Tuesday, November 26, 2019

The Hamilton Health Inc Marketing Research

The Hamilton Health Inc Marketing Research Introduction Marketing research is a strategy that businesses use to amass information regarding their operations from production to supply. In order to do this, the marketing research uses a systematic process of collecting, recording and assessing information dealing with marketing of the companies productions. The objective of the process is to identify and analyze how variation of the factors of marketing mix can influence the behavior of customers.Advertising We will write a custom research paper sample on The Hamilton Health Inc Marketing Research specifically for you for only $16.05 $11/page Learn More Why hire Marketing Research Suppliers The Hamilton Health, Inc – HHI needs to find out its actual market size so that to determine its potential of growth. This will entail determining the buying behavior of its clients, its distribution channels and the type of competition that the organization is facing. This is necessary in order for it to get professional advice of what the results of this would translate to when marketing the personal treadmills that are used for managing health and exercises. Since the founder of the business, Eric Hamilton is devoted to see that the business expands; he needs to get professional understanding of how that growth will be achieved. This is what will form the basis for a strategic plan that the firm will adapt for its expansion which will be based on accurate information, reasoned and timely decisions. HHI can make use of the marketing research suppliers to grab the competitors’ market share and also be enlightened on how to improve its products. Choosing a partner There are several companies that offer marketing research services to companies. However, for Eric’s HHI, the best company for partnering with is the one that will position it better to compete well with its competitors (Wiid Diggines, 2010, p. 134). The criteria of selecting such a partner will include choosing a company that has specialized in doing targeted market research for medical and sports equipment. Such a company will be very considering that the owner may know very little in terms of marketing. This will also give HHI an upper edge over its competitors. This is because the trained consultants are informed of the buying trends, marketing dynamics, ebbs and flows of customers among other facts (Wiid Diggines, 2010, p. 137). This type of knowledge is worth spending on especially when there is observable difference in the performance of the business. It’s important also to understand that the marketing research suppliers will not have all the answers to the company’s position at the moment. To begin with, there are several types of supplies.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The limited-service suppliers are those firms that focus their servi ces provision of one aspect of marketing research of few stages of the entire research process (Burns Ronald 2010, p. 178). These services are in most cases referred to as field services and may include data analyses, branding strategies and interviewing and coding of information among others. Full marketing research suppliers on the other hand are those businesses that will offer a full range of services that deal with the process of marketing. This means that they are able to collect information by developing research questions, conduct the research, analyze the data and come up with finding which they can use to draw conclusions and make recommendations (Burns Ronald 2010, p. 178). They utilize both the qualitative and quantitative methods of research and assessments of data. Expectations from the Supplier HHI should expect that the marketing research suppliers will free the company from the hustle of seeking customers and collecting information for analysis and so on. Therefor e Eric Hamilton will have ample time to focus on other issues of the company which include marketing, selling and studying the business trend. This means that other business aspects that would have gone unattended will be dealt with by the owner during this time (Crouch Housden, 2003, p. 145). By hiring the marketing research supplier, HHI anticipates that it will be eventually a worthy investment. Basically, Eric will be at peace knowing that the investment has a good success track record and therefore expect better and reliable results. The suppliers can always send reports on weekly, monthly or quarterly basis so that HHI can begin making strategies to move forward as the marketing research continues. The reports are likely to be more detailed than those that could have been generated by HHI. Do – It Yourself? In reality, the cost of company doing a research on its own is not just about the huge money that will be spent on the project, but it’s a matter of time th at will be invested and the quality of work done that will be realized. There are many instances where various firms opt to carry their research on their own, but later realize that they did not have adequate skill or time for the job. Many day pass-by, they turn into months and then years of a failed project because the owner may not find sufficient time for the job (Malhotra Birks, 2007, p. 256). Doing it by yourself can be cheap in terms of money, but costly in terms of failed project or lack of results. Therefore it is not advisable for anyone to pursue such a project without hiring assistance from professionals (Malhotra Birks, 2007, p. 256). This can only occur only; When one can realistically find time for the project in his own company When one has the skills and tool to analyze the data and draw conclusions When one has skill for making a report that will be credible to other users When one can be able to sustain an blind research or be able to find a sample qualified en ough to take part in the study Conclusion Marketing research will play a critical role in the growth of HHI as it fights to establish a strong market share. The information from the marketing research will enable the company develop strategies that will help it boost its operations and market share, hence making it to grow and expand steadily.Advertising We will write a custom research paper sample on The Hamilton Health Inc Marketing Research specifically for you for only $16.05 $11/page Learn More Reference List Burns, A.C. Ronald F.B. (2010) â€Å"Marketing Research,† 6th Edition. Upper Saddle River, NJ: Pearson-Prentice Hall. Crouch, S. Housden, M. (2003) â€Å"Marketing Research for Managers,† 3rd Ed, Oxford, ButterworthHeinemann Malhotra, N. Birks, D. (2007) â€Å"Marketing Research: An Applied Approach: 3rd European Ed,† Harlow, UK, Pearson Education Wiid, J Diggines, C. (2010). â€Å"Marketing Research,† 3rd Ed. New York, John Wiley Sons

Saturday, November 23, 2019

Why Renting a Flat in Germany Is Totally Common

Why Renting a Flat in Germany Is Totally Common Although Germany has got the most successful economy in Europe and is basically a wealthy country, it has also got one of the lowest homeownership rates on the continent and is also way behind the US. But why do Germans rent flats instead of buying them or even build or buy a house? Buying their own accommodation is the goal of many people and especially families all around the world. For Germans, it might seem that there are things way more important than being a homeowner. Not even 50 percent of the Germans are homeowners, whereas over 80 percent of the Spanish are, only the Swiss are even renting more than their northern neighbors. Lets try to track the reasons for this German attitude. Influence of World War II Like many things in Germany, the tracking of the attitude to rent reaches back to the Second World War. As the war ended and Germany signed the unconditional surrender, the whole country was rubble. Almost every bigger city was destroyed by the British and American Air Raids and even the smaller village had suffered from the war. Cities like Hamburg, Berlin or Cologne where nothing but a big pile of ashes. Many civilians became homeless because their houses were bombed or collapsed after the fights in their cities, over 20 percent of all housing in Germany was destroyed. That was why it was one of the first priorities of the new built West-German government in 1949 to prove every German a safe place to stay and live. Therefore, big housing programs were started to rebuild the country. Because the economy was also laying on the ground, there was no other opportunity than having the government put in charge of new housings. For the newborn Bundesrepublik, it was also very important to give the people a new home to face the opportunities communism promised just on the other side of the country in the Soviet zone. But there was, of course, another opportunity coming with a public housing program: Those Germans who hadnt been killed or captured during the war were mostly unemployed. Building new flats for over two million families could create jobs that were urgently needed. All this lead to success, the lack of housings could be reduced during the first years of new Germany. Renting Can Just Be a Good Deal in Germany This leads to the fact that Germans today just as their parents and grandparents have reasonable experiences with renting a flat, not only from a public housing company. In the major cities of Germany like Berlin or Hamburg, most of the flats available are in public hand or at least managed by a public housing company. But besides the big cities, Germany has also given the private investors the opportunity to own properties and rent them out. There are many restrictions and laws for the landlords and tenants they have to follow which proves that their flats are in a good condition. In other countries, rental flats have the stigma of being run down and mainly for poor people who cant afford to own an accommodation. In Germany, there are none of those stigmas. Renting seems just as good as buying - both with advantages and disadvantages. The Laws and Regulations Made for Renters Talking about the laws and regulations, Germany has got some specials that make a difference. For instance, there is the so-called Mietpreisbremse, which passed the Parliament. In areas with a strained housing market the landlord is only permitted to increase the rent up to ten percent above the local average. There are a lot of other laws and regulations which lead to the fact that the rents in Germany - compared to those of other developed countries - are affordable. On the other side, German banks have high preconditions for getting a mortgage or a loan to buy or build a house. You just wont get one if you dont have the right sureties. For long term, renting a flat in a city can therefore be a better opportunity. But there are of course some negative sides of this development. Like in most other western countries, the so called gentrification can also be found in Germanys major cities. The good balance of public housing and private investment seemed to tip over more and more. Private investors buy old houses in the cities, renovate them and sell or rent them out for high prices only wealthy persons can afford. This leads to the fact that normal people can no longer afford living inside the big cities and especially young people and students are stressed to find a proper and affordable housing. But thats another story because they couldnt afford buying a house either.

Thursday, November 21, 2019

Global Marketing Strategy of TOYOTA Dissertation

Global Marketing Strategy of TOYOTA - Dissertation Example The fast pace of advancement of the modern day world is more on the lines of rapid change and tremendous development. It is of high importance to mention that the evolution of the telecommunication technology along with the process of evolution of high speed internet and various kinds of technology enabled gadgets has resulted in the process of playing a tremendous amount of influence in the lives of the masses around the world. It needs to be mentioned that because of the lines of emergence of high speed internet connectivity, the network of communication channels has improved in a drastic manner all over the world. The internet has played a major role in the process of creating the channels of communication in the various regions of the developed as well as the developing economies. It can be rightly said that it is of considerable importance to highlight that this technology powered development has resulted in the process of transformation of the globe, where the entire world can be represented and increasingly seen as a single and well connected global entity. Because of this technology powered transformation of the world around us, there has always been a steady evolution of various kinds of trends associated with the factor of globalization. The trends of globalization, that are emerging from all corners of the world are increasingly getting diffused at a very rapid pace and it is happening irrespective of the fact of whether the regions are located in the developed or developing economies. The rapid diffusion of the trends of globalization is resulting in the process of evolution of various kinds of new types of consumer demands. These new consumer demands are increasingly paving the way for a significant amount of business opportunity. Business organizations that are located in various corners of the world are increasingly trying their level best to capitalize on these business opportunities. As a result, it can be said that in the recent times, there h as been a significant amount of business related activity on the lines of strategic business expansion as well as the organization’s process of entering new business markets. This age old activities of the organizations of capitalizing on potential new business opportunities are resulting in the process of increasing and catalyzing the competition that exists in the new markets. The presence of multiple firms, providing similar kinds of business products and service offerings, are increasingly leading to the process of increase in the availability of homogeneous products and services in the market. In other words, the homogeneous products and services are increasing the number of options that are available to the consumers and are automatically resulting in the process of increase in the power of substitutes for the consumers. In order to gain an edge in the competition growing in various markets around the world, companies focus on effectively communicating the values of the ir products and serv

Tuesday, November 19, 2019

Sexual harassmen Essay Example | Topics and Well Written Essays - 1000 words

Sexual harassmen - Essay Example The most common means of reprimanding employees found to be complicit in sexual harassment in the workplace are termination of employment, a verbal/written reprimand and a mandated apology. It has been found that employees of a company or organization that tend to lean towards harsher punishments for sexual harassment feel the company takes the problem seriously. This establishes a relationship of trust between employees and management that can create an atmosphere that discourages sexual harassment (Nelson, 2007). Organizations that avoid firing, reprimanding and mandating apologies risk alienating employees. Sexual harassment claims will be less likely to be made because of the perception that nothing will be done or it will be swept under the carpet by some sort of secret deal. Perceptions among employees that sexual harassment is tolerated as a result of the established organizational culture, combined with a that witnesses the harassment’s political beliefs can discourage reporting of observed sexual harassment (Benavides, 2010). Considering that the NRA is a pro-business lobbying group, the current president needs to take the probable political affiliations of employees as a consideration when considering changes to the sexual harassment policy at the NRA. Also of importance in this incident is how the current president of the NRA reviews the existing sexual harassment policy. This is important because individuals outside of the organization tend to judge the organization being accused of providing an unsafe work environment more harshly if they are not playing by their own rules. If there is a sexual harassment policy that had been violated, or if there is no sexual harassment policy at all, jurors tend to award the plaintiff more monetary damages (Cass, 2010). The lesson that needs to be learned from this finding that can be applied to the current situation is this: the public and

Sunday, November 17, 2019

Deviance Behavior and the Possible Causes Essay Example for Free

Deviance Behavior and the Possible Causes Essay Some may say its biological or psychological and even sociological reasons. There have been many studies to try and determine why people have deviant behavior and what happens to individuals when norms are broken. Not all behaviors are judged the same by all groups. For example, some may question if there are conditions under which suicide is an acceptable behavior. Lets same one person commits suicide in the face of a terminal illness but another person is a despondent person who jumps from a window, the second person may be judged differently. The first person’s suicide may be looked at with pity which the second person would be looked at in a shameful way. Another behavior that would highly be considered deviant would be committing a crime. For example, juvenile gangs provide an environment where young people learn to become criminals. Gang members glorify violence and retaliation as means to achieve social status. Whether it is an act of a crime or gang violence, criminals learn to be deviant as they embrace and conform to their street or gang’s norms. Americans consider such activities as alcoholism, excessive gambling, being nude in public, starting fires, stealing, lying, prostitution, and being gay to name only a few as being deviant. Therefore people who engage in deviant behavior are referred to as deviants. References Richard T. Schaefer. (2012). Sociology A Brief Introduction (Tenth Edition). McGraw-Hill Companies Inc, New York. Sociology of Deviance and Crime. (2013) By Ashley Crossman.

Thursday, November 14, 2019

Norman Rockwell :: biographies bio biography

If you want to learn about a famous artist named Norman Rockwell then you have come to the right place. This essay contains some interesting and funny facts about this famous American. Some of the subjects are his early life, his birthday and birth-town. Other subjects are his accomplishments, comical stories and his patriotism. Norman Rockwell was born on February 3, 1894. His birthplace was New York City. At the age of 5 he attended the Triumphal Parade welcoming home Admiral Dewey. When he was 9 years old the Rockwell family relocated to Westchester, Pennsylvania. In 1909, at the age of 15, Norman disliked high school so much that he dropped out. He then attended Chase School, where he took art classes. He was given smaller, less important assignments because he was a student. By the age of 17, after illustrating his first book, ?Tell-Me-Why?, he knew he wanted to be an illustrator even though the masses thought illustrating was an inferior type of art and he would never amount to anything. Wow, did he surprise them! Norman Rockwell accomplished so much during his lifetime. In 1913, at the age of 19, he became the art director of Boys Life Magazine and in 1916 he painted his first of 318 Saturday Evening Post covers. During WWII, he painted a series of pictures titled ?The Four Freedoms?. These were based on a speech President Roosevelt made to Congress. Though these paintings, meant to be used by the military as recruiting posters, were rejected by the military, he later submitted them to the Postal Service and stamps were created from his works of art(Marling38) . He also had some funny things happen to him. During WWII he wanted to join the Navy. He was tall enough but was 4 lbs. to light. He decided to try again so the night before his second try he gorged himself with bananas, doughnuts and warm water! He succeeded! Rockwell had many friends. One of them was Walt Disney who was going to make a robotic replica of one of Rockwell?s paintings but never got around to it. Most of his paintings included his friends. His friend Carl Hess, the owner of the local gas station, can be seen in a painting as well as many townspeople from Vermont.

Tuesday, November 12, 2019

Corporate Finance Essay

Introduction In 2001, the Tulsa, Oklahoma, Williams Company was in financial distress. The primarily energy-industry company was struggling with a shrinking energy trading market, which was marked by distressed entities such as Enron’s broadband unit and Global Crossing. Williams also suffered internally with a floundering telecommunications division and a plummeting stock price. These issues led credit rating agencies Moody’s and Standard & Poor’s to downgrade the credit rating of Williams’ bonds to the level of non-investment-grade junk bonds. Amidst all of this uncertainty, the company on January 21, 2002, announced a new CEO, Steven J. Malcolm. Malcolm realized one of the most important functions for Williams moving forward would be raising capital. Malcolm’s four-pronged plan to achieve this goal involved selling assets, reaching a resolution for its energy and trading book, managing and monitoring cash and businesses and â€Å"right-sizing† Williams to reflect the new scope of operations. However, Williams had a substantial amount of short-term and long-term debt maturing in the second half of 2002. In addition, its credit and commercial paper facilities needed to be renewed about the same time. With approximately $450 million dollars of cash on hand and only one undrawn revolving credit facility, Williams sought external financing to help meet its current cash flow needs. One group of investors led by Warren Buffett’s Berkshire Hathaway along with Lehman Brothers offered Williams a solution with a one-year $900 million loan. Under the terms of the agreement, each lender would loan $450 million to Williams Production RMT, a Williams subsidiary, whose major assets included natural gas properties in the Rocky Mountains. In addition to the repayment of the principal in one year, Williams would pay 5.8 percent interest quarterly and an additional 14 percent of the principal at maturity plus a â€Å"deferred setup fee.† The deferred setup fee would be equivalent to the greater of 15 percent of the principal or 21 percent of the purchase price less RMT’s indebtedness. This would be influenced by any further asset liquidation by RMT. The loan, guaranteed by Williams Company as well as certain subsidiaries, also contained several covenants that Williams must meet to avoid breach of contract. The positive covenants included maintaining an interest coverage ratio of greater than 1.5 to 1 and maintaining a fixed charge coverage ratio of at least 1.15 to 1. Negative covenants limited restrictive payments (including redemption of capital stock) and capital expenditures in excess of $300 million. Thorough evaluation of the terms and lending scenario reveals this loan would create a beneficial scenario not just for the lenders, but for the borrower as well. For Williams, the loan provided temporary relief from multiple short-term debt security maturations and enhanced the company’s ability to secure a credit facility of $700 million. This would likely be followed by favorable market reactions in the form of increased stock price as a result of decreased uncertainty of future cash flows. Also, any Buffett investments in Williams would signal a strong endorsement of the company’s future prospects, likely leading to increases in Williams’ stock price. Likewise, for Berkshire Hathaway and Lehman Brothers, this deal should supply high returns on investment. Assuming the loan would be held to maturity, the lenders would divide returns of approximately 34% on this loan. Given that Williams guaranteed the loan, backing it with asset and capital stock, such returns on this risk would be a huge win for both lenders. Although the risk-free rate would be necessary to determine the exact net present value of the investment opportunity facing Berkshire Hathaway and Lehman Brothers, sufficient information is available to find the project’s internal rate of return. The IRR for this agreement ranges between 11.87% and 13.01%. The return on investment (ROI) for this particular agreement ranges between 52% and 58%. In either case, the numbers range because of provision (c) listed in the case’s Exhibit 1. The â€Å"deferred setup fee† fluctuates depending on potential sales of RMT’s assets. Terms of the proposed financing Guarantees Those involved in the lending process establish financing terms to protect the positions of all parties. The debt guarantee in Williams’ proposed financing, for example, provided insurance for the repayment of debt. Williams would essentially act as a co-signer for Williams Production RMT’s obligations to Berkshire Hathaway and Lehman Brothers. Per the terms, Williams would have to agree to make payments in place of Williams Production RMT if any of the payments were late or not paid. Using a guarantor would allow Williams Production RMT access to a loan at a lower interest rate than if Williams had not secured the loan. The logic behind this is that two individuals or entities promising to pay back the debt means there is lessened risk for overall default. That means Berkshire and Lehman may be willing to accept a lower interest rate in return for less risk of loss. It is quite possible that Williams Production RMT would not have been able to obtain a loan without a gu arantee. Covenants Equity and debt investors have a somewhat adversarial position, though both want a company to succeed. Equity investors want the company to take a certain amount of risk so they have the chance of seeing large returns. Debt investors want a company to be more conservative to protect the issuer and to ensure that the company will repay its debts. Like many other companies, Williams’ top priority, however, is to maximize stockholder wealth. This creates a dilemma in a debt offering. Berkshire Hathaway and Lehman Brothers therefore use debt covenants to limit the amount of risk Williams can take in the hopes that the company’s actions will not endanger loan repayment. Collectively, these covenants outline the rights of the lenders and restrictions upon Williams in regards to the loan. When a company does not live up to its debt covenant, it breaches the contract. In theory, such action would trigger automatic payment to creditors. In reality, however, many companies default because they are not in good financial health and thus cannot pay. Therefore, breach of covenant usually means that the two parties renegotiate the terms of the debt, often calling for higher interest rates or other incentives for the issuer to allow Williams more time to pay. Williams’ financial problem During the first half of 2002, Williams suffered a number of financial difficulties. The company’s total cash flow decreased by 680.22 percent as compared with 2001. During the year, Williams’ only net positive cash inflows came from financing, which netted the company $1.061 billion. In contrast to cash inflows, the company’s outflows totaled $1.589 billion from operations and investing. Overall, the decrease can largely be attributed to the decrease in cash flow from operations, which amounted to a decrease of $2.566 billion. Specific to operations, much to blame is the company’s decrease in working capital of $879 million. To adjust for this decrease in cash flows, the company liquidated a number of assets in 2002. The most valuable included the Kern River and Williams pipelines, which generated immediate cash proceeds of $1.124 billion. The question remained, however, as to how Williams would be able to find a way to pay debts of $2.347 billion within the next year and eventually long-term debts of $11.972 billion. In May 2002, the firm sold another $1.7 billion in assets and announced its intention to sell an $1.5 to $3 billion in assets. Previously, in December 2001, Williams planned to cut its 2002 capital spending by 25 percent or $1 billion to bolster its balance sheet. Williams also issued $1 billion in equity-linked securities called FELINE PACS and decided to cut its dividend by 95 percent. While seemingly drastic measures, the negative total cash flow of $619 million reveals that reducing dividend payments and selling off two major sources of operating income was not sufficient for Williams to dig itself out from under its debt obligations without independent financial assistance. Signs of distress It was clear that Williams was in deep. Though the signs of distress were many, the most noticeable was that the company’s cash flows were insufficient to meet its short-term debt. Unless the company continued to take drastic action, it could have found itself entering into bankruptcy proceedings within the next year. Another concerning sign included that in 2002, Williams’ 95 percent decrease in dividend payments and its more than 90 percent decrease in stock price should have indicated that the firm was struggling. Particularly striking was the fact that dividend disbursements had been increasing for the prior 10 years and that Williams Communications stock closed at a mere $0.01 per share on July 31, 2002. Williams also sent strongly negative signals with its 2002 sales of its Kern River and Williams pipelines. Although these netted the company immediate cash amounting to $1.124 billion, the sale was made at the sacrifice of substantial cash inflows, suggesting this was an act of desperation. Investors weren’t the only ones receiving signs of Williams’ distress. Credit agencies also observed uncertainty in Williams’ future, as indicated by the company’s fluctuating credit ratings. With Williams in July 2002 settling at a B+ Standard & Poor’s long-term credit rating, the company saw resulting increases in bond yields. Whereas Williams had bond yields of approximately 7 percent in December 2001, its yields fell just under 20 percent in July 2002, further complicating its situation. Recommendation Williams’ plight left it with few options for restoring its financial solvency, and most were of limited feasibility. Williams could have issued additional equity at the then current stock price of $2.95 per share, though this would dilute the company’s current share base. In addition, most companies only hold seasoned equity offerings when they believe their stock is overpriced. Considering that Williams’ stock price had fallen by more than 90%, Williams should not consider an equity offering. The company also could have issued more bonds. This option was not feasible, however, due to the company’s credit downgrade.With Standard & Poor’s rating the company a B+ in July 2002, Williams would have to issue many bonds and pay a substantial yield amounting to just under 20 percent per annum. Williams also could have sold assets. Since Williams had already sold close to $3.0 billion in assets, however, selling more could damage the company’s ability to generate operating cash flows. Though Berkshire and Lehman presented an opportunity, most lenders were hesitant to provide Williams capital due to the company’s financial turmoil. This large, 35 percent interest loan appears to have the most favorable terms possible for Williams in its last-ditch effort to save itself. The real winner here, however, would be Berkshire Hathaway and Lehman Brothers, both of whom would glean a lucrative return on their investment, given it is successful. Williams, on the other hand, should agree to the loan only because it has no other feasible options.

Sunday, November 10, 2019

Kris Corporation Information Technology Proposal Essay

Kris Corporation Information Technology Proposal Introduction Information Technology Proposal   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Kris Corporation is a prominent company that deal with manufacturing parts utilized by the automotive industry. The organization’s Active-Domain infrastructure comprises of two main domains. The parent domain is kris.local and the child domain is corp.kris.local. The AD infrastructure of the organization is running on Server 2008. The company has five branches located in five cities namely, Chicago (IL), Baltimore (MD), Atlanta (GA), Seattle (WA) and San Diego (CA). Its manufacturing plants are located in Seattle and Atlanta.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Recently, the company has developed a number of concerns relating to its information system. First, the corporation is concerned about adopting multiple domains in its information systems. Secondly, some automobile manufacturing companies have approached the corporation and requested it to use a single identity in the process of procuring orders. Kris Corporation is also concerned with disaster recovery of its systems and physical space of servers especially at the Atlanta branch since it is the corporation’s headquarter. File sharing is also a big concern to the company since the locations are connected to the internet independently.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This proposal focuses on identifying and analyzing various changes in the information technology department of the company and developing solution recommendations for information technology problems experienced by the company. The proposal will discuss various benefits the corporation will acquire from updating and changing the current information systems to the modern systems. Active Directory   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Kris Corporation should adopt the new Windows Server 2012 in its information systems due to the following reasons. First, the server has the freedom to choose the interface. This means that by installing the Server Core it will prove security and performance advantage. In addition, it has a feature that allows one to switch it on or off. Secondly, the server manager is a multi-server making it easy to deploy features and roles to physical and virtual server. It also makes easy to merge servers that can be managed together hence, easing the administration of servers (Snover, 2012).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Thirdly, Windows Server 2012 provides a Dynamic Access Control (DAC) which helps to create more centralized security models for access to the network. This is done by tagging the sensitive data both, manually and automatically on the basis of creator of the files and the content of the files. In addition, Windows Server 2012 have a large storage spaces, a new feature that allow the usage of inexpensive hard drives to create a storage which can be subdivided into spaces as those used on physical disk.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Window Server 2012 also possesses Hyper –V Replica administrator which replicates their Hyper- Virtual machine from Hyper –v host at a primary site to another Hyper-V host at the replica site. This feature has the advantage of lowering the cost of ownership in an organization by providing workload –agonistic and storage- agonistic solution which replicates effectively, efficiently and periodically over IP-based network within or across different storage subsystems and across all sites. The major benefit of Hyper-V Replica is that virtual machine can easily replicate in distinct locations for higher protection and to ensure availability. Window server 2012 also possesses Direct Access, which works with IPv4 that do not require conversion of technologies and switching off the server that are running. Direct access version of 2012 server is easier to configure too.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The window server 2012 has Remote Desktop Service that provides the ability to control and centralize the applications and data that the employees need t work on from variety of machines or devices making it easy to work anywhere as long as you access a device. It also supports that control and compliance are met strictly. Lastly windows server 2012 has a simplified licensing. Microsoft have worked on the complexity involves in finding the right edition and cost. Window server 2012 has only four editions; datacenter standard essential and the foundation. These editions are licensed as per number of user for the instance foundation is licensed for 15 while essential 25. Adoption and acquiring of the server depends on the size of the company and then moving ahead buying the right edition. For the case of the Kris Company, the ideal edition is Window Server 2012 R2 Essential which is the best for cloud-connected first server.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Domain model that a company uses determine its effectiveness and affects its performance. In the selection of the appropriate domain model to use, the company should consider a number of factors that may affect the selected Domain model. First, the company must consider the amount of the capacity available on the network allocated to Active Directory Domain service. The company should choose a model with maximum efficiency in replicating information with mild effects on the network bandwidth. Secondly, the company must consider the number of users. A company should use more than one domain where the number of users is large.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The corporation should migrate to a single domain and abandon the multi-domain model. The single domain is the simplest domain design that a company can use effectively. Unlike in other domain designs, there is replication of all information to all domain controllers. Secondly, single domain design minimizes the number of deployed domains in the forest. Minimizing the number of domains reduces the complexity of the application. Consequently, the total cost of ownership is reduced. Any domain controller in the single domain model can effectively authenticate a domain user in the forest. In the single domain model, all domain controllers in a company’s system can be developed to be global catalogs. This will enable the corporation to use the single identity in order procurement processes from automobile manufacturers. Lastly, the corporation should deploy the single domain model since all data can be replicated to all its geographical locations hosting domain controllers (Windows Server, 2015).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Single sign-on is a part of the modern technology where users use locally logged on credentials when connecting to hosted desktops and Remote Apps. The technology that provides the single sign-on is Windows Server 2012. Windows Server 2012 enables users to log in without using multiple certificates and without any prompts in credentials. It is much easier to configure single sign-on (SSO) into the Windows Server 2012 than in other servers. The administrator needs to enter the qualified domain name with a prefix â€Å"TERMSRV† to the server data of the Credentials Delegation Group Policy setting. The Single Sign-On can also be configured by adding the Remote Desktop Gateway (RD Gateway). Thirdly, the Single Sign-On can be configured using the command line. Click â€Å"Start†, then click â€Å"Run† and type â€Å"cmd†. Open the Enterprise Single Sign-On directory for installation and type â€Å"ssomanage-enabless o† to enable the SSO (Termserv, 2012). DNS   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A DNS server is any computer that is allowed to join the DNS. The server is responsible for running a special purpose networking software. The DNS server should reside in Seattle. Although Atlanta is the corporation’s headquarter, the location has limited space and a large number of staffs. The corporation should ensure that the DNS server reside in Seattle where there is adequate space. Secondly, there are manufacturing plants in Seattle thus it is appropriate to set up the DNS server. The IT staff should be relocated to Seattle for effective management of DNS server and IT systems.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   DNS is one of the important components in any networking system. Therefore, it is important to secure the DNS from attackers and other risks. There are a number of risks that may attack the DNS. These include DNS cache poisoning, distributed denial of service (DDoS), denial of service, reflected attacks, fast flux and reflective amplification DoS. There are various DNS security techniques and procedure that are used to protect the DNS servers. First, a latest and updated DNS server and software versions should be used. For instance, Windows Server 2012 provides more DNS protection than other servers. The Windows Server 2012 prevents attacks using security loopholes. Secondly, a freeware such as ZoneCheck can be used to check the configuration and monitor external networks. Deploying a DNS security (DNSSEC) protocol based is also a viable solution to DNS security. A DNSSEC reduces the risk of DNS cache poisoning and other DNS attacks. DHCP   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Dynamic Host configuration Protocol (DHCP) is a server or client protocol that automatically provides an internet protocol host with IP address. The purpose of using DHCP in window server 2012 is that it reduces the administrative tasks and the configuring the host network complexity such as, private intranet. DHCP automates the process of configuring the IP and TCP of the client.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   DHCP offer support on DNS registration enhancements. This means that one can use HDCP policies to configure conditions on qualified domain name of DHCP client and also register workgroup computer as a guest DNS suffix. DHCP also support PowerShell DHCP server which is the task oriented for DHCP server management. Window PowerShell uses object pipelining to ease the need for parsing and alteration of test output. This window PowerShell for DHCP has got 103 cmdlets which cover multiple aspects of DHCP server configuration and management.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Another role of DHCP is to introduce a new policy based on IP address assignment feature. This allows the administrator to group DHCP client by specific tasks on fields and boost the administrator control over configuration parameters brought forth to the network device. DHCP policy enables flexibility while dealing with multiple device types, multiple roles, and virtualization. Consequently, it is important to Kris Company to consider DHCP for management of various task and device for easier access and to avoid duplication of tasks hence, lower cost of administration.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The tracking of DHCP is done using IPAM (IP Address Management) that enable IP tracking through correlation of DHCP lease happenings on managed DHCP servers with user and computer authentication happening or events on managed domain controller. The IP address tracking by use of IPAM occur using the following parameters; tracking by IP address (IPV4), tracking by hostname, tracking by username, and tracking by client ID (TechNet, 2015). Hyper-V.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hyper- V is an interesting feature in Windows servers. Consultants and system integrators say that hyper-v is a promising and effective virtualization platform. The features have both advantages and disadvantages. Hyper-V is an incorporative and important feature to clients using the Windows Server 2008 or 2012. Clients save on licensing costs while using hyper- v rather than other virtualization platforms. Secondly, Microsoft provides better support for the server application running on Hyper-V as opposed to other virtualization platforms. Hyper- V provides an option of consolidating multiple physical servers into comparatively fewer servers. Machines running the Hyper-V platforms are more effective and faster as compared to machines running other virtualization platforms. Therefore, Hyper- V is effective and fast.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hyper – V improves utilization and access to key resources such as networking, disk, and video when running guest operation systems. It is easier to deploy and manage the Hyper-V application than other virtualization platforms. However, the application is only limited to only 64 bit systems using the Windows Servers. Therefore, users with other systems such as Linux cannot use it. Secondly, the platform may be compatible with some devices using Windows Servers 2008, and others may not be incompatible. Therefore, a test for compatibility is necessary to devices. Hyper- V does not require clustering because it is a cluster aware application, and Windows Server 2008 provides a host clustering support for Hyper – V virtualized made machines.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Kris Corporation can leverage various features of Hyper-V. First, Hyper-V has Access Control through authorization manager that will enable the corporation to create custom roles to allocate or delegate activities within Hyper- V. The corporation will also benefit from improved VM performance provided Hyper-V. The application also has guest OS support where it supports both 64-bit and 32-bit virtual machines operating on different operating systems. Large number of users in the corporation can utilize the application since it supports a large number of users. The application provides support for virtual networking for systems in different locations thus enabling users within the corporation to communicate easily. Security   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Kris Corporation can improve its networking by practicing transparent caching on the client computer for shared folder and reducing the duration required for accessing files. This involves protocol enhancement that do away with multiple and redundant network operations when saving or opening folders. Secondly, the corporation should carry out background synchronization capabilities for offline file, reduce management overhead and supporting the end-user experience (Windows, 2015).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In conclusion, the Kris Corporation should migrate to 2012 AD since the server provides better services to its activities than the Windows Server 2008. The 2012 AD is faster, safer and incorporates more systems than the 2008 AD. The corporation should also migrate to the single domain. The single domain enables users in different geographic locations to receive the same information and be connected with each other. Single domain will enable the corporation to have a single identity in procuring orders from automotive manufacturing companies. The single sign-on can be effectively provided by the Windows Server 2012.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The DNS server of should reside in Seattle because it has adequate space and a manufacturing plant is located in Seattle. The IT staff located in Atlanta should be relocated to Seattle to effective manage the DNS server and manage the corporation’s IT systems. These staffs will also allow other staff to work effectively in Atlanta. The DHCP fault tolerance in the corporation will be implemented to improve tracking of IP address automatically. The DHCP addresses can be tracked by username, ID, and IP. Implanting Hyper-V will enable the Kris Corporation to have effective virtual connectivity among users in different locations. Lastly, the corporation can improve networking capabilities of security and file sharing through transparent caching and reducing time. References Snover J. (2012). Windows Server 2012 Remote Desktop Services (RDS). Window Server Blog. Retrieved from http://blogs.technet.com/b/windowsserver/archive/2012/05/09/windows-server-2012-remote-desktop-services-rds.aspxWindows Server (2015). Reviewing the Domain Models. Retrieved from https://technet.microsoft.com/en-us/library/cc731718%28v=ws.10%29.aspxDeuby S. (2013). 7 More Reasons to Upgrade to Windows Server 2012 Active Directory. Windows IT Pro. Retrieved from http://windowsitpro.com/identity-management/7-more-reasons-upgrade-windows-server-2012-active-directoryTermserv (2012). Remote Desktop Web Access single sign-on now easier to enable in Windows Server 2012. Remote Desktop Services Blog. Retrieved from http://blogs.msdn.com/b/rds/archive/2012/06/25/remote-desktop-web-access-single-sign-on-now-easier-to-enable-in-windows-server-2012.aspxTechNet (2015). IP Address Tracking. Retrieved from https://technet.microsoft.com/en-us/library/jj878332.aspxWindows (2015). File Sharing and O ffline Files Enhancements. Retrieved from https://technet.microsoft.com/en-us/library/dd637828%28v=ws.10%29.aspx Source document

Thursday, November 7, 2019

English paper Essays

English paper Essays English paper Essay English paper Essay Novel can influence a man to do something. Tom Buchannan is usually a passive character who usually doesnt usually resort to violence. Also traditionally women have not really seen as being prime suspects in the building of a novels plot, but in the Great Gatsby it is very different. All the women in the book in some way play a part in the development of the plot. Myrtle plays the biggest part in the plot in that she basically initiates the issue in the book. Myrtle is cheating on her husband with Tom Buchannan and when her husband finds out of this, he is outraged. Myrtle is then hit by a car, which leads her husband to search out and kill Gatsby. The one who was driving that vehicle was none other than Daisy whos inability to stop basically brings the life of Gatsby to an end. Women in this novel play a bigger role in the development of the plot than men and its clearly indicate. The Great Gatsby is a novel that switches the normal gender roles of men and women. Women go against societys standard belief that women should stay at home and also not partake in activities that only men are seen to do. Also women play a racial part in the novel, for development of the plot, without them there would be a gap in the story and it would all be thrown off. The main point here is that women arent Just caretakers and arent restricted by societys view, but go far beyond those views. Women should not be taken lightly as they have been shown to be strong symbols.

Tuesday, November 5, 2019

Mistakes and Misquotes on Memorials and Statues

Mistakes and Misquotes on Memorials and Statues Designing a building or memorial is hard enough. What happens when the work also includes words? Suddenly the focus shifts from visual to verbal as the artist and architect agonize over typography- making language visible. Words, quotations, and lists of names and dates must convey information and, ideally, flow seamlessly with the design. Hopefully the words will also be historically accurate. How do architects grapple with the challenge? Do the words to be inscribed influence the overall design? Or, do the demands of the design alter the text? Here are some examples of this design challenge. Franklin Delano Roosevelt Memorial: The 1997 memorial dedicated to the life, times, and words of Americas 32nd president incorporates over 20 quotes into its design. From March 15, 1941, inscribed in stone behind a seated FDR and his dog, Fala, are these words: They (who) seek to establish systems of government based on the regimentation of all human beings by a handful of individual rulers...call this a new order. It is not new and it is not order. The inscription is accurate, although an English teacher may frown on using all capital letters and using parentheses when square brackets are more appropriate. Accurate inscriptions, however, did not save the FDR Memorial from sins of omission. Most noticeable, Roosevelts disability from polio was initially disguised until a wheelchair was eventually added. Less noticeable, however, was the omission of one of FDRs most famous lines: Yesterday, December 7, 1941- a date that will live in infamy.... is a line not found within the 7.5 acre park in Washington, DC. Inscriptions at the Martin Luther King Jr. National Memorial: According to some critics, architect Dr. Ed Jackson, Jr. ran afoul of the truth when he helped design the Martin Luther King Jr. National Memorial in Washington, DC. The 2011 Memorial included words from Dr. Kings 1968 sermon known as The Drum Major Instinct. Toward the end of that rousing sermon, King said: Yes, if you want to say that I was a drum major, say that I was a drum major for justice. (Amen) Say that I was a drum major for peace. (Yes) I was a drum major for righteousness. And all of the other shallow things will not matter. (Amen!). However these were not the words engraved on one side of Dr. Kings statue. The architect had agreed to shorten the quote so it would fit in the space that the sculptor had allotted. Dr. Kings words became: I was a drum major for justice, peace and righteousness. Poet Maya Angelou, who was a member of the Council of Historians for the Memorial, expressed outrage. She asked why the words of the slain civil rights leader had been paraphrased. Other critics joined her in saying that the the shortened quote alters its meaning and makes Martin Luther King appear arrogant. Dr. Jackson argued that designing a beautiful monument required abbreviating some of Kings words. For him, aesthetics trumped authenticity. After some resistance, officials eventually decided to remove the historical inaccuracies from the Memorial. The National Park Service had sculptor Lei Yixin fix the disputed quote. Inscriptions at the Jefferson Memorial: Architects John Russell Pope, Daniel P. Higgins, and Otto R. Eggers faced a design challenge similar to the MLK Memorial. For the 1940s-era Jefferson Memorial, how could the prolific writings of Thomas Jefferson be fairly represented under one dome? Like the architects of other memorials, they opted to edit famous quotes from Jefferson. Panel 3 of the Jefferson Memorial reads: Commerce between master and slave is despotism. But, according to the Thomas Jefferson Foundation at Monticello.org, Jefferson originally wrote: The whole commerce between master and slave is a perpetual exercise of the most boisterous passions, the most unremitting despotism on the one part, and degrading submissions on the other. Indeed, some of the inscriptions carved in stone at the Jefferson Memorial are composites created by patching different documents together. Inscriptions at the Lincoln Memorial: When architect Henry Bacon designed the 1922 Lincoln Memorial in Washington, DC, he combined a mammoth 19-foot statue by Chester French with historically accurate inscriptions of speeches written by Lincoln. Imagine, however, if Bacon had taken short cuts. What if Lincolns famous words With malice toward none, with charity for all became, With malice...for all? Would the shortened version change our perception of Abraham Lincoln? The opposite wall of the Memorial contains the entire, unedited text of Lincolns Gettysburg Address. If the architect had desired to save wall space, he might have shortened the speech to: that this nation, under God, shall have a new birth of freedom- and that government of the people, by the people, for the people, shall not. What story would the revised quote tell about the great leader? Inscriptions at the US Supreme Court Building: Supposing that architect Cass Gilbert had been cramped for space when he designed the 1935 U.S. Supreme Court building. Imagine if he wanted to avoid the wordy balance and scale metaphors. Couldn’t he simply remove the word Equal from Equal Justice Under Law? Does the meaning change by simply saying Justice Under Law? Inscriptions at the 9/11 National Memorial: The 2011 National 9/11 Memorial in New York City took nearly a decade to construct. The project might have been completed more quickly if the architects Michael Arad and Peter Walker hadnt spent so long on the arrangement of nearly 3,000 names around the fountain parapet. Could they have left out a few? Would editorializing change the memorials meaning and impact? Inscriptions at the Vietnam Veterans Memorial: Maya Lin, designer of the Vietnam Veterans Memorial, felt that politics had eclipsed the veterans, their service, and their lives. She kept the memorial design elegantly simple so that attention could focus on the names of the men and women who died. Over fifty-eight thousand names are arranged in the chronological order of their deaths or MIA status from the Vietnam conflict. The height of the stone slowly rises and falls, as does any story of conflict. At first, few die. Then escalation. Then withdrawal. The story of the Vietnam conflict is gracefully and visually told in stone with room enough for each citizen soldier. Questions For Designers: Was poet Maya Angelo correct to condemn architect Ed Jackson, Jr.? Or, do architects and artists have the right to change the wording in historical documents? How important are written words in the language of architecture? Some would argue that architects who are inarticulate with words also might be inarticulate with design.

Sunday, November 3, 2019

IT and Entrepreneurship Essay Example | Topics and Well Written Essays - 1750 words

IT and Entrepreneurship - Essay Example The Nielson Norman Group undertakes its programs and processes in line with computerized user interfaces. Such programs enable the company to bear the ability to provide consultation to clients from the firm. The Group’s success is evident since the company has built an overwhelming range of clientele in the global market since its foundation back in 1998. The following discussion seeks to highlight the prospective of intranets with various evaluation approaches to assert the fact that the programs do not necessarily provoke learning and inspirations (Collins, 2010, p, 130). Discussion of the features to build in an organization’s intranet the different intranet services seem to comprise of different features depending on the main purposes of their improvising. Each of the learning intranets was purported by its innovators as a certain approach to solving learning and problems. Distinctively, global enterprises realize that the social media is part of the community and may not fade out despite the pre-existing challenges Green, et al 2011, p, 90). Technical surveys implore organizations to abide in the use of social media holding that it is the most appropriate method from restructuring organization’s performances and building effective teams through the imposition of knowledge of the personnel and management. Experts have the notion that collaborative communication through the internet is certainly a useful course in all enterprises operating on a global platform. The effective nature of intranets is viewed as implicit to the gradual changes that are presumed to exist in organizations. This change is certain since there is enough and unprecedented evidence that functionality will shift gradually from the current prospects for the organizations’ advantages. The fact that intranets exist in different versions, the enterprise community of the society has a significant range to choose the intranet approach in accordance to the performan ce portfolio. Ideally, I-Space intranet provides learners with provident knowledge for use in ensuring organizational development and prowess in performances. Mainly, the I-Space intranet service provides various knowledgeable aspects ranging from the provision of public knowledge to the ideology of enhancing common sense (Collins, 2010, p, 133). A detailed survey undertaken by the Norman Group asserts that the intranet survey phenomenon comprises of the aspects of codification and diffusion of reading materials, a factor that is defined as the public knowledge approach. On the second account, the intranet approach ascertains to its users that they will accrue proprietary knowledge through its intriguing provision of patented entities, official secrets, and other critical information sources. The intranet approach asserts that users seeking proprietary knowledge shall find that its lack of diffusion despite the codification as an ethical barrier to provision of security on the perti nent materials. Lastly, the account provides employees and other concerned stakeholders seeking information with personal knowledge whereby codification and diffusion equally lack thus; guaranteeing users to sort out for any information related to their needs. I-Space accounting approaches assert knowledge on common sense, the type of information that all people have knowledge about their existence. However, the service is extremely diffused and without codifications thus enabling any