Monday, September 30, 2019

Waves

When people think of waves they may think of a nice vacation or maybe a storm. Most people may not think about what causes waves or how waves can get so tall and powerful. In addition, people may not think about how tides are formed. The movement of waves includes information about how waves form, how they move, what happens when waves interact, and some of the effects of waves. When people visit a beach, they might realize the daily rise and fall of the water, or how high and low tides can get. Tides are caused by the moon, sun, and the earth and are almost never are the same size or duration.A tide can spread out to be much bigger than what it was predicted to be (Simon 1990). The easiest tidal sequence is the semidiurnal tide. A semidiurnal tide has two high tides and two low tides of about equal height each day. Semidiurnal tides may have a daily inequity where successive hide tides have different heights. Semidiurnal tides are often easy to predict because high or low tides occu r a consistent length of time after the moon has passed overhead. Both the Atlantic and the Indian Oceans generally have some semidiurnal tides with two other tides each day.Spring tides normally occur when there is a full moon and the sun and the earth are in a straight line. When this happens, tides are never the same size or last the same amount of time as the people may expect. There is also neap tides and they occur when the moon is in the first or last quarter, when its gravitational pull on the oceans is at a right angle to the sun. When this happens the tide will not be the same size or last the same amount of time either. (Hawkins 2005). Therefore, the pull of the moon causes tides and these tides produce waves.Waves are the forward movement of the ocean’s water due to the oscillation of water particles by frictional drag. Waves can also vary in size and strength based on wind speed (B. Amanda). When people are considering waves, it is important to know that while it appears that the water is moving forward, only a small amount of water is actually moving. Instead, it is the wave’s energy that is moving. When the waves get too tall, relative to the water’s deepness, the wave’s stability is weakened and the entire wave falls onto the beach, forming a breaker.Breakers come in all different types. The type of a breaker is determined by the slope of the shoreline. Falling breakers are caused by a steep slope. Spilling breakers occur when the shoreline has a gentle or gradual slope. Crests of waves are formed by a thrust or the forward push of the wave. Which could lead to the development of breakers. Sometimes, huge waves are created by undersea earthquakes or the pointy motions in the seafloor. These huge waves are called tsunamis or tidal waves. They can make really big messes and can kill a lot of people (B, Amanda).Waves are put into categories and named according to how they are formed and how they appear. Waves that are l ooped as they reach the shoreline are called ocean currents. These currents are generated in the surf zone when the front end of the wave pushes to the shore and then slows down. Wind also causes waves and these are called surface waves. Regular patterns of smooth, rounded waves in the open are called swells. Swells means that they are mature undulations of water in wave energy that has left the wave generating region (B,Amanda).When waves meet and interact they form what is called an interference. The interference occurs when the crest and trough are between two waves that are align and then they combine. The action of an interference makes a dramatic increase in wave height. When water molecules get the energy they move forward,and all of the waves are forced closer together because they are now moving a lot slower because of the wind speed. The movement of wind speed over the oceans generates corresponding movements in the water. When the seafloor becomes shallow the waves become flattened(B,Amanda).An underwater earthquake can trigger a tsunami that creates a long, fault rupture that can get up to or over 800 miles long(B,Amanda). â€Å"In December 2004, an underwater earthquake was triggered a string of tsunamis along the Indian Ocean with overwhelming effects. Scientists have found a break in the sea floor faults which are causing the earthquakes, tsunamis, and waves to be extremely dangerous. † (B,Amanda) Since waves are so powerful they have a big impact on the shape of the world’s coastlines. Generally, they straighten coastlines.Sometimes headland’s composed old rocks are very resistant to erosion just into the ocean and force waves to bend around them. When this happens, the waves energy is spread out over multiple areas and different sections of the coastline which receive different amounts of energy and are then shaped differently by waves(B,Amanda). Waves can also cancel out each other through when crest meets a tough or vise versa. The movement of sand, gravel, and concrete with the long shore drift is know as deposition. Coastal landforms caused by deposition include barrier spits, bay barriers, lagoon, tombolos and even beaches themselves.Coastal features found today include cliffs, wave cut platforms, sea caves, and arches. These types of features make it clear that ocean waves have a tremendous impact on today shoreline. Erosion also creates many of the coastal features found today. It can also act in taking away sand and sediment from beaches especially on those that have heavy wave action. Erosion also creates many of the coastal waves today(Amanda B). Erosion is a broadly defined group of processes involving the movement of soil and rock. This movement is often the result of flowing agents, whether wind, water, or ice.

Sunday, September 29, 2019

Is literature the expression of the human condition

Is Literature the Expression of the Human Condition Oh yes, is literature the expression of the human condition or is it not? Yes, literature is and for only one reason, Normans Conquest 1066. But also literature is recorders of history, recordings of time. Literature also a sequence of words, it can consist of all meanings, expressing the human condition, emotions, recorders, it defines life. The human condition is experiences of being human in a social, cultural, and personal context, it's an aspect of positives and negatives of being human.So forth, literature is shown in Death of a Salesman, where Willy is stuck in his wn past and everyone but him knows that. But like all humans, we all have dreams, hopes, and plans. â€Å"LINDA: He'll find his way. WILLY: Sure. Certain men Just don't get started till later in life. Like Thomas Edison, I think. Or B. F. them was deaf. [He starts for the money on Biff. † Goodrich. One of bedroom doorway. ] I'll put my Willy hoping that one day for Biff to be a famous salesman, like one of the best salesman out there, at the top with Thomas Edison, or B.F. or Goodrich. But both Linda and Willy knew that Biff would never be a major success in business, but even though they knew it, they still hoped and believed in him. The American dream was to be the number one, at the top better than everyone else and that's what Willy always wanted, he wanted to be the best, especially the best salesman. He was living in the past and ruining all hopes of ever becoming the best. He Just couldn't grasp on the fact that the future was coming sooner then he thought, and wasn't ready for it.CHARLEY: â€Å"Nobody dast blame this man. You don't understand: Willy was a salesman. And for a salesman, there's no rock bottom to the life. He don't put a bolt to a the law or give you medicine. He's a nut, he don't tell you man way out there in the blue riding on a smile and a ack†that's an shoeshine. And when they start not smiling earthqua ke. And then you get yourself a couple spots your hat and your finished. Nobody dast blame this man. A salesman is got to dream boy, it comes with the territory. Charley insisting that Willy a salesman and no matter he always will be, his dream will never die, and even when your salesman and it's not going the best it possibly can or you're not the best in the world there's no rock bottom. Also as you can see in Great Gatsby ,Literature is expressing that humans can be split by wealth The poor do their own thing, nave their own parties and hen the more wealthy class stay with their group and have their own events. But also in this book it prove one man's love for a women and how long and how far people are willing to go to prove their love.Well for Gatsby he Just never gave up on the girl of his dreams, he followed her, set up every moment perfectly, planned everything. â€Å"Whenever you feel like criticizing any one†¦ Just remember that all the people in this world havent ha d the advantages that you've had. â€Å"(l) In life, not everyone has the opportunities as others would get, so it's like that saying â€Å"Don't Judge a book by its cover. † Because if you are criticizing people Just off looks, or what you think they might be or what they might have done, you might never know, and maybe you would be wrong.You never know what some people have been through, until that day you learn how to go up to them and stop Judging and talk to them and find out who they really are. In humans we have the intensity to always Judge someone, will it be looks, wealth, personality, how they talk, or what they do. No matter where you go it's in the human condition that someone or everyone will Judge you, either it will be said to your face or in their mind. It's human nature for Judging, to also debate weather how we will get treated or act. â€Å"Gatsby's wonder when he first picked out the green light at the end of Daisy's dock†¦. is dream must have clos e that he could hardly fail to grasp it. He seemed so did not know that it was already behind him. † (182) Gatsby gets so close to the girl he's in love with, so close but yet so far. Emotions is one of the key part to the human condition, love can play a big role in life, it can take control over your mind, soul, heart, everything, it can be the best feeling in the world or it can be the worst. It can feel like heaven but hurt like hell. But if love didn't hurt or give the pain it gives then there would be no reasons to come back to it.Or to keep falling in and out of love. In The Adventures of Huckflnn, Huck lies throughout the book, but in some cases it's for the best, to either save himself or someone he cares about. But it's like Truth vs. Lies vs. Life and death, for example â€Å"Honest, I'll tell you everything Just as it happened, your majesty. The man that had a-holt of me was very good to kept saying he had a boy about as big as me that he was sorry to see a boy in such a me, and ied last year, and dangerous fix; and when they was all took by surprise by coffin, he lets go sure! finding the gold, and made a rush for the of me and whispers, ‘Heel it now, or theyll hang ye, and I lit out. It didn't seem no good for ME to stay†I couldn't do nothing, and I didn't want to be hung if I could So I never stopped running till I found the canoe; told Jim to hurry, or theyd catch me get away. and when I got here I and hang me yet, and said I was afeard you and the duke so was Jim, Jim if I 55) wasn't alive now, and I was awful sorry, and and was awful glad when we see you coming; you may askHuck is lying to save himself, but also he got lucky that the man that was holding him, his son died that year and was around his age and height, but it reminded n of his son. The man felt sorry for Huck, that he was in such a dangerous fix, so when the man got a chance to let Huck run, he did. The human condition, is like when we get a chance to lie we u sually take it, Just as long as we get what we want, Just put words together and make it into sentences that people want to hear, but it's all bull shit.An nice over being a asshole, out in the world there are mainly assholes, but ho can really blame them since if your too nice you get taken for granted. In Winesburg Ohio, literature is expressed through many of ways, in all of the short stories. In â€Å"Hands† a guy uses his hands to talk but he got kick out of his home town for doing that, for the town people thought he wasn't the same as them, and they didn't like people who where different, they wanted everything the same everyone the same. The coming of industrialization, attended by all the roar and rattle of affairs, the shrill cries of millions have come among us from overseas, trains, the growth of cities, of voices that he going and coming of the building of the interurban car lines that weave in in and out of towns and past farmhouses, and now these later days the coming of the automobiles has worked a tremendous change in lives and in the habits of thought of our people of Mid- America. â€Å"(56) Urbanization and travel have changed America, as the humanity started to change so did movement, traveling, and more to advance into the future.Making life easier, but in Winesburg Ohio, towns were full of one type of people because if you were different they would either run you out of the town or end up killing you, having someone different then veryone else Just wasn't common for them. Going on, Narrative of the Life of Frederick Douglass, as a slave suffering was a daily thing, and white folks were stupid for insistence†¦ â€Å"l have often been utterly astonished, since I came to the north, to find persons who could speak of the among slaves, as evidence of their It is impossible to singing, contentment and happiness. conceive of a greater mistake.Slaves sing most when they are most unhappy. The songs of the slave sorrows of his heart; and he is relieved represent the by them, only as an aching heart is relieved by its often tears. At least, such is my experience. I have sung to drown my sorrow, but seldom to express my happiness. Crying for Joy, and singing for Joy, were uncommon to me while in the Jaws of slavery. alike The singing ofa man cast away upon a desolate considered as island might be as appropriately evidence of contentment and happiness, as the singing of a slave; the songs of the one and of the prompted by the same emotion. (2. 9) other are The white folks that seen the slave singing songs, and dancing thought that they were happy, but never really understand that they were hoping for slavery to stop, to be free. Every man and every women should have equal rights no matter what color black, white, yellow, blue.. ect. All humans are equal that how God made us, Just because some are better in other things than others, doesn't make them less human or equal, slavery could work either way. So why put yo urself in a position that you wouldn't want to be in, in the first place.The Things They Carried, as literature is the expression of the human condition, it can be a not so pretty site at time. Life's already like a war, it's like the battlefield of life, but then to add to it, we got the most horrible thing know to mankind â€Å"war. â€Å"When I'm out there at night, I feel close to my own body, I can feel my blood moving, my skin and my everything, it's like I'm full of electricity fingernails, and I'm glowing in the dark– I'm on fire almost–l'm burning away to nothing–but it doesn't matter because I know exactly where I am. (1 1 1) War can change all aspects of a man, it's one of the most burial things in this world and watching with your only two pairs of eyes. We all have our own limits, till we finally break, and watching as your comrades or one of your best friends get shot, either critically injured, or to point they die. Will always change someone, c hange their life forever, war is not something to Joke about as are men fight for our safety and for us, we sit back at home living our life, like nothing going on. I'm skimming across the surface of my own history, moving fast, riding the melt beneath the loops and spins, and when I take a blades, doing high leap into the dark and come down thirty years Timmy's later, I realize it is as Tim trying to save life with a story. â€Å"(246) In this quote it shows what people really would do to save someone life, because one life can make a big differences. But Literature is the expression of the human condition, for life is something worth wild, as words have all different kinds of meaning they all can be inter twined with each other, which can tell stories and which makes history as we know it.

Saturday, September 28, 2019

SIWES Project in Computer Science Essay

1.1 Overview of SIWES SIWES refers to the employment of students nearing under-graduation in firms or organizations, which operate on activities related to the respective student’s major subjects. The course, CSC 3299 as offered in Ajayi Crowther University is a compulsory subject offered by every computer science student in the 2nd semester of the third academic year with the objective of enabling students to come into contact with real life applications regarding the knowledge and skills gained in both theoretical and practical courses of the university. The core courses of Computer Science offered by ACU are both theory and laboratory practical -based and aid in providing a theoretical concept or ‘base’ to the students so that they are equipped with sufficient knowledge for joining the work force after completion of under-graduation. SIWES on the other hand helps the students familiarize themselves with the experience of being employed in their field and effectively learning and applying the knowledge required by carrying out their activities in the offices and fields. 1.2 Objectives of SIWES The general objectives if SIWES are outlined as follows: Helping students break free from the theoretical world of ****books and class courses and leap into the real world of applications of knowledge. Enabling the students to effectively interact in a work environment within a hierarchy of employees. The efficiency in working in groups and under higher authorities is tested during this course. Helping students to express dependability, initiative, resourcefulness and professionalism in the tasks they are assigned. To evaluate the person’s ability to communicate and operate under pressure, if required. To help students enhance their creativity and efficiency in dealing with projects related to their field of study. To enable students to pick up skills from the experience and projects of other employees to apply in their own tasks. To enable the student realize their relative strength in a field with many practical applications and help students come out with final year projects that model real life industry challenges. 2.0 Origin of the Report This report has been prepared as a requirement of the internship program. The report was based upon the ICT department of the organization Nigerian civil aviation authority (NCAA). 2.1 ORGANISATION BRIEFS AND STRUCTURE OF NCAA Brief : Nigerian Civil Aviation Authority is the regulatory body for aviation in Nigeria. It became autonomous with the passing into law of the Civil Aviation Act 2006 by the National Assembly and assent of the President, Federal Republic of Nigeria. The Act not only empowers the Authority to regulate Aviation Safety without political interference, but also to carry out Oversight functions of Airports, Airspace, Meteorological Services, etc as well as economic regulations of the industry. Nigeria has just successfully passed through the ICAO Security follow-up Audit of May 2006 and the ICAO Universal Safety Oversight Audit in November 2006. Nigeria is now preparing for the American FAA IASA Category 1 Certification. With over 25 Airports, 30 Airlines, 590 Pilots, 19 Flight Engineers, 258 Air Traffic Controllers(ATC), 677 Aircraft Maintenance Engineers, 1103 Cabin Crew and 4 Aircraft Dispatchers, Nigeria now boasts of improved aviation infrastructural facilities at the Airports, state of the art navigational aids, modern weather forecasting equipment and highly skilled manpower to ensure safety and comfort of the flying public. Airlines have started bringing in brand new aircraft to the industry 737-700 new generation, Regional Jet CRJ 400/900, Dash 8-400Q, Business Jet/Turboprop, Helicopters, B777, Dreamliner B787, Jumbo Jet Boeing 747-400 series as well as brand new Regional Jet Embraer. 3.0 NCAA STRUCTURE Senior Management : Director General: Dr. H.O. Demuren Director of Airworthiness Standards: Engr. P. Ekunwe Director of Licensing: Capt. Adamu M****ia (Acting) Director of Operations and Training: Capt. A. N. Aliyu (Acting) Director of Aerodrome and Airspace Standards: Mr. Lawal Haruna Director of Air Transport Regulation: Ms. I. Sosina Director of Finance and Administration: Mrs. Elemanya Ebilah Director of Consumer Protection: Alh. Abdullahi Adamu Company Secretary/Legal Advisor: Mrs. A.A. Gbem Organizational Chart: 4.0 BRIEFS ON ICT DEPARTMENT 4.1 Our Goal To provide high quality, customer and staff-focused Information and Communication Technology support for efficient and value-added service delivery. 4.2 What We Do Our purpose is to ensure that our structures – such as all communication-based procedures for the NCAA – within and outside – conforms to standard ICT platforms and practices, carefully targeted to meet our goal. 4.3 Objectives †¢ To deploy modern-based ICT facilities that will become catalysts in the innovative processes of effective aviation safety within our air-space †¢ To embark on an on-going process in which to foster better information and communication access for aviation service users †¢ To provide the means by which information and communication knowledge is developed, stored, aggregated, manipulated and diffused within and outside the NCAA and to become the major transformational medium of aviation safety reformation †¢ To technologically support and enable NCAA’s full participation in the global economy 5.0 Responsibilities †¢ Advice on adoption of most efficiently and effective ICT policy †¢ Ascertain proper and smooth operations of computer systems at the headquarters †¢ Draw ICT and ICT-related Budgets †¢ Assess the impact of ICT in economic growth and development †¢ Drawing up specifications to facilitate procurement of appropriate computer hardware and software related features within the organization †¢ Supervise the installation and commissioning of computer network systems †¢ Contact point on all ICT-issues.(i.e. ICT Management) †¢ Represents the organization in all forums on ICT-related issues †¢ Coordinate training of staffs on computer systems in line with E-Government Strategy to build a proper ICT capacity within the organization †¢ Advice the organization on information security in the use of computers and Maintain important information and data backups CHAPTER 2 DESCRIPTION OF WORK DONE During my six months SIWES at NCAA, I worked extensively in the Network and maintenance unit, Where I gained a lot of experience in network environment and system maintenance. 6.1 NETWORK STRUCTURE OF NCAA: 6.2 SUMMARY ON THE NCAA NETWORK NCAA uses a domain to organize the network environment. Domains are groups of PCs on the same network and are a method to isolate communications between the members in the domain and the other data traffic.. Anyone in a domain can communicate with each other and out bound, however PCs not defined in the domain can not communicate with those in the domain. Basically the network starts from when the satellite in space sends radio signals down to the satellite dish receiver (ku-band, ka-band, c-band e.t.c). This satellite dish receiver is connected to the private port of the internet modem then the public port of the modem is connected to the ISA server which acts as the gateway to internet access. The ISA server is connected to a domain controller which controls the domain environment by granting anyone who has a registered account on the domain access to the internet recourse. I.e. anyone who does not have an account or valid log on credentials cannot use the internet. Domain controller can also be used to control the network environment by restricting the rights to chance setting on the workstation so that only administrative rights can alter settings. The ISA server is also connected to an antivirus server which monitors the automatic updates and downloading of update for all workstation in the domain with a specific antivirus used for the network installed on them. The ISA server is also connected to a 24 port switch which is connected to the different switch cabinet in each directorate of office buildings (since it is a 24 port switch it take a maximum of 23 directorates, another switch can be connected to the first switch in case of more buildings). Ever building has a cabinet where LAN (local area network) connections are distributed to different offices. The cabinet comprises of switches and patch panels. The patch panel is a device that is used as a repeater so that signals don’t get loss over a long cable. One of the cables that comes from the main 24 port switch goes to the patch panel then a RJ-45 cable is connected from the patch panel to the switch (mostly a 24-port switch) in the cabinet (in case of two switches  we have two patch panels.). The patch panel then distributes the connection in the office or to other offices in the building as LAN port where workstations can be connected to by the use of RJ-45 cable (workstations can also be connected directly to the switch). As for wireless connection, a wireless router or access point is placed at every passage way in each building. The wireless access point is either connected to one of the switches in the cabinet or the main 24-port switch.

Friday, September 27, 2019

Risk Assessment for Effective Physical Security Term Paper

Risk Assessment for Effective Physical Security - Term Paper Example ever, not treated with the same magnitude as technical intrusions such as hacking, computer virus and invasion of spyware programs.2 What many security strategists fail to understand is that both attacks carry the risks of equal magnitudes. Whether the intruder gained the unauthorized access by physically bypassing the security systems or electronically infiltrating the firewalls and other measures the potential detrimental effects of having the organization’s data or other possession in the wrong hands is the same. 3 To that end, physical security threats should be treated with the same magnitude as other non-physical security threats. Physical security measures are the measures instituted to prevent any unauthorized access of the organization’s property, secure facilities, data, and resources from damage. These damages could be in form of data or property theft, espionage, vandalism and even gross terrorist attack. The physical security measures, therefore, is a combination of multi-layered security systems which operate independently to prevent physical security threats. This paper will analyze the importance of physical security measures then the critical considerations used for physical security risk assessment in order to institute an effective physical security system. Physical security systems appear in different forms and perform different tasks. It is important to note that none of the systems is capable of independently and effectively protecting the organization against physical intrusion.4 The various systems operate independent of one another, but cooperate with each other in order to form an effective whole. The doctrine of synergy, which implies that the whole is better than the sum of its individual components, has great relevance and application in designing an effective physical security system. In order to ascertain an effective physical security system, it is imperative to determine the different types of systems that interact to create

Thursday, September 26, 2019

Anishinaabe Tribe Essay Example | Topics and Well Written Essays - 500 words - 1

Anishinaabe Tribe - Essay Example In addition, it fuels feelings of animosity and hatred among people that are to co-exist mutually, helping each other in times of need. This paper examines a fishing controversy that has happened between two tribes in the Spear fishing Walleye in Wisconsin, stressing on the importance of the Lac Du Flambeau, an Ojibwe person to spear fish in the Valley, without necessarily having to seek permission from the Wisconsin Authorities. The fishes existing in the Walleye Valley are meant for economic and social use by the natives of this place. These people are meant to be the custodians of the river and the resources in it, and ensure that they exploit them for their welfare. In this case, they are mandated to use them for food, as well as important products for sale in the market in order to improve their economic welfare. As a native Ojibwe resident, it is important to note that this valley existed from time immemorial, where our ancestors used it for their economic lives. They would fish in this river to get food for their stomachs as well as sold some to advance their economic welfare. During this time, the ancestors did not have to get permission from authorities in order to use and manage these resources; they were motivated by their conscience to take good care of these resources for the welfare of the future generations. The conservation and management practices used by ancestors have been passed on the succeeding generations. This is something that should prompt the Wisconsin authorities to understand that the natives of Walleye in Wisconsin have the capacity to conserve and manage the fishing grounds and exploit them for their economic and social gains. In this case, they should be allowed to go on with spear fishing in the valley without having to worry that the resource will be misused. Another important consideration in allowing the Ojibwe people to spear fish in their traditional way is that this fishing style is does not lead to

Analysis of the Impact of the Macro Environment on the Pharmaceutical Assignment

Analysis of the Impact of the Macro Environment on the Pharmaceutical Industry - Assignment Example â€Å"Changing market forces and growing public expectations† (Wilson, 2000, p.12) have added business ethics to the mix. The external environment includes both competitive and industry factors. Interestingly, Johnson et al (2008) expect all competitors to be within the same industry when this might not be the case. Equally, not all industry players compete in the same markets. Thus the diagram reflects the less-than-tidy reality of players who exist within any industry, yet compete across industry boundaries and within different competitive environments, falling outside the rational approach to strategy. The underlying factor is the organization’s ability to control the external environment. An organization has influence in the competitive arena, using marketing tools to influence others, but no control over the macro (PESTEL/STEEPLE) factors and must react to changes when they happen. Strategy traditionally focused on rational future planning, what Whittington (2001) calls â€Å"classical† and Mintzberg and Waters (1985), â€Å"deliberate† strategy. But the effects of changing macro factors fall within Whittington’s (2001) â€Å"systemic† and Mintzberg and Waters’ (1985) â€Å"emergent† strategy as such changes cannot be predicted and consequently would not feature in any strategic planning. In analyzing the external environment, de Kluyver and Pearce (2009 p.59) use global tectonics, defined as â€Å"the process by which developing trends in technology, nature, and society† change the external environment. Three tectonics are identified:

Wednesday, September 25, 2019

How does aviation impact the environment What could be done to improve Essay

How does aviation impact the environment What could be done to improve things - Essay Example Many aircrafts use avgas (Aviation Gasoline) as a fuel. It contains tetra-ethyl lead (TEL) that is a highly toxic chemical. It causes soil pollution at airports. It also pollutes air and causes various respiratory problems. The greatest threat caused to the environment is in the form of the chemical gases that emit out of the aviation aircrafts. So, these should be considered specifically. First of all, improvement in the design of aircrafts engine is required. An engine which reduces the emission of toxic gases such as Carbon dioxide, Carbon monoxide and nitrogen oxides is required. This may greatly reduce the environmental pollution caused due to these gases. Despite manufacturing new engines, the improvement in older engines can also be helpful. High-pressure turbine nozzles, upgraded gas turbines and steam injection can greatly assist in minimizing the pollution. Another requirement is to design engine which reduces the fuel combustion as fuel burn also contributes heavily to the air pollution. Moreover, light aircrafts can be run on lower-compression engines which may be operated on mogas (Motor Gasoline) mogas does not contain tetra-ethyl lead (TEL). thus, using mogas instead of avgas will be hel pful in minimizing air pollution. Another way of reducing environmental pollution caused from aviation is by improving operational efficiency of the aircraft i.e. by increasing the number of passengers in each flight. This will reduce the emissions per passenger. The reduction in taxi time may also be helpful in reducing pollution. Pollution may also be reduced by reducing energy output during landing, takeoff and taxi

Tuesday, September 24, 2019

Serology International Employee Training Case Study

Serology International Employee Training - Case Study Example The human resource director, Dr. Tom Turblin has been assigned the role of selecting the most qualified employee to lead the new division that is going to be charged with the production of the kit. Dr. Tom will also be in charge of training him for the role. Dr. Tom decides that he will first begin with a re-evaluation of the academic qualification of all the employees that are employed by the firm. The exercise is going to be undertaken by an outsourced firm that deals with analysis and auditing. The exercise is going to cost Serology International around 60,000 US dollars. In addition, the outsourced auditing firm has notified Dr. Tom that the exercise will take three weeks. However, Dr. Tom wanted it completed as soon as possible, but he has already agreed to the deal. The firm identifies Scott Dickson as the most qualified employee. Thus, Dr. Tom decides to go through his file and record. He notes Scott has been the head of the Pipette production unit for the firm for a long time. His records show that in his tenure, there has been a considerable rate of return and innovation; hence paints him as an innovative individual. What about his leadership skills? After inquiring from the workers under his jurisdiction. They indicate that he is a leader who is always willing to listen and take part in the production stages. Moreover, he seeks to understand each employee on a personal level and gives credit where it is due. However, Scott has some shortcomings. One is that Scott has no prior experience in the production of DNA assessment kits. An aspect that worries Dr. Tom a lot. He has since decided to help him and work as his guide. His hope is that doing so will give Scott the confidence that is required to run the new division successfully. Scott is also be said to be high-tempered. He is emotional and has losses control easily.  

Monday, September 23, 2019

Journal (Answer All questions) Essay Example | Topics and Well Written Essays - 1000 words

Journal (Answer All questions) - Essay Example Consequently, describes strategic management as question eight provides the similarities and the differences between military and business strategies. The second last question, describes strategic analysis, development and implementation; the last question provides my experience in relation to the group work. Discussion one Strategies are driven by numerical figures and wide extent of research and analysis of the results; the results are not based on biases, personal opinions or even individual/group’s perception but rather on the tested or expected outcomes. The idea of numerical figures and research in the formulation of strategies at organizational or individual level bring in the scientific dimension of strategies. Additionally, strategies may be considered as an art or craft owing to the fact that it is a tool applied at various managerial facets and it involves the formulation, instrumentation and the examination of various processes geared towards achieving certain goal s (Johnson et al, 2011). Discussion two Intended strategy applies to myriad organizational dimensions; it involves undertaking deliberate planning and execution of the planned courses of actions. In some occasions it may also be referred as deliberate strategy for instance humanitarian organization may formulate tools that will enable them deliver specific forms of assistance to victims of a disaster or industries may develop tools that will enable them fit in a competitive market. Tools used in intended strategy may include; objectives, visions as well as the application of a SWOT analysis process to enhance the achievement of the desired goal (Cooper, 2007). On the other hand, emergent strategies encompass a framework of actions arise over time in the process of implementing organizational plans without intended missions, objectives as well as visions. According to Mintzberg, it is described as ‘a realized pattern that was not intended’. For instance; an organization may realize certain imperative actions that may develop in the process of their operation which may also facilitate the achievement of their goals. Discussion Three The learning school strategy is among the ten schools of strategy; it is based on the idea that strategy is a tool that develops in the process of acquiring new ideas and skills concerning various organizational facets. For instance; an organization may be faced by various challenges in the process of its operation however, new ideas may emerge in the process that may assist in creating a solution to the problem (Bhatt, 2005). The other school of strategy is the position strategy that was developed by Michael Porter who believed that strategy is ascribed to the position of individual in a certain situation or the position of an organization in a certain market scenario which will influence its courses of action. For example; a high demand of commodities in the market may force an organization or an industry to raise the prices of its commodities (Bhatt, 2005). Discussion Four A strategist is a person with the intellectual capacity and skills to formulate a method through the combination of various ideas and perception in order to ensure that certain specific desired goals are achieved. The

Sunday, September 22, 2019

Music and Literature Essay Example for Free

Music and Literature Essay Music and literature have played an important role in our community and society since not only humans but the earth was born. It’s still a great mystery as to who invented or made music first. But first of all we shouldnt focus as to when was music made but should see that what actually music is? How to define music has long been the subject of debate; philosophers, musicians, and, more recently, various social and natural scientists have argued about what constitutes music. The definition has varied through history, in different regions, and within societies. Definitions vary as music, like art, is a subjectively perceived phenomenon. Its definition has been tackled by philosophers of art, lexicographers, composers, music critics, musicians, linguists, sociologists, and neurologists. Music may be defined according to various criteria including organization, pleasantness, intent, social construction, perceptual processes and engagement, universal aspects or family resemblances, and through contrast or negative definition. Music is sometime said to be a branch of literature. Now the question stands that what is literature? Literature is the body of all written works; the collected creative writing of a nation, people, group, or culture; all the papers, treatises, etc. published in academic journals on a particular subject. its particularly hard to understand but in simple words literature means a piece of work written deeply form the or whatever your experiences and brain say and to put that experience and the work of brain into a piece of writing. Literature comes from the Latin word literra meaning a piece of writing. Literature has many branches like narrative stories, novels, poems and etc. Music is also a famous branch of literature. There are many music lovers found all over the world. Music is further separated into many other branches e.g. jazz, pop and etc. Music has been with us since the start of our beautiful earth. Music is just an inch away from us always: it’s in the rustling of leafs, the sound of waves hitting the shore, the quite sound that trees make when they sway in the air.

Saturday, September 21, 2019

The Smartphone Security Awareness Information Technology Essay

The Smartphone Security Awareness Information Technology Essay Over the past decade mobile phones have become pervasive and have evolved significantly from feature phones to smartphones to fit the increasing needs of the competitive market and to meet consumers wants and needs. The purpose of this research paper is to provide insight and raise security awareness into the risks posed by unsecured smart mobile devices. Smartphones are ubiquitous devices and are comparative to the personal computer in terms of computational power, choice of operating systems, software with the same extended features and the ability to support 3rd party software. Smartphones have enabled businesses and their workforce the freedom to collaborate and access organizational data 24 hours a day, 365 days a year. What has been done to protect individuals and businesses from the ever increasing threat of mobile orientated attacks? Pervasive computing (also called ubiquitous computing) Endpoint security antivirus/malware enterprise information infrastructure mobile information security perspective security awareness training technical topics are outside the scope of this research Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is on smartphone security awareness. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and create a comprehensive guide for the benefit of the reader. 1.1 Motivation The motivation for this project was mostly due to my vocational role as an IT consultant. During the course of my employment over the past decade within the IT industry, I have noticed a substantial gap within businesses for the need of greater smartphone security and awareness. It was obvious to me that along with the evolution and improved capabilities of cellular devices, established a greater risk for organisations. This thesis is the result of work I have personally carried out in various roles throughout my technological career between October 2004 and December 2010. 1.2 Aims and objectives The following are my aims and objectives for this project Aims Create an authoritative document with recommendations to raise awareness and inform businesses for the need of greater mobile security within the business environment. Use insight to establish a research gap. Main objectives Assess smart mobile devices currently used. Analyse security advantages and disadvantages of smart mobile devices. Establish what risks smart mobile devices are exposed to. Evaluate impact of risk exposed by unsecure mobile devices to businesses. Examine mobile security currently available. Investigate responsibility Evaluate current business policies and procedures for mobile devices and how these are enforced. Construct smartphone security guide with recommendations for businesses. 1.3 Problem Statement The problem is information and financial loss due to information theft or inaccessibility from malicious software (malware), and the detrimental impact this has upon the business. There are many types of information that can be stored on smartphones for example, personally identifiable information in the form of contact details (phone, address), email, GPS coordinatesà ¢Ã¢â€š ¬Ã‚ ¦ Information security has gained significant value within the business domain over the past decade however this value remains subjective. Users have been made aware of the risks posed by malicious software whilst using their personal computer on the internet, now assistive technology like smart mobile devices are becoming increasingly more powerful, functional and ubiquitous. Where personal computers have at least some security software in place as standard, smartphones commonly have no security software installed and are susceptible to the same threats as personal computers. Businesses, professionals and personal users now have a greater awareness for the need of personal computer security. This has been provided by media coverage, enterprise training or through personal experience. When using a personal computer or laptop for example, it is common to find a firewall and antivirus software installed showing that internet safety has now become a social normalcy. Example http://www.bloobble.com/broadband-presentations/presentations?itemid=3397 Data loss or inaccessibility due to a virus, data theft due to Smartphones are high specification mobile personal computers, and are subject to the same risks personal computers are open to. There are four to five billion mobile phones and we are approaching a billion smart phones. But remember that these devices are more powerful than supercomputers were a few years ago, and we are putting them in the hands of people whove never had anything like it before. Google CEO Eric Schmidt Businesses need IT to function, IT adds value and to compete in todays economic climate. ITs purpose is to save time, time is money. Todays organisations rely heavily upon information technology in order to allow their business to function (Khosrowpour, 2001). This is fundamentally due to how intricate information technology systems are embedded into organisations. Enterprise architecture (EA) is a communication tool between IT and business (Zachman, 2004). EA is multifaceted (Wagter et al, 2005) and for the scope of the project I will be examining how the Security Architecture (SA) facet can benefit organisations to secure the Information Technology within the business against the increasing threat that unsecured mobile devices pose. There are many different mobile operating systems for smart mobile devices requiring different security applications. I will analyse these systems and the risks associated. My intentions are to investigate what impacts smart mobile devices can have on businesses, why these problems affect the organisation, and how they are overcome. Finally I will gather insight and make recommendations that businesses can use to foresee and prevent future unnecessary costs and risk. 2 Literature review 2.1 Background The subject I have proposed to use for this project is a very real-world business and information technology problem. Because smartphone security is still in its infancy, it is currently quite a challenge to source accurate and relevant information from authoritative sources such as Emerald without resorting to web based research. However, the more this project advances smartphone security in the media is becoming omnipresent. The first documented computer virus was designed over 25years ago by two brothers named name 1 and name 2 in Pakistan, the virus was called the brain virusà ¢Ã¢â€š ¬Ã‚ ¦ Timeline evolution of the mobile telephone (Malware) Analogue Cellular Mobile History / Uses 2.2 Current status/Development of theories Information is all that needs to be secured. Malware is changing, smartphones are changing and businesses are changing. How far up the technological ladder are mobiles/feature phones/smartphones 2.3 How this project fits in with the literature review I had chosen the subject then chosen the literature review method, thus tailoring the literature review to fit the requirements of the project. 3 Research methods 3.1 Introduction: hypothesis Throughout my employment, I recognised a gap and need for smartphone security within 3.2 Epistemology http://www.learnhigher.ac.uk/analysethis/main/quantitative1.html One of the methods of analysis I will to use is the conceptual method, this has been described by Beaney as a way of breaking down or analysing concepts into their constituent parts in order to gain knowledge. Conceptual analysis consists primarily in breaking down or analysing concepts into their constituent parts in order to gain knowledge or a better understanding of a particular philosophical issue in which the concept is involved (Beaney 2003). I have interpreted this to mean the compartmentalisation and analysis of data. The proposed project will be delivered using an analytical in-depth research structure. I have chosen this project structure as it will primarily be research based on the current business problem as previously stated. I intend to analyse this problem, propose possible solutions, test and implement a well-documented solution with recommendations. Critical and creative thinking skills such as Edward.De Bono six thinking hats will be used to examine the problem domain. A review will be given on how the systems work and compare them to how they should work. I will then analyse the solution domain by examining which options are available to improve the system security along with an optimal recommendation and the benefits it would provide. 3.3 Methodology Figure research methodFor my project I will implement a triangulated, positivistic methodological approach, I have chosen this particular technique as it will provide me a balanced view of the subject area. I will incorporate both quantitative and qualitative primary research methods as recommended by Bryman (BRYMAN, 2006). However for the scope of this project I will be mostly using Quantitative based research as indicted in Fig 1 below. . Bryman advises that quantitative data can be gathered by way of a survey and qualitative research collected from journals and interviews. Initially I will undertake primary research in the form of a survey questionnaire, and furthermore I will interview professionals in the field of smartphones and security such as police personnel, security advisors and mobile phone shop staff. The survey will be available to respondents in paper form and electronically hosted so any user with internet access may access it. I will design the survey to be concise and simple to maximise the amount of respondents and gain quality information. My target survey participants are business managers, IT professionals and general smartphone users. I have chosen to target these particular users as I am trying to ascertain not only the perception of smartphone security but also what policies and procedures are put in place and how aware users are of these. I have proposed to target these users by using a popular internet based technological social news website named Reddit. Reddit has a daily turnover of over 850.000 unique users (Alexa, 2010). According to Alexa the average Redditor is male, between the age of 18 to 44, does not have children, is well educated and browses Reddit either from work or home, suggesting that the majority of Redditors are working professionals and due to being a technological social news website the average user is technologically aware (Alexa, 2010). This confirms my premise and establishes that Reddit would suit my proposed target survey participant. There are many options available for online survey software, each option has its benefits and weaknesses, I have carefully analysed these options personally and have chosen to utilise the cloud based option Survey Monkey to host my survey. The default limitations of Survey Monkey are the survey itself has been designed to be logical with closed questioning and Qualitative data has been sourced from reliable and authoritative resources. I have chosen journals from Emerald Primary research methods used Interviewing mobile phone shop staff, police, business owners I will critically analyse the results of my survey by comparing the answers given to a risk register. 4 Results 4.1 Presentation and description of results Who took part? A survey was conducted to establish the awareness for the need of smartphone security. Users were openly invited from technological backgrounds to partake in the survey and assured of anonymity. A total of 758 people responded to the online survey from a possible 854,998 potential participants. The survey itself was open for one month during February and March 2011. The results indicated that majority share with 82% of survey responders being male as opposed to the 18% that were female both averaging at 26 years of age, this confirms part of my original hypothesis as an average smartphone user. When asked, 53% of respondents reported that they had used their smartphone solely for personal use as opposed to the 45% of partakers that reported they used their smartphone for both business and personal use, with just 2% reporting to use a smartphone solely for business use only as shown in Fig 2 combining a total of 47%.C:UsersLeeDesktopUniUniversity 2010_11MikeDissertationDocumentsDissertationSurveySurvey monkey charts8 FeaturesSM_Features_Line.png Figure Smartphone use 25% of respondents had only been using smartphones for the past six months, 17% were aware they had been using them for at least a year and a majority percentage of 59% had been using smartphones for more than one year. Only 12% of respondents opted to use the pay as you go payment facilities as opposed to the greater majority of 88% that have contracts. SMARTPHONE 34% of respondents used an Apple IPhone, 58% reported to use Android smartphones, 13% used Blackberries and 6% (46) of respondents had Nokia smartphones. (GRAPHIC) 87% of respondents had used calendar functions, 94% of respondents used email, 86% of used games, 87% of respondents used GPS features, 74% of respondents used instant messaging, 52 % of respondents used internet banking facilities, 66% of respondents used multimedia messaging service (MMS), 94% of respondents used the short messaging service (SMS) feature and 78% of respondents admitted to using social networking sites on their smartphone. A total of 756 participants responded and 2 participators chose not to answer the question. From a total of 758 respondents, 63% (476) valued the physical smartphone above the 37% (282) whom valued the information more. Applications 93% of survey partakers used 3G for mobile data communication, 59% of respondents used Bluetooth technology, only 4% of had used infrared line of sight technology, 75% of respondents admitted to connecting via universal serial bus (USB), 94% of participators had used wireless for mobile data communication. Total of 757 participators answered this question and 1 partaker chose to skip the question. Security Survey respondents considered smartphone security as beneficial but not essential as the majority answer with 64% (485), 21% (159) didnt not consider there to be a need currently for smartphone security software as opposed to 15% (114) whom considered smartphone security software as absolutely essential. A total of 758 of 758 responded to this question. 87% Of participants stated that they do not use any smartphone security software. 87% of participants reported that they did not use any form of smartphone security software such as antivirus as opposed to 13% that did. A majority of 92% (699) had not been advised of any security methods to protect them or their information from fraud, theft or malicious software. 8% (59) respondents agreed they had received adequate security advice. Everyone answered this. Malware 95% (694) of respondents were aware of Adware, 27% had known about Badware, 25% (181) of respondents were aware of Crimeware, 69% (504) had previous knowledge of Rootkits, Trojans'(95%, 696), Spyware (95%, 697), and Worm (90%, 656)were the most commonly aware terms of malware from the malicious software list, the majority being Virus (711) with 97% of respondents being aware of this type of malware. 731 respondents answered this question. 62% of survey participants reported that they did not pay attention to licence agreements and permissions when installing applications on their smartphones 34% reported they did read the licence agreements and permissions. 4% of respondents believed that this question was not applicable to them for their smartphone use. Personal Computer 81% of responders were aware for the need of security software for personal computers and 19% were not aware. All survey partakers responded to this question. 94% (713) participants have connected their smartphone to a personal computer (PC), 6% (46) stated they had not ever connected to a PC. All 758 respondents answered this question. 96% (728) respondents stated that they owned the smartphone, only 4% (30) of respondents had employer owned smartphones. All partakers responded to this question. Responsibility Out of the 758 respondents, 15% (115) were aware of policies within their place of business, with the majority of respondents 41% (309) unaware of any workplace policies or procedures particularly orientated toward smartphones. 44% (334) responded that the question was not applicable to them. All participants answered this question. 4.2 Discussion and interpretation of the results Awareness and concern Compare phones and age to security awareness Bb were the most security aware group Internet banking is true by smartphone antivirus is false and user is aware of computer antivirus need. Harris Interactive: Tablet users more likely to transfer sensitive data than smartphone users Serendipity, sagacity 5 Smartphones A mobile phone is a portable electronic device used to make and receive telephone calls. The mobile phone was first revealed by Dr Martin Cooper from the company Motorola in 1973, it was not until ten years after Dr Coopers demonstration that Motorola released its flagship mobile phone the DynaTAC, this was the worlds first commercially viable mobile phone (Motorola, 2009). Originally these devices were commercially targeted at businesses and upper class individuals as the cost of the device was very high and the actual usage was severely restricted, due to the technology limitations at this time battery weight was 2kg (Motorola, 2009) and the battery duration would last a maximum of 30 minutes thus making the device impractical and available only to businesses and professional consumers. According to Moores Law, the number of transistors on a chip roughly doubles every two years. (Intel, 2005) As Moore stated over thirty five years ago, due to the advancement of processors, battery technologies and overall reduced power consumption, mobile phones have become lighter, smaller, more powerful and longer lasting. Due to these fundamental technological advancements mobile phones have been able to incorporate additional existing technologies such as camera units, sensors, speakers and often take advantage of JAVA based applications and features, thus coining the term Feature phone. Feature phones are more advanced technologically than mobile phones. Smartphone The term smartphone is ambiguous and many experts fail to agree on a suitable definition. Most smartphone features are not exclusive to a particular category, this project does not intend to make that definition, however for the scope of this project I have listed combined definitions and compared current smartphone features as listed in Figure 3 below. Most vendorsà ¢Ã¢â€š ¬Ã‚ ¦ type more Gartner, a world leading authority in information technology research define smartphones as A large-screen, voice-centric handheld device designed to offer complete phone functions while simultaneously functioning as a personal digital assistant.'(Gartner, 2010) Feature phones can have several of the characteristics as listed below in figure 3, however smartphones have the capability of providing all the capabilities. As a result, any mobile device meeting all conditions of each function in figure 3 can be considered a smartphone under this definition. Figure Smartphone characteristics Function Characteristic Phone size Device is compact and easily transported. Operating System Operating system that allows third party applications. Connectivity Device provides multiple methods (wired and wireless) of connecting to both the internet and other devices and networks. Input The device contains keyboard, or touchscreen keyboard. Storage capacity The device has a large and expandable storage facility. Office functionality The device provides the ability to perform basic office tasks such as email, take notes and word processing. Calendar The device includes a digital organiser and calendar. Synchronisation The device supports synchronisation of information with fixed desktop or laptop devices, or online web services. Phone Features The mobile device executes voice, text and multimedia message functions. Sensors Acceloratormeter, light, sound and movement sensors. A model to measure the maturity of smartphone security at softwareà ¢Ã¢â€š ¬Ã‚ ¦ Under this definition of smartphones or Smart Mobile Device (SMD) the following mobile platforms were included: Apple iOS Blackberry Google Android Symbian Windows Mobile These mobile platforms were reported to be the top 5 mobile platforms used in 2010 Figure (?) Storage expansion cards Smartphones currently reside in the top tier of mobile communication technology. Third party operating system As previously stated there are many smartphone platforms available, each platform and brand bringing different benefits and functionality. These platforms or operating systems create opportunities for both businesses and personal users. For businesses this increased functionality provides the facility for added employee productivity. These opportunities exist not just for business and personal users as the opportunity extends to the bad guys too, I will continue to explain further in the document. Smartphone Definition A smartphone is defined as A cellular telephone with built-in applications and Internet access (PCMAG, 2010) describes a smartphone as a à ¢Ã¢â€š ¬Ã‚ ¦ andà ¢Ã¢â€š ¬Ã‚ ¦ describes it asà ¢Ã¢â€š ¬Ã‚ ¦I have interpreted these descriptions and define smartphones as not feature phones basically. All smartphones have generalised functionality, such as input devices (keys, touchscreen) I will go into greater detail regarding the operating features Botha, et al (2009) point out that early generations of cell phones and PDAs had relatively little storage capability. Johnson (2009) indicates that todays generation of devices can be quickly and easily upgraded by adding additional storage cards. http://mobileopportunity.blogspot.com/2007/01/shape-of-smartphone-and-mobile-data.html 5.1 Apple The Apple Iphone was the original smartphone (), first released in June 2007. Popular, perceived security (apple store, scans for malware?) Simplistic design Limitations: NO support for flash 5.2 Android Open source, will be biggest 5.3 Blackberry (RIM) Security architecture built upon military specification, perceived most secure as email encryption (tunnelled) through Canada Banned in UAE 5.4 Symbian Owned by Finnish giant Nokia open sourcing the software opens up the availability of the Source Code to programmers, who can then develop, modify and distribute as they see fit meaning a richer and hopefully what becomes a considerably improved OS very quickly thanks to developer input. http://blog.mobiles.co.uk/mobile-news/symbian-os-goes-open-source/ http://blog.mobiles.co.uk/wp-content/uploads/2010/02/symbian.jpg Most popular globally, acquired by Microsoft? 5.5 Windows mobile Newest player, least perceived secure device 6 Smartphone role within business environment 6.1 Email 7 Malware defined Continuously evolving, changing creative Virology Malware encompasses Define Malware (Family) Malware, short for  malicious software http://en.wikipedia.org/wiki/Malware Grimes (2001) defines malware as any software program designed to move from computer to computer and network to network to intentionally modify computer systems without the consent of the owner or operator. Etsebeth, V. (2007) Sensory malware soundminer, a stealthly Trojan with innocuous permissions that can sense the context of its audible surroundings to target and extract a very small amount of HIGH-VALUE DATA. Give example 7.1 Badware Give example 7.2 Crimeware Collecting company secrets for profit Crimeware is malicious software that is covertly installed on computers. Most crimeware progams are in fact Trojans. There are many types of Trojans designed to do different things. For example, some are used to log every key you type (keyloggers), some capture screenshots when you are using banking websites, some download other malicious code, and others let a remote hacker access your system. What they each have in common is the ability to steal your confidential information such as passwords and PINs and send it back to the criminal. Armed with this information, the cybercriminal is then able to steal your money. http://www.kaspersky.com/crimeware Give example 7.3 Greyware Adware spyware Give example 7.4 Riskware Give example 7.5 Rootkits iPad and smartphone rootkits demod by boffins http://www.theregister.co.uk/2010/02/23/smartphone_rootkits_demoed/ Give example 7.4 Scareware Give example 7.5 Trojan Give example 7.6 Virus Give example 8 Define Risk to business or individual Mobile banking 8.1 Define Legal implications http://www.oucs.ox.ac.uk/its3/seminar-notes/2005-05-18-DataSecurityLaw.pdf Computer related crime Dishonestly obtaining electronic communication service Section 125 of the Communications Act 2003 creates an offence in relation to dishonestly obtaining use of an electronic communication service with intent to avoid payment of the charge applicable to that service. This offence reflects the continual advancement of technology, thus covering all the diverse types of services available Theft of information Oxford v Moss (1979) Unauthorised use of a computer: theft of services Theft Act 1968, s. 13 dishonestly uses without due authority, or dishonestly causes to be wasted or diverted, any electricityà ¢Ã¢â€š ¬Ã‚ ¦ Criminal damage à ¢Ã¢â€š ¬Ã‚ ¢ Intangible (Computer Misuse Act 1990, s.3) unauthorised modification: to impair the operation, prevent or hinder access or reliability denial of service: The Caffrey problem à ¢Ã¢â€š ¬Ã‚ ¢ Case law insiders à ¢Ã¢â€š ¬Ã‚ ¢ Whitaker (1993) à ¢Ã¢â€š ¬Ã‚ ¢ Lindesay (2000) virus writers à ¢Ã¢â€š ¬Ã‚ ¢ e.g. Pile (1995), Vallor (2003) 8.2 Responsibility Examine who is responsible Define Solutions Effects and results of infected device on company with each malware type 9 Security Security doesnt exist in products and verbiage alone; it requires a process, people, policies, education, and technologies working together. http://www.informationweek.com/news/showArticle.jhtml?articleID=6502997 9.1 ISO27002 9.2 COBIT 5 Schedule to release in 2011, COBIT 5 will consolidate and integrate the  COBIT 4.1, Val IT 2.0 and Risk IT frameworks and also draw significantly from the Business Model for Information Security (BMIS) and ITAF. http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx Security updates? 9.3 Smartphone security solutions http://www.networkworld.com/news/2011/020911-ibm-juniper-mobile-security.html 10 Conclusions Moores Law http://venturebeat.com/2010/08/13/moore%E2%80%99s-law-hits-a-wall-trouble-for-mobile-growth/#disqus_thread 10.1 Summary 10.2 Future work Mobile wallets customers will be able to transfer funds from their bank account/paypal using their phones via text message (http://www.cs.virginia.edu/~robins/Malware_Goes_Mobile.pdf) http://en.wikipedia.org/wiki/NirvanaPhone future smartphone symbiant acquisitioned by Microsoft (biggest os for pcs) newest player to smartphone market. As Sensor-rich smartphones become more ubiquitous, sensory malware has the potential to breach the privacy of individuals at mass scales. https://www.cs.indiana.edu/~kapadia/papers/soundminer-ndss11.pdf 11 Glossary PC Personal computer PDA Personal digital assistant Prosumer Professional + consumer = advanced consumer (Cisco, 2008) http://www.cisco.com/web/about/ac79/docs/wp/Prosumer_VS2_POV_0404_FINAL.pdf

Friday, September 20, 2019

The US Hotel Chain Marriott

The US Hotel Chain Marriott U.S. hotel chain Marriott International is one of the largest transnational corporations in the world. According to the corporations data, every fourth tourist in America stays in Marriott International hotels. Rapidly spreading its influence in the world, Marriott sets the goal to win and retain the leading position in the hotel market, showing a special concern with respect to the guests, business partners, employees and society as a whole. The business of Marriott Corporation is built on fundamental ideals of service provided to customers, employees and society. These ideals are perpetual, unique and make the company a successful manager, being the cornerstone for all employees of the company. In this section, the main study focus is on the data of exploratory research conducted with the purpose of identifying current practices of Marriott International under the conditions of globalization and the impact of globalization on Marriotts sales, marketing, HR, and brand positioning approaches, while outlining the main advantages Marriott international within this context. History of Marriott International, Inc. The history of this hotel corporation is a vivid example of the embodiment of the American dream traditional for several generations of U.S. citizens. Thousands of now flourishing companies started their long journey to success just like Marriott. In May 1927, a 26-year-old man from Utah, John Marriott and his wife opened the eatery for nine seats in Washington. Johns lucky fortune and business skills helped him to survive the collapse of the U.S. economy during the Great Depression in the late thirties he was already the owner of a regional restaurant chain The Shoppe Inc. and the eponymous company specialized in the delivery of hot meals for passengers of local airlines. John Marriott acquired his first hotel in 1957. It was called the Twin Bridges Marriott Motor Hotel, and was located in Arlington (Virginia). John wanted to create a family business and eventually handed over the management of the company to his son. Marriott Jr. conducted business as thoroughly as his father did (Marriott and Brown, 1997). In 1964 the company was renamed as Marriott Corporation. The Corporation expressed interest in everything that was associated with restaurant and hotel business, and when in 1977 the sales revenues of enterprises in which Marriott had a franchise crossed one billion dollars, John Marriott Jr. realized that the property management brings no less benefits than its owning. The Corporation developed its own concept of hotel network with a limited set of services by the end of the 80s and actively operated in three sectors of the hotel market in the U.S.: managing the network of hotels with full service (Marriott suites), inexpensive hotels (Residence Inn) and a network of cheap motels (Fairfield Inn) (Marriott and Brown, 1997; OBrien, 1995). In the early 90s, Marriott Corp. had only a few dozen hotels outside the U.S.A. Based on the principles of diversification, kept by the most of the major companies in the world (in other words: Dont put all your eggs in one basket), in 1993 the corporation was split into two companies: Marriott International (hotel and real estate management) and Host Marriott (real estate transactions and food delivery). That moment laid the beginning of the active promotion of Marriott International in the international market as the management company (Marriott and Brown, 1997). At the moment, Marriott International Corporation has more than 3500 lodging properties located in the U.S. and in 69 other countries around the world (2010), employing 137,000 people (Marriott International Company Profile, 2010). Table 2.1. Marriott International Hotel Brands and Property Count (December 2009- December- 2010) Marriott-12-31-10-Hotel-Count-global Globalization Strategies and Practices Marriott controls more than half a million hotel rooms worldwide, while owning only 0,3% of them. Half of the remaining rooms is a franchise. This means that hotel owners allocate 5% to 6% of their incomes to Marriott as a fee for using the companys name as well as for using rooms reservation system. Marriott manages the other half of hotel rooms by charging the owners of the hotel fee for providing this service (Boo, Hillard and Jin, 2010). Acting as an operator, Marriott takes about 65% of income, paying out from this sum the expenses for salaries, utilities, insurance, and purchase of food. 29% of revenue goes to the owner of the hotel. Of this amount, he pays property taxes and mortgage rates, and the rest (if any) he counts to his earnings. Even though some people may be disgruntled and demonize Marriott, the company still has much to be proud of: 55% Marriott hotel owners would like their next hotel to be run by this company (Jang and Tang, 2009). Brand and the Marriott reservation system are worth it. Regional offices Marriot Inc. include (Table 2.2.; Table 2.3.): North America (NALO) Asia, Pacific, Australia (APA) The Caribbean, Latin America (CABL) United Kingdom, Ireland, Middle East, Africa (UKIMEA) Continental Europe (CE) Central Europe (Germany, Austria, Switzerland) Western and Southern Europe (France, Belgium, Holland, Spain, Italy, Greece, etc.) Eastern Europe (Russia, Armenia, Georgia, Poland, Czech Republic, Romania, Hungary, Kazakhstan). Marriott International manages and provides franchise of hotels under the brands of Renaissance, Marriott, JW Marriott, Ritz-Carlton, Residence Inn, Courtyard, TownePlace Suites, Fairfield Inn, SpringHill Suites and Ramada International; the company develops and operates resorts in the vacation ownership under the brands of Marriott Vacation Club International, The Ritz-Carlton Club, Horizons and Marriott Grand Residence Club; it offers apartments in Marriott Executive Apartments, provides furnished corporate suites Marriott ExecuStay and operates conference centers (Table 2.4.). Smith Travel Research data state that raising a Marriott flag in the front of a big hotel offering a full range of hotel services increases its sales by 13% if compared to sales of a hotel with the flag of, for example, Doubletree. Virtually all other Marriott divisions from luxury Ritz-Carlton to a commonly accessible Residence Inn are ahead of their competitors in the indicator of hotel room income by 10% to 30% (A problem shared, 2005). Product Brand Position The components of Marriotts corporate style are a company logo, colors, fonts, letterhead, website, brand perfumes and accessories. Marriott logo is a rectangle with an image of a sphere the inscription Marriott itself, designed in two basic colors: white and cherry, and golden. A well-established and recognizable corporate style is the key to Marriott brand promotion in the global market. For example, when developing a program to promote a network of hotels in Moscow, Marriott used the corporate logo and brand image, which is the image of the famous Faberge Easter eggs, which embodies prestige, luxury, and very high consumer value, comparable only with the works of the most expensive and fashionable jeweler. For example, Marriott Tverskaya has as its symbol a stylized gold Faberge egg, Marriott Grand 5 *- the blue one, and Marriott Royal 5 * luxury the scarlet one. Such approach to corporate style creation can be described as very competent and thoughtful. Relying on the widely popular historical and cultural brands and using countrys national colors, the company certainly enhances the image component of hotel marketing, combining high international standards of service with the national peculiarities of a country and its hospitality traditions (ONeill and Mattila, 2004). Moreover, in each room of Marriott hotel chain there are branded forms for letters and branded pens with the hotel name. The rooms use brand linens, and brand aromatic policy of Marriott hotels. Recently, with the development of Internet and e-mail correspondence, the issue of corporate style of electronic documents has become very topical. Web site today is the first thing that a potential guest sees, and it can help to quickly create an impression about the level of the hotel, the service, room rates, to estimate the location and walk through rooms, restaurants, lounge, as well as to book a room (OConnor, 2008). Marriott Corporation owns over 3500 hotels, and for conveniency there is a single site from which one can get to the site of any hotel of the network in the world. Moreover, the web-sites of the hotels are designed in the same style and structure. Color differences depend on the brand. The common brand Marriott Hotels, Resorts Suites unites many brands, each with its own color scheme: for example, Courtyard by Marriott has a green color palette. Site structure is common for all hotels (photo tour, guest rooms in details, hotel proposals, hotel background information, restaurants and halls, city guide, maps and transport, events plan, Marriott Rewards program, hotels fact-sheet in print format). The web-site is the embodiment of Marriott corporate style and world-class service. Currently, Marriott is included in top 10 international hotel chains and actively moves to the top through expanding its franchise contracts and promoting high level of service and corporate style. Sales Marketing The major instrument of the company is the fact that a very small percentage of real estate the company manages factually belongs to it. In 1993, Marriott transferred all of its buildings and most of the debt on the balance of the investment real estate subsidiary Host Marriott, headed by the younger brother of Bill Marriott, while Hilton and Starwood, in contrast, own 30% of hotels under their control. Since Marriott receives a fee for hotel management, vacant hotel rooms bring fewer losses to it than to the owners, who have to clear the mortgage (A problem shared, 2005). Another component of the success of Marriott is the attention to details. For instance, the rules for cleaning a hotel room set in Marriott include 66 points. The company also shares the aroma marketing approach. Generally, Marriott with great zeal is looking for new clients and opportunities to open new hotels. Taking into account different groups of clients and their material resources, the network is developing a variety of brands, increasing the amount of service (Table 2.4.): Marriott Hotels and Resorts hotels with full service, managed through a franchise or independently. Renaissance Hotels and Resorts hotels offering full-service accommodation facilities for business travelers, vacationers. Marriott Conference Centers full service hotels for conferences and meetings. Courtyard by Marriott division responsible for a hotel chain with relatively low prices. Fairfield Inn by Marriott division responsible for economy class hotel chain. SpringHill Suites division responsible for the chain of secondary and higher-class hotels targeted at business and leisure travelers, especially women and children. Residence Inn by Marriott leader in the segment of the long stay hotels. TownePlace Suites division responsible for long stay hotel chain with relatively low prices. Marriott ExecuStay business unit that provides accommodation facilities for 1 month or more. Marriott Executive Apartments division that provides accommodation for business visitors for a period of more than 30 days. Marriott Vacation Club International division applying timeshare system; a guest can purchase a week off at the hotel of this class. The system includes 38 exclusive resorts. Ritz-Carlton leading hotel brand in the segment of luxury hotels. The innovative approach that accelerated the development of Marriott, Inc., was also the bonus program for customers, launched in 1983, which now serves as the element of Marriotts corporate style. Thanks to Marriott Rewards, Marriott Corporation has an opportunity to acquire more permanent guests of the Marriott chain. Marriott Rewards program encourages customers for giving preference to Marriott International and its partners, rewarding them for the choice of hotels of the network (Dubà © and Renaghan, 1999). The participant of Marriott Rewards receives certain points or miles that can be used as payment for accommodation (special certificates) in the hotels of the network or as a discount for buying airline tickets (applied to miles). Points can be used for free accommodation, purchasing discounted packet services around the world, including domestic air transport services, car rental, cruises, etc. Such programs later started to be introduced by other network hospitality compan ies, but the scheme, devised by Marriott, remains the best one: maximum discount combined the highest luxury. Human Resources Every corporate culture is an element of corporate style. Marriotts corporate culture was founded in 1927 and is being kept till this day: The better the company will treat its employees, the better employees will treat customers. Big corporations like Marriott, offer a high service level in many countries around the world. To make all the employees regardless of their nationality and educational level meet the high standards of the corporation, they should be trained in order to improve their skills. The key to training efficiency in Marriott is its perception as a corporate value which is consistent with the main strategy of the company. A continuous training helps to guarantee high quality service, comply with the companys strict standards, motivate and retain employees, creating staff reserve. Continuous training is also the only way to keep abreast with the changes occurring today and be prepared to their growing pace (Hinkin and Tracey, 2010; Katzenbach, 2000). Every year, Marriott celebrates the anniversary of its foundation (May 20) selecting a certain week for it to express the companys gratitude to the employees who are the members of a huge international family Marriott. Advertising and promotion program Marriott Rewards is also a very important part of every employee in the Marriott Corporation. Considering the case of hotel chain Marriott International, it should be noted that in a business famous for its high rates of revenues, Marriott is outstandingly competent at preserving talented managers, which is reflected in low satisfaction gap (Figure 2.2.) (Hinkin and Tracey, 2010). One of the ways to do that is a specific program that trains managers to solve business situations preparing and encouraging them to seek for promotions to top management positions. Advantages of Marriott, Inc over Competition in terms of Globalization Marriott International Hotels have the loading of 10% above the average in the global hospitality industry, while hotel rooms are sold at higher rates than those of direct competitors (Table 2.5). The advantage in the loading percentage and selling prices is achieved by providing individual and group customers more services than they can get anywhere else. Booking of hotel rooms in the companys hotels is conducted through its own global distribution system (GDS) or via the Internet. Moreover, the system uses the technology of guest recognition of hotels of all brands of the company, and rewards programs for repeat customers. In 1999, the company expended its use of the so-called quality assurance teams, assisting companies to implement advanced network management practices and reduce costs (Dubà © and Renaghan, 1999). On a whole, Figure 2.3 shows the positive dynamics in RevPAR data for North America Marriott properties for the five fiscal years 2004 -2008 with a peak in 2007: Figure 2.3. 2004-2008 RevPAR data for Marriot International (North America) Figure 2 Conclusion Marriott dominates in the market for one simple reason: it is successful in managing hotels worldwide. The hotel managed by Marriott becomes a large hotel with restaurants, shops and business center, room service, in-line and butlers. All hotels of the chain are characterized by the same service, which is based on a clear interaction between all structures and maintained tight control by the head office. Marriott International mission states that the corporation aims to become the best company in the fields of accommodation and services in the world due to the fact that its employees are seeking to provide their customers the best possible services, resulting in benefits for the companys shareholders. In recent years, Marriott International has shown a positive dynamics of development and continues to rapidly spread the chain all over the globe on the basis of franchise contracts. This practice, along with innovative approach to global hotel marketing, Marriott Rewards program, guest recognition technologies, high level of personnel training and constantly increasing level of service, helps Marriott International stay in the top five hotels chains globally.

Thursday, September 19, 2019

Sexual Harassment in the Workplace :: Workplace Harassment Essays

According to the United States Equal Employment Opportunity Commission (EEOC) the definition of sexual harassment is â€Å"Unwelcome sexual advances, requests for sexual favors, and other verbal or physical conduct of a sexual nature constitute sexual harassment when this conduct explicitly or implicitly affects an individual’s employment, unreasonably interferes with an individual’s work performance, or creates an intimidating, hostile, or offensive work environment.† Regardless of position in company or type of candidate it is against the law to make passes or harass one because of their sex or gender. In order to harass a person it does not have to necessarily be physical contact but this regulation also includes any offensive verbal context that anyone may say towards a person’s sex and/or gender. Also, a lot of times sexual harassment is based on personal opinion, meaning what may come off as offensive to one person another may be fine with working. A good example is if a woman is wearing a blue dress and makes a random comment of saying â€Å"I really do love the color blue on women.† All depending how the woman wearing a blue dress perceives the comment will depend on whether or not she feel the person was looking at her and how the comment was said in her eyes. Sex and/ or Gender play absolutely no role in whether or not you can be sexually harassed any side of sexual harassment can be played by any sex and/or gender. A third party of someone that heard or saw the sexual harassment also has the right to file sexual harassment charges, so technically that person does not have to be involved in the situation directly. With sexual harassment there is a very gray area because unfortunately it does not allow teasing, general comments and minuet one on one problem. Harassment is so serious it is a criminal offense, but it also creates a terrible environment for productivity and plays a vital role many times in position movement in the company or organization. Sexual harassment is a form of sexual bigotry and is written into law with Title VII of the Civil Rights Act of 1964. To be specific this title only extends to that employer of 15 or more workers and is included for everyone from federal governments to employment agencies. Sexual harassment cases are inspected by the EEOC on a case-by-case basis usually after the victim has told or made it obvious that the harasser should stop.

Wednesday, September 18, 2019

Melbourne, Australia :: essays research papers

Melbourne, one of the most beautiful city's in the world. I have traveled through the USA, Canada & the Bahamas, and still, I find Melbourne is the greatest. In 1981 I was born in a New South Wales mid-coast town of Port Macquarie. I lived there until I was the age of four, and that's when we made the move to Victoria.I grew up in Kew, a suburb of Melbourne, not far from the actual city. Most of my family lived there, and was the main cause for the move. I went to school and met lots of friends. Nearly every night my friends and I would get together and go to the local car park and roller-blade for a few hours before going to 7-11 for a Slurpee.I look back at those days, and see how Melbourne was in the 80's and early 90's. Old buildings and great friendly people. Still, Melbourne has all of this, as well as new developments, such as new multi-million dollar entertainment complex's. Over the past 5 years, Melbourne have brought us the all new Exhibition Building and of course, the Crown Casino. This was a great move for the Kennett government, as it proved to be successful with the un-employment problem. It didn't stop the problem, but it sure did help it. The casino complex is not only for gambling, it is also a great place for teenager's to go the movies or even the special area for arcade games, sort of a side show alley. Crown also contains 2 nightclubs and is host to many international bands. In 1997, the decision was made to start construction of the Docklands stadium, for football and cricket, much bigger then the MCG. Construction is underway and it should be complete in the year 2000.As well as all these new constructions, Melbourne is home to a lot of well known events. The Ford Australian Tennis Open, is one of the biggest with thousands of international visitors annually. Biggest of them all, has got to be the Australian Formula 1 Grand Prix. It was only a few years ago that Melbourne got this wonderful event, as it used to be held in the streets of Adelaide. It is now located along the banks of Albert Park Lake. Moomba is an event which every Victorian, cant wait for. Its an annual event, held at the same time as the Grand Prix, and has been biggest festival since around the early 60's. Melbourne, Australia :: essays research papers Melbourne, one of the most beautiful city's in the world. I have traveled through the USA, Canada & the Bahamas, and still, I find Melbourne is the greatest. In 1981 I was born in a New South Wales mid-coast town of Port Macquarie. I lived there until I was the age of four, and that's when we made the move to Victoria.I grew up in Kew, a suburb of Melbourne, not far from the actual city. Most of my family lived there, and was the main cause for the move. I went to school and met lots of friends. Nearly every night my friends and I would get together and go to the local car park and roller-blade for a few hours before going to 7-11 for a Slurpee.I look back at those days, and see how Melbourne was in the 80's and early 90's. Old buildings and great friendly people. Still, Melbourne has all of this, as well as new developments, such as new multi-million dollar entertainment complex's. Over the past 5 years, Melbourne have brought us the all new Exhibition Building and of course, the Crown Casino. This was a great move for the Kennett government, as it proved to be successful with the un-employment problem. It didn't stop the problem, but it sure did help it. The casino complex is not only for gambling, it is also a great place for teenager's to go the movies or even the special area for arcade games, sort of a side show alley. Crown also contains 2 nightclubs and is host to many international bands. In 1997, the decision was made to start construction of the Docklands stadium, for football and cricket, much bigger then the MCG. Construction is underway and it should be complete in the year 2000.As well as all these new constructions, Melbourne is home to a lot of well known events. The Ford Australian Tennis Open, is one of the biggest with thousands of international visitors annually. Biggest of them all, has got to be the Australian Formula 1 Grand Prix. It was only a few years ago that Melbourne got this wonderful event, as it used to be held in the streets of Adelaide. It is now located along the banks of Albert Park Lake. Moomba is an event which every Victorian, cant wait for. Its an annual event, held at the same time as the Grand Prix, and has been biggest festival since around the early 60's.

Tuesday, September 17, 2019

Magnifying and Obscuring Essay

The stories of John Updike’s â€Å"A&P† and William Faulkner’s â€Å"A Rose for Emily† both make use of the first person point of view in narration but with very different and quite powerful effects that also affect other elements of the story. The ways in which these two stories play with the individual elements of a piece of fiction show just how important it is to make sure that these individual elements are all taken cared of and built-up with equal care and attention, because a problem with one element can result into a problem with the entire story; the elements must all be able to work together to support each other and to weave a tight story. â€Å"A&P† uses the first person, non-omniscient, singular point of view (POV) narration to build rapport with the main character, Sammy [for example: â€Å"I’m in the third check-out slot, with my back to the door, so I don’t see them until they’re over by the bread; I could see Lengel in my place in the slot, checking the sheep through. † (Updike 560)]. This connection with Sammy is a very important one because it is pretty much the driving force of the story; learning of what’s going on in a teenage boy’s head while there are half-naked girls walking about can make an interesting read. This point of view is really what helps push the reader on along as she or he plods through the â€Å"A&P† plot. With â€Å"A Rose for Emily†, on the other hand, we are given the first person, non-omniscient, plural point of view. Obviously, because it is plural it cannot be the view of the main character, Miss Emily Grierson. Instead we seem to have the entire story narrated to us by the entire town [â€Å"When Miss Emily Grierson died, our whole town went to her funeral; for a long while we just stood there, looking down at the profound and fleshless grin† (Faulkner)]. This works to increase the mystery that surrounds Miss Emily and her house because we never really knew what she is thinking or feeling. This point of view, giving an air of mystery, again, helps push the reader on to discover what happens throughout the story. Relating with the use of the POV are the different story plots. Here, we can see a great difference between â€Å"A&P† and â€Å"A Rose for Emily† because we find that one is mainly character-driven while the other has a strong plot that keeps the readers going through the story. It is â€Å"A&P† that is, obviously, character-driven because of its simple plot of a boy wanting to elicit the attention of some pretty girls, which is quite common. Even the events in the story and the simple chronological way that it folds are quite ordinary; it is really Sammy – his thoughts and his feelings – that make a reader interested in the story. And, even up to the ending, readers are all interested only in Sammy’s fate and no one else’s [â€Å"I felt how hard the world was going to be to me hereafter† (Updike 564)]. In â€Å"A Rose for Emily†, on the other hand, we have a story with a strong plot, aided by the effective point of view narration, which moves the story along. The story hooks readers into the plot by making them curious about who Miss Emily Grierson is from the very beginning – readers are wondering why she is a â€Å"fallen monument† and what is so interesting about the â€Å"inside of her house† (Faulkner). The non-linear timeline that the story follows also strengthens the mystery of Miss Emily because the building block to her life must be pieced together slowly and with a certain amount of intuition, at first. Now, the characters of the two stories are also very different – one is as open to us as a book laid flat-open, while the other is mystery to the very end. With Sammy of â€Å"A&P†, we never seem to see a concrete glimpse of in terms of physical appearance but the readers would all know him if they met him. The first person narration lets us in on all the things that makes Sammy think and tick with that little grocery stop. In his observation of the girls, we find a young man with a keen eye and, also, an eye for beauty. He also shows us the ability of a good imagination when he imagines how the girls behave and how their relationships with each other must be like as when he describes the tall girl as: â€Å"a tall one, with black hair that hadn’t quite frizzed right, and one of these sunburns right across under the eyes, and a chin that was too long — you know, the kind of girl other girls think is very â€Å"striking† and â€Å"attractive† but never quite makes it, as they very well know, which is why they like her so much. † (Updike 561) Sammy, as we can surmise, is a boy that is very much in-touch with his surroundings and his imagination. The characterization of Miss Emily, in contrast, is one that is left murky and shadowy. Because we only see her through the townspeople’s eyes, we never really see her clearly; we can only watch her through the stories, the memories, and the patchwork guesses that these observers give us. But even from this blurry view of Miss Emily through a window, we can see how guarded and closed-off she is from her environment [as when she acted ignorant of Colonel Sartoris’ death (Faulkner)] – the total opposite of Sammy. In â€Å"A&P†, we are set-up in a small grocery store that effectively concentrates our attention on no one and nothing else but Sammy and his current preoccupation. The A&P grocery store acts as the perfect magnifying glass to help us focus on our main character and how he deals with the current situation. â€Å"A Rose for Emily† is set-up up throughout decades of a life and in different places of the town; this manner of a setting makes for even more mystery as the reader tries to fill in all the gaps between the years that the narrators had no contact nor any knowledge of what went on in Miss Emily’s life. The vast setting diffuses the readers’ minds and it wanders across time and space, searching for a complete picture of Miss Emily Grierson. These two stories, perhaps more different than alike, prove that good stories don’t need to follow a certain pattern to mold in order to be good; it is in the writer and the dedication to his work that makes a story count. Works Cited Faulkner, William. â€Å"A Rose For Emily. † 16 February 2008. Fu Jen University: Department of English Language and Literature. 26 June 2009 Updike, John. â€Å"A&P†. The Compact Bedford Introduction to Literature Eighth Edition. Ed.