Wednesday, November 27, 2019

Queen Victoria Quotes

Queen Victoria Quotes Queen Victoria, the longest-ruling monarch of Great Britain, ruled during a time of economic and imperial expansion, and gave her name to the Victorian Era. Selected Queen Victoria Quotations We are not amused. (attributed) Please understand that there is no one depressed in this house; we are not interested in the possibilities of defeat; they do not exist. Move Queen Anne? Most certainly not! Why it might some day be suggested that my statue should be moved, which I should much dislike. (about moving a statue of Queen Anne for Victorias Diamond Jubilee) The Queen is most anxious to enlist every one who can speak or write to join in checking this mad, wicked folly of Womans Rights, with all its attendant horrors, on which her poor feeble sex is bent, forgetting every sense of womanly feeling and propriety. The important thing is not what they think of me, but what I think of them. His purity was too great, his aspiration too high for this poor, miserable world! His great soul is now only enjoying that for which it was worthy! When I think of a merry, happy, free young girl and look at the ailing, aching state a young wife generally is doomed to which you cant deny is the penalty of marriage. I feel sure that no girl would go to the altar if she knew all. An ugly baby is a very nasty object, and the prettiest is frightful when undressed. I dont dislike babies, though I think very young ones rather disgusting. I would venture to warn against too great intimacy with artists as it is very seductive and a little dangerous. Great events make me quiet and calm; it is only trifles that irritate my nerves. He speaks to Me as if I was a public meeting. (of Mr. Gladstone) More About Queen Victoria Queen Victoria BiographyHow Is Queen Elizabeth II Related to Queen Victoria?   About These Quotes Quote collection assembled by Jone Johnson Lewis. Each quotation page in this collection and the entire collection  © Jone Johnson Lewis. This is an informal collection assembled over many years. I regret that I am not be able to provide the original source if it is not listed with the quote.

Saturday, November 23, 2019

Infosys and Corporate Social Responsibility in India Essays

Infosys and Corporate Social Responsibility in India Essays Infosys and Corporate Social Responsibility in India Essay Infosys and Corporate Social Responsibility in India Essay Corporate Social Responsibility (CSR) is defined as a businesss policy to encourage positive impact through its activities on the environment, consumers, employees, communities and all other member of the public who may be considered its stakeholders. [8] Analysis The Infosys Foundation The Infosys Foundation was established in the year 1996 with the goal of serving the under-privileged sections of the society The focus areas of the foundation are: Learning and education in 2007, the foundation embarked on the Library for Every Rural School program to get people to donate books in Karnataka, Andhra Pradesh, Orissa, and Kerala. It has since set up 35,000 school libraries, the largest rural education program in India. Healthcare Since its inception in 1996, the foundation has constructed hospital wards, donated medicines and advanced medical equipment to hospitals, and organized health camps in remote areas, all in order to get the under-privileged access to modern medical practices. Arts Culture The Infosys Foundation sustains and preserves several art forms that are unique to our country and form a part of our heritage. Over the years it has sponsored art and music shows by rural artists, sponsored documentaries on Indian culture and published books that delineate the roots of art in Karnataka. Social Rehabilitation and Rural Uplift The foundation works for the welfare of destitute women and children and also helps towards developing rural India by providing education and vocational skills. It has built orphanages where education is prioritized and organized training centres for destitute women in and around Karnataka. Assessment There are a number of observations to be made from the above. Firstly, Infosys is seen to be engaged in various, unconnected welfare activities. Though laudable, this may not be the best policy to adopt towards CSR because many of these have little or no relevance to its core business ability. Thus, there is a chance that it may drop them in the future if aspects of the activities start to clash with their normal business working. This will damage the entire premise of sustainability that the company promotes about its CSR. The extremely local nature of these activities (most are based in and around Karnataka) show that Infosys is perhaps trying to build a good relationship at home where it wants to address as many problems as possible. However, scaling up of these activities will be the real test of its CSR practices because being a global company it cannot afford to limit its welfare activities to only one region. This may raise questions about their sincerity as their efforts may be construed as simply trying to appease the authorities at home and maybe get benefits over its competition. In the next section we will see that in matters in which it has expertise, Infosys has already expanded its activities to the global level. Sustainable Social Change Infosys makes the proud claim of influencing sustainable social change through its varied development initiatives. [1] The following are some of these initiatives: Education and Intellectual Capability It is no secret that India is engineering-mad with Indian Engineering Institutions churning out over 500,000 science and engineering graduates every year. However, even as rival IT companies and a host of other recruiters vie with Infosys over the recruitment of the fresh, inexpensive engineering talent, there is little that these corporates have done to aid in the recognition and reward of top Indian research. This is a matter of pressing concern because not only does this hamper the intellectual capital of our country in relation to competition from overseas (Even China has more PhDs per capita than India) but it promotes a lack of systematic learning that ultimately results in making a lot of these graduates unfit for immediate industrial employment. It is here that Infosys has once again differentiated itself from the competition by undertaking ventures that promote science and engineering education as more than simply a means of landing a job. The Infosys Science Foundation (ISF) was set up with the goal of achieving the above. It was set up by some of the companys founder members in February 2009 with the aim to elevate the prestige of scientific research in India and inspire young Indians to choose a vocation in scientific research. The ISF honours outstanding contributions and achievements by Indians in various streams of science with the Infosys Prize in five categories: mathematical sciences, physical sciences, engineering and computer sciences, life sciences and social sciences. The award is given to Indian scientists below the age of 50. The Foundation is funded by an amount of Rs. 215,000,000 contributed by the members of the Infosys Board and an annual grant from Infosys Tech. Ltd. The annual award in each category amounts to Rs. 5,000,000. The importance of this award is highlighted by the names of its past winners and their achievements, for e.g. last year the award for Life Sciences went to Dr. Chetan Chitnis for having discovered the first viable malaria vaccine and the award for Engineering Sciences went to Prof. Ashutosh Sharma for his applications in energy storage. Along similar lines is the ACM Infosys Foundation Award in Computer Sciences, established in August 2007 and carrying a cash award of USD 150,000 provided by the Infosys Foundation Endowment. It aims to reward educators and researchers whose work in software systems foster innovations that address existing challenges in the domain. Assessment Unlike a number of Indian companies whose education related welfare activities focus primarily on issues of primary/basic education, Infosys initiatives are unique in that they are associated exclusively with the domain of higher technical education, a segment in which it is arguably the most respected company in the country. This allows it to create perfect synergy between its everyday business activities and its investments in the above initiatives because unlike a lot of other companies who get into CSR without doing their homework and as a result get accused of doing it for ulterior motives, Infosys engagement with the field of technical education is a natural extension of its business practices. Its approach in this direction must also be lauded. While Narayana Murty has been accused in the past of favouring foreign universities when it came to giving grants, his decision of having Infosys establish the above awards is a godsend for the research establishment in India because though grants may be siphoned off by agencies without the threat of accountability, awarding individuals for their excellence is more effective as it provides a greater encouragement for others to follow in their shoes. But Infosys has not completely ignored the primary and secondary education sectors either. It has just approached it in a different way and yet received accolades all the same. A case in point is the Akshaya Patra Foundation, which was founded in 2000 and has three senior Infosys members apart from numerous Infosys volunteers who work towards providing free midday meals to schoolchildren. The foundations functions in partnership with state and central governments and currently serves over 1.3 million students in 7699 schools across India. Its impact is easy to assess from third party recognitions: it was awarded an International Fellowship by the US Congressional Hunger Centre, it received the 2008 CNBC India Business Leader of the Year Award and it even made it to the MBA curriculum as a case study at the Harvard School of Business in 2007. Similarly, Infosys BPOs work on Project Genesis, under which it works to improve the written and spoken communication capabilities in addition to the analytical skills of students in Tier 2 and 3 towns of the country so that they become employable, was awarded as the best CSR initiative at the 8th National Outsourcing Association (NOA) Awards 2011, in London. It was especially lauded for making sure that no expense was incurred by the participating academicians in the program. Community Development Unlike the education schemes already mentioned, community development initiatives do not at first seem the best fit with the companys existing activities. However, Infosys has done its share of work in this domain too and while most of it has been in the vicinity of its offices, there are projects like the Flood Relief Project for the victims of northern Karnataka in which the company has participated quite actively. Only last year the first phase of their initiative to construct 2250 houses across 18 villages was completed and subsequently these houses were handed over to the villagers. Assessment This aspect of Infosys CSR efforts can also be criticized for not matching with the core business abilities of the organization. The question to be asked is whether Infosys could have done a better job as simply a service consultant (a domain in which it already has expertise) to a third-party organization and have the latter handle the actual on-ground developmental work. Also, nearly all of Infosys developmental work has come in the neighbourhood of Karnataka. The scalability of this work can be called into question much like in the case of the Infosys Foundation. Regionalized developmental work can always raise questions about its sincerity, i.e. whether they are simply means to appease the local public/authorities. Infosys Eco Group Plans and Implementation Infosys has been considering the worsening impact of businesses on the environment for several years and has understood the importance of a clean environment and energy efficient solutions. It has hence committed itself to come up with innovations which positively impact the environment and can lead to large energy savings. Many of these have been implemented at Infosys itself. Under this initiative of Green Innovation, Infosys has not only come with a number of ideas but has also implemented some of them in tangible forms: iSustain: Carbon energy and resource management tool that helps the user to generate and monitor the use of various resources such as energy and water etc. being used, take majors to allot them efficiently and also monitor the carbon footprint. InGreen Energy Management: A tool used by Infosys to monitor the energy consumption at micro level and to take majors to cut on unnecessary usage. Using this, Infosys has been successfully reducing its carbon emission at a rate of more than 5% per annum. InGreen Personal Carbon Calculator: A tool that helps the user organizations to assess their impact on ecological systems in terms of carbon emission. Smart Integrator for Smart Grid: A device that continuously monitors the power usage of various devices in the range using a sensor and controls them accordingly. Infosys also plans to become carbon neutral and shift to entirely renewable energy by 2017. The steps taken for the same seem to be promising which include building of renewable energy power generation plants (recently they have built a solar energy plant at Jaipur Campus) and aiming for a platinum rating, the highest rating given by LEED (Leadership in Energy and Environmental Design) for environment friendly architecture. In January 2012, the third building at the Mysore Campus achieved this rating. Besides these, Infosys has been taking small but effective measures to reduce its own energy consumption, such as building designs with maximum exposure to natural light, design of windows which could lead to reduction in room temperature thus saving on air conditioning consumption of energy, increasing use of green power and use of recycled water. (Refer Exhibit 1) Assessment In year 2011, Infosys has saved more than 4 lakh units of conventional energy units through the use of the renewable energy sources. Not only has this helped in energy conservation but it has also resulted in savings of Rs. 20 Crore for the organization. In a similar way, innovative ideas such as smart integrator, rooms having maximum exposure to day light, optimum room temperature maintenance measures and use of LED and CFL tubes in place of conventional ones saved more than 7 lakh units of electricity, accounting for monetary benefit of Rs. 35 lakhs. In addition to these, Infosys is working closely with the Karnataka Government and Karnataka Electricity Regulatory Commission (KERC) for implementation of renewable energy power plants. It has been successful in convincing KERC to remove the cross-subsidy on renewable energy thus reducing its cost. Moreover as a result of these efforts, KERC has made it compulsory for the power utilities in Karnataka to buy at least 0.25% of total energy in form of solar energy, which will cost the end users only 4 paise more than regular rate per unit. Though listed under the CSR activities and initiated as Green Innovations, the activities mentioned above are not only intended to improve the environmental conditions as a social need but are also aimed at a reduction in Infosys energy consumption thereby giving it a competitive advantage as it can sell these innovative solutions to its clients as well. It is these latter observations that have been points of concern for critics who blame Infosys of hyping its energy savings and accuse it of Greenwashing. [18] Employee-Driven CSR Employees at Infosys are given ample opportunities to contribute to the society. This way of engaging employees to have hands on experience on CSR can also help the society, which needs responsible citizens to contribute man hours. The policy also helps these employees to attain their personal aspirations of serving the society. This sabbatical policy was initiated in the year 2008, where all the employees are encouraged to work through Infosys Foundation to support the needs of the society. The company as an entity is greatly supportive of its employees in executing the initiatives. The employees are made to pledge that they will make a difference to the society on a consistent basis. For effective execution, the company has individual divisions which run independent of each other under major themes like Health, Art, Education, Rural welfare and Rehabilitation and Targeted inclusive growth. A governance framework has also been put in place to streamline and implement the employee driven CSR initiatives in order to provide operational efficiencies and financial transparency.

Thursday, November 21, 2019

Chronic Disease Paper Essay Example | Topics and Well Written Essays - 1250 words

Chronic Disease Paper - Essay Example According to Andrew Prentice, professor of international nutrition at the London School of Hygiene and Tropical Medicine, UK, he finds developing countries facing a â€Å"double burden of disease†. Nutrition and life styles play a major role where chronic diseases are concerned. Cancer occurs or develops when the abnormal cells in ones body grow rapidly out of control. Normally, the cells in our body grow, divide and die in a systematic fashion. When the person is young, the cells grow rapidly until the person reaches adulthood after which the cells in the body mostly divide to repair any injury or to replace the dead or worn – out cells. In the case of Cancer, the cells are much different than normal cells. They keep on growing and dividing replacing the normal cells with abnormal ones. Cancer occurs because of the damage caused to the DNA which is present in every cell and conducts all our activities. Usually, when the DNA becomes damaged, the body is in a position to repair it. But in case the cells are cancerous, the DNA is not repaired. Damaged DNA can also be inherited and therefore can get cancer later on in life. Substances in the environment can damage the DNA, such as smoke from tobacco. Cancer cells often travel to different parts of the body where they take root and grow and multiply while replacing normal tissue. The process by which this takes place is called â€Å"Metastasis†. Most of the Cancers form tumors but in the case of leukemia no tumor is formed but instead these cells flow with the blood and circulate through the blood forming organs. Different types of cancer react differently to different types of treatment. All cancers are not life threatening. The tumors may be benign or non-cancerous and do not spread or metastasize to the various parts of the body. They multiply at a different pace and needs a

Wednesday, November 20, 2019

Geography Assignment Example | Topics and Well Written Essays - 250 words

Geography - Assignment Example The first phase in weathering of rocks is fracturing, which entails the formation of joints and cracks. Jointing a means through which rocks yield to both external and internal stresses including tectonic movements, contraction and expansion as a result of chemical or physical changes. Joints in rocks result from cooling or when pressure on their rock surface gets offloaded through erosion. Joints facilitate weathering by creating free space weathering agents, which increasing the surface area of rocks exposed to agents of physical or chemical weathering (Spellman, 2009). â€Å"They play an important part in rock weathering as zones of weakness and water movement† (Spellman, 2009, p.96). A slope failure refers to the collapsing of a slope caused by weakened stability of the earth in the event of an earthquake or heavy downpour. In most cases, slope failure often catches people unaware when it happens near residential areas causing high fatality rates. In order to determine whether a building lot is safe, it is important to assess slope failure factors such as gravity, physical properties of slope materials, and level of saturation of the area. Assessing all these factors would reveal the level of safety of the building

Sunday, November 17, 2019

The White Dress Poem Essay Example for Free

The White Dress Poem Essay The White Dress is an expressionism poem discussing a powerful, universal connection with the dress hanging in the woman’s closet. She analyzes how she thinks the dress sitting in the closet would feels, should it be alive, ready to be at her service upon demand, cosmetically. When she wears decorative highly fashionable dress, the dress becomes a part of her, and the woman becomes part of the dress. The two are inseparable, like she is describing two special people feel towards each other. The white dress described in this poem is a formal dress, taken out for special occasions. Of all the dresses in her closet, and even other white dresses in her closet, this is the dress she writes an analytical emotional poem about. Perhaps she is discussing a one time special occasion when she was wearing the dress, perhaps when she got engaged, met a special friend, or maybe she is expressing her desire to wear the formal reserved dress more often.   The deep fascination she has with the dress is very intriguing, because the strongest emotional empowerment she feels to the dress is invisible, but overwhelming.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In her line in the first paragraph â€Å"We itch to feel it, it itches to feel us, it feels like an itch† (Emanuel, par. 1 lines 3, 4). This line is saying there is an underlying emotional reason why she was attracted to purchase that particular dress in the store, amongst all other dresses. Everyone, or at least all women, experience this â€Å"sudden click† when they see a dress or other item when shopping. There are items everyone buys, for example everyone needs clothes. Most clothes are purchased because the look good, or we need them for something coming up. Then there are items that click with us. When this happens, we always just happen to have the money, sometimes it may be barely enough, and more often than not, it is on clearance or better than average price. When she talks about mutual â€Å"itch† she is describing that sudden click when we see an item calling out to us in the store.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Next paragraphs she speaks about its decorations, the actual character or identity of the dress. â€Å"Encrusted with beading, its an eczema 5 of sequins, rough, gullied, riven, puckered with stitchery† (Emanuel, Par. 2 lines 5, 6, 7). †Bouquet of a woman’s body, or its armor and it fits like a glove.† She is saying she becomes the decorations, comparing her body to a bouquet of flowers, the dress acting as a vase. There is a phrase or saying in professional ballroom and salsa dancing, the man is the frame and the woman is the picture. The dress frames or outlines her body, like a vase, but she is the actual attraction inside the dress. But she is enslaved to the dress to make her look good. â€Å"When we’re in it we’re machinery.† (Emanuel, Par 4, line 13).   Ã¢â‚¬Å"Right now it’s lonely locked up in the closet; while we’re busy fussing at our vanity† (Emanuel, Par. 5, 6 Lines 15, 16, 17).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The tonality of this poem is consistent from beginning to end. A woman talks about a formal dress in her closet reserved for special occasions. She obviously had a very special event with the dress, probably meeting a special person or friend who made am important impact on her life. Not many of us think about any of the clothes sitting in our closet, not even the formals that stand out until we are planning an occasion we will wear the dress, or within the first few moments we bring it home. There is a hint of guilt in some of her lines, talking about the dress sitting in the closet, waiting for it to be called upon again.   This poem sums up her powerful invisible connection to the dress, talking about it like it much more than just another item. She identifies herself with the dress, almost like she is becoming another person or going into another realm of the universe when she puts on this dress.

Friday, November 15, 2019

Australian Economy - Foreign Debt :: essays research papers

Throughout its history Australia has had to rely on foreign savings to finance its development as did America until the World War I. This savings inflow showed up as a current account deficit that averaged 2.5 per cent of GDP. The 1980s monetary explosion under Keating saw this average leap to about 4.5 per cent. The soothing argument was that this sudden rise only meant that more foreign savings are being invested in Australia. That most of the foreign debt was incurred by the private sector was waved about as proof of this proposition. The debt, we were told, was being used to generate future income. If only it had been that simple. The painful truth is that a good part, if not most, of that capital inflow was wasted and the previous labour government was to blame. Foreign debt now stands at about 51 per cent of GDP. It is claimed by some that Australia has been forced to finance this debt by selling off the farm, and this is largely the fault of the private sector borrowing. This is economic nonsense. The 1980s saw the money supply spin out of control; at one point monetary growth was averaging 25 per cent a year. (In 2001 the present government allowed M1 to explode by 22 per cent and deposits by 25 per cent). As any classical economist — a much maligned breed — would have warned, the results were rising interest rates and rising current account deficits. True, the monetary expansion stimulated the economy — it also gave us an unsustainable boom followed by the inevitable bust. With monetary demand rising, interest rates at historically high levels and inadequate domestic savings the private sector was forced to borrow abroad. Much of the borrowings by business went into mal-investments: investments that would turnout to be unprofitable. This happened because the monetary expansion (inflation) misdirected production and hence investment by sending distorted price signals to investors. The situation was aggravated by a speculative fever fuelled by the boom and by any elements of the tax structure that favoured debt. Only accelerating inflation could maintain these mal-investments. Eventually, as we know, the government finally punctured its monetary boom with 20 per cent plus interest rates. The mal-investments revealed themselves as idle resources and humiliated entrepreneurs. What we could not liquidate was our foreign debt. The debt was bad because of the circumstances that created it.

Tuesday, November 12, 2019

Management Information System Questions

————————————————- MANAGEMENT INFORMATION SYSTEM Question 1(10 Marks) Discuss five (5) challenges of Management Information System (MIS). Answers Introduction A Management Information System (MIS) provides information which is needed to manage organizations effectively. Management information systems involve three primary resources such as people, technology and information or decision making. Management information systems are distinct from other information systems in that they are used to analyze operation activities in the organization.Academically, the term is commonly used to refer to the group of information management methods tied to the automation support of human decision making, e. g. decision support systems, expert systems and executive information systems. The Challenge of Management Information System (MIS) Although information technology is advancing at a bli nding pace, there is nothing easy or mechanical about building and using information systems. There are five major challenges confronting managers: 1. The information systems investment challengeIt is obvious that one of the greatest challenges facing managers today is ensuring that their companies do indeed obtain meaningful returns on the money they spend on information systems. It’s one thing to use information technology to design, produce, deliver, and maintain new products. It’s another thing to make money doing it. How can organizations obtain a sizable payoff from their investment in information systems? How can management ensure that information systems contribute to corporate value?Senior management can be expected to ask these questions: How can we evaluate our information systems investments as we do other investments? Are we receiving the return on investment from our systems that we should? Do our competitors get more? Far too many firms still cannot answ er these questions. Their executives are likely to have trouble determining how much they actually spend on technology or how to measure the returns on their technology investments. Most companies lack a clear-cut decision-making process for eciding which technology investments to pursue and for managing those investments. 2. The strategic challenge What complementary assets are needed to use information technology effectively? Despite heavy information technology investments, many organizations are not realizing significant business value from their systems, because they lack—or fail to appreciate—the complementary assets required to make their technology assets work. The power of computer hardware and software has grown much more rapidly than the ability of organizations to apply and use this technology.To benefit fully from information technology, realize genuine productivity, and become competitive and effective, many organizations actually need to be redesigned. T hey will have to make fundamental changes in employee and management behavior, develop new work models, retire obsolete work rules, and eliminate the inefficiencies of outmoded business processes and organizational structures. New technology alone will not produce meaningful business benefits. 3. The globalization challengeHow can firms understand the requirements of a global economic environment? The rapid growth in international trade and the emergence of a global economy call for information systems that can support both producing and selling goods in many different countries. In the past, each regional office of a multinational corporation focused on solving its own unique information problems. Given language, cultural, and political differences among countries, this focus frequently resulted in chaos and the failure of central management controls.To develop integrated, multinational, information systems, businesses must develop global hardware, software, and communications stan dards; create cross-cultural accounting and reporting structures; and design transnational business processes. 4. The information technology infrastructure challenge: How can organizations develop an information technology infrastructure that can support their goals when business conditions and technologies are changing so rapidly? Many companies are saddled with expensive and unwieldy information technology platforms that cannot adapt to innovation and change.Their information systems are so complex and brittle that they act as constraints on business strategy and execution. Meeting new business and technology challenges may require redesigning the organization and building a new information technology (IT) infrastructure. Creating the IT infrastructure for a digital firm is an especially formidable task. Most companies are crippled by fragmented and incompatible computer hardware, software, telecommunications networks, and information systems that prevent information from flowing freely between different parts of the organization.Although Internet standards are solving some of these connectivity problems, creating data and computing platforms that span the enterprise—and, increasingly, link the enterprise to external business partners—is rarely as seamless as promised. Many organizations are still struggling to integrate their islands of information and technology. 5. Ethics and security challenge: The responsibility and control challenge: How can organizations ensure that their information systems are used in an ethically and socially responsible manner?How can we design information systems that people can control and understand? Although information systems have provided enormous benefits and efficiencies, they have also created new ethical and social problems and challenges. A major management challenge is to make informed decisions that are sensitive to the negative consequences of information systems as well to the positive ones. Managers face an ongoing struggle to maintain security and control. Today, the threat of unauthorized penetration or disruption of information systems has never been greater.Information systems are so essential to business, government, and daily life that organizations must take special steps to ensure their security, accuracy, and reliability. A firm invites disaster if it uses systems that can be disrupted or accessed by outsiders, that do not work as intended, or that do not deliver information in a form that people can correctly use. Information systems must be designed so that they are secure, function as intended, and so that humans can control the process. QUESTION 2 (10 Marks)Explain with example (s) one (1) of the following Enterprise Applications: a) ERP b) SCM c) CRM Answers a) ERP Introduction In 1990, Gartner Group first employed the acronym ERP as an extension of material requirements planning (MRP), later manufacturing resource planning and computer-integrated manufacturing. W ithout supplanting these terms, ERP came to represent a larger whole, reflecting the evolution of application integration beyond manufacturing. Not all ERP packages were developed from a manufacturing core.Vendors variously began with accounting, maintenance and human resources. By the mid-1990s, ERP systems addressed all core functions of an enterprise. Beyond corporations, governments and non-profit organizations also began to employ ERP systems. Enterprise Resource Planning (ERP) Enterprise Resource Planning (ERP) systems integrate internal and external management information across an entire organization, embracing finance or accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this activity with an integrated software application.Their purpose is to facilitate then flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders. ERP systems can ru n on a variety of computer hardware and network configurations, typically employing a database as a repository for information. Characteristics ERP systems typically include the following characteristics:- * An integrated systems that operates in real time (or next to real time), without relying on periodic updates. * A common database, which supports all applications. * A consistent look and feel throughout each module. Installation of the system without elaborate application/data integration by the Information Technology (IT) department. Examples: * Finance/ Accounting : General ledger, payables, cash management, fixed assets, receivables, budgeting and consolidation. * Human Resources : payroll, training, benefits, 401K, recruiting and diversity management. * Manufacturing : Engineering, bill of materials, work orders, scheduling, capacity, workflow management, quality control, cost management, manufacturing process, manufacturing projects, manufacturing flow, activity based cost ing, product lifecycle management. Supply chain management : Order to cash, inventory, order entry, purchasing, product configurator, supply chain planning, supplier scheduling, inspection of goods, claim processing, commissions. * Project management : Costing, billing, time and expense, performance units, activity management. * Customer relationship management : Sales and marketing, commissions, service, customer contact, call center support. * Data services : Various â€Å"self–service† interfaces for customers, suppliers and/or employees. * Access control : Management of user privileges for various processes. Components:- * Transactional database Management portal/dashboard * Business intelligence system * Customizable reporting * External access via technology such as web services * Search * Document management * Messaging/chat/wiki * Workflow management Connectivity to Plant Floor Information ERP systems connect to real–time data and transaction data in a v ariety of ways. These systems are typically configured by systems integrators, who bring unique knowledge on process, equipment, and vendor solutions. Direct integration—ERP systems have connectivity (communications to plant floor equipment) as part of their product offering.This requires the vendors to offer specific support for the plant floor equipment that their customers operate. ERP vendors must be expert in their own products, and connectivity to other vendor products, including competitors. Database integration—ERP systems connect to plant floor data sources through staging tables in a database. Plant floor systems deposit the necessary information into the database. The ERP system reads the information in the table. The benefit of staging is that ERP vendors do not need to master the complexities of equipment integration. Connectivity becomes the responsibility of the systems integrator.Enterprise appliance transaction modules (EATM)—These devices commu nicate directly with plant floor equipment and with the ERP system via methods supported by the ERP system. EATM can employ a staging table, Web Services, or system–specific program interfaces (APIs). The benefit of an EATM is that it offers an off–the–shelf solution. Custom–integration solutions—Many system integrators offer custom solutions. These systems tend to have the highest level of initial integration cost, and can have a higher long term maintenance and reliability costs. Long term costs can be minimized through careful system testing and thorough documentation.Custom–integrated solutions typically run on workstation or server class computers. Implementation ERP's scope usually implies significant changes to staff work processes and practices. Generally, three types of services are available to help implement such changes—consulting, customization, and support. Implementation time depends on business size, number of modules, customization, the scope of process changes, and the readiness of the customer to take ownership for the project. Modular ERP systems can be implemented in stages. The typical project for a large enterprise consumes about 14 months and requires around 150 consultants.Small projects can require months; multinational and other large implementations can take years. Customization can substantially increase implementation times. Process preparation Implementing ERP typically requires changes in existing business processes. Poor understanding of needed process changes prior to starting implementation is a main reason for project failure. It is therefore crucial that organizations thoroughly analyze business processes before implementation. This analysis can identify opportunities for process modernization. It also enables an assessment of the alignment of current processes with those provided by the ERP system.Research indicates that the risk of business process mismatch is decreased by: * linking current processes to the organization's strategy; * analyzing the effectiveness of each process; * understanding existing automated solutions. ERP implementation is considerably more difficult (and politically charged) in decentralized organizations, because they often have different processes, business rules, data semantics, authorization hierarchies and decision centers. This may require migrating some business units before others, delaying implementation to work through the necessary changes for each unit, possibly reducing integration (e. . linking via Master data management) or customizing the system to meet specific needs. A potential disadvantage is that adopting â€Å"standard† processes can lead to a loss of competitive advantage. While this has happened, losses in one area are often offset by gains in other areas, increasing overall competitive advantage. Configuration Configuring an ERP system is largely a matter of balancing the way the customer wants t he system to work with the way it was designed to work. ERP systems typically build many changeable parameters that modify system operation.For example, an organization can select the type of inventory accounting—FIFO or LIFO—to employ, whether to recognize revenue by geographical unit, product line, or distribution channel and whether to pay for shipping costs when a customer returns a purchase. Customization ERP systems are theoretically based on industry best practices and are intended to be deployed â€Å"as is†. ERP vendors do offer customers configuration options that allow organizations to incorporate their own business rules but there are often functionality gaps remaining even after the configuration is complete.ERP customers have several options to reconcile functionality gaps, each with their own pros/cons. Technical solutions include rewriting part of the delivered functionality, writing a homegrown bolt-on/add-on module within the ERP system, or int erfacing to an external system. All three of these options are varying degrees of system customization, with the first being the most invasive and costly to maintain. Alternatively, there are non-technical options such as changing business practices and/or organizational policies to better match the delivered ERP functionality.Key differences between customization and configuration include: * Customization is always optional, whereas the software must always be configured before use (e. g. , setting up cost/profit center structures, organizational trees, purchase approval rules, etc. ) * The software was designed to handle various configurations, and behaves predictably in any allowed configuration. * The effect of configuration changes on system behavior and performance is predictable and is the responsibility of the ERP vendor. The effect of customization is less predictable, is the customer's responsibility and increases testing activities. Configuration changes survive upgrades to new software versions. Some customizations (e. g. code that uses pre–defined â€Å"hooks† that are called before/after displaying data screens) survive upgrades, though they require retesting. Other customizations (e. g. those involving changes to fundamental data structures) are overwritten during upgrades and must be re-implemented. Customization Advantages: * Improves user acceptance * Offers the potential to obtain competitive advantage vis-a-vis companies using only standard features. Customization Disadvantages: * Increases time and resources required to both implement and maintain. Inhibits seamless communication between suppliers and customers who use the same ERP system un-customized. * Over reliance on customization undermines the principles of ERP as a standardizing software platform Extensions ERP systems can be extended with third–party software. ERP vendors typically provide access to data and functionality through published interfaces. Extensio ns offer features such as:- * archiving, reporting and republishing; * capturing transactional data, e. g. using scanners, tills or RFID * access to specialized data/capabilities, such as syndicated marketing data and associated trend analytics. advanced planning and scheduling (APS) Data migration Data migration is the process of moving/copying and restructuring data from an existing system to the ERP system. Migration is critical to implementation success and requires significant planning. Unfortunately, since migration is one of the final activities before the production phase, it often receives insufficient attention. The following steps can structure migration planning: * Identify the data to be migrated * Determine migration timing * Generate the data templates * Freeze the toolset Decide on migration-related setups * Define data archiving policies and procedures. Comparison to special–purpose applications Advantages The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expense. Decisions can be made more quickly and with fewer errors. Data becomes visible across the organization. Tasks that benefit from this integration include: * Sales forecasting, which allows inventory optimization * Chronological history of every transaction through relevant data compilation in every area of operation. Order tracking, from acceptance through fulfillment * Revenue tracking, from invoice through cash receipt * Matching purchase orders (what was ordered), inventory receipts (what arrived), and costing (what the vendor invoiced) ERP systems centralize business data, bringing the following benefits: * They eliminate the need to synchronize changes between multiple systems—consolidation of finance, marketing and sales, human resource, and manufacturing applications * They bring legitimacy and transparency in each bit of statistical data. They enable standard product naming/coding. * They provide a comprehensive enterprise view (no â€Å"islands of information†). They make real–time information available to management anywhere, any time to make proper decisions. * They protect sensitive data by consolidating multiple security systems into a single structure. Disadvantages * Customization is problematic. * Re–engineering business processes to fit the ERP system may damage competitiveness and/or divert focus from other critical activities * ERP can cost more than less integrated and or less comprehensive solutions. High switching costs associated with ERP can increase the ERP vendor's negotiating power which can result in higher support, maintenance, and upgrade expenses. * Overcoming resistance to sharing sensitive information between departments can divert management attention. * Integration of truly independent businesses can create unnecessary dependencies. * Extensive training requirements take resources from daily operations. Due to ERP's architectur e (OLTP, On-Line Transaction Processing) ERP systems are not well suited for production planning and supply chain management (SCM) The limitations of ERP have been recognized sparking new trends in ERP application development, the four significant developments being made in ERP are, creating a more flexible ERP, Web-Enable ERP, Enterprise ERP and e-Business Suites, each of which will potentially address the failings of the current ERP. QUESTION 3 (18 Marks) Describe with example all stages of System Development Lifecycle.Answers Introduction The Systems development life cycle (SDLC), or Software development process in systems engineering, information systems and software engineering, is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems. In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling th e creation of an information system: the software development process.Software development contains set of activities which when performed in coordination and in accordance with one another result in the desired result. Software development methodologies are used for the computer based information systems. The growth of the information’s has to pass through various phases or stages these stages are known as System Development Life Cycle (SDLC). The SDLC follows a well defined process by which the system is conceived, developed and implemented. To understand system development, we need to recognize that a candidate system has a life cycle, much like a living system or a new product.Systems analysis and design are based to the system life cycle. The stages are described below. The analyst must progress from one stage to another methodically, answering key questions and achieving results in each stage. Figure 1 : System Development Life Cycle (SDLC) Stages Step 1: Recognition of Need – What is the Problem? One must know what the problem is before it can be solved. The basis for a candidate system is recognition of a need for improving an information system or a procedure. For example, a supervisor may want to investigate the system flow in purchasing.Or a bank president has been getting complaints about the long lines in the drive – in. This need leads to a preliminary survey or an initial investigation to determine whether an alternative system can solve the problem. It entails looking into the duplication of effort bottlenecks, inefficient existing procedures, or whether parts of the existing system would be candidates for computerization. If the problem is serious enough, management may want to have an analyst look at it, such an assignment implies a commitment, especially if the analyst hired from the utside. In larger environments, where formal procedures are the norm, the analyst’s first task is to prepare a statement specifying the scope and objective of the problem. He/she then reviews it with the user for accuracy at this stage, only a rough â€Å"ball parle† estimate of the development cost of the project may be reached. However, an accurate cost of the next phase – the feasibility study – can be produced. Step 2: Feasibility Study Depending on the results of the initial investigation, the survey is expanded to a more detailed feasibility study.As we shall learn, a feasibility study is a test of a system proposal according to its workability impact on the organization, ability to meet user needs, and effective use of resources. It focuses on their major questions: * What are the user’s demonstrable needs and how does a candidate system meet them? * What resources are available for given candidate systems? Is the problem worth solving? * What are the likely impact of the candidate system on the organization? How will it fit within the organization’s master MIS plan?Each of these questions must be answered carefully. They revolve around investigation and evaluation of the problem, identification and description of candidate systems, specification of performance and the cost of each system, and final selection of the best system. The objective of a feasibility study is not to solve the problem but to acquire a sense of its scope. During the study, the problem definition is crystallized and aspects of the problem to be included in the system are determined. Consequently, costs and benefits are estimated with greater accuracy at this stage.The result of the feasibility study is a formal proposal. This is simply a report – a formal document detailing the nature and scope of the proposed solution. The proposal summarizes what is known and what is going to be done. It consists of the following. 1. Statement of the Problem – a carefully worded statement of the problem that led to analysis. 2. Summary of Findings and Recommendations – a list of the major findings and recommendations of the study. It is ideal for the user who required quick access to the results of the analysis of the system under study.Conclusions are stated, followed by a list of the recommendations and a justification for them. 3. Details of Findings – An outline of the methods and procedures undertaken by the existing system, followed by coverage of objectives ; procedures of the candidate system. Included are also discussions of output reports, file structures, and costs and benefits of the candidate system. 4. Recommendations and Conclusions – special recommendations regarding the candidate system, including the personal assignments costs, project schedules, and target dates.Three key considerations are involved in the feasibility analysis: economic, technical, behavioral. Let’s briefly review each consideration and how it relates to the systems effort. * Economic Feasibility: Economic analysis is the most frequently use d method for evaluating the effectiveness of a candidate system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system.Otherwise, further justification or alterations in the proposed system will have to be made if it is to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. * Technical Feasibility: Technical feasibility centers around the existing computer system (hardware, software etc. ) and to what extent it can support the proposed addition. For example, if the current computer is operating at 80 per cent capacity – an arbitrary ceiling – then running another application could overload the system or require additional hardware.This involves financial considerations to accommodate technical enhancements. If the budget is a serious constraint, then the project is judged not feasible. * Behavioral Feasibility: People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user staff is likely to have towards the development of a computerized system. It is common knowledge that computer installations have something to do with turnover, transfers, retraining, and changes in employee job status.Therefore, it is understandable that the introduction of a candidate system requires special effort to educate, sell, and train the staff on new ways of conducting business. After the proposal is viewed by management it becomes a formal agreement that paves the way for actual design and implementation. This is a crucial decision point in the life cycle. Many projects die here, whereas the more promising ones continue through implementation. Changes in the proposal are made in writing, depending on the complexity, size, and cost of the project. It is simply common sense to verify changes before committing the project to design.Step 3: Analysis It is a detailed study of the various operations performed by the system and their relationship within and outside of the system. A key question is – what must be done to solve the problem? One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate system should consider other related systems. During analysis, data are collected on available files, decision points, and transactions handled by the present system. We shall learn about some logical system models and tools that are used in analysis.It requires special skills and sensitivity to the subjects being interviewed. Bias in data collection and interpretation can be problem. Training, experience and common sense are required for collection of the information needed to do the analysis. Once analysis is completed the analyst has a firm understanding of what is to be done. The next step is to decide how the problem might be solved. Thus, in the systems design, we move from the logical to the physical aspects of the life cycle. Step 4: Design The most creative and challenging phase of the system life cycle is system design.The term design describes both a final system and a process by which it is developed. It refers to the technical specifications (analogous to the engineer’s blueprints) that will be applied in implementing the candidate system. It also includes the constructions of programs and programme testing. The key question here is – How should the problem be solved?. The first step is to determine how the output is to be produced and in what format. Samples of the output (and input) are also available. Second, input data and master files (data base) have to be designed to meet the requirements of the proposed output.The operational (processing) phase are handled through programme constru ction and testing, including a list of the programmes needed to meet the system’s objectives and complete documentation. Finally, details related to justification of the system and an estimate of   the impact of the candidate system on the user and the organization are documented and evaluated by management as a step toward implementation. The final report prior to the implementation phase includes procedural flowcharts, record layouts, report layouts, and a workable plan for implementing the candidate system.Information on personnel, money, hardware, facilities and their estimated cost must also be available. At this point, projected costs must be close to actual costs of implementation. In some firms, separate groups of programmer do the programming whereas other firms employ analyst programmers who do analysis and design as well as code programs. For this discussion, we assume that analysis and programming is carried out by two separate persons. There are certain functio ns, though, that the analyst must perform while programs are being written operating procedures and documentation must be completed.Security and auditing procedures must also be developed. Step 5: Testing No system design is ever perfect. Communication problems, programmers negligence or time constraints create errors that most be eliminated before the system is ready for user acceptance testing. A system is tested for online response, volume of transactions, stress, recovery form failure and usability. Then comes system testing, which verifies that the whole set of programs hangs together, following system testing is acceptance testing or running the system with live   data by the actual use.System testing requires a test plan that consists of several key activities and steps for programs, string, system and user acceptance testing. The system performance criteria deal with turnaround time, backup, file protection, and the human factor. Step 6: Implementation This phase is less c reative than system design. It is primarily concerned with user training, site preparation, and file conversion. When the candidate system is linked to terminals and remote sites the telecommunication network and tests of the network along with the system are also included under implementation.During the final testing, user acceptance is tested, followed by user training. Depending on the nature of the system, extensive user training may be required, conversion usually takes place at about the same time the user is being trained or later. In the extreme, the programmer is falsely viewed as someone who ought to be isolated from other aspects of system development. Programming is itself design work, however. The initial parameter of the candidate system should be modified as a result of programming efforts. Programming provides a â€Å"reality test† for the assumptions made by the analyst.It is therefore a mistake to exclude programmers from the initial system design. System te sting checks the readiness and accuracy of the system to access, update and retrieve data from new files. Once the programmes become available, test data are read into the computer and processed against the file(s) provided for testing. If successful, the program(s) is then run with â€Å"live† data. Otherwise, a diagnostic procedure is used to local and correct errors in the program. In most programs, a parallel run is conducted where the new system runs simultaneously with the ‘old’ systems.This method, though costly, provides added assurance against errors in the candidate system and also gives the user-staff an opportunity to gain experience through operation. In some cases, however, parallel processing is not practical. For example, it is not plausible to run two parallel online point-to-sale (POS) systems for a retail chain. In any case, after the candidate system proves itself, the old system is phased out. Step 7: Evaluation During systems testing, the sy stem is used experimentally to ensure that the software does not fail.In other words, we can say that it will run according to its specifications and in the way users expect. Special test data are input for processing, and the results examined. A limited number of users may be allowed to use the system so that analyst can see whether to use it in unforeseen ways. It is desirable to discover any surprises before the organization implements the system and depends on it. Implementation is the process of having systems personnel check out and put new equipment into use, train users, install the new application and construct any files of data needed to use it.This phase is less creative than system design. Depending on the size of the organisation that will be involved in using the application and the risk involved in its use, systems developers may choose to test the operation in only one area of the Firm with only one or two persons. Sometimes, they will run both old and new system in parallel way to compare the results. In still other situations, system developers stop using the old system one day and start using the new one the next.Evaluation of the system is performed to identify its strengths and weaknesses. The actual evaluation can occur along any one of the following dimensions: * Operational Evaluation: Assessment of the manner in which the system functions, impact. * Organizational Impact: Identification and measurement of benefits to the organisation in such areas as financial concerns, operational efficiency and competitive impact. * User Manager Assessment: Evaluation of the attitudes of senior and user manager within the organization, as well as end-users. Development Performance: Evaluation of the development process in accordance with such yardsticks as overall development time and effort, conformance to budgets and standards and other project management criteria. Step 8: Post – Implementation and Maintenance Maintenance is necessary to eli minate errors in the working system during its working life and to tune the system to any variations in its working environment. Often small system deficiencies are found as a system is brought into operation and changes are made to remove them. System planners must always plan for resource availability to carry out these maintenance functions.The importance of maintenance is to continue to bring the new system to standards. After the installation phase is completed and the user staff is adjusted to changes created by the candidate system, evaluation and maintenance being. Like any system there is an ageing process the requires periodic maintenance of hardware ; software. If the new information is inconsistent with the design specifications, then changes have to be made. Hardware also requires periodic maintenance to keep in time with design specification. The importance of maintenance is to continue to bring the new system to standards. BIBLIOGRAFIGordon b. Davis ; Margrethe H. Ols on. (1985). Management Information Systems : Conceptual Foundations, Structure and Development. New York : McGraw-Hill. Lucey. T. (1987). Management Information Systems. 5th Ed. Eastleigh, Hants : D. P Pubns. O’Brien, James A. (2002). Management Information Systems : Managing Information Technology in the E-Business Enterprise. Boston : McGraw-Hill. Robert C. Nickerson, Saravanan Muthaiyah. (2004). Introduction to Information Systems. Petaling Jaya : Prentice Hall. McLeod Raymond, P. Shell George. (2004). Management Information Systems. N. J. : Pearson Prentice Hall.

Sunday, November 10, 2019

End to End

The challenges of using satellites in end-to-end communications links: GEO satellite networks have the potential to provide the end user the ability to receive broadcast and multicast in greater amounts of information at higher rate of speed providing global connectivity anywhere within the footprint of the satellite. On the other hand there are several challenges that are presented when utilizing satellite networks. These challenges are seen by the end user in several different formats; the most common one being in Internet applications.The latency experienced by the end user due to the communication between two earth stations can be significant and often annoying. A tremendous amount of military and government organizations utilize and rely on satellite communications, when that path fails due to blocked areas, lack of available bandwidth or atmospheric interference then this becomes a serious situation and another reason why redundancy and a secondary and tertiary plan is always n eeded.Point to point fiber optic connections can provide a solid backup plan if availability is an option. The latency may not affect bulk data transfer and broadcast type applications, but those applications requiring extensive â€Å"handshaking† between two sites will be undoubtedly affected. TCP which is one of the Internets major protocols requires such interaction. Satellites that can provide the end user with global and broadband communications capacity are also an option but also come with challenges of its own.LEO(low earth orbit) and MEO (medium earth orbit) each are a viable source that provide latency times comparable to that of a terrestrial fiber optics; however because neither can remain in a constant fixed position relative of that of the earth, a constellation of several satellites is required to maintain comprehensive coverage. In this case network management becomes increasingly more complicated due to handoff to another satellite, tracking problems and prop er routing plans. The advantage of a simple topology is no longer a factor and lost is single-source broadcast/multicast capability and brings you back to ground zero.

Friday, November 8, 2019

Understanding Sender Parameter in Delphi Event Handlers

Understanding Sender Parameter in Delphi Event Handlers Event handlers and the Sender procedure TForm1.Button1Click(Sender: TObject) ; begin    ... end; Button1Click OnClick event The parameter Sender references the control that was used to call the method. If you click on the Button1 control, causing the Button1Click method to be called, a reference or pointer to the Button1 object is passed to Button1Click in the parameter called Sender. Lets Share Some Code For example, suppose we want to have a button and a menu item do the same thing. It would be silly to have to write the same event handler twice. To share an event handler in Delphi, do the following: Write the event handler for the first object (e.g. button on the SpeedBar) Select the new object or objects - yes, more than two can share (e.g. MenuItem1) Go to the Event page on the Object Inspector. Click the down arrow next to the event to open a list of previously written event handlers. (Delphi will give you a list of all the compatible event handlers that exist on the form) Select the event from the drop-down list. (e.g. Button1Click) OnClick procedure TForm1.Button1Click(Sender: TObject) ; begin    {code for both a button and a menu item}    ...    {some specific code:}    if Sender Button1 then   Ã‚   ShowMessage(Button1 clicked!)    else if Sender MenuItem1 then   Ã‚   ShowMessage(MenuItem1 clicked!)    else   Ã‚   ShowMessage( clicked!) ; end; Note: the second else in the if-then-else statement handles the situation when neither the Button1 nor the MenuItem1 have caused the event. But, who else might call the handler, you could ask. Try this (youll need a second button: Button2) : procedure TForm1.Button2Click(Sender: TObject) ; begin   Ã‚   Button1Click(Button2) ;   Ã‚   {this will result in: clicked!} end; IS and AS if Sender is TButton then   Ã‚   DoSomething else   Ã‚   DoSomethingElse; Edit box procedure TForm1.Edit1Exit(Sender: TObject) ; begin    Button1Click(Edit1) ; end; {... else} begin    if Sender is TButton then   Ã‚  Ã‚   ShowMessage(Some other button triggered this event!)    else if Sender is TEdit then   Ã‚  Ã‚   with Sender as TEdit do   Ã‚  Ã‚  Ã‚   begin   Ã‚  Ã‚  Ã‚  Ã‚   Text : Edit1Exit has happened;   Ã‚  Ã‚  Ã‚  Ã‚   Width : Width * 2;   Ã‚  Ã‚  Ã‚  Ã‚   Height : Height * 2;   Ã‚  Ã‚  Ã‚   end {begin with} end; Conclusion As we can see, the Sender parameter can be very useful when used properly. Suppose we have a bunch of Edit boxes and Labels that share the same event handler. If we want to find out who triggered the event and act, well have to deal with Object variables. But, lets leave this for some other occasion.

Tuesday, November 5, 2019

Leopard Facts

Leopard Facts Leopards (Panthera pardus) are one of five species of the big cat genus Panthera, a group that also includes tigers, lions, and jaguars. These beautiful carnivores are the subject of movies, legends, and folk tales, and are common in captivity. There are nine official subspecies of leopards, as well as several proposed sub-species. Leopards are considered to be vulnerable, endangered, or critically endangered animals in different areas of their range, which includes portions of African and Asia. Fast Facts: Leopards Scientific Name: Panthera pardusCommon Name(s): Leopard, pard,  pardus, pantherBasic Animal Group:  MammalSize: 22–22 inches tall, 35–75  inches longWeight: 82–200 poundsLifespan: 21–23 yearsDiet:  CarnivoreHabitat:  Africa and AsiaConservation  Status:  Endangered or Near Threatened depending on location Description The base color of the leopards coat is cream-yellow on the belly and it darkens slightly to an orange-brown on the back. A dappling of solid black spots is present on the leopards limbs and head. These spots form circular rosette patterns that are golden or umber in color at the center. The rosettes are most prominent on the jaguars back and flanks. Spots on the leopards neck, belly, and limbs are smaller and do not form rosettes. The leopards tail has irregular patches that, at the tip of the tail, become dark-ringed bands. Leopards exhibit a range of color and pattern variations. Like many species of cats, leopards sometimes exhibit melanism, a genetic mutation that causes the skin and fur of the animal to contain large amounts of the dark pigment called melanin. Melanistic leopards are also known as black leopards. These leopards were once thought to be a separate species from non-melanistic leopards. Upon close inspection, it becomes apparent that the background coat color is dark but the rosettes and spots are still present, just obscured by the darker undercoat. Leopards living in desert areas tend to be paler yellow in color than those that live in grasslands. Leopards inhabiting grasslands are a deeper golden color. Leopards have shorter legs than many other species of big cats. Their body is long and they have a relatively large skull. Leopards are similar to jaguars in appearance but their rosettes are smaller and lack a black spot in the center of the rosette. Full grown leopards can weigh between 82 and 200 pounds. The lifespan of a leopard is between 12 and 17 years. Rudi Hulshof/Getty Images Habitat and Distribution The geographical range of leopards is among the most widespread of all the big cat species. They inhabit the grasslands and deserts of Sub-Saharan Africa including West, Central, South and East Africa as well as South East Asia. Their range does not overlap with jaguars, which are native to Central and South America. Diet and Behavior Leopards are carnivores, but their diet is among the widest of all the cat species. Leopards feed primarily on large prey species such as ungulates. They also feed on monkeys, insects, birds, small mammals, and reptiles. The diet of leopards varies based on their location. In Asia, their prey includes antelopes, chitals, muntjacs, and ibex. Leopards hunt mainly during the night and are skilled at climbing and often carry their prey into trees where they feed or hide their catch for later use. By feeding in trees, leopards avoid being disturbed by scavengers such as jackals and hyenas. When a leopard captures large prey, it can sustain them for as long as two weeks. Anup Shah/Getty Images Reproduction and Offspring Leopards have multiple mates and reproduce year-round; females attract potential mates by excreting pheromones. Females give birth to two to four cubs after a gestation period of about 96 days and usually produce a litter every 15 to 24 months. Leopard cubs are tiny (about two pounds at birth) and spend their first week of life with their eyes closed. Cub learn to walk at about 2 weeks old, leave the den at about 7 weeks, and are weaned by three months. They are independent by the age of 20 months, though siblings may stay together for several years and young leopards often stay in the area where they were born. Dietmar Willuhn/Getty Images Conservation Status Leopards are more numerous than any of the other great cats, but, according to the Animal Diversity Web, Leopards are declining in parts of their geographic range due to habitat loss and fragmentation and hunting for trade and pest control. As a result, leopards are listed as near threatened on the IUCN Red List of Threatened Species. Efforts are underway to protect most of their range in West Africa, but numbers are still shrinking; five of the nine subspecies of leopard are now considered to be endangered or critically endangered: Panthera pardus nimr  - Arabian leopard (CR Critically Endangered)Panthera pardus saxicolor  - Persian leopard (EN Endangered)Panthera pardus melas  - Javan leopard (CR Critically Endangered)Panthera pardus kotiya  - Sri Lankan leopard (EN Endangered)Panthera pardus japonensis  - North Chinese leopard (EN Endangered)Panthera pardus orientalis  - Amur leopard (CR Critically Endangered) Sources Burnie D, Wilson DE. 2001. Animal. London: Dorling Kindersley. p. 624.Guggisberg C. 1975. Wild Cats of the World. New York: Taplinger Publishing Company.Hunt, Ashley. â€Å"Panthera Pardus (Leopard).†Ã‚  Animal Diversity Web, animaldiversity.org/accounts/Panthera_pardus/.

Sunday, November 3, 2019

Northern Rock Disaster Case Study Example | Topics and Well Written Essays - 3000 words

Northern Rock Disaster - Case Study Example One of the major UK shares, Northern Rock has been most horrible exaggerated by the troubles in the fiscal system. It was enforced to go to the Bank of England for emergency financial support after its customary representation of accessing resources from the money marketplace bankrupted over the summer. It is now lumbered with a 25bn credit from the Bank of England and prolongs to endeavor whereas the administration and its executives fight over the finest path of action for the suffering bank. It will be seated at the base of the FTSE 250 index of average sized organizations, barely staying away from the humiliation of falling into the index that follows diminutive businesses. The thought of setting up Northern Rock Foundation appeared in the mid of1990s throughout the deliberations at the then Northern Rock Building Society about demutualization. In April 1996, the chairman of the society namely, Robert Dickinson, proclaimed the construction of the organization as part of its proce dure to turn out to be a plc. The offer was to create a bountiful organization with just about fifteen percent of the concerned share resources and an agreement of five percent of the new plc's yearly earnings. In October 1997, together the bank and the organization became veracity. Officially establishe... In the subsequently few years other parts of significance were added such as offspring, elder people and society renewal. In 2000, the organization started granting elevated report culture systems. From the beginning, along with its assurance to approachable endowment making, the organization intended to take other more tentative looms and to update the thoughts and development of provincial and general strategy creators. In 1999, the trustees founded a 1 million huge thoughts preserve whose subject would change yearly. In the initial year, the focal point was the area's coalfield societies, though in 2000 it was severe improvement. (Bank of England, September 14, 2007). The subsequent year, the endowment was dedicated in retort to the outburst of foot and mouth sickness. As it urbanized its endowment making, the organization in addition saw necessitate sustaining charitable and group of people organizations in additional means. Guidance and enlargement, all the way through very litt le funding was obtainable, permitting organizations the chance to stopover a comparable development somewhere else, to depart on a route or to purchase in a number of external aid. The organization moreover specially made elevated quality teaching on ascendancy, administration and features of regulation influencing the charitable zone. As the organization reached its fifth bicentennial, the trustees determined to gaze once more at its exertion and its field. An exacting disquiet was that some programs related to definite positions and sorts of job while others did not. From 2003, the trustees determined that they would propose financial support solely in the North East and Cambria. They in addition initiated innovative agendas which sustained many

Friday, November 1, 2019

History and political science Essay Example | Topics and Well Written Essays - 1000 words

History and political science - Essay Example Some of the ancient theorists are the Marxists and empiricists. Marxists focused on the issue of communism and capitalism1. Karl Marx is among the many known historians who led to the development of the Marxist theory. Therefore, it is necessary to address a number of theories developed by these historians. Numerous reasons are accountable for the difference in interpretations of history as depicted by varied historians. First, historians existed at dissimilar times and thus encountered different life occurrences. For instance, the ancient historians majorly tried to put into history the occurrences that people had not given attention2. This is a category of individuals, who ventured majorly in the explanation of the origin of humanity and the social classes. In an appropriate explanation of why historians have such different interpretations of history, it is crucial to examine the works of Karl Marx3. Marx is highly renowned due to his Marxist theory. Karl Marx is among the ancient historians born in Germany in 1818 and his works contributed mightily to history. Marx existed during a period coupled with many revolutions. As a result, together with his collaborator, he developed several ideas from their life experiences. Karl’s closest friend, Friedrich Engels worked together in writing the history. As opposed to ancient historians, modern and postmodern historians depict a different way of interpreting history4. The key reason behind their interpretation is the developments that have occurred recently. In addition to the developments, the availability of the secondary information sources in national archives and libraries facilitates the process of interpreting history5. Such resources normally compare the ancient history with the current, thus coming up with an accurate, as well as informed explanation of the key historical happenings. The question also demands an explanation on how different historians interpret history in a dissimilar manner. In answ ering the above question, it will be necessary to focus on some of the historians’ interpretations about history. An ancient historian whose name is Karl Marx contributed significantly in history. He interpreted history by giving a lot of attention to materialistic bit of it6. As a result, the phrase historical materialism came into existence. The literature has revealed that he concentrated on both physiological, as well as the material needs. He disputed the idea of a complete satisfaction of an individual’s both physiological, as well as materialistic needs. He thus concluded that the ease at which to access such materials determines the nature of a society hence the birth of the phrase history of humanity. He also established three ways in which human society changes and all of them were dependent on the level of production. In addition to the Karl’s interpretation of history, other historians such empiricists have different interpretations7. Empiricists emp loy scientific principles in understanding how history has been changing over time. They insist the implication of applying knowledge in order to understand the key historical events. In the information collection process, they stress on the authenticity of the resources used in maintaining the accuracy of information. They aim at visiting the main international archives thus collecting the most accurate information for interpretation purposes. Among all the theories described in the book, I feel comfortable with the empiricist theory. The above is a theory based on knowledge, as well as epistemology8. Scholars define epistemology as the study of knowledge. The empiricists majorly center their work on craft. The issue of craft highly concentrates on knowledge and skill. The empiricism is an