Saturday, August 31, 2019

The BSC tells the technical story of its formulation Essay

It begins from the initiation of the strategy, to the high level business executives who would sponsor the program, to actual scheduling of it, and then to the allocation of resources to it, and finally to actual budget. The BSC has an inbuilt feature to enhance general strategic goals, and competition in the private industries, or a clear declaration of mission and better efficiency in the public sector. So it has beneficial features no matter what the individual sector. It enhances  financial goals in the private sector by helping the company capture bigger market share and therefore increases profit margin. It enhances productivity, and efficiency. It is equipped to achieve desired outcome by increasing customer satisfaction. The benefits from BSC is enormous, it allows the entire organization to put itself in a continuous learning process. By aligning all the strategy in one framework, it strengthens itself in time, even with resource allocation. It helps organizations to make better budgetary decisions, it improves performance, and communication, and enable the company to have  important data for its bench marking. It helps the company to develop management system that is based on facts. It can anticipate the future, and can help organizations reach beneficial cause and effect predictions. It supports accountability and makes it easier to implement necessary innovations. The BSC system makes it simple for organizations to follow, because the steps are clearly outlined. First the company would make an initial organizational assessment, to ensure itself that it truly is ready to embark on the BSC system, because even though the system  could be highly profitable, it is not cheap. The next important step would be the definition of the company’s strategic themes, or the area it needs to focus on. Then it would develop its objectives, and the strategic maps, and performance measures. The system would then be cascaded to the essential business units. The final step is usually the evaluation and then important adjustments. A decision by a company to undertake the BSC cannot be made lightly, it is a big business venture. So the company must ask itself what its missions are, if it is ready to embark in such huge application. The company must know what it wants to provide in terms of services or programs. It must be sure that those needs are required needs, service or program that would sustain the implementation of the BSC, the balance scorecard would not help a poor business idea. The company must ask itself how it could be more beneficial to its customers and to its stakeholders. And does it have the capacity to change and improve as the business environment would eventually demand. Would the organization be able to provide required satisfaction to both the customers and the stakeholders. On the implementation steps the process is also clear. Because it would not make sense to place team leaders into position of leadership without adequate training, BSC demands workshops and both leadership training and team training. And that would be followed by the assessment of the corporate objectives, and strategy developments, then a draft of those important strategies. It would be essential to have the corporate executives involved in these processes as much as possible. In the BSC the essential training are supported by computerization or automation of the strategies that were developed in  order to provide access to all concerned. There are some barriers that could adversely affect the implementation of the process if left unresolved. If the company is unable to clearly define its mission and vision, the BSC would not be able to effectively implement such poor visions. So to make the visions and missions actionable it ought to be very well defined. Also the corporate strategies, the budget planning process and the entire goals should be linked to the performance drivers. Employees involvement with reasonably positioned performance expectation must be  appropriate. It would not make sense to set them to high at the onset. The entire story ultimately returns to the fact that balance scorecard has the ability to give corporations a solid framework, i. e a good sketch in which to design its strategies and align them with excellent chances to pursue such critical elements as efficient customer service and better learning atmosphere for the employees. All indications are that this system has been effective for organizations that have applied it accurately, and Pepsi Saudi should benefit from the implementation as well.

Friday, August 30, 2019

Network Design Project It/230 Final Paper

Network Design Project Art Meyer IT/230 Pernell Curtis 11/27/2011 Executive Summary The Tri-Corp company is need of a complete networking solution. Tri-Corp has two offices, one in Phoenix, and the other in Tucson. The main office in Phoenix is a large 4-story building with 50 workstations and 10 network printers. The Tucson office has five separate workstations and three network capable printers. The clients use Outlook exchange web server for their email communications; both offices require data transfer on a daily basis. Each user requires access to the internet and the shared data stored on the nine clients workstations.DSL, cable, and T3 network solutions are available to the clients. The Tucson clients have a cable internet connection with 8mbps max upload and download limit. The physical layout of the Tucson office is a single story design where the workstations are located in five separate offices in a large building; an unused storage closet is located in a central point in between the offices of that building. Tri-Corps needs a reliable network, with a VPN service to accommodate the needs of traveling executives, upper management, and a growing workforce.Company executives at Tri-Corp have requested a remote access solution as part of their systems upgrade. The company desires its employees to have access to the network from their home PC’s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. In order to function more efficiently, many companies across the globe require remote access to their server systems. A remote access solution will provide Tri-Corp with a proven method to retrieve data from remote locations and them with the opportunity for their executives to complete necessary tasks on the go.However, remote access may provide intruders a method to access Tri-Corps secure data. These vulnerabilities may expose the risk of exploitation and have caused irreparable damage to other companies i n the past. Successfully implementing Tri-Corps remote access solution requires careful planning to protect their data and avoid unwanted attacks by unauthorized users. In addition to the Enterprise system upgrades, Tri-Corp needs to design and implement a disaster recovery plan and review system security policies.While some disasters are unavoidable and vary in type and magnitude, system security attacks are avoidable when companies enforce their information policies and protect their resources. Tri-Corps offices may contain vulnerabilities because they offer remote access to company data to many employees in both locations. Cabling Specifications The shield twisted pair (STP) or unshielded twisted pair (UTP) cable are what connects computers to the switch on the Star Topology network10Base-T is one of the Ethernet standards for cabling in a network environment. 10BaseT uses a twisted pair cable with a maximum length of 100 meters.Standard 10BaseT operates at 10 Mbps. It is commonl y used in a star topology. Gigabit Ethernet (CAT6) over twisted pair copper wires is the preferred cabling specification for high speed data transmissions. Transmission rates in this cabling specification may reach speeds of up to 1000 Mbps. CAT5 T/100 base cables will provide adequate data transfer for most other applications. Local Area Network (LAN) Topologies In the star topology, instead of having a direct connection to each other, the systems are connected to a central device, such as a network switch or a router.One definite advantage the star topology provides is network stability. For example, in the star topology, when one system goes down, it does not bring the rest of the network down with it as it does in the bus or ring topologies. The star topology is the most prevalent topology in use today. The physical topology of the star network contains six different classifications; namely point-to-point network, ring network, mesh network, bus network, tree network and star ne twork. Of these six, the star network is one of the most commonly utilized network topologies.According to definition, the term ‘star topology‘, refers to a network wherein all the nodes are connected individually to one common hub (Naik, 2011). Simply stated, the stat topology is a network topology wherein transmission stations connect to the central node in a configuration where the design of the network stations resembles the shape of a star. Essentially, the star topology design may be likened to the spokes on a wheel, all connected to the central hub. In this network configuration, the exchange of date is only possible through an indirect connection to the central node; this connects all other nodes to the network.As with various other types of network topologies, the star topology has its own set of particular advantages and disadvantages. These factors require careful consideration in regards to the feasibility of the network setup. When evaluating this topology, careful comparison to other network solutions and consideration of all available options helped to discover which solution would provide Tri-Corp with the best answer to meet their needs. It is very easy to install and manage star network topology because its functionality is the simplest among the topologies.Because all computers rely on the central hub, troubleshooting a star topology network is much easier, therefore, any problem, which leaves the network inoperable, leaves a direct path to the central hub. This feature simplifies troubleshooting by offering a particular spot for error connection and at the same time, the reliance is very high on that single point. In star topology, the data packets do not have to make their way through various nodes; this ensures that the data transfer is fast.Consequently, the fact that the data packets only make it through three different points also guarantees that the data is safe. Because the nodes do not connect to each other, problems in one node do not affect the routine of other nodes in the network. Since all the computers on the network have independent control of their networks and are only dependant on the central hub computer, failures in transmitting data and other possible problems in this area are less likely to occur. In addition, if the hub is safe then every computer in the network is safe.This type of network provides more privacy than any other network. Additions, such as new machines or replacing older units are much easier in the star network topology, since the network will not experience any disruption to facilitate changes. The primary problem with star network topology is the fact that it is highly dependent on the central hub functioning properly. Additionally, network size is dependent on the number of connections available on the hub. This network type requires more cable when compared to other topologies, such as linear bus topology.Therefore, the cost and expense of a star topology runs hig her and the expenses incurred are relatively high. Since the performance of the total network depends on the performance of the hub, a slow server will cause the entire network to slow down. As mentioned earlier, the star network topology requires more cable to connect the network together than the usual Bus topology. For this particular network setup, the recommendation is to use is the RJ45 or the Ethernet cables. To be specific, this network setup requires a gigabit 48-port switch and CAT6 base T/1000 Ethernet cabling to both the IT and the graphic design department.The other departments will use CAT5 base T/100 cabling. In a Star Network the entire network is dependent on the hub so if the entire network is not working then there could be a problem with the hub. Since all the computers on the network have independent control of their networks and only dependant on the central hub computer, the failures in transmission and other possible problems in this area are less likely. In addition, if the hub is safe then every computer in the network is safe. This type of network also offers more privacy than any other network.A Star Network Topology is best suited for smaller networks like Tri-Corps and works best when there is limited number of nodes. The primary objective is to ensure that Tri-Corps hub or the central node is always functioning and that all extra security features are added to the hub because it s the heart of the network and the stability of the network relies directly on the stability of the central hub. Wide Area Network (WAN) Design Tri-Corps two offices, one in Phoenix and the other in Tucson require a WAN network to effectively communicate and share data and resources.The main office in Phoenix is a large 4-story building with 50 workstations and 10 network printers. The Tucson office has five separate workstations and three network capable printers. The clients use Outlook exchange web server for their email communications and require mini mal amounts of data transfers between the offices. Each user requires access to the internet and the shared data stored on the nine clients workstations. Both DSL and cable internet service are available to the clients. The Tucson clients have a cable internet connection with 8mbps max upload and download limit.The physical layout of the Tucson office is a single story design where the workstations are located in five separate offices in a large building; an unused storage closet is located in a central point in between the offices of that building. The current system in the Tucson office uses a non-commercial five-port router; each computer connects to the router through a Cat5 Ethernet connection. The first step is to discover the bandwidth needs and average user loads. Data from Cisco (Boda, 2009) suggests the average broadband connection generates approximately 11. gigabytes of Internet traffic per month. We will use this figure to calculate the bandwidth needs of this company. Calculating with 10 users and a five-day, forty-hour workweek as our model for the Tucson office, we can calculate average daily consumption to be approximately 5. 7 gigabytes per day of bandwidth consumption. The current cable internet allows for 28 gigabytes during an eight-hour period (multiply 8mbps x 3600, the number of seconds in an eight, hour period, and divide by 1024) should provide a stable connection throughout the day as all ten users are rarely on the network at once.The setup of the Phoenix offices is more complex; they require a T3 connection to accommodate the IT and the Graphic Design departments. The third floor houses the IT department, the first floor houses the reception staff, along with lower level management, the second floor houses the graphic design department, and the fourth floor houses the operations staff while the fifth floor houses upper management. The current system in the Phoenix offices uses a network hub and repeaters. Both the IT and graphic de sign department complain they do not have sufficient bandwidth to meet their needs.Upper management complains that the system on their floor is too slow. The Tucson offices complain they experience difficulty sending and receiving data and email from the Phoenix offices, and connections time out frequently. The current system in the Tucson offices lacks design and will not allow for additional users or adding network printers. Additionally, aside from the firewall provided by the router, no real network security is in place and the workstations cannot communicate with each other in either location. The Phoenix offices need increased speed and greater bandwidth. Both offices require better communications etween the workstations to increase efficiency. The recommendation for the Tucson offices is to install a server system using Windows server 2003, and a VPN; this office will utilize the star topology, thus allowing for growth and easier diagnostics. In addition, failure of one works tation will not affect the entire network and the speed will be optimal. The server software provides several benefits. Multiple applications are available to run in the Server 2003 environment, including financial apps, database programs, and e-mail exchange operations as well as web server and Internet programs.Domain operations are included in the software, something that will become an important resource by adding security and the ability to the local and group policies of the network. Additionally, if Server 2003 is not utilized as a domain controller, then it can run simple network operations using peer-to-peer structures (Garza, 2010). An extensive amount of shielded twisted pair Cat5 cables will be necessary to connect each workstation and the network capable printers. The VPN system will allow the users to connect remotely to their workstations and the company intranet. The Tucson office will utilize the central closet as a server room.The server will handle all application s and house the data storage. The server will have a connection to a primary switch; this switch will also handle the data transfer between the local PCs of each office. The switch accomplishes two tasks; since connections from one port to another are made on an as needed basis (Axia College, 2005), this will eliminate traffic collisions and create faster point to point connections. The switch will be connected to ports on the private network switch allowing for access to the application and data servers, along with the DNS and Active Directory server.Since the data transfer needs are minimal, the switch does not need Cat6 cabling; Cat5 STP will work, gigabit switches will not be necessary. Security from outside traffic will be enforced by closing the ports to outside traffic. Users will access the internet via an Internet Security and Acceleration (ISA) server, which will be connected to the public network. The recommendation for the Phoenix office will also include a new server an d the Windows server 2003 platform. Both offices will use the same VPN, however, in the Phoenix offices, only upper management will have access to the VPN from outside the building.The existing network hub will be replaced by T/1000 switches connected to gigabit LAN network interface cards on each of the workstations in the graphic design department as well as those in the IT and upper management. Gigabit LAN adaptors are required on the servers to accommodate the high bandwidth needs of these departments. The reception area, lower management, and Operations will connect to standard switches using a T/100 base, thus eliminating the problem of network congestion in the departments where more bandwidth is required, and limiting the bandwidth where it is not necessary.Cat6 cabling will be utilized on the second, third, and fifth floors to accommodate the bandwidth needs of the high end users. CAT5 cabling will be used throughout the rest of the system and should easily meet the needs o f the end users in the other departments. The primary cost of upgrading both systems will be in the cabling; both offices will require an extensive amount of CAT5 and CAT6 networking cables.The server systems and switches will incur the second highest cost; both upgrades are necessary to provide the company with greater ease of use and transitional growth opportunities Updating the current systems and switching to Windows server 2003 will provide both offices with greater stability, efficiency, and increased security. Updating the Phoenix offices from hubs to switches will increase the flow of network traffic and allow for greater communications between both offices and all workstations.The Tucson offices will benefit from less frequent connection time outs and rapid data transfer to and from the Phoenix offices. Additionally, both offices will be more prepared for rapid growth. The Tucson offices will show increased productivity by networking all of the printers. The Phoenix office s will benefit from as the IT department and graphic design will have the necessary bandwidth to meet their needs, while upper management will spend less time waiting on reports and data necessary to make day to day decisions that will affect the company’s long-term growth strategies.Upgrading the current systems is not only a wise decision, it is the only logical decision for a company that is primed to move ahead and take control of the market in its area and expand into more profitable markets in other cities as well. Network Protocols VPN users gain remote access to their LAN through the internet. VPN’s are network links formed by connecting to an ISP and the company LAN. These connections use technologies such as sophisticated packet encryption to secure the data link. This is especially important, as the information is travels across a public network.The advantage of using a public network versus dedicated connections is the cost; many companies take advantage of VPN technology to provide remote access without compromising security. Dial-up networking is the simplest way to connect to the Internet. Computers connect over the phone line using a modem. Users must pay for a subscription to an ISP like AOL. Dial-up connections are much slower than broadband and the speed maxes out at 33. 6 Kbps. Some applications will work with satisfactory results; more and more applications require greater connection speeds even when performing simple tasks such as transferring files.Both applications require user name and password login information; that however, is where the similarities end. VPN users benefit from a secure, encrypted connection that is firewalled from intruders and typically monitored by a network administrator to ensure the privacy of the connection is not compromised. Dial up users connect to a public network and may be susceptible to outside attacks. Network Remote Access Company executives at Tri-Corp have requested a remote access sol ution as part of their systems upgrade.The company desires its employees to have access to the network from their home PC’s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. The company requests that all upper management be granted unlimited access to all files and network resources and permissions. Additionally, they wish to grant access to all mid-level managers, the operations manager, and the entire graphic design department. Support staff and non-salaried associates desire access to the company site for employee benefits and access to daily reports.Tri-Corps enterprise system runs two servers, one in the main branch located in Phoenix; the other in the support branch located in Tucson. Both branches utilize Microsoft Server 2003 software, and a star topology. Outlook is among the programs that are most widely used by the executive branch, Publisher and Adobe Illustrator top the list among the graphic design department. O perations use a simple data storage program that breaks down cost and projects business forecasts. Tri-Corp believes their company will function more efficiently by granting its employees remote access to their server systems.Whereas it is true remote access does provide many companies with a proven method to retrieve data from remote locations and offers their users a chance to complete necessary tasks on the go, Tri-Corp will be at risk; remote access also offers intruders a way in to Tri-Corps secure data. If these vulnerabilities expose the company to exploitation, the damage may prove to be irreparable. Companies who plan to use a remote access solution need careful planning to protect their data and avoid unwanted attacks by unauthorized users.Therefore, the question lays, â€Å"Should Tri-Corp use Dial-Up or VPN to complete their remote access solution? The first step is user control; it is imperative to control which users can access the network from outside the company. Ne twork access should be granted only for users who need it; the likelihood is that not everyone is likely to need network access from outside the company. Whether Tri-Corp decides to use Dial-Up or VPN they must set up remote access accounts for remote users that are separate from their normal accounts, and make these accounts more restrictive than their normal LAN accounts (Axia, 2006).The company executives may believe this security measure to be impractical; however, this strategy is vital, particularly for users who normally have broad security clearance (Axia, 2006). The advantage of using Dial-Up is the Dial-back feature. Dial-back is a feature whereby you securely enter the phone number of the system from which users are calling (Axia, 2006). Users requesting remote access from a fixed location such as a private residence are ideally suited for a Dial-Up remote access connection with the dial-back feature.Once these users connect, they dial the system, request access, and then the remote access system terminates the connection and dials the preprogrammed phone number to make the real connection (Axia, 2006). The home based computer then answers the call and proceeds to a normal connection. This service offers greater security for home based users because any other user who may attempt to gain access will not be allowed access with this feature enabled. One more key advantage of a dial-up remote access server (RAS); RAS solutions require employees to onnect to the corporate network via a direct telephone call to modem banks installed at the network edge (â€Å"Remote Access Vpn Solutions†,  2000). Three key differences separate dial-up and VPN architectures; the first being that direct dial-up does not utilize the internet to avoid incurring long distance phone charges. Next, the corporation setting up the dial-up connection is responsible for providing modem banks (modem banks are similar to network hubs or switches). Finally, encryption technol ogies are not required because the network traffic passes through non-shared links.Undoubtedly, granting remote access may increase productivity and effectiveness by giving employees direct access to information from anywhere in the world. One primary example is email access; this factor alone makes a big difference for employees that are constantly on the go and rely on email to communicate from remote locations. The business benefits of using a VPN delivers several advantages versus RAS solutions. VPNs offer two distinct cost advantages; first, Internet connections, which are typically local calls, are much less expensive than toll free or long distance dial-up connections.This consideration typically is what convinces most organizations to apply a VPN rather than an RAS solution. Secondly, the equipment cost of purchasing and maintaining a VPN is much more cost effective than standard RAS equipment. Installation and use of VPN’s may yield a cost savings of up to 70 percent over a standard RAS system. Comparatively, most companies discover that remote access VPNs pay for themselves in cost savings in a relatively short period. By way o f contrast, RAS systems only incur greater cost throughout the course of time, especially if upgrades or adding more users is necessary.The amount of access available is dependent on the scaling system and how the VPN distributes the client’s software. Scaling a remote access may also necessitate increased bandwidth of the company’s Internet connection. As soon as the VPN gateway is operational, the company may change the scaling system to support anywhere from a few hundred to tens of thousands of users. The option of scaling for RAS solutions is not as trouble-free and requires the use of additional hardware and adding phone lines.The widespread use of broadband Internet service now offers VPN clients an inexpensive solution to connect corporate networks by utilizing the World Wide Web to connect from ou tside the company walls without losing speed and compromising security. This is a very attractive option for mobile users in particular. Dial-up solutions do not always provide the same security and ease of use as this option. In some cases dial-up solutions may very well remain the best solution; many company’s still employ this solution as part of their remote access services for their fixed locations.With proper maintenance, this solution will still serve the needs of a smaller client base. However, if the client base grows rapidly and significantly, they may soon overload the RAS system and discover they need to move on to a different solution. The recommendation for Tri-Corp is to utilize a VPN solution. However, the executive branch will utilize the dial-up service from their fixed locations, such as their place of residence. This will offer greater security by using the dial-back feature to ensure the user is not an unauthorized intruder.This will also remain cost effe ctive as the executive staff numbers only eight individuals. Graphic design, operations, and the rest of the support staff will gain access through the VPN software in Microsoft’s Server 2003 package. However, each department will only have access to the resources that are consistent with their job requirements. Operations will have access to the database and Outlook; the graphic design department will have access to their saved projects files and Outlook. The support staff will only have access to the company human resources sites and limited access to non-confidential company information.The key elements of a successful remote access implementation will include security, performance, high availability, and client management. A meeting with the Tri-Corp company will outline and clearly define their specific requirements in each key area to discover the solution that will serve the company’s needs. Utilizing both dial-up and VPN solutions will offer this company the be st of both worlds; security and performance as well as greater productivity and performance without the need for incurring greater cost. Network Business ApplicationsThe recommended applications for Tri-Corp will include Microsoft’s Office Professional suite and the Microsoft Server 2003 software for the local servers. Outlook will replace the exchange server provided by Microsoft. This will provide Tri-Corp with more flexibility and aid in the ease of adding new email user accounts. POP3 and SMPT will require proper configuration to enable this service. In addition to the Enterprise system upgrades, Tri-Corp needs to design and implement a disaster recovery plan and review system security policies.While some disasters are unavoidable and vary in type and magnitude, system security attacks are avoidable when companies enforce their information policies and protect their resources. Tri-Corps offices may contain vulnerabilities because they offer remote access to company data t o many employees in both locations. Network Security We will first address the issue of Enterprise Security and best practices. Microsoft has developed a four-part checklist, which focuses on the following key points: Assessing the environment, protecting the network, protecting servers and clients, and finally, monitoring the environment (Microsoft 2011).Using this guide will help increase Tri-Corps security and reduce the risk of outside attacks. Assessing the environment requires learning all of the components within the infrastructure. Tri-Corp needs to identify all assets and security issues while continually monitoring the quality of the security program (Microsoft 2011). Their first step will be to partner upper management with the IT staff so they may both focus on establishing an ongoing process to classify and examine all security risks. Failure to establish this vital communication will absolutely place the company at risk with the largest security problems.Next, protecti ng the network; Tri-Corps server system will utilize both Secure Socket Layer (SSL) encryption, and a Public Key Infrastructure (PKI) to aid in maintaining network security. Secure Sockets Layer (SSL) encryption is one of the leading technologies used today to secure web sites, intranets, extranets, and other server-based applications (IT Observer, 2009). Using SSL along with special server digital certificates will provide the security handshake and the data encryption to prevent eavesdropping and secure the integrity of data transmissions (IT Observer, 2009).Although SSL and PKI will help provide network security, additional security measures are necessary to protect the servers and clients. Tri-Corps server will utilize a software firewall such as Zone-Alarm, and must maintain up to date anti-virus and Trojan protection software such as Kasperksy, Norton, or McAfee. Next, the IT department must ensure every security patch for all operating systems and applications are applied as soon as they become available. The final focus point in network security, monitoring the environment, entails the weakest link in all network security, people.Monitoring the environment is more than watching and reacting; Tri-Corp must establish a proactive strategy to audit the network and discover poor practices and configurations. Password rules are a primary example; passwords must contain both upper and lowercase characters and one symbol. Only secure messaging through company provided and monitored email accounts will be allowed, no instant messaging or chat rooms; all emails must pass a virus scan before the recipient will be granted access to view the message.With a detailed information policy in place, proper training, consistent, proactive monitoring, Tri-Corp will protect its data and avoid the mess and disruption of security leaks. Once this policy is in place, Tri-Corp will need to move on to its disaster recovery plan. Tri-Corps needs to have a disaster recovery plan i n place, to return to normal after disaster has struck. Defining disaster means an abrupt disruption of all or part of its business operations, which may directly result in revenue loss (Cisco, 2008).To reduce disaster losses, it is imperative to have a first-rate disaster recovery plan for every business subsystem and operation within Tri-Corps walls. Backup and Disaster Recovery Every time a business encounters a disaster, the company always points to one or more causes and effects. The causes may be anticipated, or a result of human, or mechanical origin, and can range from events as miniscule as a minor hardware or software components malfunctioning to commonly recognized events such as earthquakes, fire, and flood (Cisco, 2009).These disasters may cause small interruptions or may lead to total business shutdown for days or months. Occasionally, these disasters have proven to be fatal to unprepared businesses. Forming a disaster recovery plan begins by recognizing the root cause and effect, followed by a detailed analysis of probability and severity, and ranking them in terms of their business priority. The outcome is an official evaluation of threat and a disaster recovery plan that takes into account all available recovery means.In simpler terms, Tri-Corps IT staff needs to determine what types of disasters are most likely to occur and rank them in order of probability. Afterwards, Tri-Corp must create an action plan that encompasses detailed steps to return business to a state of normalcy in the event of the given disaster. Finally, Tri-Corp must form a Disaster Recovery Committee to assume responsibility for rehearsing, carrying out, and improving the disaster recovery plan on a continual basis. Tri-Corps disaster recovery plan must include a data backup plan in the event the company’s database is compromised. The recommendation is to use IBM’s Tivoli software.IBM’s backup and recovery service provides companies with a backup and d isaster recovery solution that includes cloud backup, remote office, unified recovery, and virtual server protection. Their Tivoli Storage Manager received the 2011 CRN Channel Champions Award because of the quality, reliability, support, and scalability of their solution. Many other companies offer backup and disaster recovery solutions, however, based on my research IBM offers the most complete and reliable solution. IBM’s backup and recovery service provides companies with a proven solution for managing their storage needs with a central backup solution.This service uses smart data movement and smart data store technology; together, these technologies complete backups and restores quickly and efficiently while still providing the client with the flexibility to change and adapt. Additionally, the IBM Tivoli suite of storage products supports more than a dozen OS platforms, along with several network connectors, and more than 500 storage devices. (Art W Meyer,  2011,  pa ra. 2,4) Using these two key components will ensure Tri-Corp will complete the necessary preparation to survive disaster and avoid external attacks.Additionally, this plan will ensure that the resources required to keep the business going are available to key personnel. The questions regarding what to do, how to do it, and the ever- present need for communication to critical data is a key component in maintaining Tri-Corps success. However, no amount of planning provides the desired effect without a thorough understanding of the organization and its inner workings. Tri-Corp must incorporate its processes, people, and systems with precise, exacting detail to aid in a seamless transition.Following the preceding recommendations will help assure Tri-Corp does not fail because of ignorance. This recommendation will protect Tri-Corps valuable data assets and help the company to keep moving forward.References . Axia College. (2005). Networking, a Beginners Guide, Fourth Edition. Retrieved from Axia College, IT/230 website Axia College. (2005). Networking, a Beginners Guide, Fourth Edition. Retrieved from Axia College, IT/230 website Agility Recovery Solutions. (2009). Retrieved from http://blog. agilityrecovery. com/disaster-recovery?   k=disaster%20recovery%20solutions&_kt=b63adcc1-e0cf-4e52-b042-bbffd8dddc96 Art W Meyer. (2011). Backup and Disaster Recovery. Retrieved from Art W Meyer, IT/230 website Backup and Recovery. (ND). Retrieved from http://www-01. ibm. com/software/tivoli/solutions/backup/ Backup & Recovery. (2011). Retrieved from http://www. sonicwall. com/us/products/Backup_Recovery. html Boda, K. (2009). Forums > Cisco: Average Connection Consumes 11. 4 GB Per Month. Retrieved from http://www. dslreports. com/shownews/Cisco-Average-Connection-Consumes-114-GB-Per-Month-105086 Cisco. (2008). Disaster Recovery: Best Practices. Retrieved

Thursday, August 29, 2019

The Use Of Internet In Business Essay Example | Topics and Well Written Essays - 250 words

The Use Of Internet In Business - Essay Example This eliminates the use of intermediaries in business transactions. It provides a channel for consumers to interact directly with business owners through the internet.Consumer to consumer electronic commerce (C2C)This is where business transactions are done directly between consumers. An –example of popular sites that are used for these transactions includes ‘bdizcom’, ‘craigslist’ and ‘ebid’ among others.E-GovernmentIt is a process whereby ICT is used in the sharing of information amongst different parties. It is advantageous because it helps to fasten paper-based processes and to improve the relationship between citizens and the government.Mobile commerceThis is the use of wireless devices to perform business transactions. It is considered a success when benefits are realized by its users. Electronic and mobile commerce is largely used in fields like manufacturing, marketing and investment amongst others. It exhibits the following advan tages; it reduces costs since it is cheaper than other source used in marketing or promoting a business. Secondly, it increases accuracy in business activities because it does not provide room for mistakes, and lastly, it provides a universal reach. For business, enterprises to have electric commerce they should have a web server hardware platform that is complete with appropriate software. There also exists electronic payment systems that are used to enhance businesses transactions by companies.

Wednesday, August 28, 2019

Global Perspectives Essay Example | Topics and Well Written Essays - 500 words

Global Perspectives - Essay Example The trends are of particular relevance for anybody wanting to know more how globalization affects people. Each trend is a global issue in itself which creates further momentum for globalization. Advances in technology hastened the spread of globalization; without the technological advances in information, communications, and travel, people and countries would not be tightly inter-connected today. News and events from far-away places of the world are flashed instantly on the television as breaking news stories, and people are updated almost daily on these events. Improvement in ICT – information and communications technology made globalization a virtual reality as people can get in touch with practically anyone anywhere anytime. The Internet has brought people close together and helped brought down cultural, social, and political barriers which would otherwise have taken much longer. Moreover, social media networks enhanced this seeming community of global citizens wherein people empathize with people somewhere else in cases of natural disaster, tragic events, or political upheavals such as the Arab Spring in Middle East countries. There is a growing sense of unity everywhere in which people feel they belong to the same human species, to humankind. Globalization had promoted better understanding. Increased migration – people today move to other countries to seek better employment opportunities, to pursue additional educational degrees, escape poverty in their home countries, avoid religious and political persecution, and in a new twist, the emergence of a new kind of the proverbial refugee, that of people seeking asylum due to climate change and adverse weather and environmental developments, such as rising sea levels, more severe floods and droughts. More convenient transportation modes which provide safer, faster, and cheaper travel encouraged more people to migrate for greener pastures, thereby further promoting global tourism (Walker,

Tuesday, August 27, 2019

Government Assignment Example | Topics and Well Written Essays - 1000 words

Government - Assignment Example Consensus, on the other hand, is a general agreement among these parts or groups of people. 3. A multi-party system is a political arrangement where parties seeking electoral posts are more than two. They occur in many states such as the UK. People prefer them to the system in the US as they offer the people more choices, and the competition between them leads to the development of better policies to gain an edge over the competition. 5. Having two major parties discourages any upcoming parties as most people are already divided between the parties. The division between the populations on the basis of the parties’ ideologies increases the competition. 11. The nominating process is a serious part of the electoral process. Those nominated, however, are appointed by several influential individuals and not all voters that significantly affects the voters’ right to vote 15. In an open primary, anyone can vote for any party’s candidate regardless of whether they are republican or democrat. In a closed primary, on the other hand, a voter can only vote for someone from their registered party. 23. No person can give more than $2,100 to any federal candidate in a primary election or over $2,100 for the candidates general election campaign. Moreover, no person can contribute more than $5,000 in any year to a political action committee or $26,700 to a national party committee. The total of any persons contributions to federal candidates and committees must be limited to no more than $101,400 in an election cycle (McClenaghan 191). 15. Gerrymandering where the shape of districts if done to the advantage of the political party that, literally, controls. Spreading the opposition thinly throughout the districts limiting their ability to win any

Monday, August 26, 2019

Explain why it is important for modern organisations to create dynamic Essay

Explain why it is important for modern organisations to create dynamic tensions between opportunistic innovation and predictable goal achievements; and discuss how managers can influence such tensions - Essay Example the controlling role of management control systems is associated, according to Mundy (2010) with the efficiency, predictability and importance to meet the short-term goals, it strives to diminish issues of information asymmetry and search for the ways that would decrease uncertainty and improve decision-making. There are numerous studies that highlight the use of management control systems by organizations in order to facilitate innovation and learning during the exertion of control over the achieved goals. The importance of management control systems is in the provision of organization’s values and priorities in leveraging the belief system, which givens employees a stable environment and challenges organizational stability and political processes by means of communication of values and assumptions (Mundy, 2010). For the modern business it is essential so the levers of control supported the development of organizational abilities of innovation, learning, entrepreneurship and market orientation. While the lever of control promotes forming of dynamic tension between innovation and goals achievement, it is a positive growth for each organization; hence, it should be studied by the companies. Besides, they do so in order to handle inter organizational conflicts. It proves that formation of dynamic tensions influences the development of organizational capacity. Simons (1995), states that within the modern business environment, managers are facing different challenges in terms of seeking of opportunities for meeting the customers’ needs. Thus, employees can break the control mechanisms within a business and ruin the company’s reputation and cause fines and business loses. One solution in managing control issues can be monitoring of employees and counseling about how to make certain job. Simons (1995) considers that in the intense business environment managers, however, have not time for each employee to be provided with the necessary advice. For that purpose,

Sunday, August 25, 2019

The Causes of Cirrhosis Research Paper Example | Topics and Well Written Essays - 1250 words

The Causes of Cirrhosis - Research Paper Example The organ affected is the liver. One of the liver’s major functions is for ethanol metabolism. Acetaldehyde is one of the ethanol metabolites. Acetaldehyde malfunctioning may contribute to alcoholic liver disease or ALD (Aspen, 2012). Cirrhosis is the advanced stage disease affecting one vital human organ. The organ is the liver. The liver is characterized as having scars. There are many causes of the scars. One of the causes is the patients’ suffering from hepatitis. Another is a disorder of the patients’ bile duct body part (Alkaddour et al., 2014). Another cause of the liver scars, Cirrhosis, is excessive drinking of alcohol (Acton, 2013). Cirrhosis is characterized as the presence of avoidable scars’ damaging to the liver. The scars slow down or unfavorably disrupt the normal functions of the liver. The damage is accumulated over many years. Once the liver is scarred, removing the scars is very impossible (Ye, 2014). In terms of anatomy, the healthy liver helps in the metabolism of the body. The liver helps metabolize the body’s proteins. The liver maximizes the use of carbohydrates. The liver helps metabolize the body’s fats. The liver synthesizes the hormones, glycogen, amino acids, urea and other factors. The liver’s bile helps achieve and maintain the optimum nutritional requirements. The healthy liver has normally functioning portal vein and hepatic artery. The liver’s hepatocytes play an important role in the metabolism of both the human body’s ammonia and amino acids (Aspen, 2012). Cirrhosis manifestation focuses on the signs or evidence of the occurrence of the cirrhosis ailment. The healthy liver tissues are slowly replaced by scar tissues. The scar tissues prevent the normal flow of blood through the human body (Aspen, 2012).

Saturday, August 24, 2019

Origins of American History Essay Example | Topics and Well Written Essays - 1500 words

Origins of American History - Essay Example It is only knowledge from these primary sources that can possibly give us reliable evidence on the effects of slavery on the Atlantic civilization. The Flourishing of the Slave Trade The first effect of the slave trade on the Atlantic world was the expansion of the trade itself. Much of the information concerning this was exposed through the publication of the journals of John Barbot, a French Royal African Company agent who made voyages from the West Coast of Africa back to the Atlantic world, two of these documented in 1678 and 1682. Based on the Slave Trade documents by John Barbot, which were published in 1732, it was rather easy to obtain slaves from Africa because â€Å"in times of dearth and famine, abundance of those people will sell themselves, for a maintenance, and to prevent starving†. Moreover, according to John Barbot, the main consequence of the great supply of slaves from Africa going to the Atlantic civilization is the lesser demand for them and more important ly, the cruelty and inhumane treatment that is afforded these slaves. According to John Barbot, the masters of these slaves â€Å"subsist them poorly and beat them inhumanly†. ... Also, when the slaves die, the masters â€Å"never bury them but case out the bodies into some by place, to be devoured by birds or beasts of prey†. This is rather one of the cruelest acts done by the masters on the slaves, which is not to afford dignity to the slaves even in death. Lastly, these slaves have been subjected to torture as Barbot himself admits ad confesses: â€Å"And tho’ I must say I am naturally compassionate, yet have I been necessitated sometimes to cause the teeth of those wretches to be broken, because they would not open their mouths†. From these accounts of John Barbot, one can clearly see the maltreatment of the slaves in the Atlantic civilization, whether in Europe or in America. This dominated the market during those times. Fusion of African and Atlantic Cultures The account of Olaudah Equiano, who was born in Benin in the late 1700s and kidnapped from there by the European slave traders, somehow opposed the idea of Barbot that it was ra ther easy to obtain slaves because they would sell themselves to prevent starving. On the other hand, it is possible that not all places would be the same all the time. Nevertheless, according to Equiano, when he arrived in England, he thought â€Å"the languages of different nations did not totally differ, nor were they so copious as those of the Europeans, particularly the English [and] they were therefore easily learned; and while I was journeying thus through Africa [probably on board the slave ship], I acquired two or three different tongues†. This is therefore a sign that the cultures of Africa have Formation of Anti-Slavery Organizations As early as 1790, there have been calls for anti-slavery in the Atlantic world, like the Society of the Friends of Blacks, who called for the abolition of

Managament of Specific Risk Exposures Essay Example | Topics and Well Written Essays - 2500 words

Managament of Specific Risk Exposures - Essay Example al 1996). Environmental auditing helps identify the problem areas. This would aid in developing schemes and precedencies by which the different issues may be dealt. Environmental auditors' objective with regard to this particular construction work is to clean the contamination of the water table and the running stream as these areas are assigned for tiny parks within the new Village. The main objective of the new administrator of the council is to see through the completion of the project. He has to see to it that all the employees whether temporary or otherwise is satisfied once the project gets over. It is his duty to see that all the legal rules and regulations are followed by the company. The main objective of the contracted construction workers is to earn as much as possible till such time the project lasts. As these workers are not permanent but are contracted for a particular job their aim is to make money which might see them through in the lean season also. The union of the workers' feels that since the administrator is new there may be some hitch in their relationship with regard to the workers welfare. The union also feels that the new administrator may handle workers roughly which might lead to disaster. The environmental auditor... The union also feels that the new administrator may handle workers roughly which might lead to disaster. Risk to the environmental auditors The environmental auditors perceive risk with regard to cleaning the contaminated water table. Since no companies are available at the local to clean the polluted water the company is at a high risk of not getting the project approved. Risk perceived by Wishford Bird Lover's Society There are three nests of the orange crested cuckoo (listed as an endangered species) in areas designated for new houses. The Wishford Bird lover's Society feel that these birds may migrate to other places when they (birds) perceive danger to their breeding and nesting. Risk to Wishford Council's new administrator Since the administrator is new it might take some time for him to adjust with the other employees and to gain their confidence. Gaining the confidence of employees has to be achieved within no time or else the project may take more time for completion. Apart from this since he is a new employee it might take some time for him to study the present workers and the rules and regulations of the council. Risks to Hartford Brown contracted construction workers Contracted workers at construction sites are always in danger of contacting occupational diseases. They also are exposed to some highly dangerous materials like asbestos which might be used in construction works. Q.1. (c) The overall project manager can draft all the risks attributed to the different stakeholders and form a report. This report has to be prepared in consultation of each of the stakeholders by identifying risks involved in their respective areas. The risk arising directly from the project has to be segregated from other risks which might rise

Friday, August 23, 2019

GENETICS Assignment Example | Topics and Well Written Essays - 250 words

GENETICS - Assignment Example In connection with this, it is evident that biotechnology has led to the introduction of hybrids of plants and animals through cloning and gene therapy. It is also apparent that employment of biotechnology in the medical contexts has enhanced the production of effective medicine. However, the ethical issues surrounding the application of biotechnology in real life situation are diverse and convincing. For instance, Coulter, Myers and Varacalli assert that the extensive use of biotechnology has led to human beings being used as the instruments of biotechnology. In connection with this, it is also evident that biotechnology has resulted in biological manipulations (Morris, 2006). It has distorted the profoundly human activities such as those associated with receiving and nurturing life. The production of genetically modified foods has also raised public concerns in many developed countries. Majority of the people believe that the food crops generated via biotechnology may result in fatal health complications (Morrey & Sherlock, 2002). Additionally, it is evident that the introduction of genetically modified organisms hampers with the marketing of organic

Thursday, August 22, 2019

Philippine Treasure Essay Example for Free

Philippine Treasure Essay After watching the documentary of Philippine treasures, I have been get more knowledge about our ancestors treasures remains and I think that the early Filipinos living in the Philippines already had an advanced civilization. Instilled something into me that we were rich, we were rich! We’re talking of gold here it is an opulence. During the early times, the Philippines was filled with gold. These gold were used for everyday clothing of the Filipinos, and even for accessorizing themselves. Our ancestors, the early Filipinos, were civilized enough to know how to process gold. They made many bowls, necklaces and earring out of gold. These gold were part of their daily lives. The Philippines is filled with natural resources, so there was abundance in gold. Some people were even dressed from head to toe in all gold. Also, the early Filipinos were able to craft a doll of a Goddess of Buddhism. This doll also called Golden Tara was a golden alloy, mixed with many other metals. This shows how the Filipinos were knowledgeable to creating alloys with different metal even before Westerners have arrived in our country. The Filipinos have even known how to sew shells and make clothes out of them! There are also several jars that represents the early Filipinos, these jars can be used for multi-purpose storage, because these jars can story many other things aside from water. All these many things were made even before the arrival of the Spaniards or other colonizers, so this shows that the early civilization of the Philippines was very unique and quite advanced. I like the show of Philippine Treasures. It really told us what are some things on this country or treasures are not yet seen by the FILIPINOS. Now I realized that we need to care and concern the importance of some ancient things. I also hope that efforts can be made by officials to preserve the Philippines historical artifacts, and to strengthen support for the National Museum. â€Å"Dont Gain The World Lose Your Soul, Wisdom Is Better Than Silver Or Gold. † ? Bob Marley

Wednesday, August 21, 2019

The arc welding of mild steel

The arc welding of mild steel Introduction The microstructure of a material is significant when it comes to the properties and characteristics of a particular material. It would be perfect if the properties and characteristics, which are related to the microstructure, of the parent metal, heat affected zone and the weld metal is the same. However the probability of occurrence of such a situation is very less since the parent metals are used in the wrought form and the weld metals are used in the cast form. Wrought materials got superior strength, ductility and toughness when it is weighed against the materials in the cast form. Even then the weld metal properties draws near the properties of the wrought material, since it is a minuscule casting which is rapidly cooled. This situation is particularly related with the ferrous materials, which includes mild steel also (Houldcroft and John, 1988). The report holds the information regarding the development of microstructure during the arc welding of mild steel plate, changes which occur in the heat affected zone and the change in the structure of the steel when the carbon equivalent of the steel was increased. Mild steel Steel with a low carbon content of 0.25% is known as mild steel. Mild steel is easy to weld and fabricate because of its low carbon content since it would not get harden by heat treatment. This leads to the lack of hardened zones in the heat affected zones and welds, even though there is quick cooling. As the carbon content increases, the ease in welding reduces because of the quenching action (Davies, 1993). Welding Welding is primarily classified into two welding methods and they are (1) Plastic welding and (2) Fusion welding. It can be further fragmented into eight divisions on the basis of its specific processes and they are (1) Cold welding, (2) Thermit Welding, (3) Gas welding, (4) Resistance welding, (5) Arc welding, (6) Braze welding, (7) Forge welding, (8) Induction welding. The welding processes such as Cold welding, Pressure welding, Resistance welding and Forge welding comes under the Plastic welding division whereas the welding processes such as Gas welding, Thermit welding, Induction welding and Arc welding belongs to the Fusion welding processes (Clark, 1962). Arc welding The electrode material and shielding technique are the basis of classification of Arc welding processes. In mass production, the automatic welding technique is very important and the Arc welding technique is well adapted to it. Added on to this, Arc welding technique imposes a lot of flexibility to the joining of both thin and heavy sections of a material. Another trait of Arc welding process is that the heat application in this particular welding process is highly concentrated when compared to other welding processes (Clark, 1962). Microstructure of weld metal The microstructure of the weld metal is primarily dependent upon the alloy content of the carbon steel. Whereas in carbon, carbon manganese and micro-alloyed steel, the weld metal microstructure is mainly affected by the welding procedure and composition of the weld. According to Lancaster, 1999, the microstructure of Carbon-Manganese alloy steel is affected by the aspects such as cooling rate, composition, plastic strain and the presence of non-metallic nuclei. Figure 2.1 shows the effect of cooling rate and composition on structures produced in the weld. The above details show that the steel containing less than 0.30% C will have similar microstructures after the welding process. During the Arc welding of mild steel a number of discrete structural zones, such as unaffected, transition, refined, coarsened, fusion and deposited metal zones are formed. These zones are shown in the diagram and it is compared with the relevant section of the iron-iron carbide diagram. Many of these zones will not be having discrete line of demarcation and they appear to be merged together (Clark, 1962). Unaffected zone In the unaffected zone, the parent mild steel is not heated to an adequate amount to reach the critical range. Therefore, the structure is unchanged and the unaffected zone represents the archetypal grain structure of the parent mild steel. The figure shows the microstructure of the unaffected zone of mild steel. It consists of a typical combination of ferrite and pearlite (Clark, 1962). Transition zone Next to the unaffected zone, there exists a region where there is a temperature range, between the A1 and A3 transformation temperatures, in which a limited allotropic recrystallization takes place and this particular zone is known as the transitional zone. The transition zone has a microstructure of both ferrite and pearlite. But the size of the pearlite region will be different from that in the unaffected zone. The pearlite region will be much finer which is due to the heating of the mild steel to the critical range and due to the cooling after the heating process. During the heating process, the pearlite will be transformed into austenite and then transformed into finer pearlite grains on cooling (Clark, 1962). Refined zone After the transition zone, comes the refined zone. In this zone, the temperature is heated just above the A3 temperature and the finest grain structure exists in this region as a result of the extensive grain refinement. The figure shows the microstructure of the refined zone of the mild steel. The microstructure consists of much finer structures of pearlite and ferrite. These structures are formed from the austenite which existed at a temperature just above the upper critical temperature (Clark, 1962). Coarsened zone The region next to the refined region is known as the coarsened zone. In this zone, the temperature is higher than the A3 temperature and the grain structure will be coarsened. When it comes to the coarsened zone, the microstructure will be dominated by pearlite grains and ferrite will be of smaller grain. Due to the prevailed rate of cooling, the pearlite will show a higher rate of finer grains than that existed in the original pearlite areas, when it is magnified (Clark, 1962). Fusion zone The actual melting of the parent metal takes place when the temperature is higher than the solidus and the zone in which this takes place is known as the fusion zone. In the fusion zone, the microstructure will be of a very coarse structure. This type of structure is common in mild steel where the particular structure is formed from the large austenite grains when the cooling rate is of a medium pace. The following figure shows the microstructure in the fusion zone (Clark, 1962). Deposited metal zone The deposited metal zone is a zone along with the fusion zone where there is a coarse grain structure and it happens when a filler metal is added to the weld. The structure of deposited metal zone is shown in the figure. As you can see in the figure, the microstructure consists of columnar structure of ferrite and pearlite (Clark, 1962). Heat affected zone The possibility of performing a welding process without building up a thermal gradient in the parent metal is almost negligible. The temperature and the speed of the welding process is very influential in deciding the spread of heat into the parent metal. The thermal gradient will get compressed by the high power welding at high speed (Houldcroft and John, 1988). The schematic sketch of a weld, heat affected zone and relevant portion of the iron-carbide phase diagram is shown in the figure 3.1. The base metal is heated up to a peak temperature and it varies along with the distance from the fusion line. If the lower critical temperature, A1, was surpassed by the peak temperature, then there will be a transformation from ferrite to austenite. This transformation will be complete and an austenitic microstructure is formed when the temperature goes beyond the upper critical temperature, A3. The ferrite structure is stable at room temperature and has bcc crystal structure whereas the austenite structure is stable at high temperature and has fcc crystal structure (Raj et al, 2006). The heat affected zone of an arc weld in steel is classified into three regions, such as supercritical, intercritical and subcritical regions, from a metallurgical perspective (Lancaster, 1999). The supercritical zone The supercritical zone can be classified into the grain growth region and the grain refined region. Coarse grain heat affected zone (CGHAZ) is the term which is used to refer to the region of heat affected zone where extensive growth of austenite grains takes place when the temperature goes beyond the temperature of 1300 degree Celsius. The region next to the CGHAZ, which is at a temperature range of 900 to 1200 degree Celsius, is known as the Fine grained heat affected zone (FGHAZ). In this region of the steel, the austenite grain size remains small (Raj et al, 2006). The intercritical zone The intercritical region is narrow when compared to other zones and partial transformation takes place in this zone. The region of HAZ, which is having a temperature range in between the critical temperatures A1 and A3 is referred as Inter critical heat affected zone (ICHAZ) (Raj et al, 2006). The subcritical zone In the subcritical zone, not much observable alteration in the microstructure will be there except the occurrence of a small region of spheroidization, which is difficult to detect. The tempered zone and unaffected base material comes under this zone (Raj et al, 2006). The microstructures such as ferrite and other metastable phases are formed during the cooling cycle of a welding process, from an austenite microstructure which was formed at high temperatures. For welds produced with adequate pre-heat or for high heat input welding, the cooling rate will be less and this leads to the formation of a mixture of ferrite and carbides whereas in a high cooling rate scenario, microstructures such as bainite or martensite are formed from austenite. The formation of bainite and martensite is also affected by the amount of carbon content and alloying elements. This particular trait of steel to form a hard microstructure such as bainite or martensite from austenite phase when cooled at high rate is generally referred to as hardenability and this increases with the austenite grain size and alloy content of the steel. Therefore in the case of mild steel, the microstructure of the heat affected zone (HAZ) is of carbide and ferrite after performing an arc welding even if it is performed without any preheating (Raj et al, 2006). The effect in the increase of carbon-equivalent of steel The carbon equivalent plays an important role in deciding the microstructure of the steel. Along with this, the cooling rate during the welding process too plays a decisive role in this regard. The probability of formation of martensite or bainite in high carbon equivalent steels is high and in order to avoid that situation, use of distinctive techniques, such as preheating and post-heating are required (Clark, 1962). Carbon equivalent calculation In order to discuss about the effect of carbon equivalent in deciding the microstructure of mild steel during the arc welding process, first we have to discuss the formula which is used to calculate the carbon equivalent of steel. The carbon equivalent can be calculated by the formula. CE= C% + (Mn%)/6 + (Cr%+Mo%+V%)/5 + (Ni%+Cu%)/15 (Davies, 1993). This formula is relevant to the plain carbon and carbon manganese steel but it is not applicable to micro-alloyed high strength low-alloy steel or low alloy Cr-Mo type. Due to Ito and Bessyo, the formula used by Japanese Welding Engineering Society is Pcm= C + Si/30 + (Mn+Cu+Cr)/20 + Ni/60 + Mo/15 + V/10 + 5B (Lancaster, 1999). As mentioned in the previous sections, the formation of hard microstructures such as bainite and martensite is dependent upon the cooling rate as well as the carbon equivalent in the steel. During the welding process of mild steel, the heat will be absorbed faster by the steel and creates a sudden fall of temperature (Raj et al, 2006). Here, steels with three different carbon contents are compared with the help of an Iron-Iron Carbide Equilibrium diagram. The steel with less than 0.83 percent carbon content is known as hypo-eutectoid steels, steel with 0.83 percent carbon content is known as eutectoid steel and steel with more than 0.83 percent carbon content is known as hypereutectoid steel (Clark, 1962). Steel with 0.1% carbon content This type of steel belongs to the hypo-eutectoid steel. As you can see from the Iron-Iron carbide diagram, when a 0.1% C steel is cooled at an appropriate rate from 2800 F to room temperature, a mixture of austenite and delta solid solution is formed from the delta solid solution and liquid. On further cooling, grains of austenite are formed from the former followed by formation of ferrite and austenite. By the time the cooling is done till the room temperature, a microstructure of ferrite and pearlite will be formed (Clark, 1962). Steel with 0.8% carbon content This form of steel has a composition which is very near to the composition of eutectoid steel. During the process of cooling of this steel from 2800F, the transformation starts from the molten state into a liquid and austenite form. Then on further cooling, formation of austenite followed by the eutectoid called pearlite will occur (Clark, 1962). Steel with 1.2% carbon content This form of steel belongs to the hypereutectoid steel. During the cooling process of this steel from 2800F, the transformation starts from the molten state of steel into a liquid and austenite form. Then on further cooling, there will be formation of austenite, combination of austenite and cementite, and ends with ferrite and cementite at room temperature (Clark, 1962). Conclusion Microstructure of steel is a very important deciding factor when it comes to its properties and behaviour. It is obvious from this report that the cooling rate during the welding process, composition of weld metal and the type of welding process plays a vital role in the formation of the different form of microstructures in the weld metal. The weldability and hardenability of the steel depends a lot on the carbon content of the steel to be welded. As the carbon content of steel increases, the weldability of that particular steel decreases and its hardenability increases. This proves that the composition of the weld metal plays an imperative role in the characteristics of a welded material. This report illustrates that the weldability of mild steel is quite good and the role of composition of mild steel in achieving so. It also gives you an idea about the various changes that occur to the microstructure of the mild steel during the arc welding process. References Clark, D. and Varney, W. (1962) Physical metallurgy for Engineers. 2nd edition New York: D Van Nostrand Company. Davies, A.C. (1993) The science and practice of welding, vol 2, The practice of welding. 10th edition Cambridge: Cambridge University Press. Houldcroft, P. and John, R. (1988) Welding and cutting. 1st edition Cambridge: Woodhead-Faulkner Limited. Raj, B., Shankar, V. and Bhaduri, A. (2006) Welding Technology for Engineers. 1st edition Oxford: Alpha Science International Limited. Lancaster, J.F (1999) Metallurgy of Welding. 6th edition UK: Abington Publishing.

Tuesday, August 20, 2019

International joint venture

International joint venture Joint venture is one of the preferred international market entry modes by many firms but it suffers high failure rate. Construct a review of literature on how to manage international joint venture successfully. International joint venture is one of the preferred international market entry mode. â€Å"An international joint venture is a separate legal Organizational entity in which at least two partners that are economically, Geographically and legally independent of each other participate† (Frà ©dà ©ric and Pierre 2006). Many multinational corporations use the joint venture as the market entry mode to enter in to developing countries (young,1994: Mickiewicz , 1986). International joint ventures are popular institutional forms chosen by less developed countries to attract foreign direct investment and knowledge . Through the partnership with the foreign venture it will help in knowledge transfer in terms of technology, it also will create employment opportunities in the local country and grow the flow of foreign currencies (Udo ,Sugata and Arijit 2003). In an individualistic grown economy joint venture is used as strategic option. An foreign company can not came a open its branch straight away in the local market, so to overcome this barrier the foreign company merge with the local company to form a joint venture.. The main thing about the joint ventures are the foreign companies jointly decide with the local company to create a legal entity to share the ownership, profit or loss and other benefits of the business. Despite a strong understanding between the companies and with huge amount of resources also, the joint venture achieve a high failure rate. This is because of the differences in culture ,strategy planning and organizing , it initially start with differences an result in problem (Bruce ,1988). One of the preferred international market entry is joint venture, the other entry modes are Licensing , Direct Foreign Investment , Internationalization , Franchising and exports. Joint ventures involve two or more legally formed distinct organizations , each of which shares in the decision making activities of the jointly owned entity (Geringer and Hebert 1991 ; Geringer 1988 ). â€Å"It is deemed to be an international joint venture when at least one partners head quartered outside the ventur e country of activities, or if the Joint Venture has a greater level of operations in more than one country† (Geringer and Hebert 1991 ; Geringer and Hebert 1989). In the rapidly changing international environment the intense technology and timely competition there are major changes around the world that are political and economical . It is closely examined that joint venture or any other forms of business relates with ownership , performance and control (Hans, Stephen ,. 1997) The joint venture suffer a high failure rate because its got more than two parent organization. It is reported that 47% of the firms have more than 3 parent firms. A study in the article states that if a joint venture consist of more number of parent company means it will attain failure. (YAPING , ODED , YADONG and MEE-KAU ,. 2007). The experience of the parent company will influence the joint venture with the company in the developing countries. Essential resources and mutual understanding between the parent companies is important for the joint ventures success. The needed resources and acheived experience of joint ventures parent partner are important to cope the relationship , which leads to trust and ultimate understanding . â€Å"Companies should look for a potential partners with joint venture experiences and should have adequate knowledge to provide complementary resources† (Sim and Yunus. 1998).. For example, Bangladeshi firms should expect foreign companies such with appropriate technology, joint venture experience ,overseas marketing knowledge, managerial expertises and networks. So as the foreign company will look in the Bangladeshi firm is local market knowledge, cost effectiveness in inputs and past joint venture experience. Market strength and technology and export orientation where other im portant successful factors for joint ventures . Unlike the developed countries the developing countries need local parental control and good technology were needed to create its venture to success(Sim and Yunus. 1998). Kathryn 1988 argues that â€Å"Customer Attributes will influence firms abilities to differentiate their product offerings from those of competitors and they will also(1) determine whether sponsoring firms can standardize their respective product configurations across markets (2) grant their ventures much operating autonomyâ€Å" . The change in particular partners strategy , choosing of strategy for the joint venture and the action of the competitors must focus during the changes in the venture. And the dynamics of ventures owner and the partners collaboration must be adjusted to hypothetical changes in the respective strategically need , c apability and success of other owners in the international venture(Kathryn 1988) . The important and most surprising question is , why do joint ventures fail?. The example is This research is based on a systemetic analysis of a joint venture associating a Brazilian company (local partner), Algar, formerly ABC, with a French company Bull (foreign partner). The joint venture was founded in 1983, initially it was called as ABC-BULL but later it changed it name as ALGAR BULL, the change in the balance of power took place in 1989.then the partners separated due to situation of subsidiary. Both the companies attain huge profits but the conditions turned to be unfavorable . In the end Bull took over the entire company from to form Bull South America, right form the beginning Bulls have major rights on the company and more power on decision making process also. The main differences through the joint venture in to dissolution is the cultural factor. It has affected almost everything in that joint venture. Despite its dissolution it is considered to be a successful Joint ve nture(Frà ©dà ©ric and Pierre 2006 ). In the previous empirical studies using the meta-analysis it examines the relation between the culture and decision making strategies. The result declares that individualistic cultures prefers a f orcing strategy more over a collective cultures, wherein more likely collective cultures use withdrawing, compromising and problem solving strategies than that of the capitalistic culture (Lung-Tu 2007). Key factors for managing International Joint venture success are Performance, Human Resource development , Practices based on host cultural characteristics, Quality performance, Training competence, Flexibility and Adaptation , Technological sophistication, Knowledge acquisition from foreign partners, Cooperation between parents, Recourses sharing, Equity sharing, Governance, Political risk in host country these are some of the important key success factors that influence the International Joint venture into success. If there is any misunderstanding or conflict in these issues means it will develop a crack in the joint venture (Michael , Schon and Andreas ,. 2007 ). The individual bargaining power of the partners should determine which of them should bring the particular resources , to cut down the cost (Kathryn 1986 : Beamish , Peter 1997 ). In another example its HERO HONDA , it is the merge of HERO group of India and Honda of Japan to produce bikes, it is one of the biggest and most profit earning company in the world in terms of motorcycle sales . It is selling more than 1 million bikes per year. And it is ranked 108th in The Forbes 200 most reputed companies list 2006. Another popular example for the successful international joint venture is Sony Ericsson. The joint venture of this company was establishes on October 2001, it is the joint venture between Japanese Sony Corporation and the Swedish telecom communications company Ericsson to make mobile phones and smart phones. In the insurance industries there are also some emerging international ventures they are in following examples , such as Aviva Life Insurance Company India Ltd. It is joint venture between the Aviva life insurance in united kingdom and India based Dabur company, its Dabur that holds 74%of the stake in the company and it used the brand name of Aviva. In another example Bajaj Allianz Life Insurance Co., Ltd. , it is the joint venture between the Indian Motorcycle company Bajaj and German Insurance Giant Allianz Insurance. The important thing to be noted in this is that global players in the business world are elaborating there channels through the mode of joint ventures, and they a re also using there experience in to the business they are involved . Which will result in a success rate . Another awaiting joint venture in India is between Indias Bharti group and the worlds largest retailer Wal-Mart . To conclude this essay on International Joint venture, it is that the success of any joint venture is within that organization .in the very beginning itself the counterparts should target a goal and should work towards that. The partners of the joint ventures not only should share profit and losses and resources , but they also should be open to share there operational , strategies , technology ,trust , knowledge acquisition from foreign partners , selection of experienced partner and performances. And they should overcome the barriers such as cultural differences , managerial inequalities ,lack of knowledge, selection of inexperienced partner, lack in communication, and political . These barriers should be carefully tackled otherwise the joint venture will end up in failure. Despite the failures in the international joint venture rate is high companies prefer to go for it , because they enter a new market . Thus the international joint venture should overcome the above mentioned odd s and barriers to become successful joint venture in the international market . References : Udo Broll, Sugata Marjit, and Arijit Mukherjee 2003, ‘FOREIGN DIRECT INVESTMENT, CREDIBLE POLICY: The Role of Risk Sharing‘, THE INTERNATIONAL TRADE JOURNAL, Volume XVII, No. 2 : Pg 165-176 Geringer, J. Michael., and Louis.Hebert, 1989, ‘Control and Performance Of International Joint Venture . Journal Of International Business Studies, 20: Pg 235-254. Geringer, J. Michael., and Louis.Hebert. 1991, ‘MEASURING PERFORMANCE OF INTERNATIONAL JOINT VENTURES , Journal of International Business Studies; 1991, Vol. 22 Issue 2, p249-264, Geringer, J. Michael. 1988. Joint venture partner selection Strategies for developed countries. West-port Conn.: Quorum Books. Killing, J. Peter. 1983. Strategies for joint venture success. New York: Praeger. Bruce Kogut ,.1988.‘Joint Ventures: Theoretical and Emperical Perspectives , Strategic Management Journal ,Vol. 9, Pg319-332 . Hans Mjoen . Stephen Tallman,. 1997. ‘Control and Performance in international Joint venture. ORGANIZATION SCIENCE ,. VOI. 8, No, 3. Richard N. Osborn ,. and John Hagedoorn , 1997. ‘THE INSTITUTIONALIZATION AND EVOLUTIONARY DYNAMICS OF INTERORGANIZATIONAL ALLIANCES AND NETWORKS . Academy of management journal. Vol.40,No. 2 , 261-278. Frà ©dà ©ric Prevot, and Pierre-Xavier Meschi. 2006 . ‘Evolution of an International Joint Venture: The Case of a French Brazilian Joint Venture. Thunderbird International Business Review, Vol. 48(3) Pg 297-319 YAPING GONG, ODED SHENKAR, YADONG LUO and MEE-KAU NYAW ,. 2007 . ‘DO MULTIPLE PARENTS HELP OR HINDER INTERNATIONA JOINT VENTURE PERFORMANCE? THE MEDIATING ROLES OF CONTRACT COMPLETENESS AND PARTNER COOPERATION , Strategic Management Journal,. 28: Pg 1021 -1034. Michael Nippa , Schon Beechler and Andreas Klossek ,. 2007. ‘Success Factors for Managing International Joint Ventures: A Review and an Integrative Framework , Management and Organization Review.3:2 2007 A. B . Sim and Yunus Ali ,. 1998.‘Performance of international joint venture from developing and developed countries : An Emperical Study in a Developing Country context . Journal Of world Business / 33(4). Lung-Tu Lu,. 2007. ‘The Effect Of Cultural Similarity On International Joint Ventures: An Emperical Study . International Journal of Management. Vol.24 No.2 : Pg 230-241 . Kathryn Rudie Harrigan,. 1988. ‘Joint Venture And Competitive Strategy. Strategic Management Journal. issue 9: Pg 141-158 (1988). W. Beamish, J. Peter Killing,. 1997. Cooperative Strategies : Asian Pacific Perspectives. Craig C. Julian,. 2005. International joint venture performance in South East Asia. Kathryn Rudie Harrigan,. 1986. ‘ San Francisco: new Lexington Press .

Monday, August 19, 2019

No Child Left Behind Essay example -- Education Teaching Learning Essa

No Child Left Behind As students in a Structure & Philosophy class, one of the main components has been to introduce and familiarize us with the No Child Left Behind Act. President Bush passed this legislation on January 8, 2002. The NCLB Act was designed to ensure each and every student the right to a fair education, to give parents more options in their child’s education, and to guarantee all teachers are highly qualified. By highly qualified, the act means teachers must have at least a bachelor’s degree, have full state certification or licensure, and have demonstrated competence in their subject areas (US Dept. of Education). â€Å"Making the Grade,† which was published in the Salt Lake Tribune in September of this year, is an article arguing the negative sides of the No Child Left Behind Act. Through this article, a majority of the discussion regarded the budgeting involved with NCLB. This article calls No Child Left Behind a â€Å"one-size-fits-all formula for improving education in America† (Making the Grade). According to President Bush, the NCLB Act is â€Å"’the cornerstone’ of his administration† (Salt Lake Tribune). Like with any legislation, however, come both positive and negative sides. As argued in â€Å"Making the Grade,† the No Child Left Behind Act seeks to reduce gaps in testing areas that have allowed kids to advance without having high-quality skills in subjects such as math and reading. By discovering what kids are slipping through the gaps in testing, it will be easier for schools to aid these students and make sure they are not left behind. Other main goals of this act include to find teachers who are not well educated in the subjects they are currently teaching, and to locate those schools who fail t... ... Act highly overweigh the few negative sides of the act, such as the supposed lack of funding as pointed out in â€Å"Making the Grade.† With time and patience, I feel everyone will see the benefits of this act and will be supportive of a brighter future of education in the US. Works Cited: â€Å"Making the Grade.† Salt Lake Tribune. 14 Sept. 2003. 30 Oct. 2003. http://web.lexisnexis.com/universe/document?_m=e639f774e6d2737990eb1dcaeec86e34&_docnum=92&wchp=dGLbVlbzSkVA&_md5=66c0907fb6980f1de15959b46cf292a4 US Department of Education. Choices for Parents. 8 November 2003. http://www.ed.gov/nclb/choice/index.html?src=ov US Department of Education. No Child Left Behind. 8 November 2003. http://www.ed.gov/nclb/landing.jhtml US Department of Education. No Child Left Behind. 8 November 2003. http://www.ed.gov/nclb/accountability/ayp/testing.html

Sunday, August 18, 2019

Events in History from 1820-1850 Essay -- American History

The period from 1820 to 1850 was a time where several important and diversified events in American history occurred. This period was a period of extreme reform. There were many conflicts during this period in which brought about great change. Such conflicts include the Gibbons vs. Ogden, Erie Canal, American Temperance Society, David Walker’s Appeal, Anti-slavery society, Sack of Lawrence, and the Dred Scott Decision. All of these events had one goal, to make the society a better, improved place for everyone, both in the North and South. Inside three people’s lives: free black man, slave women and a middle class white woman, none of them actually had the freedom and rights as opposed to today. If a middle class white woman was married, her life was controlled by her husband. She had no property rights and could not vote. The free black man could own property and vote in many states outside the South. The slave woman had no rights at all. Her "master" could rape her and she could do nothing about it. The economies of each region (North and South) at the time where really only similar in the way they were expanding and growing stronger. One way the two regions differed in economics was in the base of the economy. For example, the South’s economy was based on cotton farming, while the North’s economy was based on manufacturing. Because the South did not manufacture goods, they were forced to purchase finished products from the North- thus adding to the North’s economy. With the South’s money they would acquire cotton from the southern states. Also, in the South, there were little job opportunities for whites since slaves had the jobs in the field, unlike the North where jobs were abundant in factories for the unskilled workers. Many... ...made today. The period between 1820 and 1850 was an interlude of great reform. The conflicts discussed in this phase were crucial in the developments, such as the development of the political party Democrats lead by Andrew Jackson in 1832 and the Whig Party in 1836 showing resistance to Andrew Jackson’s ideas. Though the era did include of opposition in both the parties, but their ultimate goal was to make the society a better, improved place for the citizens, which did eventually occur. Works Cited †¢ Boyer, Paul S. "Chapter 14: From Compromise to Secession." The Enduring Vision: a History of the American People. Boston, MA: Wadsworth Cengage Learning, 2009. 412-42. Print. †¢ Harding, Vincent. 1981, There Is A River: The Black Struggle for Freedom in America. Vintage Books †¢ Nichols, Alice. "Bleeding Kansas." New York: Oxford University Press, 1954.

Jacob A. Riis How the Other Half Lives Essay -- Jacob Riis Other Half

Jacob A. Riis' How the Other Half Lives This book talks about the immigrants in the early 1900’s. The book describes how they live their daily lives in New York City. It helped me a lot on Riis photographs and his writings on to better understand the book and the harsh reality this people lived. This comes to show us that life is not that easy and it will cost us work to succeed. Riis talked about all the immigrant major groups that came to the United States during this time period. Riis was a bit prejudice and stereotyped the people he wrote about. For example he talked about he Italians as being gamblers and being slow learners. He criticizes them as being dumb and that is the reason they were cheated on their pay roll. They were told that by coming to America they would get pay...

Saturday, August 17, 2019

Does This Milkshake Taste Funny

George Stein, a college student employed for the summer by Eastern Dairy is faced with an ethical dilemma. His co-workers don’t care about proper procedures required in ensuring that the milkshake produced during the shift is hygienic and safe for human consumption. The milkshake that is produced is usually delivered to fast-food restaurants and drive-ins. George had less than a minute to think about his choices and must decide if he is going to remove the filters from the plant's piping and, thus, allow the current production run of milkshake mix to be contaminated with maggots or refuse to remove the filters, and report the maggot problem to management. Removing the filters will save the company’s money, at least in the short run, and allow George's shift to go home on time. George is disturbed, however, by the thought of children drinking those milkshakes. Analysis: The others looked Paul Burnham as direction. He’s goal was completing all of the assigned work before the end of the shift and clean the equipment. He does not care about other things from this. Such as the quality of the final product, the contaminants whether or not mix into the milkshake. Eastern Dairy was lack of quality control and quality management. It over relied on an occasional visit by the inspectors from the county health department for the overall production facility health check. Recommendation: * Create the quality control and quality management system, ensure that the quality of products, stuff behavior and administration are under control. * Design a monitoring situation. The company can set a night superintendent to monitor stuff and quality of production. * Establish a ethical concept and corporate social responsibility to stuff. * Improve the organizational culture.

Friday, August 16, 2019

The Crucible-Theme- 5-Paragraph

â€Å"Even the Good can be Twisted† â€Å"Be who you are and say what you feel, because those who mind don't matter and those who matter don't mind. † ( Dr. Seuss) â€Å"Even though I walk through the valley of the shadow of death, I will fear no evil. † (Psalm 23:4) â€Å"God has given you one face, and you make yourself another. † (William Shakespeare) These quotes, found throughout many different time periods of history, all say the same: â€Å"Be who you are and don’t let anything change that. † These are great words to live by, but, in time of weakness, does one stay true?Can even the good be twisted? This is a theme that is represented throughout The Crucible many times. Characters such as Elizabeth Proctor, John Proctor, and Reverend Hale had good intentions or morals in the beginning but were soon marred by protecting a lover, temptation, or the questioning of all that one stood on. To begin, Elizabeth Proctor was twisted in a way tha t was out of love for her husband and his keeping safe. In the beginning, Elizabeth was a character that was known for never lying. She was a woman of Salem that could do no wrong and loved her husband abundantly.Soon, though, her incorruption was challenged when she was brought to court to prove her husband’s innocence. Instead of telling the truth, she lied about the affair that John had previously confessed about. Thinking what was best, detrimental to herself or not, Elizabeth broke the one thing that made her consistent. She chose hurting her own conscience and fate over seeing her husband be punished for a crime he actually committed. As a result of this, Elizabeth’s whole character was altered, changing from a purely good woman to a liar.Simultaneously, John Proctor’s character was distorted in many ways. Even before the play began, John had broken his own moral code by having an affair with Abigail Williams. This went against, not just the rules of the c hurch, but his own personal beliefs and everything he lived by. This caused John to have internal conflict throughout the entire play, making him guilt-ridden. This contention was only to him until he openly stated it in court to prove his wife’s innocence from witchcraft. It was a moot point though, because Elizabeth did the same thing for him, damning him to be ried for taking part in black magic. Only in the end did John Proctor feel any forgiveness towards himself. In his mind, he deserved the punishment he was going to endure and wasn’t going condemn anyone else in the process. All in all, John was a noble man but, warped by temptation, was made a man of slander. Furthermore, Reverend Hale was pushed to change also. Hale came into Salem a stranger, but knew how to fix the problem the town endured. He never questioned that God had a plan and always thought that something was either good or bad, with no gray area in between.This thinking is challenged when Elizabeth , a pure person, is accused and then later when John confesses. He knows that these people are honest and leaves the court for a period of time. In the end, Hale is a desperate man, and even though knowing there is no witchcraft present, he urges John to admit that he is not the one that should be punished. He has to question all the rules he has lived by his whole life and pursue something he knows is incorrect. In essence, Reverend Hale is pushed to his limits and is turned into a man that will be permanently in suspicion of any standards he ever thought were true.In the end, as a reader, one is challenged to think, if put in that situation, if he or she would falter from what is right. If one would, knowing that is against every precedent and moral one owns, be brought away from all that is good and change? This play shows this theme various times throughout that the good, like Elizabeth, John, and Hale, would be changed when brought up against acting out of love, lust, and doing what is right. The Crucible is continuously asking the reader, â€Å"Can even the good be twisted? †

Thursday, August 15, 2019

Becoming an Adolscent

Childhood to adolescences Eventually, everything has to change. Whether it is for the best or the worst is to be determined. In this short story Steven becomes more realistic about the nature of breaking up and he also learns to consider the feelings of others. Steven gains a deeper understanding of himself and figures out who he wants to become. In â€Å"breaking up† by Susan Beeby and Paul Lima, Steven experiences a transition from childhood to adolescences. Steven’s view of being in a relationship is not realistic because he does not know what commitment entails. He attended his girlfriend’s birthday party, where he made her a cake and gave her a special birthday gift. His girlfriend said â€Å"when he gave me a gold band for my birthday, I thought our relationship was solid. †(Beeby and Lima 1) Steven did not recognise the sentimental values a ring has for a girl. He did not think about the commitment he just made to her, resulting in a very immature choice. Steven is now seeing his ex-girlfriend not acting like she is upset or mad about him breaking up with her. She is not giving him the satisfaction that he craves for. Steven than proclaimed â€Å"and every time I saw her afterwards- laughing with her friends, but looking at me with icicle eyes- I almost gagged on what I said. †(Beeby and Lima 1) He is now taking more accountability for his actions. Steven is realizing he should have never made a commitment when he was not ready because it hurt him more in the end. He started out making immature decisions and he made progress through the story by taking more responsibility for the actions he chooses. In addition to that, Steven takes more steps to becoming more of an adult. Steven gets the opportunity to understand how to respect others feelings. His girlfriend was expressing how their relationship was not perfect. â€Å"the romance did have its weaknesses, Steven would sometimes break our date†(Beeby and Lima 1) said his girlfriend. Steven did not take into consideration that maybe his girlfriend was really looking forward to their date. He did not think about her feelings. More into the story, Steven’s girlfriend explained how he has changed. sometimes he brought me flowers and wrote me poems† (Beeby and Lima 1) his girlfriend expressed. He is now realizing he should respect his girlfriend’s feelings and he should make her feel special. By this time he is not just thinking about himself. Steven makes a transition from acting very immature to more mature, and is now actually treating his girlfriend with respect. With the ability to respect others, he f inds out who he wants to become. Steven has more of an understanding of himself. He is analyzing what he thinks a poet should do about love. love means commitment and real poets don’t commit themselves, not to no body. †(Beeby and Lima 1) Steven is relating himself to what a poet would do, not to what he thinks is best for himself. He also experiences a wide awakening of who he thought he was. Steven was questioning if he was really a poet. â€Å"but I should have known I wasn’t a poet because I was afraid of how far we could go on the name of poetry. †(Beeby and Lima 1) Steven made an adult decision realizing he was not a poet because he actually loved her. He finally understood that you can be your own version of a poet and do not have to follow all the guidelines of a poet. Steven takes a huge step from being a child to becoming an adult. He experienced the aftermath of a break up. Steven also now knows how to consider other people’s feelings not just his own. He realizes who he wants to become; Steven took some time to figure out his faults, but in the end it all worked out to better him. The only question is will he stay an adolescences or make his way back to becoming more of a child?