons. How these scientific components are implemented and arranged to work in a technology is the art that depended on creative and critical judgment. Still and Siskind (1954) further affirmed that machine design calls for individual judgment to a greater extent. But judgment is not easily acquired in school. It is inherent within the character of the designer and learnt through practice and experiences. Achieving the end through the unu sual way requires a critical mind that evaluates every bit of possibilities and impossibilities. The outcome or the end results, the underlying cause why a technology is created, the effect of the technological... al environment, improved food, clothing, and shelter, increased security, release from the bondage of bare existence, increased knowledge as among the important contributions of technological development. Meanings are embodied within the aspect of every technological design and this revolves around the creative nature of the designer. Focusing so much on the technological side could not make us appreciate the real context of the creativity for which the technology is based. As Heidegger (1997) puts it, "the essence of technology is by no means anything technological." Therefore dealing so much on the tangible aspect of the technology would keep us entwined and captured with it. By looking beyond we open our minds to new possibilities, innovations, and a future outlook. Design concepts and creations are based on science and engineering principles but it is the creativity that puts meaning on the design. To simply illustrate, two scientists may use the same engineering principles and techniques in coming up with a design to solve a particular problem but there could be difference in the final form since another factor usually play and that what most creative thinkers see beyond the phys ical side. When humans developed the rockets he looked beyond the conquest of space. And when man sees beyond the boundaries of the universe he doesn't end his creativity within the limits of the capability of the rockets. Technologies are shaped by the future and seeing beyond the future of new technologies is what ignites creativity to develop new ways, new things, and new ideas. Let us apply the concepts of technological creativity with the emerging virtual technology and gather around the science, the art, and the means to an end behind its conceptualization, development, and

Saturday, November 16, 2019

Economies of Scale Economies of Scope in long run

Economies of Scale Economies of Scope in long run Paridhi Gupta Introduction Economies all about cost effectiveness. The term Scale is all about the benefits gained by the production of large volume of a product. The term scope is linked to the benefits gained by producing a wide variety of products by efficiently utilizing to same operations. What are Economies of Scale? The term economies of scale refers to a situation where the cost of producing one unit of a good or service decreases as the volume of production increases. Economies of scale arise when the cost per unit falls as output increases. Economies of scale are the main advantage of increasing the scale of production. Examples:- Table 1 Assume each unit of capital = Rs.5, Land = Rs.8 and Labour = Rs.2 Calculate TC and then AC for the two different ‘scales’ (‘sizes’) of production facility AC = TC / Q TABLE 2 Doubling the scale of production (a rise of 100%) has led to an increase in output of 200% therefore cost of production PER UNIT has fallen Don’t get confused between Total Cost and Average Cost Overall ‘costs’ will rise but unit costs can fall Classification of Economies of Scale: Marshall made a differentiating concepts of internal and external economies of scale. That is that when costs of input factors of production go down, it is a positive externality for all the firms in the market place, outside the control of any of the firms. Internal Economies of Scale Internal economies of scale relate to the lower unit costs a single firm can obtain by growing in size itself. This means that the internal economies are exclusively available to the expanding firm. Internal economies of scale may be classified under the following categories. Bulk- buying economies As businesses grow they need to order larger quantities of production inputs. For example, they will more raw materials. As the order value increases, a business obtains more bargaining power with suppliers. It may be able to obtain discounts and lower prices for the raw materials. Technical economies Businesses with large-scale production can use more advanced machinery (or use existing machinery more efficiently). This may include using mass production techniques, which are a more efficient form of production. A larger firm can also afford to invest more in research and development. Financial economies Many small businesses find it hard to obtain finance and when they do obtain it, the cost of the finance is often quite high. This is because small businesses are perceived as being riskier than larger businesses that have developed a good track record. Larger firms therefore find it easier to find potential lenders and to raise money at lower interest rates. Marketing economies Economies in marketing arise from the large –scale purchase of raw materials and other material inputs and large scale selling of the firm’s own product. Every part of marketing has a cost – particularly promotional methods such as advertising and running a sales force. Many of these marketing costs are fixed costs and so as a business gets larger, it is able to spread the cost of marketing over a wider range of products and sales – cutting the average marketing cost per unit. Managerial economies As a firm grows, there is greater potential for managers to specialise in particular tasks (e.g. marketing, human resource management, finance). Specialist managers are likely to be more efficient as they possess a high level of expertise, experience and qualifications compared to one person in a smaller firm trying to perform all of these roles. External economies of scale External economies of scale occur when a firm benefits from lower unit costs as a result of the whole industry growing in size. External economies accrue to the expanding firms from advantages arising outside the firm e.g. in the input markets. The main types are: Transport and communication As an industry establishes itself and grows in a particular region, it is likely that the government will provide better transport and communication links to improve accessibility to the region. This will lower transport costs for firms in the area as journey times are reduced and also attract more potential customers. For example, an area of Scotland known as Silicon Glen has attracted many high-tech firms and as a result improved air and road links have been built in the region. Training and education becomes more focused on the industry Universities and colleges will offer more courses suitable for a career in the industry which has become dominant in a region or nationally. For example, there are many more IT courses at being offered at colleges as the whole IT industry in the UK has developed recently. This means firms can benefit from having a larger pool of appropriately skilled workers to recruit from. Other industries grow to support this industry A network of suppliers or support industries may grow in size and/or locate close to the main industry. This means a firm has a greater chance of finding a high quality yet affordable supplier close to their site. The long run average cost curve (LRAC) The long run average cost curve (LRAC) is known as the ‘envelope curve’ and is usually drawn on the assumption of their being an infinite number of plant sizes – hence its smooth appearance in the next diagram below. The points of tangency between LRAC and SRAC curves do not occur at the minimum points of the SRAC curves except at the point where the minimum efficient scale (MES) is achieved. If LRAC is falling when output is increasing then the firm is experiencing economies of scale. For example a doubling of factor inputs might lead to a more than doubling of output. Economies of scope Economies of scope is a term that refers to the reduction of per-unit costs through the production of a wider variety of goods or services. Many firms produce more than one product. Sometimes, a firm’s products are closely linkes to one another. An automobile company, for instance, produces automobiles and trucks, a chicken farm produces poultry and eggs. At other times, firms produce physically unrelated products. In both caes, however, a firm is likely to enjoy production or cost advantages when it produces two or more products. These advantages could result from the joint use of inputs or production facilities, joint marketing programs, or possibly the cost savings of a common administration. Example of Economies of Scope McDonalds can produce both hamburgers and French fries at a lower average cost than what it would cost two separate firms to produce the same goods. This is because McDonalds hamburgers and French fries share the use of food storage, preparation facilities, and so forth during production. Difference between economies of scale and economies of scope Mergers and Acquisitions Mergers are basically combining of two business entities under common ownership. Two companies legally become one. All assets and liabilities being merged out of existence become assets and liabilities of surviving company. Under acquisitions one firm buys the assets or shares of another. Acquired company becomes subsidiary of purchasing company. Different Types of Mergers A horizontal merger This kind of merger exists between two companies who compete in the same industry segment. A vertical merger Vertical merger is a kind in which two or more companies in the same industry but in different fields combine together in business. Co-generic mergers Co-generic merger is a kind in which two or more companies in association are some way or the other related to the production processes, business markets, or basic required technologies. Conglomerate Mergers Conglomerate merger is a kind of venture in which two or more companies belonging to different industrial sectors combine their operations Different Types of acquisitions Friendly acquisition Both the companies approve of the acquisition under friendly terms. Reverse acquisition A private company takes over a public company. Back flip acquisition- A very rare case of acquisition in which, the purchasing company becomes a subsidiary of the purchased company. Hostile acquisition Here, as the name suggests, the entire process is done by force. Motives for Mergers Acquisitions Economies of large scale business large scale business organization enjoys both internal and external economies. Elimination of competition It eliminates severe, intense and wasteful expenditure by different competing organizations. Desire to enjoy monopoly power MA leads to monopolistic control in the market. Adoption of modern technology corporate organization requires large resources Lack of technical and managerial talent Industrialization, scarcity of entrepreneurial, managerial and technical talent Creation of Synergies The financial benefit that two companies may derive from a merger or acquisition is called synergy. The synergistic effect may also refer to the cost reduction a merger brings about by eliminating or streamlining redundant processes. Different types of Synergies enjoyed through MA Management Synergy Management synergy refers that the companies use its extensive and efficient management resources through new permutations and combinations after MA to improve the existing management and finally increase the revenue. Operating Synergy Operating synergy refers to the improvement of production and operation efficiency of enterprises which caused by economies of scale and economy of scope after MA. Financial Synergy Financial synergy refers to the financial benefits generated by MA transaction. It is a net cash flow on benefits which are caused by tax laws, accounting standards and other provisions of the securities and exchange. Production Synergy Two companies that merge may be able to produce more revenue than either one could produce independently by combining the most efficient processes each brings to the merger. Risks Analysis of the Realization of Synergistic Effect The risks of the realization of synergistic effect refers to the uncertainty of the increment of corporation value and the performance of strategic MA. Such risks always exist throughout the whole process of synergistic effect realization. From the view of the root causes of the risks, such risks can be divided into internal risks and external risks Internal Risks Internal risks mainly refer to the synergistic effect of risks which is caused by MA transactions and integration. Synergistic effect of internal risks mainly includes financial risk integration risk anti-MA risk principal-agent risk asymmetric information risk 1) Financial risk. MA often requires large amounts of capital, how to raise funds in short term is very important. Companies can use cash, stock or debt financing for the MA. Either way, there are great risks. If companies use cash to complete the MA, there will have the following short-comings: first of all, a one-time large amount of cash outflow for MA will cause intense pressure on the production and management of the enterprise. Second, the trade size will be restricted by the ability to obtain cash and lead to the failure of a large-scale MA. Moreover, the merged side may not like cash payment, because they cannot get the new company’s equity, this situation will also lead to MA risks. 2) Integration risk. According to a survey on the failure of MA, about 80% of MA failures are caused by enterprise integration failures. The MA integration risk is manifested mainly in the following three aspects: first, production and technology cannot achieve the expected synergy after MA. For example, the MA side usually wants to implement diversification through MA so as to enter new areas, when the growth of the new areas are faced with obstacles, it often makes MA activities in trouble. Second, the integration of personnel, institution and culture after MA. If the enterprise cannot make effective integration according to the designed MA plan, this will lead to the conflict of personnel, institution and cultural be-tween new and old enterprises and resulting in internal friction. Third, the impact of MA on business relationships, such as the impact on customers and suppliers. MA might cause deterioration in external business relationship and lose some customers and suppliers, thus lead to the increa se of enterprise’s operating costs and reduction its profitability. 3) Anti-MA risk Under normal circumstances, the merged enterprise’s attitude of MA is uncooperative. Because the merged enterprises are usually inferior enterprises, they will find ways to stop MA. Such practices will greatly increase the MA risks. In addition, under the modern corporate governance structure, a successful MA must first be accepted by enterprise management, then adopted by the board of directors in the enterprise, at last obtain the consent of the large, small and medium-sized investors. 4) Principal-agent risk For pursuing business expansion, the senior executives with information superiority might ignore the interests of shareholders to meet the needs of their individual fame and fortune. The â€Å"out of control† risk of principal-agent relationship in MA decision is very dangerous. In a company, the relationship between its manager and corporate owners is principal-agent relationship. The company management might pursuit company expansion for their own interests to show their performance. They have information superiority and might agree on the unreasonable terms of the target company without considering its own financial and operating conditions. This conduct will increase the realization cost of synergy and reduced synergy benefits. 5) Asymmetric information risk In the market mechanism of incomplete competition, the problem of information asymmetry is quite general. During the course of strong company’s acquisition of target company, the target company’s executives might conceal the facts such as enterprise’s hidden losses of contingent liability and the true value of patents to achieve their private intentions. They might also collude with the agency or the insider of the strong enterprise to make false information so that the policy makers of the merging side might make wrong decisions. External Risks As synergistic effect is based on certain of development strategy and the formulation of such a development strategy is based on external environment, therefore, the changes in external environment not only affects the enterprise’s development strategy, but also cause the deviation from the expected synergies. The external risks of synergistic effect mainly include policy risk legal risk industrial risk. 1) Policy risk. Policy risk refers to the synergy risk which caused by the adjustment of national economic policies. The government develops special policies to protect the vested interests of government and â€Å"special groups† or uses administrative means to arbitrarily change its policy to destroy the normal order of market competition, such behavior would increase the risk of synergy. 2) Legal risk. Legal risk mainly lies in the following three aspects. The first is the provisions of anti-monopoly law. Most of western countries developed a series of anti-monopoly laws to safeguard fair competition. The second is the specific provisions of MA in the law. For instance, according to the correlated laws, if the acquirer holds 5% of a listed company’s shares, it must notice and suspend trading, for each 2% subsequent increment, it is necessary to repeat the process, if holding 30% of the shares, it must launch a comprehensive tender offer. This provision leads to great increase of the acquisition costs and MA risk. Thirdly, during the course of MA, as laws and regulations are incomplete, the conduct of company cannot be guided correctly, thus result in the increase of MA risk. 3) Industrial risk. Industry risk refers to the uncertainty of the industry prospects caused by the changes of country’s economic situation and industrial policy, which might influence the enterprise development strategy. In the process of MA decision-making, many enterprises sink into woeful situation because they are not familiar with the new industry they wish to enter or without a accurate grasp of the industry prospects. The â€Å"big diving† of e-commerce enterprises in the last two years are good examples. Conclusion Bibliography http://tutor2u.net/economics/content/essentials/economies_scale_scope.htm http://www.tutor2u.net/business/gcse/downloads/production_economies_of_scale.pdf www.scirp.org/journal/PaperDownload.aspx?paperID=4385 Pindyck, Rubinfield, Mehta, MicroEconomics, 7th Edition, Pearson

Wednesday, November 13, 2019

Vineyard provinces of Iran Essay -- Agriculture, Grape Production

Grape berry moth, Lobesia botrana Den. & Schiff. is one of the most important pests of grape vine in most parts of the country. Losses caused by larval feeding leads to disrupted plant activities, reduction in flower buds and ultimately decreased quality and quantity of the crop. In order to study seasonal flight activity of Lobesia botrana and to determine spraying time, experiments were conducted for two consecutive years at two different orchards in Sissakht region in 1999-2000. The seasonal flight of Lobesia botrana was investigated by using pheromone traps and collecting samples from eggs, larva and pupa stages of the pest. The results showed that Lobesia botrana has three generations with an incomplete 4th in the region. Damage of first and forth generation is very low. The grape vine fruits can be mainly damaged by the second and third generation of Lobesia botrana that will happen about ten days after the adult emergency. Regarding to the results, spraying should be done duri ng two weeks from 9th Lobesia botrana for the next year. Key Words: Lobesia botrana, Population dynamics, Pheromone traps, spraying. Introduction Grape is one of the major economical products in Iran. Kohkiluyeh-Va-Boyer- Ahmad has been long one of the Vineyard provinces of Iran. According to statistics of 2005, there was 1900 hectares under cultivation (700 hectares of sapling and 1200 hectares of fruitful trees) with the production of 1250 metric ton, an average of 12500 Kg per hectare [5, 7]. The vineyards of Kohkiluyeh-Va-Buyer-Ahmad are mostly in the counties of Buyer-Ahmad, Sissakht (Dena) and Kohkiluyeh [10]. Lobesia botrana is one of the most important pest causing serious damages to vineyards in Iran and around the world. In some years, ... ... – 11, May 13 – 18, May End of 2nd gen 26, May – 5, June 25, May – 4, June Start of 2nd gen. 5 – 12, June 4 – 11, June Fly climax of 2nd gen. 19 – 26, June 18 – 25, June End of 2nd gen 17 – 31, July 13 – 28, July Start of 3rd gen. 31, July – 11, August 28, July – 13, August Fly climax of 3rd gen. 20 – 27, August 22 – 29, August End of 3rd gen 3 – 9, September 6 – 16, September Start of 4th gen. 9 – 16 September 16 – 24, September Figure 1. Population dynamics vine moth in Sissakhat region (plain) 2007-2008 Figure2. Population dynamics vine moth in Sissakhat region (Mountain). 2007-2008 Figure 3a. Fluctuation curve daily Min and Max temperature (Celsius). 2007 Figure 3b. Fluctuation curve daily Min and Max temperature (Celsius). 2008 Figure 4. Exit trend adults overwintering in laboratory conditions (2008). References :

Monday, November 11, 2019

Organizational Behavior in Criminal Justice Essay

Organizational behavior in a criminal justice agency is the way in which employees and their superiors interact amongst themselves and with one another both positively and negatively. Organizational behavior itself is the study of social conduct as it relates to the confines of a specific group. It is the study of how an individual or group interacts with one another and the dynamics of the personal relationships that evolve from that contact (Duan, Lam, Chen, & Zhong, 2010). The shifting paradigm trends describe by Schermerhorn, Hunt, and Osborn (2008) can be used to delve further into the understanding of the organizational behavior that exists in most criminal justice agencies. The archetypical performance falls into one of seven categories; commitment to ethical behavior, importance of human capital, demise of command-and-control, emphasis on team work, pervasive influence of information technology, respect for new workforce expectations, and changing careers. From these trends b oth positive and negative characteristics of criminal justice agencies can be identified. â€Å"Commitment to ethical behavior: Highly publicized scandals involving unethical and illegal business practices prompt concerns for ethical behavior in the workplace; there is growing intolerance for breaches of public faith by organizations and those who run them† (Schermerhorn, Hunt, & Osborn, 2008, para. 14). In criminal justice agencies ethical violations often are handled with little fan fair. Any level of impropriety introduced in the prying public eye can have innumerous repercussions. The loss of public support and trust can be a huge problem, but it affects the internal structure too. Depending on how fairly and swiftly the situation is handled determines whether or not those in charge gain or lose respect. Judgments will be passed on how the situation was controlled, and how it should have been dealt with. In delicate matters like this behaviors of retaliation and accusations of bias are important to be kept at a minimum. â€Å"Importance of human capital: A dynamic and complex environment poses continuous challenges; sustained success is earned through knowledge, experience, and commitments of people as valuable human assets of organizations† (Schermerhorn, Hunt, & Osborn, 2008, para. 14). The workforce is the heart of a criminal justice agency. It should be the single most cherished asset. The appreciation of experience by an organization is vital. But more importantly the recognition, respect, and aspiration by new members and seasoned is a must. This necessity recognizes a clear chain of command and model of training. â€Å"Demise of command-and-control: Traditional hierarchical structures are proving incapable of handling new environmental pressures and demands; they are being replaced by flexible structures and participatory work settings that fully value human capital† (Schermerhorn, Hunt, & Osborn, 2008, para. 14). Shared responsibility and the extinction of the â€Å"because it has always been done that way† is a requirement in the modern criminal justice agency. It is being replaced by the attitude that the old way is not always the best way, and we all have a lot to learn from one another. While command still flows in one direction; ideas can come from anywhere. â€Å"Emphasis on teamwork: Organizations today are less vertical and more horizontal in focus; driven by complex environments and customer demands, work is increasingly team based with a focus on peer contributions† (Schermerhorn, Hunt, & Osborn, 2008, para. 14). In a criminal justice agency teamwork may have become common place, but improvements still need to be made in the area of information sharing. While no man is an island, neither is an agency. For the sake of public welfare resources need to be pooled. â€Å"Pervasive influence of information technology: As computers penetrate all aspects of the workplace, implications for workflows, work arrangements, and organizational systems and processes are far-reaching† (Schermerhorn, Hunt, & Osborn, 2008, para. 14). We are in the information technology age and the correct resources and know-how can be the deciding factor in the constant struggle b etween criminals and policing agencies. Increased educational and computer skills demands are needed to boost and maintain an advantage at any level of criminal justice agency. â€Å"Respect for new workforce expectations: The new generation of workers is less tolerant of hierarchy, more informal, and less concerned about status; organizations are paying more attention to helping members balance work responsibilities and personal affairs† (Schermerhorn, Hunt, & Osborn, 2008, para. 14). While a certain amount of attention should be paid to new workforce expectations it is important not to compromise the integrity of the job expectations. A balanced life should lead to a happy and relaxed employee who theoretically should also be more effective and efficient in an effort to maintain employment in the desired environment. Employer’s must remain fair but also realize their top priority in the criminal justice field is not to ensure employee happiness. An employee who can balance work and a private life on his own should be a valuable commodity. â€Å"Changing careers: The new realities of a global economy find employers using more â€Å"offshoring† and â€Å"outsourcing† of jobs; more individuals are now working as independent contractors rather than as traditional full-time employees† (Schermerhorn, Hunt, & Osborn, 2008, para. 14). In criminal justice agency this trend is no different. It is not uncommon for governments to hire private security firms and private corrections companies. However, by outsourcing such positions power is lost in the public sector. Monitoring a regulations create more work when dealing with outside policing forces. It also opens up a gray area for bad behavior and a hired gun mentality. While roles may be redefined privatization of criminal justice agencies can be more of a problem than a convenience. Study of workplace environments and the effects of the personnel’s behavior can only continue to bring about recognition of areas in need of improvement. Works Cited Duan, J., Lam, W., Chen, Z., & Zhong, J.A. (2010). Leadership justice, negative organizational behaviors, and the mediating effect of affective commitment. Social Behavior & Personality: An International Journal, 38(9), 1287-1296. Retrieved from http://biere.louisiana.edu:2092/ehost/detail?hid=17&sid=5d563aca-ec9a-43c49e42db48b73a6784%40sessionmgr4&vid=4&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=sih&AN=54018927 Schermerhorn, J.R., Hunt, J. G., & Osborn, R. N. (2008). Organizational Behavior. Available from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx.

Saturday, November 9, 2019

Twenty Years at Hull House

Twenty Years at Hull House The study of leadership and leaders has a long and multifaceted history rich in rituals, metaphors, symbols, and stories. As a field of scientific inquiry, leadership has intrigued scholars and practitioners from nay disciplines, as diverse as religion and political science, psychology and economics.Advertising We will write a custom essay sample on Twenty Years at Hull House specifically for you for only $16.05 $11/page Learn More In our everyday conversation, we talk about the lack of sound leadership, and the need for more effective leadership in the family, our organizations, communities, and nations (Fradin and Fradin). On the other hand, some of our greatest cultural, social, political, and artistic accomplishments are attributed to leadership, as have many political catastrophes and social ills. Leadership has been and is a cause and effect of greatness and success as well as insignificance and failure. Since recorded in history, ideas of leadership h ave been found in every culture and the literature of the oldest civilizations around the world. They are embedded in mythology, legends, sagas, religions, and social life of early and contemporary societies, in the past as well as in the present. Leadership has been vital in every historical period and in every culture. Historically, leadership has been conceptualized as the â€Å"man on the white horse,† that is, the study of leadership has been seen as the study of â€Å"great men.† Moreover, it has been primarily the study of political leadership exercised by privileged group of â€Å"great men† who defined power, authority, and knowledge. Although history has produced some great men, it has also produced great female leaders who have played a critical role in the well being of the human beings. Key among the lady leaders is Jane Addams. Today little is known about Jane Addams, however, in the early 1900s, Jane Addams was not only one of the two or three mos t famous women in the United States she was one of the most beloved Americans in the world. The young woman who emerges from these pages was not raised for female idleness but for community service; her nascent talent was less for friendship than for leadership and her first interest was less in plight of the downtrodden than in the potential powers of the elite (Addams). Her journey from that youth to Hull- House involved less invalidism and more religious questioning than the standard story allows, and much softening as toughening. Addams first gained fame as the head of Hull House – an institution offering educational, recreational, and other services to the needy people whom she and a friend founded in Chicago in 1889. During the nearly fifty years that she ran Hull House, Jane Addams improved life for thousands of Chicagoans, mostly poor and immigrant families, for her achievements at Hull House she was hailed as the â€Å"Angel of Democracy†. Jane also dedicated herself to another cause, which stirred up strong feelings both for and against her. She became a pacifist – a person strongly opposed to war.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More As the head of the women’s International League for Peace and Freedom, she criticized America’s entry into World War I. Addams was regarded as one who could speak with authority on the distinction between being good â€Å"to† people and being good â€Å"with† them because she had demonstrated her capacity for cross – class cooperation in her daily conduct among her immigrant neighbors (Fradin and Fradin). Every week, a thousand of those neighbors visited Hull House for one activity or another, and that level of voluntary participation in clubs, classes and social events convinced sympathetic observers in the press and public that â€Å"the gentle, the earnest, th e noble woman† who presided over the Hull House must have been doing some great work. Essentially, the Hull House, which was Chicago’s first settlement, was established in September, 1889. It represented no association, but was opened by two women, backed by many friends, in the belief that the mere foothold of a house, easily accessible, ample in space, hospitable and tolerant in spirit, situated in the midst of the large foreign colonies which so easily situated in the midst of the large foreign colonies which so easily isolate themselves in the American cities, would so easily isolate themselves in American cities, would be in itself a serviceable thing for Chicago (Fradin and Fradin). Hull House endeavored to make social intercourse express the growing sense of the economic unity of society. It was an effort to add the social function to democracy. It was opened on the theory that the dependence of classes on each other is reciprocal; and that as the social relation was essentially a reciprocal relation, it gave a form of expression that had a peculiar value. Addams and Starr moved into Hull – House in 1889 and by 1891, they had added an art gallery, by 1893 a coffee house and a gymnasium. In 1907, 70 people lived there full time and by 1910, there were 1500 boys who were members of the Hull – house boys club and the house and its programs saw approximately 2000 guests. The first community need that she perceived once ‘settled’ into the house was the need for day care for young mothers and for structured educational opportunities for preschool age children. Jane Addams appeared on the Chicago scene in 1889, at the end of a decade in the city’s history marked by labor protests against employers’ exploitation and working class hostility to patronizing Protestant philanthropy. Addams introduced the British settlement scheme to Chicago labor activists, women reformers, and liberal clergy, who were hungry fo r practical, productive alternatives to the class alienation borne of laissez-faire capitalism and condescending charity.Advertising We will write a custom essay sample on Twenty Years at Hull House specifically for you for only $16.05 $11/page Learn More Those who became Addams allies in Chicago represented that vanguard of urban Americans coming to the fore in every major city, ready to challenge the economic and political rules that had dominated the landscape since the triumph of northern industrial capitalism in the Civil War. Addams described the ethnic makeup of the neighborhood around Hull – House in her autobiography, noting the gradual outmigration of the more prosperous Irish and German immigrants, and the slow influx of Russian Jews, Italians, and Greeks in their place. In the forty years that passed between her speech at New York’s United Charities Building and her death from cancer in May 1935, Jane Addams managed the ever expand ing, always esteemed program at Hull – House. By 1910, when she published her enormously successful autobiography, Twenty years at Hull-House, the settlement comprised thirteen buildings encircling an entire square block at Halsted and Polk Streets and served several thousand visitors a week, hull house operated as a meeting ground for working class neighbors, labor artists, ethnic club members, intellectuals, religions liberals, teenage athletes, and children in search of a music class, jungle gym, or free bath. It served, as well as a catalyst for social legislation, political reform, social science theory, and labor organizing at the city, state, and national levels. Addams was the steady arms at the helm of Hull House, attracting extraordinarily gifted, innovative women and men around her and adroitly leading them in the development of the social service programs and legislative agenda. Addams, Jane. Twenty years at Hull-House with autobiographical notes. Illinois: Unive rsity of Illinois Press, 1990 . Fradin, Judith Bloom and Dennis B. Fradin. Jane Addams: champion of democracy. New York: Houghton Mifflin Harcourt, 2006 .

Wednesday, November 6, 2019

Uncle Vanya analysis essays

Uncle Vanya analysis essays 1. The Protagonist: Yelena, 27 year old wife to Alexander Serebriakov, a retired professor. 3. Antagonist: Mikhail Lvovich Astrov, a doctor, drunkard and ecologist. 4. Unconscious: Yelena is a woman afraid of her true feelings. She cannot recognize them to act upon them. As a result of playing life safely, boredom is a constant, unwelcome companion. 5. Super Objective: Yelena yearns to break free and fly away. 6. Inciting Event: At the beginning of act three, Sonya confesses her love of Astrov to Yelena. Yelena agrees to find out from Astrov his feelings for Sonya. 7. Rising Action: Sonya admits her love of Astrov to Yelena, who offers to find out from Astrov his feelings for Sonya -> Astrov and Yelena discuss Sonya's affections, but the conversation turns around when Astrov becomes certain Yelena using Sonya as an excuse to see him -> Astrov grabs her by the waist and she nearly gives into him, resting her head on his chest -> Vanya walks in on them at that moment and becomes upset -> The Professor calls a meeting and implores the family for advice on a scheme in which the farm would be sold and the proceeds invested in managed funds and a small vacation home in Finland -> Vanya, upset over a great many things attempts to murder the professor by shooting him, but misses -> Vanya is sequestered in his room as Astrov and Sonya talk him out of killing himself -> He gives back the morphine he stole from Astrov and Sonya takes him to speak with The Professor so they may make amends -> Yelena parts, giving Astrov a last intense embrace -> Astrov l eaves -> The play ends with Sonya telling Uncle Vanya they will have a better next life. 8. Climax: When Yelena rests her head on Astrov's chest, giving into her yearning to break free, but is interrupted by Uncle Vanya walking in. 9. Resolution: The Professor and his wife leave, as does the Doctor, leaving Uncle Vanya and Sonya in a ...

Monday, November 4, 2019

Visual Rhetoric Paper Assignment Example | Topics and Well Written Essays - 500 words

Visual Rhetoric Paper - Assignment Example It features a young woman who is clad in a yellow outfit and a white hijab. The black background creates a huge contrast which is a notable aspect about the photograph. The woman’s face is covered with scars from the acid attack. The photographer has effectively conveyed his message on the plight of the acid survivors in Bangladesh and is calling on his audience to empathize with the victims and do something about it. The photograph is about a story of how women are disfigured following the inhumane and violent acid attacks. Victims of these attacks live in perpetual fear and agony. Beauty means a lot to a woman and when her face is scarred she is left in despair and experiences low self-esteem. The notable photograph shown below highlights the resilience and bravery of a mutilated victim of an acid attack. Her dreams and hopes were fragmented in seconds (World Photography Organization). Reconstructive surgeries and medical treatment to the victims of acid attacks are just but a dream. This is owing to the fact that these services are hard to come by and are highly expensive. This means that the victims of similar attacks live with the scars for a lifetime. They are faced with a high level of stigmatization in society. They also face the task of establishing a new life and facing life with hope in spite of the challenges that they could be facing. The photograph depicts that majority of acid vict ims are women who are under thirty five years old. The photographer is trying to get his audience to feel the plight of the woman based on features on the photograph. The scars on her face are clearly defined showing her pain and struggle (World Photography Organization). There is no smile on her face which indicates that she was emotionally scarred by the acid attack. The look on her face is blank depicting the emptiness that she could be feeling following the acid attack. The photograph is one of the most

Saturday, November 2, 2019

Feminism as Archetype fpr Overcoming Prejudice Essay

Feminism as Archetype fpr Overcoming Prejudice - Essay Example With that said, a close look will be taken in Glaspell’s â€Å"Trifles† to illuminate the portrayal of women within a patriarchal society and define how those women work together to overcome their oppression, even though their choices may not have been the best in regards to actual justice. To begin with, â€Å"Trifles† is about two women, Mrs. Peters and Mrs. Hale and the discoveries they make about a Minnie, a woman wanted for the murder of John Wright, her husband. They find conclusive evidence of her guilt, but are sympathetic to Minnie, whom they both see as the victim in the situation. But what, then, is the purpose of justice if women like Minnie can kill whomever they please without consequence? The truth is that Minnie may or may not have been a victim of her situation. She may have had reason to kill John, but there is no real evidence to suggest that she couldn’t have reasoned with him and gotten out of the relationship. Perhaps John was an extr emely violent man who would never have let her leave and who would have continued to abuse her for the rest of her life until she was finally killed herself. Or maybe, Minnie was seeing things in the relationship that weren’t as bad as she believed and she could have found a different route for resolution. The plot is frustrating in that the men are portrayed as cold hearted investigators who care nothing about Minnie’s potential reasons for the murder, or that she might have done so out of self defense or to save herself from a situation she felt she couldn’t control or escape from. This is maddening for a reader because both sides have clear reasons for viewing the situation as they do, and both sides are ultimately correct in their assumptions. Where the women take the sympathetic route, the men take the analytical route, and both come to the same conclusions about Minnie; it is the execution of her justice, however, where the two sides differ. Because Mrs. P eters and Mrs. Hale believe Minnie to be guilty but are more sure of her guilt due to being a victim of her situation, they find themselves trapped in the moral dilemma of whether or not to help her or to hand her over to the proper authorities. One thing that â€Å"Trifles† achieves is to grant the reader enough information to be taken on the morality trip with Mrs. Peters and Mrs. Hale as well. Evidence for both sides is presented, and though there is a clear bias as to whether or not the men should be trusted because of their callous and over-bearing nature, a reader has to question their own resolve as to what they would do if placed on either side. To take the feminist route and let Minnie go free, or to punish Minnie for murder, despite whatever led her to commit the act. More, to choose to side with the men leaves the clear impression that such a choice is wrong because of the archetypal manner in which the women are defined. The men are almost cruel in their analytica l natures and are described as showing almost zero empathy in their placement of justice. On the opposite side, the women are defined as creatures of pure empathy, sympathetic to the wounded creature of Minnie, willing to help her because she is a human being in pain in need of assistance. It is a jarring sensation, to feel confident in both sides, yet knowing that neither is exactly right. True justice should take both