Wednesday, July 31, 2019

Two Vastly Difrent Words Two Vastley Diffrent Meanings

Two vastly different words with Two vastly different meanings Ignorance and Stupidity are words that are commonly used out of context and either word is often mistakenly used in the others rightful place. Ignorance is commonly mistaken for stupidity in society. Just as commonly, stupidity can be denied and termed as ignorance. To say that these words are one in the same is ignorance in and of its self, that is if one is uninformed of the true definitions of either word. When one has been informed of the correct definition and still uses the term out of context well, that is an example of stupidity. For many reasons these two words have two vastly different meanings which can be easily contrasted with some thought. Ignorance can be defined as having no knowledge or information in ones mind of a specific subject. Ignorance is the result of a lack of education, one can not be expected to have the correct response when exposed to something they are uneducated on. For example, a male student walks into his college math class half an hour late. He sits down and is then handed a quiz on calculus and instructed to finish the quiz in fifteen minutes. He hasn’t read any of the chapter on calculus assigned last week and he has missed the lecture on calculus that his teacher gave at the beginning of the class. This is the first he has heard of calculus and he has had no prior experience in the subject. Therefore the student was ignorant on the subject. He failed the quiz because of his ignorance. The student may have retained the information given on calculus well and aced the test had he obtained that information. Ignorance is also a term used to describe being unaware of something. Such as, when a good friend of mine bill ate crab legs for the first time he was ignorant to the fact that he was allergic to shellfish. His throat itched then swelled and he was quickly rushed to the E. R that night. Know he is no longer ignorant to that fact. Other words to describe ignorance are uninformed, unlearned, uneducated and unwitting . Stupidity can be defined as a lack of intelligence. When one lacks intelligence they lack the ability to think and learn. They also lack the ability to apply information that they have been given. Stupidity can also be described as a lack of perception, not using the senses or lacking common sense. When one does not think logically or chooses not to make practical judgments based on the experience they already posses that is stupidity. Stupidity is expressed in irrational or thoughtless behavior. Such as the story given earlier of the male college student who didn’t study he showed an example of ignorance by having no knowledge of the subject he was being quizzed on. He also showed an example of stupidity. He would not have been ignorant had he studied. He was not ignorant to the fact that he had a chapter to read or of the time he was to be in class he just stupidly chose not to read the chapter just as he stupidly chose to be late for class. Because of this thoughtless, stupid behavior he was left ignorant. Other words to describe stupidity are foolish, senseless, witless and idiotic. Ignorance is a term used to describe ones unknowing, as to say he is ignorant of a subject not because he is stupid but because he lacks knowledge of that subject. It is a term that should never be used to insult and just as well should never be taken that way. There is no one person who possess no ignorance at all, we all have things we are ignorant of. Benjamin Franklin once said â€Å" being ignorant is not so much a shame as being unwilling to learn†. One can attempt to dispel there ignorance by seeking out and the proper Knowledge and education. Once they obtain the proper information and knowledge then they are no longer ignorant of the subject. Stupidity is a term used as an insult and can usually be correctly perceived as one. When a person uses the term stupid to describe another they are usually placing the blame of thoughtlessness or another negative trait such as foolishness on that other person. Fools rush in where fools been before† Unknown. While ignorance can be dispelled as quickly as one can learn, stupidity seems to be a pattern or bad habit that even the most educated people tend to exhibit. It can take a lot longer for some to get rid of there stupidity then for others to gain knowledge and rid of there ignorance. These terms have been defined enough to show why they are two vastly different words wi th two vastly different meanings and are expected to be used wisely.

Tuesday, July 30, 2019

Founding Fathers Of Sociology

Sociology can be defined as the scientific study of society and human behavior. It tries to acquire knowledge about society, and about how the humans making up these societies interact with each other. Auguste Comte was the first true father of sociology. He was the person who coined the term â€Å"sociology†. Other sociologist who can also be called the founding fathers of sociology include Weber, Marx, Engels and Durkheim. In this essay I will be looking at where these sociologists came from and the theories they came up with.Auguste Comte was a French social thinker and was the first person who coined the term â€Å"sociology†. He wanted to establish a science of society as a new discipline. He modeled sociological study around natural science and wanted to discover the laws of society. He aimed to study society through Social statics, which is the study of order and stability and Social dynamics, which is the study of social change. He wants to answer the question o f how one plans for change. One should think about in advance where you want to go and how to get there from here.One should be future oriented and goal oriented, achieving goals by optimal means. Social planning is designed to enhance social functioning by either changing the structural relations among people or providing a tangible support than enables an individual to cope with or overcome a social problem. It is necessary to plan in order to reduce uncertainty and enhance accountability. It also increases the potential for participation. Comte says that the process of change involves three stages; The future state, where the change has occurred.The present state, this is where we are in relation to where we want to get to and it is the period of planning and initiating the desired change. The last stage is the transition state, and asks the question of how we get from where we are to where we want to be. Comte’s idea for sociological study was based on the concept that so cieties evolve through three intellectual stages. These are the Theological stage, which involves the belief in the supernatural, the metaphysical stage, which is the transition stage and the positivistic stage which involves scientific thinking.After the third stage is reached, true understanding of the working of society becomes possible. Social disorder such as crime would be diminished and eventually stop when society’s cogs and wheels are established. Another founding father of sociology is Max Weber. He was a German sociologist. His central focus was on the process of rationalization. He has a middle class protestant background. He defined sociology as the scientific study of human action. Social action is human conduct oriented toward others and based on social meaning given to that conduct.It involves other human beings and is based on intentions and ideas of individuals. It must understand the subjective meaning behind people’s actions and this makes sociology fundamentally different from natural sciences. Weber calls such understanding â€Å"verstehen†, which is the investigator’s attempt to understand human action by viewing the cause of the action through the actor’s eyes rather than his own. The theory became known as Interactionism. Weber focuses on social actions of individuals and says that society cannot think or act, only individuals can.There is an opposition to positivism. The subject matter of sociology is unique and it cannot be studied with principles/methods of natural sciences. It requires verstehen. Another founding father is Karl Marx. He was born on May 5, 1818 in the German city of Trier. His family was Jewish, but he later converted to Protestantism in 1824 in order to avoid anti-Semitic laws and persecution. Marx was forced to go to London in 1849, but he did not work alone. He had help of Friedrich Engels who had on his own developed a very similar theory of economic determinism.Although the id eas later acquired the term â€Å"Marxism†, it must always be remembered that Marx did not come up with them entirely on his own. Engels was also important for Marx in a financial sense. Poverty weighed heavily on Marx and his family. Karl Marx focuses on conflict and inequality. Conflict is a fact of life in society. There is conflict between various social groups derived from a conflict of interest which brings inequality. Power and resources are unevenly distributed in society. Such inequality is maintained by naked coercion or manipulation of norms and values. Marx was interested in a particular type of conflict.This was class conflict or conflict between classes. He says, â€Å" The history of all hitherto existing society is the history of class struggle†. Production is a key concept in Marxism. It is the production of material goods and services in society and is the most important human activity. Production is carried out in the context of cooperation between h uman beings. Out of productive activity, human beings organize themselves, establish relations with each other and form a society. Thus change through improves technology of production also implies a change in social relations.Processes of production have given rise to inequality between human beings because production has been carried out by means of exploitation of the majority of the population by a few. Classes are social units based on their relation to the means of production. The means used to produce goods and services example: land, factories, tools, machinery, raw materials etc. The dominant class are the minority who own means of production and the subordinate class are the majority who don’t. Production is carried out by exploitation of one class by the other and this leads to class conflict.Bourgeoisie vs Proletariat. All societies go through stages in history and are destined to reach the communist stage. The communist mode only is not based on class exploitatio n. Communism realizes classless society where no one dominates one another. Marx’s dichotomy of society. Society is divided into two levels: The base/infrastructure (economic) and the superstructure (non-economic sphere). According to Marx the superstructure plays significant role in society. Example: the state. Common view: The state is neutral institution representing the interest of all citizens and society as a whole.Marx’s view: the executive of the modern state is but a committee for managing the common affairs of the whole â€Å"bourgeoisie† (the owners of production). Example: The state. The interest of the state coincide with those of the dominant class. Apparatuses of the state are used to protect capitalists’ interests against worker’s rebellion. There is a contrast with Durkheim. Durkheim says that norms and values of society produce social integration and harmony (social solidarity). Marx says that these norms and values are ideologies which suppress people’s opposition and resistance (which may look like harmony or consensus to Durkheim). Founding Fathers of Sociology Sociology can be defined as the scientific study of society and human behavior. It tries to acquire knowledge about society, and about how the humans making up these societies interact with each other. Auguste Comte was the first true father of sociology. He was the person who coined the term â€Å"sociology†. Other sociologist who can also be called the founding fathers of sociology include Weber, Marx, Engels and Durkheim. In this essay I will be looking at where these sociologists came from and the theories they came up with.Auguste Comte was a French social thinker and was the first person who coined the term â€Å"sociology†. He wanted to establish a science of society as a new discipline. He modeled sociological study around natural science and wanted to discover the laws of society. He aimed to study society through Social statics, which is the study of order and stability and Social dynamics, which is the study of social change. He wants to answer the question o f how one plans for change. One should think about in advance where you want to go and how to get there from here.One should be future oriented and goal oriented, achieving goals by optimal means. Social planning is designed to enhance social functioning by either changing the structural relations among people or providing a tangible support than enables an individual to cope with or overcome a social problem. It is necessary to plan in order to reduce uncertainty and enhance accountability. It also increases the potential for participation. Comte says that the process of change involves three stages; The future state, where the change has occurred.The present state, this is where we are in relation to where we want to get to and it is the period of planning and initiating the desired change. The last stage is the transition state, and asks the question of how we get from where we are to where we want to be. Comte’s idea for sociological study was based on the concept that so cieties evolve through three intellectual stages. These are the Theological stage, which involves the belief in the supernatural, the metaphysical stage, which is the transition stage and the positivistic stage which involves scientific thinking.After the third stage is reached, true understanding of the working of society becomes possible. Social disorder such as crime would be diminished and eventually stop when society’s cogs and wheels are established. Another founding father of sociology is Max Weber. He was a German sociologist. His central focus was on the process of rationalization. He has a middle class protestant background. He defined sociology as the scientific study of human action. Social action is human conduct oriented toward others and based on social meaning given to that conduct.It involves other human beings and is based on intentions and ideas of individuals. It must understand the subjective meaning behind people’s actions and this makes sociology fundamentally different from natural sciences. Weber calls such understanding â€Å"verstehen†, which is the investigator’s attempt to understand human action by viewing the cause of the action through the actor’s eyes rather than his own. The theory became known as Interactionism. Weber focuses on social actions of individuals and says that society cannot think or act, only individuals can.There is an opposition to positivism. The subject matter of sociology is unique and it cannot be studied with principles/methods of natural sciences. It requires verstehen. Another founding father is Karl Marx. He was born on May 5, 1818 in the German city of Trier. His family was Jewish, but he later converted to Protestantism in 1824 in order to avoid anti-Semitic laws and persecution. Marx was forced to go to London in 1849, but he did not work alone. He had help of Friedrich Engels who had on his own developed a very similar theory of economic determinism.Although the id eas later acquired the term â€Å"Marxism†, it must always be remembered that Marx did not come up with them entirely on his own. Engels was also important for Marx in a financial sense. Poverty weighed heavily on Marx and his family. Karl Marx focuses on conflict and inequality. Conflict is a fact of life in society. There is conflict between various social groups derived from a conflict of interest which brings inequality. Power and resources are unevenly distributed in society. Such inequality is maintained by naked coercion or manipulation of norms and values. Marx was interested in a particular type of conflict.This was class conflict or conflict between classes. He says, â€Å" The history of all hitherto existing society is the history of class struggle†. Production is a key concept in Marxism. It is the production of material goods and services in society and is the most important human activity. Production is carried out in the context of cooperation between h uman beings. Out of productive activity, human beings organize themselves, establish relations with each other and form a society. Thus change through improves technology of production also implies a change in social relations.Processes of production have given rise to inequality between human beings because production has been carried out by means of exploitation of the majority of the population by a few. Classes are social units based on their relation to the means of production. The means used to produce goods and services example: land, factories, tools, machinery, raw materials etc. The dominant class are the minority who own means of production and the subordinate class are the majority who don’t. Production is carried out by exploitation of one class by the other and this leads to class conflict.Bourgeoisie vs Proletariat. All societies go through stages in history and are destined to reach the communist stage. The communist mode only is not based on class exploitatio n. Communism realizes classless society where no one dominates one another. Marx’s dichotomy of society. Society is divided into two levels: The base/infrastructure (economic) and the superstructure (non-economic sphere). According to Marx the superstructure plays significant role in society. Example: the state. Common view: The state is neutral institution representing the interest of all citizens and society as a whole.Marx’s view: the executive of the modern state is but a committee for managing the common affairs of the whole â€Å"bourgeoisie† (the owners of production). Example: The state. The interest of the state coincide with those of the dominant class. Apparatuses of the state are used to protect capitalists’ interests against worker’s rebellion. There is a contrast with Durkheim. Durkheim says that norms and values of society produce social integration and harmony (social solidarity). Marx says that these norms and values are ideologies which suppress people’s opposition and resistance (which may look like harmony or consensus to Durkheim).

Dramaturgical Analysis Essay

In life we all act differently depending on who we are with and the situation at hand. In almost every situation we act in a different way, with our friends in public, with our family members at home, with coworkers, and most importantly our boss in a work environment. Depending on who we are with you could say our personality changes. As humans we know how to act in every situation, at work you would dress more formal, whereas going out with a group of friends you would dress more causal. Along with our looks changing, we also change our behaviors, the way we talk, sit, the tone of your voice, etc. At a doctor’s office, the receptionist must play a defined role. She has to act polite, caring, professional, and must remain discreet about her patient’s information and conditions. The receptionist is 27 year old Hispanic woman, she works at the doctor’s office from 8 am to 5 pm. She is acting in a professional manner, well maintained, dressed in scrubs with closed toe shoes. I would describe the receptionist as upper middle class social status. The receptionist sits at her front desk in the middle of the doctor’s office and greets all the patients. She is in charge of all the paper work, appointments, and all the patient’s charts. While analyzing the receptionist in her work environment I noticed many front stage behaviors and backstage behaviors (concepts used to describe the relationship between the roles actors play at a given moment and the various audiences these roles involve). For example, she would talk to almost everyone with respect, especially her patients and boss. Then when no one was around, I noticed that she was very rude to her coworkers. By looking at her coworkers facial expressions it was obvious to see they didn’t like the receptionist. When the boss was around the receptionist would act very professional and caring towards everyone. Right when he would leave the room she would start doing different things that I’m sure wasn’t involved with her job. I noticed she was on her cell phone a lot, texting and talking in a very rude way to people and mostly about her personal problems, even though she was supposed to be working and taking care of her patients. When the boss would walk into the room she would quickly hide her cell phone and act as if she is working. The receptionist never noticed that I was observing her every move therefore I was able to see her front stage and backstage behavior. We all have these behaviors, but I was shocked to see that this receptionist showed both her personality sides at a professional working environment. Using an approach, like dramaturgy, helped me to analyze social interaction in a more interesting and complex way. If I had been just simply observing the receptionist I would have never payed attention to her backstage behavior. By using a dramaturgical approach I noticed how her personality would change depending on if the boss was in the room or not. This approach provides us with a deeper understanding on how humans think and act. In life most of us only show our good side to people especially at work, therefore I was surprised to have been able to see the receptionist rude side. I think if the receptionist had known that I was observing her she would have acted only in front stage behavior. This assignment was very beneficial to me it helped me to take a deeper look at what microsociologists do. Now I have a different perspective on how people act. I knew that humans act differently in public than they do in private but I had never seen it happen in real life which made this assignment so much more interesting to me. I think it is really important to know how to act in every situation. Some people do not understand that a work environment needs to remain professional whereas going out with your friends can be more social and personal. Overall I enjoyed this assignment because it opened up my mind to bigger ideas. It made me think if a person can act like this in work environment imagine how they act with friends, people they like, and just imagine seeing people they don’t like in public. It made me think that if the receptionist wasn’t scared to talk rudely to her coworkers in the office imagine how she would act if she saw them in public. From now on I think I will always be using the dramaturgical approach because it provides us with a richer meaning and deeper understanding of human behavior.

Monday, July 29, 2019

My Personal Capital Essay Example | Topics and Well Written Essays - 750 words

My Personal Capital - Essay Example Reading has helped me in so many ways. My good reading habits help me easily understand and consequently recall what has bean read. Having gone through a number of projects involving research, I could ably help the team go through a company’s records and database to be able to arrive at an honest description of its historical data, present financial position as well as its potentials for growth. Writing skills, on the other hand, which benefits a writer professionally and personally, is one of a few other technical capabilities that I possess (Nordquist 2008). It being one of my passions, my ability to write effective essays, reports and other forms of correspondence vis-Ã  -vis grammar and composition will undoubtedly help the team come up with a very good written output. My knowledge in the use of software for word processing, spreadsheets and other financial applications, could significantly help the team come up with an honest, comprehensive and workable business plan for the company. Likewise, my experience in communicating, handling and utilizing e-mail as a method for seeking advice from mentors, could make the writing job easier. My modest technical know-how in troubleshooting simple problems on computer systems and application may also be of great help to the team. Moreover, my background in the preparation of financial reports, such as income statements and balance sheets and cash flow statements will make computing for the company’s financial less difficult.

Sunday, July 28, 2019

Should gay marriage be legalized Research Paper

Should gay marriage be legalized - Research Paper Example Should gay marriage be legalized? The United States constitution guarantees all citizens equal rights regardless of gender, sex, religion, race or sexual orientation and therefore, denying people of same-sex the right to get married is a violation of the constitution. As stipulated in the constitution, everyone has a right to liberty, freedom and equality provided in the exercise of such rights one does not cause damage or harm to other people. The gay people in engaging in marriage are only exercising the right and their behavior does not cause harm to anybody. Despite the fundamental principles not only allowing but also requiring legalization of same-sex marriage, some people still insist that same-sex couples should not be accorded equal right to marry. They forget that gays are human beings just like other people such as the heterosexuals and as such should be treated equally. The democrats and republicans often advocate equal rights for gay and lesbians such as the right to proper housing, government benefits, employment and legal protections. However, when it comes to marriage they strongly oppose such an idea. The democrats even go ahead to support the inclusion of gay and lesbian families in the life of our nation and seek equal responsibility. Opposing the right to marry is thus a contradiction to the party’s commitment to legal equality and non discrimination. It makes no sense to support good cause for the gay and their families but refuse to acknowledge their right to marry and to live happily.

Saturday, July 27, 2019

MGMT436 U4 DB2 Research Paper Example | Topics and Well Written Essays - 250 words

MGMT436 U4 DB2 - Research Paper Example These structures are mandatory for an organization to retain its market relevance. Additionally, technology provides unique and complex opportunities to change. From the changes experienced in the modern business market, it is an obvious assumption that technology has been a positive influence in organizational change. The market has grown significantly as practices have become more relevant and competitive. This has increased the quality of goods and services available in the market. Most software used in organizational change is based on their ability to develop effective ways to improve business structures. For instance, an organization requires software that determines the most effective marketing structure in regards to cost and consumer preference. In addition, an organization may develop its IT systems to increase their business connectivity (Carnaghan & Klassen, 2010). Technology has been fully responsible for the growth of the modern corporate world. This trend will not change as more companies are embracing the need to consider technology as a tool for change. In addition, the positive influence on companies will be more exceptional as more ways to make technology more influential have been developed (Carnaghan & Klassen,

Friday, July 26, 2019

Integrated Marketing Strategy Essay Example | Topics and Well Written Essays - 3500 words

Integrated Marketing Strategy - Essay Example Finally in the conclusion we will take a look at the suggested strategy that Apple should take to overcome its deficiency. Main Body Here we will take a look at all the Marketing Mix of Apple iPad and consequently whether the strategies followed by Apple with respect to the four Ps are effective or not. Price Apple has always used a marketing strategy where it wants their products to have a mass appeal. It wants to gather the business customers and the entrainment customers both for their product. Price is perhaps the most important factor among the four Ps of marketing. It is important form the point of view of revenue which the company earns. We need to understand that as a product moves along its product life cycle the pricing strategy adopted by the company usually changes. Of the many strategies which a company can adopt, â€Å"price skimming† is one of them. Here the initial price of the product is set high to targeted creamy segment of the market to skim revenues from t he market layer-by-layer. Apple gas used this strategy of pricing for its iPad product. The process of Price skimming involves charging relatively high price for the product for a short period of time when a new, innovative product or new improved version of it is launched in the market. The main objective of the price skimming strategy is to â€Å"skim† off the customers who are willing to pay more for owning a product sooner than the others (Huimin, and Hernandez, 2011, p. 390). Later when the demand falls a little then the prices are lowered and the late adopters then accept the product. Figure 1: Product Life cycle. Generic Graphic The success of this pricing strategy is dependent on the inelasticity of demand for the product by the market segment or by the market as a whole. Such... This report stresses that due to brand loyalty which Apple had acquired over the years, the company has been able to take advantage of the market opportunities and adapt to the environmental threats. Apple is successful on two of the marketing mix i.e. price, product. Apple still has to work on its other two marketing mix which are promotion and distribution. This paper makes a conclusion that people are more interested in things which really matters to them. This means that Apple should target the audiences based on their specific needs. Apple shouldn’t create a one-size fits all app. It is just filled with loads of irrelevant content. Instead Apple should plan to segment on the basis of their needs, interest and wants. Apple invests in the right user experience. It is of no use to create fantastic content, if the users have bad application experience. The author of the paper talks that With the launch of iPad on 2010, the company made use of good use of its core competency i.e. innovation. They have been able to turn ordinary into something beautiful. PC fans wanted something which is as powerful as a PC but portable. Apple understood the need and created iPad with new features to meet their increasing demand. They can offer accessories along with iPad like adapters, chargers, cables, cases etc. Apple have made iPad a household n ame so that they everyone knows about the product. On an overall basis Apple has achieved a successful integrated marketing strategy with still rooms for improvement as discussed above.

Thursday, July 25, 2019

MSc computer system security 'Practical Windows Security' Essay

MSc computer system security 'Practical Windows Security' - Essay Example The main types of attacks include Denial of Service, Trojan Horse, viruses, worms and Logic Bombs. The first virus that operated on Windows 2000 was detected on 13th January 2000 (Wong 2000). It is known as the Win2000.Install or W2K.Installer virus. Although the virus could not do much damage to the new windows but it provided attackers with the concept to identify the vulnerabilities of the Windows and to invade into the systems with improved attacks in the future. A definition of security vulnerability can be regarded as the preliminary filter that is applicable to various issues. A security vulnerability can be considered as, â€Å"a flaw in a product that makes it infeasible – even when using the product properly —to prevent an attacker from usurping privileges on the user's system, regulating its operation, compromising data on it, or assuming ungranted trust† (Microsoft 2011). Microsoft publishes security bulletins when a specific security issue fulfills t he criteria for the standard security definition. However this does not follow that no action is taken by Microsoft. For instance if Microsoft finds a bug that does not raise any security vulnerability, the security team nevertheless gives it importance and tries to counter it. In this case the Microsoft team does not come up with a patch or publish security bulletin; rather the team would include the solution in the product that it is going to release in the future. On the other hand, if a certain issue does fall on the criteria for security vulnerability definition, the security team first tries to establish whether the issue has breached the security policy of the product. When a product is made there is an assortment of instructions that are devised to inform the costumer about how a particular product is to be used as well as the promises that it delivers regarding the security it provides. What is CVE? Common vulnerabilities and exposures (CVE) brings together a list of common security vulnerabilities and exposures which are publically accessible. Common identifiers of CVE play a role in the exchange of data between security products and put forth a base line index point for the purpose of analyzing coverage of various products such as tools and services (CVE 2011). When Microsoft comes out with a patch for a security problem, it aims to fix whatever security vulnerability the problem has exposed. The purpose of the new patches is to protect the costumer from security threats. For example MS03-026 was released on July 16, 2003 to correct a security vulnerability in a Windows Distributed Component Object Model (DCOM) Remote Procedure Call (RPC) interface. After Microsoft had introduced this bulletin Microsoft was informed that there are yet more ports available that can be abused for the purpose of this vulnerability. Later on Microsoft added information regarding these extra ports in the security bulletin; particularly this has been integrated in the mit igating factors as well as the Workaround section in the bulletin. However later additions were made to it like the MS03-039 with an updated scanning tool which provided further advancements in the patches given in the older version as well as the original scanning tool. The use of remote procedure call The windows operating system makes use of a certain protocol which is referred as the Remote

Wednesday, July 24, 2019

H5N1 Avian virus Essay Example | Topics and Well Written Essays - 1750 words

H5N1 Avian virus - Essay Example Moreover, this virus also has the ability to undergo antigenic drifts and antigenic shifts. The emergence of new strains of Avian influenza virus is of major public health concern because of the impending threat of a pandemic that it poses. Currently, the virus does not possess the ability of being transmitted amongst humans and it has been postulated that one this quality is acquired it would lead to potentially devastating consequences in the form of a pandemic. Till date, no vaccine for the prevention of H5N1 infection amongst humans exists. Moreover, the treatment options for infection are also limited viz. oseltamivir and zanamivir. Therefore, further research needs to be undertaken in order to develop new vaccines against these organisms and better medications to combat the infection if once contracted. Moreover, vigilant surveillance of outbreaks and epidemics of bird flu is also imperative. Avian Influenza or Bird Flu, as it commonly referred to, is an infection which is caused by the H5N1 virus. The natural hosts of this virus are wild birds, in particular water fowls, who carry these viruses in their intestines while themselves remaining asymptomatic (Auewaraku 404). ... Recently, H5N1 virus is not only leading to an increasing number of epizootics, but has also been implicated in several epidemics in humans. The mode of transmission of this virus has been described as being feco-oral amongst birds, whereas humans contract the disease via contact with airborne particles from infected poultry or while contact with the poultry or their fecal matter e.g. during food preparation (Fleming 1066). The first human infection with H5N1 was witnessed in 1997 in Hong Kong, as a result of which six out of the eighteen people affected died. Eversince, several similar outbreaks of human infection have been observed in various regions of the world and this has become an important public health concern (Auewaraku 404). At present, there are two different clades of the H5N1 which have been identified to be circulating amongst poultry. Amongst these, three subgroups from the clade 2 have been shown to infect humans viz. subclades 2.1, 2.2, and 2.3 Centers for Disease C ontrol and Prevention). Infections in humans appear on a spectrum, ranging in variety and severity from relatively milder infections such as conjunctivitis to potentially serious ones such as pneumonia and can even lead to death (Centers for Disease Control and Prevention). The increasing outbreaks of human infection with H5N1 are of prime concern as this organism is highly pathogenic. It has a unique ability to infect humans and this poses a threat to the human race as this virus might have the potential to evolve into a form which is transmissible from person to person (Auewaraku 404). In the past, the world has witnessed several outbreaks of influenza, causing significant morbidity and mortality. If a new strain of this virulent organism

Competitive Advantage Case Study Example | Topics and Well Written Essays - 2000 words

Competitive Advantage - Case Study Example This paper will compare and contrast the competitive advantages of renowned engine manufacturer Rolls-Royce Plc (Rolls-Royce) and retail store giant Tesco Plc (Tesco). Traditionally, the competitive advantage business organizations can be fully identified by conducting a value chain analysis. However, recognizing the numerous changes in the businesses' market environment, this paper will also complement value chain analysis with a method introduced by Shawn Cartwright, the value web analysis. It should be noted that this tool brings into consideration the analysis of competitive advantage of dotcoms or firms whose operations are conducted online or whose brick and mortar strategies are complemented by online presence (Cartwright and Oliver 2000). This report will be organized as follows. The first section will take a look at the operations of Rolls-Royce Plc. A brief organizational profile will be presented together with the company's identified core competencies. The paper will then evaluate Rolls-Royce's competitive advantage in light of the value chain and the value web analysis. The second section will also evaluate Tesco Plc in the same manner. This paper will conclude with a comparison and contrast of the previously identified competitive advantages. Rolls-Royce is currently the world's second largest airline engine manufacturer beh... Aside from aero-engine, the company is also involved in other industries like defence, marine, and energy markets. The business organization traces its origin in 1971 and was founded by Henry Royce and CS Rolls. With its humble beginning, it has now ascended in the global business marketplace with its cutting edge technology and diverse product offerings. The company is not just a provider of high-quality products but also offers unmatched after sales service to its clients. Its market base spans over 120 countries around the globe, becoming a significant supplier of engine to important customers worldwide. Also, in order to complement its product, Rolls-Royce has established online presence through Aeromanager in offering aftermarket services. 2.1 Core Competencies The success of Rolls-Royce in the global aero-engine industry is attributed to its core competencies. A core competence, according to Prahalad and Hamel (1990) is something that a firm can do well and meet three specific conditions: "it provides customer benefit; it is hard for competitors to imitate; and it can be leveraged widely to many products and market." A company's core competencies are the capabilities which the company needs in order to build a competitive advantage. In the case of Rolls-Royce, its core competency is apparently in the production of engine. It should be noted that the expertise of the business organization in the creation of aero-engine is applied to a wide range of industries where it operates such as defence, marine, and energy. With the company's expertise in the production of a single product engine, Rolls-Royce, with its technological is able to transform this engine into one which can be used in other industries. It should be noted that all the end

Tuesday, July 23, 2019

Personal Philosophy (Mission Statement) Essay Example | Topics and Well Written Essays - 1000 words

Personal Philosophy (Mission Statement) - Essay Example Amidst all frustrations in life, optimism is essential. Everything can be achieved if we remain positive. With sufficient determination, we can climb the highest of mountains. That cannot be achieved in the absence of faith. Philosopher Henry David Thoreau once said, "If one advances confidently in the direction of his dreams, and endeavors to live the life which he has imagined, he will meet with success unexpected in common hours." We cannot afford to lose hope and faith. Hope and faith may only seem a simple word but they are the tower of strength in times of anxiety and despair. My spirituality remains extremely important in my life; it is the backbone of my inner self. I am basically a simple person who appreciates the goodness of life. One of the things I enjoy is watching movies. Films are both entertaining and educating. Whether captured from actual accounts or just purely fictional fragments, they depict reality and display the expanse of man's imagination. I have always been amazed at man's cleverness in producing movies. I constantly look forward to meeting new people. It gives me a sense of excitement. Perhaps it's because this is a very big world and it is probably impossible to meet all the six billion plus people inhabiting earth. I always find something interesting in the diversity of man's character. And I have proven that whatever color we may be, beyond the variety of race and culture, beneath the skin we are all the same; we are brothers and sisters. Whenever I feel exhausted from everyday routines, I go shopping. When it comes to relaxation, shopping is indeed a pleasant diversion. I also found out that until now I am fond of exploring new things. I guess that the curious little child in me never grew up. Many things capture my interest and I don't stop until I learn about them and then put them to good use. There are quite a few things I wish to change about myself. Some say that I have a little attitude and that I easily get angry. Perhaps that is because I am far from my country and that I miss my family and friends very much. Sometimes I also easily get impatient. I get annoyed when things get delayed and not done right away. Personal, Academic, and Career Goals Coming from a small family of four, it is my dream to have a large family. I intend to stay with my husband for the rest of my life and be able to provide my kids a happy life and good education. I also want to stay close with my parents and only brother. I aspire to have a 4.0 GPA and get my bachelor degree sooner than expected and start my MBA soon after. I believe that I would need all the skills I can acquire to competently manage my mother's business. I plan to make many changes and practice the theories I have learned. Strengths and Weaknesses I am happily married and have just recently given birth to a healthy baby boy. Even from the womb, he is my inspiration. He is definitely one of my treasures in this life. My son embodies the love that has flourished between me and my husband. My son provides in me the strength to desire a better future for my family. I am not a very patient person but having a child gradually remedies that. Caring for an infant requires patience and my love for my

Monday, July 22, 2019

Analysis of Durkheims The Elementary Forms of Religious Essay Example for Free

Analysis of Durkheims The Elementary Forms of Religious Essay As described in Durkheim’s The Elementary Forms of Religious Life, a totem is apparent in every society. A totem is a symbolic figure of some creature, being, or thing that represents the sanctity and principle of god. Essentially, a totem is a profane, ordinary object that has been deemed by society to have some holy, sacred characteristics. With this being said, the object itself does not have any holy or sacred qualities; rather it is merely the representation of the totem that holds these characteristics. For example, if a society’s totem is a turtle then an actual turtle would merely be a turtle, but when the turtle is presented as a totemic emblem then this symbolic representation of the turtle is sacred. Durkheim argues that, because the totem is a socially constructed representation of god then the totem itself represents society as well. Durkheim makes this assumption evidently clear by stating that â€Å"the god of the clan, the totemic principle, can therefore be nothing else than the clan itself, personified and represented to the imagination under the visible form of the animal or vegetable which serves as totem. From this, one can conclude that Durkheim viewed the worship of totem as worshipping society. Durkheim goes on to make the argument that god and society are â€Å"equivalent. † God is an outside, figurative force that holds the people worshiping it to certain manners and actions. The act of worshipping said god or totem is an indication that the follow ers, believers, or worshipers are dependent upon this force to determine the actions they partake in, the behaviors they exhibit and so on. God and religion exist in order to keep people â€Å"in line† via ritualized activities and setting moral and ethical guidelines that people abide by. Society, in and of itself, possesses the same qualities. The norms and values of a society, which for the most part have been incorporated into the moral and ethical guidelines laid out in the society’s religion, are followed whether or not they are in line with the individuals intrinsic nature. Because of this characteristic, society is itself an outside force that people are dependent on, whether or not they acknowledge it. Lastly, Durkheim acknowledges that these ritualized activities and shared moral values foster the social solidarity and cohesion of society. By partaking in shared activities, whether it be the Islamic ritual of praying to Allah multiple times a day, the American tradition of singing of the national anthem before the first pitch of a baseball game, or the Catholic ritual of aking communion, we are acknowledging that we belong to a group or society. Common activities help establish what Durkheim refers to as â€Å"collective consciousness†, that is a specified set of beliefs and values that are common to members of a given society or group. Praying to the same god or praising the same society, which according to Durkheim are one in the same, encourages the development and maintenance of a collectively held set of morals, values, ethics, and belief s.

Sunday, July 21, 2019

Application Level Gateway Information Technology Essay

Application Level Gateway Information Technology Essay This document provides a clear overview of the function of network firewalls in an organization and the authentication methods that they support. The reason why a firewall is needed is given and the benefits and drawbacks of using a firewall, the components of other devices that could be used in place of firewalls are introduced along with the purpose of using them. Finally typical activities are described along with implementation of the firewalls. INTRODUCTION. With the rapid development of the world, the business, marketing, science, engineering even writers and astrologists are intend to use the technology. Therefore we could say that the technology has become the main media among all these fields. YES its true that is quite easy to work with when you get familiar with it. But still we got to know that there are plenty of sand traps in the technology. By the end of this document we will find out few of them and also we will be able to get an in detailed expanded knowledge about them. As we talked earlier, in every field the main media or the attribute is technology. Most of these fields use technology to gather, store, maintain and develop their data. At this point this technology they use become more critical as these data is so much important for the relative company or the organisation. As the world runs faster and its businesses run faster, people have become so much competitive. So it is so important to protect their own data among themselves to compete stronger. So that these organisations aim a secured system for their organisation. In this case FIREWALE plays a major rall. In order to prevent or secure their own data from the outside world, they define their own network that they call a secured network. But networks cannot be simply defined as secured or unsecured. Some organisations store their valuable data in a database and they prevent outsiders from accessing their data or computers from the outside networks. At the same time some organisations need to make information or data available outsiders. But they have some conditions or set of rules. For example these outsiders cannot edit or modify these data. They only can read. We call this READ/WRITE permission. These networks allowed arbitrary access to its data and they use some sort of a mechanism to prevent the original data. This mechanism we call FIREWALE. We all know that with the widespread of the internet along with the World Wide Web (WWW), electronic mail, telnet and file transfer protocol (FTP) each and every person in every corner of the world got the opportunity to communicate with one another in a flash. Sometimes these commutation needs protection. To provide this required protection we use FIREWALES. Since the internet is inherently an insecure network it is so much useful to utilize this kind of method. Sometimes some organisations use their own customised methods since they have their own unique networks. But still the functionalities are the same. BASIC FIREWALL OPERATION and how it works? Figure 1.0 Source: http://www.irislogic.com/Firewall_WP.pdf FIREWALL is a system or a device that enforces a unique access control policy between networks as well as it monitors all data transmission internally and externally of a network. But the main purpose is to keep track of other unauthorized accesses. Also we can limit communication by the direction of the flow, IP address as well as ports. But if we have the access to the firewall, we can simply configure it and enable whatever ports, protocols and computers we want. Also FIREWALLs helps to control the flow of data. For example, it can control the traffic of the TCP layer. So that we can manage the usage of data as well. We can easily set a certain criteria in a firewall. Then it allows all that level of traffic only through the gate or it may deny all traffic unless it meets certain criteria. FIREWALL ARCHITECTURE Firewalls are helping in many ways to structure and protect our network system by introducing the firewall architecture. Basically there are three types of Firewalls Arictectures. Application layer firewalls Dual-Homed Host Figure 1.1 Source: http://www.interhack.net/pubs/fwfaq/firewalls-faq.html Systems with more than one network interface without functioning as routers. In other words where the interface that connected to logically and physically separate network segments. Ex: Application layer firewall. Network layer firewalls Screened Host Figure1.2 Source: http://www.interhack.net/pubs/fwfaq/firewalls-faq.html In screened host architecture, there is no boundary net, no interior router, and often no bastion host. Obviously, there is a host that the outside world talks to, but this host is often not dedicated exclusively to that task. What you have instead is a single router and a services host that provides Internet services to internal and external clients. Ex; Network layer firewalls Screened Subnet Figure 1.3 Source: http://www.interhack.net/pubs/fwfaq/firewalls-faq.html Screen Subnet is a variation of the dual-homed gateway and screened host firewalls. If we want to locate each components separately in a firewall this function plays a big role. When we locate each component of the firewall on a separate system it makes us a greater output and flexibility and it helps to reduce the cost. But, each component of the firewall needs to implement only a specific task, making the systems less complex to configure. Ex: Network layer firewall. Source: http://www.vtcif.telstra.com.au/pub/docs/security/800-10/node58.html BASIC TYPES OF FIREWALL Conceptually, there are two types of firewalls: 1. Network layer 2. Application layer Network Layer Firewalls Basically the external devices of a computer situated between the network and the cable or the modems. Ex: Routers. Figure 1.4 Source: http://www.irislogic.com/Firewall_WP.pdf Application Layer Firewalls Basically the internal components of a computer system. Ex: softwares. Figure 1.5 Source: http://www.irislogic.com/Firewall_WP.pdf BASIC FIREWALL DESIGN DECISIONS When implementing an internet firewall, there are numerous decisions that must be addressed by the Network Administrator. 1. The stance of the firewall This decision reflects the policy of how your company or organization wants to operate the system. It may take one of two completely opposed stances: Everything not specifically permitted is denied firewall should block all traffic, and that each desired service or application should be implemented on a case-by-case basis. This is the recommended approach. Since this creates a very secure environment. But some could say this limits the number of options. Everything not specifically denied is permitted firewall should forward all traffic, and that each potentially harmful service should be shut off on a case-by-case basis. This is more complex than the previous. 2. The overall security policy of the organization The security policy must be based on a carefully conducted security analysis, risk assessment, and business needs analysis. If an organization does not have a detailed security policy, the most carefully expertise firewall can be avoided to expose the entire private network to attack. 3. The financial cost of the firewall That depends on the financial stability of the organization. How much can they afford for the security? A commercial firewall system provides increased security but may highly cost, depending on its complexity and the number of systems protected. If an organization has the in-house expertise, a home-developed firewall can be constructed from public domain software, but there are still costs in terms of the time to develop and deploy the firewall system. Finally, all firewalls require continuing support for administration, general maintenance, software updates, security patches, and incident handling. Source: http://www.itmweb.com/essay534.htm#Introduction COMPONENTS OF THE FIREWALL SYSTEM Packet filtering Circuit gateways Application level proxy Stateful packet inspection Internet connection firewall Hybrid firewall PACKET FILTERING FIREWALL Figure 1.6 A packet filtering firewall works on the network layer of the ISO protocol and this examine the information contained in the header of a packet which includes the source address and the destination address and the application it has to be sent. It is important to know that these types of FIREWALLs only examine the header information. If some corrupted or unwanted data sent from a trusted source, then this type of firewall is no good. Because when a packet passes the gate or the filtering process, it is always passed on to the destination. Therefore we could say that these types of firewalls are so much vulnerable to IP spoofing. In other words, a hacker can make his transmission to the private LAN easily and gain the access. ADVANTAGES OF PACKET FILTERS 1. Easy to install 2. Supports High Speed 3. Makes Security Transparent to End-Users DISADVANTAGES OF PACKET FILTERS 1. Leaves Data Susceptible to Exposure 2. Offers Little Flexibility 3. Offers No User-based Authentication 4. Maintains no state related to communication Source: http://www.cse.iitk.ac.in/research/mtech1997/9711107/node14.html CIRCUIT LEVEL GATEWAY Figure 1.7 Circuit gateway firewalls work on the transport level of the protocol. These firewalls are fast and transparent, but no protection from attacks. Same as the previous Packet filtering firewall, circuit gateway firewalls do not check the actual data in a packet. But surprisingly this can hide the LAN behind it to the outsiders. In other words, this makes the LAN behind the firewall invisible. ADVANTAGES OF CIRCUIT LEVEL GATEWAYS 1. Less impact on network performance 2. Breaks direct connection between the untrusted host and trusted client 3. Higher level security than the static and dynamic filter. DISADVANTAGES OF CIRCUIT LEVEL GATEWAYS 1. Lack of application protocol checking. 2. Low to moderate security level. APPLICATION LEVEL GATEWAY (OR PROXY SERVER) Figure 1.8 Source: http://www.irislogic.com/Firewall_WP.pdf This is the slowest and most awkward firewall is the Application level proxy. As it says, this works on the application level of the protocol stack. Since it operates on the application layer, this can act more wisely and perform the job more intelligently than packet filtering and circuit gateway firewalls. These firewalls are more suitable for enterprise firewalls rather than home use. Application level proxy determines so many useful things such as, if the connection requested is permitted, what application their computer will be used and what are permitted to use at this stage. Not only that but also this firewall protects internal computers from outside sources by hiding them from external viewing. Therefore outside viewers has to conduct all communications via the internal proxy server. That is why this method exceeds the average computer use and not much suitable for home use. ADVANTAGES OF APPLICATION LEVEL GATEWAYS 1. The firewall verifies that the application data is of a format that is expected and can filter out any known security holes. 2. Can allow certain commands to the server but not others, limit file access and authenticate users, as well as perform regular packet filtering duties. 3. Fine-grained control of connections is possible, including filtering based on the user who originated the connection and the commands or operations that will be executed. It can provide detailed logs of all traffic and monitor events on the Host system. 4. The firewall can be set up to trigger real time alarms when it detects events that are regarded as potentially suspicious or hostile. DISADVANTAGES OF APPLICATION LEVEL GATEWAYS 1. Loss of transparency to applications and slower response time. 2. Each application requires a unique program or proxy, making the process resource intensive. Source: http://www.dslreports.com/faq/3065 STATEFUL MULTILAYER INSPECTION FIREWALL Figure1 .8 Source: http://www.irislogic.com/Firewall_WP.pdf Stateful packet inspection examines the state of the communication. This ensures that the stated destination has already acknowledged the communication from the source. So that all the source computers become known and trusted sources to the receiving computer. In addition to that, this firewall closes all ports until it gets authorized and acknowledged by the receiving computer. So that this gives more protection from outside hackers. ADVANTAGES OF SMI FIREWALL 1. Offer a high level of security control by enforcing security policies at the Application socket or port layer as well as the protocol and address level. 2. Typically offer good performance 3. Offering transparency to end user Ensure that all packets must be a port of an authorizes communication session DISADVANTAGES OF SMI FIREWALL 1. It is more expensive than the other firewalls. That means it required to purchase additional hardware software. 2. More Complex than the others Source: http://www.scribd.com/doc/7627655/Internet-Firewalls INTERNET CONNECTION FIREWALL http://i.msdn.microsoft.com/Aa366124.icsicf01(en-us,VS.85).png Internet connection firewall is the new form of security that windows XP provide. This circumvents hackers from scanning the local server or computers by use of packet filtering. This technology can make some holes on the firewall and allow the traffic through to certain ports. The major difference in this firewall is, this provides only inbound protection. In other words, data that travels from the internet to the machine not the data that travels from the machine to internet. HYBRID FIREWALL http://www.networkworld.com/gif/2002/0401TechUpdate.gif Hybrid firewall is a combination of two firewalls that we mentioned before. This was developed using the application gateway and a packet filtering firewall. Generally this firewall is implemented by adding a packet filtering firewall into the application layer to enable a quick access to the internet. But still there could be greater risks from inside network attacks and previously unknown viruses and or attacks. DRAWBACKS USING A FIREWALL Drawbacks of firewalls. As I mentioned before firewalls are playing a major role to avoid unauthorized parties from accessing the private network or computer. Although firewalls are having strength to protect against the attacks but some attacks such as eavesdropping or interception of emailing cannot protect avoided by firewalls. That means firewalls will not provide much protection on each and every attack. So that we could say firewalls have benefits as well as drawbacks too. Here are some drawbacks. Drawbacks of software firewalls. Slow down applications May be heavy on system resources. Difficult to remove. Cannot protect against attacks that do not go through the firewall Cost is high Cannot protect against threats posted by traitors or unwritten users of the system or the network Drawbacks of hardware firewalls. Expensive to purchase. Need of Specialist knowledge Upgrading is difficult. Cost is high BENEFITS USING A FIREWALL As we discussed earlier, firewalls are a kind of filters that we use or add to filter data which pass from and into our network or computer while we using or surfing the internet. This helps to protect private LANs from hostile intrusions from internet Allows network administrators to customise access rights of their network users Helps with the information management Protect private information Manage the filtration level Monitors what information gets in and what gets out More importantly, this protects the network or the computer from harmful viruses, spyware and other malicious programs that can be infected from the internet. Firewall can save important and valuable data Sometimes some programs can simply attack on the whole system and destroy all valued data. In such cases firewall can keep a choke point that can be useful when retrieving the data. This choke point could be a starter to save that whole lot of important data. In other words this choke point could be an alarm point that monitors and alarms about the risk. Firewall can offer a central point of contact for information delivery service to customers IMPLEMENTING THE FIREWALL SYSTEM Determine the access denial methodology to use Start with a gateway that has no traffic and no holes or brick walls in it Determine inbound access policy The NAT router will block all inbound traffic that has no relate to the requested data from the original LAN. To make the LAN more secure, it is required to determine which packet should be allowed into the LAN. This may require a certain criteria Determine the outbound access policy If the user only needs the access to the web, then you may need a high level of security with manually selected sites on each web browser on each machine. But this would defer when using a NAT router with no inbound mapping of traffic from the internet. Then we can allow users to use the internet freely as they wish. Determine of the dial in or dial out policy is required Dial in always requires a secure remote access PPP server outside the firewall. Somehow if a dial-out requires then the dial-out machine should be individually secured to make hostile connections impossible through the dial- out connection. Why buy a firewall product and how After above questions are being answered, then we can decide whether to buy a product or it is ok to implement or configure a product by ourselves. This will always depends on the size or the capacity of the network and the availability of the resources such as expertise and requirements. Alternatives Virus guard Zone alarms Software firewalls Routers Virus guard Virus guard is simply a program which runs in the background of a computer to protect the computer from malicious distrusted programs that can arrived through emails and other file transfer methods. Zone alarm Zone alarm is originally a software firewall which has an inbound intrusion detection system. This also has the ability to control the outbound connection system. Software firewalls Firewalls can be both software and hardware. The ideal firewall consist of both software and hardware firewalls. These firewalls are installed in the computer itself. Therefore these are more popular in individual use. But the downside of this is that, this only protects the computer that it has been installed, not the network that the computer is in. Routers As it sounds routers are used to rout data packets between networks. This device is capable of read the information each packet and direct them to the correct place or correct network where it belongs. Conclusion In this report I would like to

Saturday, July 20, 2019

Organizational Change Of Procter And Gamble Marketing Essay

Organizational Change Of Procter And Gamble Marketing Essay In these ever changing and highly competitive markets, there has been a considerable amount of research carried out into new product development and introduction. A successful new product launch is believed by many to be the recipe to business or firm growth and profitability depending on their ability to identify the needs of customers and to quickly create products that meet these needs and can be produced at a low cost. The next step is to analyse and develop the market plan. This is done by reviewing the 4Ps product matrix as a way to finding a unique position from which to create a competitive advantage for the product. Also, review the SWOT with Clients and utilize SMART technique to develop the written, working plan Executing the plan and launching the product. This includes developing collateral materials, begin placement discussion with the first stage in the ideal channel, have enough discussion with as many different entities with a view to uncovering any previously undiscovered real objections. Review and improve plan as necessary with the new information, repeat until sold, and explore link extensions with new partners. It should be noted that new product development and introduction plan is the first stage in the Product Life Cycle. It is created in stages, giving logical break points to force the decision to proceed or not based on what occurs at each stage. Aim and Objective The goal of this research paper is to present in a clear and detail way how the development and launch of household care products by Procter and Gamble (PG) Company is aimed at bringing together the marketing, design, strategy and manufacturing functions of the company and also to identify the overall profitability of the product. Companys Overview and History With its headquarters in Cincinnati, Ohio, Procter and Gamble (PG) Limited is one of the worlds leading giants when it comes to making household products. The company is engaged in producing beauty, health, fabric, home, baby, family, and personal care products. With commitments to remain as the leader in its market, PG is one of the most aggressive marketers and is the largest advertiser in the world. Many innovations that are now common practices in corporate America including extensive market research, the brand-management system, and employee profit-sharing schemes were first introduced at Procter and Gamble. Procter and Gamble Limited has an employee base of 138,000 or more and operates in nearly 80 countries around the world and markets more than 300 brands in over 180 countries; more than half of the companys revenues are generated overseas. The company recorded revenues of $83,503 million during FY2008, an increase of 9.2% over FY2007. The operating profit of the company was $17.083 million during FY2008, an increase of 10.6% over FY2007. The net profit was $12.075 million in FY2008, an increase of 16.8% over FY2007. History Procter and Gamble Company (PG) was established as a joint partnership business by William Procter and James Gamble, two immigrants from United Kingdom in 1837 with head-office in Cincinnati, Ohio. By 1890, PG was selling more than 30 different types of soap, including Ivory. In 1915, the company built a manufacturing plant in Canada, its first outside the U.S. During 1917-1918, PG established the chemicals division which function was to formalize research procedures and develop new products. Then in the 1920s the company discontinued the manufacturing of candles. KEY DATES AND ACQUISITIONS: c. 1851: The Companys famous moon-and-star symbol is created. 1878: PG introduces White Soap, soon renamed Ivory. 1885: Introducing Innovative Employee Benefits. 1890: The company was incorporated as Procter and Gamble Company. 1911: The debut of Crisco, the first all-vegetable shortening. 1931: Brand management system is formally introduced. 1946: PG introduces Tide laundry detergent. 1955: Crest toothpaste makes its debut. 1957: Charmin Paper Company is acquired. 1961: Test marketing of Pampers disposal diapers begins 1963: Company acquires the Folgers coffee brand. 1982: Norwich-Eaton Pharmaceuticals is acquired 1985: PG purchases Richardson-Vicks Company, owner of the Vicks, NyQuil, and Oil of Olay brand 1988: Noxell Corporation, maker of Noxema products and Cover Girl cosmetics, is acquired 1990: PG expands its presence in the male personal care market by acquiring Shultons Old Spice Product line. 1991: Max Factor and Betrix cosmetics and fragrance lines are bought from Revlon, Inc. 1992: Pantene Pro-V shampoo is introduced. 1993: Major restructuring is launched, involving 13,000 job cuts and 30 plant closures. 1994: Company enters the European tissue and towel market with the acquisition of the Germany-based company, Schickedanz. 1997: Company acquires Tambrands, Inc., maker of Tampax line of tampons 1998: Organization 2005 restructuring is launched. 1999: Premium pet food maker Iams Company is purchased. 2001: PG acquires the Clairol hair-care business from Bristol-Myers Squibb Company. 2002: Jif peanut butter and Crisco shortening brands are divested. 2003: Company acquires a controlling interest in German hair-care firm Wella AG. By 2004, the company announced its agreement to acquire the commercial business of Grupo Vita in Spain. In the same year, PG finalized the sale of its juice drink brands, Sunny Delight and Punica, to JW Childs Associates LP, a private-equity firm in Boston. This further paring of the food business left PG with just two main food brands, Pringles and Folgers. The snacks and beverages unit accounted for only 7% of the companys total revenues in fiscal 2004. At the beginning of fiscal 2005 PG realigned its business units, shifting it five previous units into three: global beauty care; global health, baby, and family care; and global household care. Pringles and Folgers were placed within the latter unit. During the fiscal 2004, sales surged 19%, surpassing the $50 billion mark for the first time. Net earning also jumped 25%, hitting $6.48 billion mark. The newly invigorated company continued its streak of paying dividends without interruption since its 1890 incorporation, and it also increased its dividends for the 48th straight year. And in July 2005, a proposed merger with the Gillette Company, a leader in male grooming product was completed and cleared by the European Commission. Literature Review Product planning should be considered as a key driver for the eventual manufacturing and development of a successful new product. It can mean both organizational entity and the process of planning the product which can involve many more departments in a company (Allen, 1993). The consistent investment in consumer and market research, innovation, brand-building and go-to-market policies has considerably helped Procter and Gamble Company achieve success in its new product development strategy and also achieve considerable market shares. This case continues with an insight into PGs product innovations that have been a success among the diverse segments of the global market. The company is organized into three Global Business Units (GBUs) and a Global Operations group for producing commercially viable products. The three GBUs are beauty, health and well-being, and household care. The Global Operations group consists of the Market Development Organization (MDO) and Global Business Service (GBS). Research Methodology The research methodology will be based on the qualitative analysis, i.e. on the presentation and the analysis of a series of findings retrieved by researchers in the literature (Internet sites, online newspapers, periodicals, books and other academic publications, journals). The presentation of appropriate primary sources (statistical indexes, graphs, and financial data) will be also used in order to support the views of the literature. In other words, the research will be mainly secondary mostly because of the objectivity of data involved. More specifically, the use of primary research would not be used for the purpose of this research. Chapter 1 Organizational Culture and Structure 1.0 Corporate Structure Procter and Gamble organization structure is an important part of their capability to grow. It combines the global scale benefits of a $79 billion global company with a local focus to win with consumers and retail customers in each country where PG products are sold. PG organizational structure comprise three Global Business Units (GBUs), Global Operations, Global Business Services (GBS) and Corporate Functions (CF) Fig 1: Four Pillars of Corporate Structure of PG Global Business Units (GBUs) focus solely on consumers, brands and competitors around the world. They are responsible for the innovation pipeline, profitability and shareholder returns from their businesses. Market Development Organizations (MDOs) are charged with knowing consumers and retailers in each market where PG competes and integrating the innovations flowing from the GBUs into business plans that work in each country. Global Business Services (GBS) utilizes PG talent and expert partners to provide best-in-class business support services at the lowest possible costs to leverage PGs scale for a winning advantage. Corporate Functions ensure ongoing functional innovation and capability improvement. Procter and Gamble has adopted an organizational structure of innovation that allows them to launch innovation faster. The company has taken seven key steps in order to structure their innovation management and organization for faster innovation. Delegating decisions to innovative teams: Decisions are delegated to the innovative teams in order to avoid delays and enable fast innovation independent of top managements. Integrating the Research and Development Department into the Business Unit: Integrating majority of the RD into the business unit makes innovation management more effective and fosters the collaboration with the other departments of the business units and the orientation towards the customers in lieu of an exclusive focus on the technology. Co-Location of Teams Department: By locating all innovative team members and relevant departments of a division in the same place, the company can make sure that information flows without distortion. Central Innovation Team: Procter and Gamble has an organization of central innovation team at the corporate level which goes by the name Future Works. At the business unit level its central innovation teams belong to the New Business Development Organization. Central Innovation Fund: PG has established the PG Corporate Innovation Fund (CIF) for the purpose of financing the development of disruptive innovation and of new business. Crest Whitestrips were, for instance, funded by the CIF. External Interface for Open Innovation: In order to execute Open Innovation and to channel external solutions and ideas into the company, PG innovation management needs an effective external interface. The company has established its External Business Development Organization and its Connect Develop Organization. The mission of these departments is to realize the innovation potential, which slumbers in the outside world, via the development of external networks. Merger Acquisition Department: The mission of this department is to acquire innovative companies with a view of strengthening it innovation management and be in the market-place with innovations much faster. 1.1 Corporate Culture Procter and Gamble organizational culture is based on the guiding foundation of Purpose, Values and Principles (PVP) Purpose To provide branded products and services of superior quality and value that would touch and improve the lives of their consumers and in return, the consumers would reward PG with leadership sales, profit and value creation, and allowing their people, shareholder and the communities in which they live and work to prosper. Values Integrity Leadership Ownership Passion for winning Trust Principles Show respect for all individual The interest of the company and the individual are inseparable Strategically focused in their work Innovation being the cornerstone of their success Value Personal Mastery Seek to be the best Externally focused Mutual interdependency is a way of life. Organizational Change of Procter and Gamble A common aspect of any company whether small, medium or large scale is the structural and organizational changes. An organization undergoes change in order to ensure the products and services that would be given to customers are excellent, as well as, the performance of the employee within the company. Procter and Gamble is one the company that utilises change in organization in order to become one of the most well-known product producers in the whole world. Organization 2005 is aimed at changing PGs culture from a conservative, slow-moving, bureaucratic behemoth to that of a modern, fast-moving Internet-savvy organization. PG wants to make faster and better decisions, cut red tape, save cost out of systems and procedures, fuel innovation, set more aggressive sales goals and nearly double its revenue. The catalyst for all this change is Information Technology. Finally, PG wants to abandon its legacy of secrecy. Its new spirit of openness is most evident on the Internet. SWOT Analysis One strategic management tool that PG uses to stay ahead of its competition is the effective and efficient utilization of SWOT analysis. This involves specifying the goals and objectives of the business as well as identifying the internal and external factors that are favorable and unfavorable in achieving the goals and objectives Strengths Weaknesses * Strong focus on Research and Development. * Leading market position * Diversified product portfolio * Strong brand portfolio. * Increasing instances of product recalls * Dependent on Wal-Mart Stores for majority of its revenue Opportunities Threats

The Left Hand of Darkness: Gethenian Society Essay -- Ursula K. Le Gui

The Left Hand of Darkness: Gethenian Society Upon finishing the novel, The Left Hand of Darkness, by Ursula K. Le Guin, what stands out the most in my mind is the strange and complex Gethenian society. There are many aspects, some of which we are accustomed to, and others we would never consider a part of our society. There are things we have never heard of, like kemmer and shifgrethor. As well things every society should have like politics and human interaction. Politics are an important part of the Gethenian society. The political structure varies from country to country, the main two countries being Erhenrang and Orgoreyn. Erhenrang has one supreme ruler, King Argaven, and the equivalent of a prime minister, whereas Orgoreyn, is ruled by a group of thirty-three commensals. Both political structures seem to only have a loose authority over their various domains, and both are concerned with what the other is doing, but neither one wants to be overshadowed. They are aware of what is going on in the opposite government, but only release to the public what they want to have known. That is, whatever makes them look better and the other look much worse. The truth is very hard to come by in these political institutions. Gethenians are not an aggressive people. Violence is not a large problem in the Gethenian society. Violent crime is virtually nonexistent, and is never talked about. However when a crime does occur, usually treason, the perpetrator is sentenced to exile if they live in Erhenrang, or can be sent to a voluntary farm if they are from Orgoreyn. Once exiled, the individual has a certain amount of time to get out of the country or they can and will be killed. Furthermore, anyone who aids them by giving them money, g... ...e is considered lesser or even more qualified for one thing. Every person is considered equal. There is however still a hierarchy of money and power. The people who have greater wealth are usually government officials and people close to the king. Otherwise, everyone shares what they have. A Gethenian would take you in a give you all they have to give, no questions asked. These are the main aspects of Gethenian society as I see them. It seems to me similar to ours; some parts better, some parts worse. It is hard for me to imagine a world where there is no division of stronger and weaker sex as it is still so dominant in our society. It would have an overwhelming effect on everything, which Le Guin shows through her explication of the Gethenian society. Works Cited 1. Le Guin, Ursula K. The Left Hand of Darkness. New York: The Berkley Publishing Group, 1969.

Friday, July 19, 2019

FAMOUS PEOPLE :: essays research papers

Rosa Parks is widely known as the African-American woman who refused to get off her seat on a bus. She did not want to forfeit her seat in order for a white individual to replace her. She was arrested and taken into custody against her will, just because she felt the need to stay on the seat she felt she rightfully deserved. On December 1st, 1955, according to history, Rosa Parks was tired and exhausted from a long day of work. In fact, under different circumstances, she would have probably given up her seat willingly to a child or elderly person. But at this point in history, Parks was tired of the treatment she and other African-Americans received everyday of their lives. This included racism, segregation, prejudice and the Jim Crow laws of the time. After she took a stance, Americans seemed to notice and the laws and regulations of the time were questioned and subsequently, revised. Before her arrest, Parks had the fire inside of her to change what was wrong with things that were unjust. She served as secretary of the NAACP and later an adviser to the NAACP Youth Council and tried to register to vote on many occasions when it was basically impossible to do so. Not only was Parks a legitimate figure in the African-American community, but also she initiated change without really realizing so. After the bus incident, the establishment of the Montgomery Improvement Association was implemented, led by a young pastor named Dr. Martin Luther King, Jr. The world today is clearly different all because of Rosa Parks refusing to give her seat up. Her action lead to reaction, which is the most important part in establishing change. Her act of defiance began a movement that ended legal segregation in America. This meant that people of different color could finally start drinking from the same water fountain, restrooms were not designated â€Å"colored† and â€Å"white,† and one of the most important things was that schools started desegregating, which mean t black and white children could attend the same schools. This last item was finally implemented by the passing of the Brown v. Board of Education law, but it would not have been able to happen if Rosa Parks had gotten up from her seat. Had she done that, our future as Americans would have been compromised and the laws that are active today might have been something African-Americans would still be fighting for.

Thursday, July 18, 2019

Percy Bysshe Shelley’s “Mont Blanc” Essay

The Prelude is an auto-biographical, epic poem by William Wordsworth, ‘Mont Blanc’ by Percy Bysshe Shelley is a much shorter poem, however it correlates closely to a passage from Wordsworth’s epic where he describes a walking trip he took to Mont Blanc. There are some startling similarities between the two pieces, but at the same time there are sharp contrasts in the way that the scene is represented and the poets have conflicting views on what this beautiful landscape means to them. A key theme in romantic poetry is a connection with the natural world, if we look at the ways that Shelley and Wordsworth represent nature in their work then some interesting contrasts can be seen. The Prelude, subtitled ‘Growth of a Poet’s Mind’, is a narrative poem, showing us the events in Wordsworth’s life that have shaped his way of thinking and his views on nature and existence. The poem was written in blank verse, this form was reserved for epics and grand poems. Right away this unrhymed form, and the iambic pentameter which it follows, lend the poem a grand and sweeping feel, creating a sense of importance and gravitas. This passage is split into three sections; a broad description of the mountain and the vale below it, a strictly narrative passage where Wordsworth tells of how he and his friend were lost upon the mountain and crossed the Alps without realising, and finally a lyric interruption or ‘hymn’ (Romantic Writings p123 ) to ‘Imagination’ (The Prelude, Book Sixth l525). First the speaker describes the setting, the natural world around him and how it effects his emotions, then he returns to the narrative, telling us of the event that has caused him to relay us this tale and finally he conveys to us the moral implications of the event and how it has shaped his ‘poets mind’. In the first section the landscape is described as ‘wondrous’ (TP l456) the glacier as ‘a motionless display of mighty waves’ (l459) but the speaker is ‘grieved’ (l453) by what he sees, the ‘souless image’ (l454) of the mountain is not as beautiful or as wondrous as the ‘living thought'(l455) in the minds eye. The imagery used to personify the mountain and its natural beauty is epic and grand. Winter is like a ‘tamed lion’ (l466), ferocious,  dangerous, but sedate and controlled, creeping down the mountain with a stately pace. The pace of the poem quickens as the stretch of narrative begins’Descending by the beaten road that ledRight to a rivulet’s edge, and there broke off.’ (l503-4)The shorter words, repetition of plosive and hard sounds, internal partial rhymes (‘led’ ‘edge’) and the lack of imagery increase the tempo of this section. The tripping and jumpy sound of the lines, contrasts quite sharply with the earlier flowing sentences and sweeping descriptive passages. The metre helps to create the feeling of ascending the mountain, it also lends the setting a sense of desolation and emptiness; there are rocks and streams and tracks but little else. This creates a sharp comparison with the beauty of the valley below. Finally this change in style also helps to create a build-up of anticipation before the anti-climax of realising that they have ‘cross’d the Alps’ (l524) unknowingly. As they are told that all their remaining ‘course was downwards, with the current of the stream’ (l519) the young men’s spirits flow downwards with it, as nature mirrors the emotions of the individuals viewing it. ‘Imagination!'(l525)†¦ ‘ I recognise thy glory’ (l532). Underwhelmed by what the real world has to offer, the narrator can look back and see that imagination can usurp such disappointments. The ‘invisible world, doth Greatness make abode’ (l536), imagination can keep an individual in ‘hope that can never die’ (l540), and these lines seem to be saying that this transcends nature, that the human mind can imagine nature in all its perfection which can overcome the disappointments of the real world, and ‘Greatness’ capitalised along with ‘thy glory’ and the hymn-like nature of this passage suggest imagination gifted by a higher power. This point is where Shelley and Wordsworth’s treatments of Mont Blanc differ greatly. ‘Mont Blanc’ by Shelley is also written in Iambic Pentameter, lending it the same grand and solemn air as The Prelude. There is some rhyme throughout the poem although it is irregular, this helps to draw attention to certain lines, and phrases. Lines 25 – 28 form a rhyming couplet. Previous to this, the poem has spoken of ‘an old and solemn harmony’ (‘Mont Blanc’ l24), this  couplet is that ‘harmony’. The rhyme and prosaic language lends this passage a lilting quality, emphasising the beauty and majesty of the nature it describes, ‘earthly rainbows’ (l25) and ‘aethereal waterfall’ (l26). When the rhyme breaks on the next line a pause is created, changing the atmosphere. ‘Wraps all in its own deep eternity’ (l29). Shelley has created a dichotomy to describe nature, the savage, awful power against the serene, calm and solitude. Shelley said that the poem â€Å"rests its claim to approbation on an attempt to imitate the untamable wildness and inaccessible solemnity† (Oxford World’s Classics edition (2003), the Preface to History of a Six Weeks’ Tour by Mary and P. B. Shelley). The speaker finds the landscape beautiful, like Wordsworth, but also sees a much darker savagery in the mountain. Regal metaphors are littered throughout the poem the spring of the river is ‘a secret throne’ (l17), the mountains around Mont Blanc are its ‘subjects’ (l62) and the river is ‘majestic’ (l123). The imagery used here emphasises the power of the mountain and its splendour. In the third stanza where the speaker ponders on the creation of the mountain an unusual rhyming scheme is used. From lines 72 to 83 the scheme is ABCCADBDEFFE. While there is no distinct pattern the rhymes seem to gradually slot together, creating a feeling of increasing momentum, this places great emphasis on the final quatrain which directly addresses the mountain itself ‘Thou hast a voice, great Mountain'(l80). This random and unordered rhyme mirrors the unpredictability of the natural forces it describes, emphasising Shelley’s point that the ‘wilderness’ (l76) has no pre determined pattern or plan, asking the reader, like the mountain, to refute the ‘large codes of fraud’ (l81) that credit a greater design with its creation. The beginning of the fourth stanza from lines 84 to 95 are concerned not with Mont Blanc itself but the cyclic nature of life and death. This whole section is one long sentence, filled with lists ‘the fields, the lakes, the forests and the streams’ (l84), uses of the words ‘and’ ‘that, and an ever increasing intensity caused by the language. We move from ‘forests’ to ‘rain’ then ‘fiery flood and hurricane’ (l87). Strings of alliteration keep increasing the pace of this passage ‘future leaf and flower’ (l90), ‘that  detested trance’ (l91), ‘works and ways’ (l92) as finally it builds to a crescendo ‘Are born and die;’ (l95). Now the punctuation forces a pause and the following hard sounds and spondees of ‘revolve, subside’ put huge emphasis on this line as an ending point. Like the cycles of life and nature that this passage describes the momentum ke eps building with great fury and passion until eventually it stops and subsides. Similar imagery can be found to relate the two poems, both, for example, mention eagles in a setting of isolation, ‘A desert peopled by the storms alone, save when the eagle†¦Ã¢â‚¬â„¢ (MBl67-8), ‘The eagle soareth in the element’ (TPl463), this shows that both poets have taken things from the natural world to create a certain atmosphere. Shelley and Wordsworth have used a variety of metaphoric imagery to relay the aesthetic wonder of the mountain, interestingly both have used other images from nature to define it, ‘Winter like a tamed lion’ (TPl466), ‘brood of pines around thee clinging, children of elder time’ (MBl20-1), ‘glaciers creep like snakes that watch their prey’ (MBl100-1). While both seem to keep the scene completely natural, there is a much darker edge to the descriptions in ‘Mont Blanc’. The writing in The Prelude, while in the same form as ‘Mont Blanc’ is more stately and controlled; Shelley has tried to infuse his verse with more passion, to reflect his feelings on the wildness of the natural world. The tempo in ‘Mont Blanc’ seems to ebb and flow with the subjects that are touched upon, whereas in The Prelude, except for the narrative passage of the mountain climb, the progress is constant and measured. Nature is clearly awe-inspiring to the narrators in both poems but the way they feel about nature’s relationship with human thought seems to be intrinsically different. Two sections that stand out when comparing the poems are the ones which describe the infinite scope of the mountain when compared to the human mind. ‘Some say that gleams of a remoter world visit the soul in sleep’ (MBl48-9)’when the light of sense goes out in flashes that have shewn to us the invisible world’ (TPl535-6)Shelley believes that a remoter world is the  realm of imagination, that only those who are ‘wise, and great’ (MBl82) can reach while in a state of ‘trance sublime’ (MBl34). That nature has the power to help you understand the perceiving mind, you realise that the process of thought, like the water cycle of the mountain, or the circle of life, though invisible, is very real, and that this understanding can help us realise that any other ‘power dwells apart’, ‘inaccessible’ (MBl96-7). Wordsworth gleans quite a different feeling from his experiences in the mountain. Imagination can transcend nature; the natural world can never match the ‘infinitude’ (TPl539) of the human mind. Bibliography Asbee, Sue (2001) Approaching Poetry, The Open University’Mont Blanc’, P B Shelley (referred to as MB)The Prelude, W Wordsworth (referred to as TP)Bygrave, S (1996) Romantic Writings, RoutledgeOwens , W, R and Johnson, H (1998) Romantic Writings: An Anthology, The Open UniversityShelley, P, B and Mary (1817) History of a Six Weeks’ Tour, Oxford World’s Classics 2003 edition

Product Positioning in the Market

ISSN 1392-2785 ENGINEERING ECONOMICS. 2008. none1 (56) COMMERCE OF ENGINEERING DECISIONS Theoretical Aspects of convergence destineing in the commercialize R ta Ostasevi i t Kauno technologijos universitetas K. D iodinelai io g. 73, LT-44029, Kaunas The bind consists of fourteen give centerings, starting with the introduction where the novelty, the caper of the inquiry, the finis of the investigate, the purpose of the research and the research orders argon puffd.The purpose of the denomoation is systemization and perfect(a) description of the knowledge and teaching (found in a large number of sources) roughly the military slope theory, its localise in the s.t.p. baby-sit, coherent description of the produce fix put to work stairs as recommendations for in(predicate) point of intersection spatial relation suffice accomplishment. It is perspicuous that to be successful a yield must occupy an explicit, distinct, and seemly place, in the minds of poten tial drop and real consumers, copulation to early(a) rival overlaps on the grocery store. Product aligning is the in like mannerl to achieve the preceding(prenominal) mentioned result.The hold analyses how the harvest-time should be persuasioned on the market. The snatch part of the artic conceptions of crop put in the market. Those include Etzel, go-cart, Stanton (1997), Ries and Trout (1986), Kotler (2006), Armstrong (2006), Bhat (1998), Fill (2006), Ferrel (1997), Lamb, Hair, McDaniel (2004), Boone and Kurz (2001). The third part restrains the basement of fruit pastime part segmentation, rear ending and emplacement. The fourth part c tout ensembles harvesting fix steps, interpreted by polar scholars. in that location atomic number 18 two samples of wareion post dish up given (by Hooley (2004) and Hutt, Spech (2004)) and a model pull ind by the authors of this clause. The seventh part, credit and psychoanalysis of war-ridden wareions in the mar ket, describes the best means how to make love matched products, different levels of rivalry. The eighth part, identification of determinative belongingss and measuring their signifi disregardce to the user, reveals the techniques for cream of determinant attri howeveres and criteria for successful determinant attri justes.The ninth part, identification of circulating(prenominal) position of the product and another(prenominal)wise competing products accord to determinant imputes, shows likely ways of carrying out this product perspective process stage. The tenth part, composition of the office map, reveals the process of their excogitation and hand overs reasons why it is such a powerful tool for examining the positions of products. The ordinal part, the determination of the want position of the product, speaks close the ideal position of a product and where companies want to position their products (the desired position).The duodecimal paragraph, called the d irection of locating or dislodge system, reveals viable fix strategies proposed by versatile authors, re localisation strategies, presented by Doyle, Stern (2006), possible reasons of inadequate post. The thirteenth part, creation of the billet account, discusses the three models of creation of product mass statement X-Y-Z model, I-D-U model, and a-b-e model. The last part consists of conclusions on theoretical studies of product situation process. Keywords product placement, product set teps, determinant attributes, put map, side and shift system, put statement. launch There is no product in the world that does not gravel a position. Product spatial relation is close profile and recognition and what product represents for a buyer. In markets where the intensifierness of rivalry and competition atomic number 18 increasing and buyers countenance a greater intrinsic values become critical. An whirl with a clear identity and orientation to a needs will not that be purchased, but coffin nail warrant a larger strand through increased added value.Numerous organizations atomic number 18 nerve-racking to manage their positions occupied by their products and atomic number 18 using different position strategies to proceed to rude(a) positions in consumers minds and so founder an advantage over their competitors. Earlier lay was very important in markets that atomic number 18 very militant and where mobility barriers ar comparatively low. Nowadays these market characteristics tin be applied al to the highest degree to both effort or line of products, and to any economy. No product, of those which have survived, can be imagined without clear, distinct and intensive locating.It is vivid, that for a successful product in the market good quality and vigorous known bell ringer are not enough. The product must occupy an explicit, distinct, and proper place, in the minds of potential and existing consumers, comparative to other r ival products on the market. compass (or not reaching) that suitable position in the minds of consumers is the result of successful (or not successful) positioning. The article analyses how the product should be positioned on the market. The object of the research product positioning in the market.Purpose of the research to systemize and thoroughly describe the knowledge and information (found in a large number of sources) virtually the positioning concept, its position in the s.t.p. model, coherently describe the product positioning process steps as recommendations for successful product positioning process accomplishment. Research methods employ Conducting theoretical studies of positioning in the market, the method of comparative analysis and systematization of scientific literary productions were employ.Concept of product positioning There is a great number of different definitions of positioning in scientific literature of market. The concept of positioning seeks to place a product in a certain(p) rspective buyers. Marketers offerings from those of competitors and to create promotions that communicate the desired position. Boone and Kurz (2001) Scientists Etzel, Walker and Stanton (1997) refer to a product and to nock (position) it in a favorable way from similar products. Ries and Trout (1986) distinguish from all other market theoretics, stating that positioning is not what is make to a product. emplacement is what you do to the mind of the prospect. The said(prenominal) authors indicate that positioning starts with a product. A piece of merchandise, a service, a company, an institution, or even a person. However, Kotler (2006) defines positioning as the act of designing the upies a distinct and valued position in the address consumers mind. students Kotler, Armstrong (2006) verify that market positioning is organisation for a product to occupy a clear, distinctive, and desirable place, in the minds of target consumers, congeneric to compe ting products.Thus, marketers plan positions that distinguish their products from competing products and give them the superlative strategic advantage in their target markets. The purpose of positioning is to create a unique and favorable image in the minds of target customers, Bhat (1998). The author Fill (2006) states, that positioning, therefore, is the congenital conclusion to the sequence of activities that constitute a core part of the marketing strategy. Market segmentation and target marketing are prerequisites to successful positioning.Product positioning refers to the ratiocinations and activities in leaned to create and main(prenominal)tain a certain concept 1997). Positioning is developing a limited marketing mix to brand, product line, or organization in general (Lamb, Hair, McDaniel 2004) perceptions of a products attributes relative to the attributes of free-enterprise(a) products. Buyers make a large number of purchase decisions every day. To avoid constant ree valuation of numerous products, buyers tend to root, decisions. Rather than departing customers to position products independently, marketers must elbow grease to influenceThe steps of STP model The can of positioning theory is made of one of the most important postulates of the science of marketing. extremely diverse and that a the postulate it is round-eyed to define the essence of the STP model to present the product to those consumers, who want it and are able to acquire it. The foremost two steps of the STP model set to find and define the desired consumer, and positioning serve ups for placing the product in the desirable position in the minds of target consumers.Scholars Grancutt, Leadley and Forsyth (2004) thoroughly describe the STP model steps in the table below Table 1 The STP model steps sectionalisation * Choose variables for segmenting market * Build a profile of the segments (sub-segments) * Validate emerging segments Targeting * set on targeting strategy * recognize which and how galore(postnominal) segments should be targeted Positioning * Understand consumer perceptions * Position products in the mind of the consumer * Design withdraw marketing mix to communicate positioning witnesser Grancutt, Leadley, Forsyth (2004)Product positioning steps Scholar Winner (2007) has a distinct understand on product positioning decisions he accents customer decision fashioning process as the most important give up in product positioning steps. correspond to the scientist, marketers have to answer the following questions when positioning the product What dimensions do consumers use to quantify product offerings in the industry or family? How important is each of these dimensions is in the decision making process? How do you and competition compare on the dimensions? What decision processes do the customers use?The author Hooley (2001) keep an eye ons these stages of product positioning process Table 2 Product positioning steps designat ion of competitors Singling out decision making attributes military rating out of decision making attribute significance aim the determinant attributes and pace their significance to the user Product positioning steps Identify and analyze warlike products in the market Table 4 realisation of competitor position consort to the most important attributes Identify the occurrent position of the product and other competing products harmonize to determinant attributesIdentification of consumer needs Preparation of a consumer map direction of the desired position Selection of positioning strategy first Grancutt, Leadley, Forsyth (2004) Compose the positioning map keep an eye on the desired position of the product Select positioning or repositioning strategy Create the positioning statement Scientists Hutt, Spech (2004) imply the following steps in the product positioning process Table 3 Product positioning steps Identify the relevant set of agonistic products Identify the set of determinant attributes that customers use to sort out among options and determine the preferred choiceIdentification and analysis of competitive products in the market Drawing positioning frames for a product, category membership should be determined first, i. e. other products that compete in the said(prenominal) market and can serve as substitutes. The best considered means for determination is allows collecting a large issue forth of useful data, which is easily systemized, adapted, processed statistically. ane of the main advantages of consumer survey is the anonymousness. Deep oppugn can be also used to determine the rival products in the market, but due to larger time and fiscal costs is used seldom.Scientists Hooley, Saunders, Piercy (2006) state that competition can take place in the following levels rival with products with analogous qualities Competition in the same product group Competition with other products that satisfy the same or very similar consumer petition Competition in the same consumer essential level As mentioned above it is vitally important not yet to determine all products on the same shelf, but also determine the rivals to the whole shelf. Identification of determinant attributes and measuring their significance to the userCollect information from a sample of existing and potential customers concerning their ratings of each product on the determinant attributes offerings for each market segment seek the fit between preferences of market segments and current position of product Select positioning or repositioning strategy Source Hutt, Spech (2004) Concentrating all discussed product positioning models the authors of this article propose the following algorithm of positioning process steps.After the identification and analysis of competitive products in the market, determinant attributes should be determine and their significance to the user should be measured. consort to Aaker, (2005) determinant attributes define not ne vertheless the products benefits and value to the user, but also associations with the product consuming process and with the consumer himself. The authors Hooley, Saunders, Piery (2006) consider a qualitative Determination of the desired position of the productIdentification of the current position of the product and other competing products according to determinant attributes Selection of positioning or repositioning strategy melodic theme of the positioning map It is important to mention, that the above mentioned strategies are not discrete and unremarkably are just pats of complex hybridizing strategies, used by marketers. Sometimes, changes in the competitive environment force marketers to repositi position it holds in the minds of consumers relative to the positions of competing products.Scientists Doyle, Stern (2006) suggest the following repositioning options (the first two are real repositioning strategies, the rest can be considered psychological) Introduce a late bran d Change existing brand modify beliefs astir(predicate) the brand Alter beliefs about competitive brands Alter attribute importance weights Introduce newfound or neglected attributes Find a new market segment Not only changes on the market lead to a demand for a new repositioning strategy.Very often the product fails because of marketers initial positioning mistakes. Brooke (1994) states that a product may be inadequately positioned for three reasons The segment in which it is targeted might have become unattractive because it is too small, declining, too competitive or otherwise unprofitable. Positioning might be inadequate because the quality and features that the product offers do not appeal to the segment to which it is targeted. igh to allow it to be wrongd competitively. Scientists Grancutt, Leadley, Forsyth (2004), Kotler (2006) indicate four main risky product positions on the market underpositioning, overpositioning, confused positioning and doubtful positioning Table 5 Risky positions potency risk Underpositioning Comment Some companies clutch that buyers have only a umbrageous idea of the brand and the features/benefits of that brand.Customers may not be aware of anything particularly supernumerary about the brand Customers may have too narrow a view of the brand. Therefore a consumer might recover that a particular glass company, for example, only produces luxury items that retail at mellow prices. However, it may produce a multifariousness of cheaper standard glassware. Customers could be confused about the position of the brand within the marketplace. This cloudiness may result from the company making too umpteen positioning too frequently.Customers may find it hard to cerebrate the claims made by the company about its brand in view of benefits, the price and the name of the manufacturer. Source Grancutt, Leadley, Forsyth (2004) This process is believably the most laborious and difficult piece positioning implementation steps. Sc holars Capon, Hulbert (2001) define the creation of positioning statement as a complex, creative, and highly interactive process, often involving many cut-and-try attempts, before the satisfactory result is achieved.Clear positioning statements have major value. For example, one of the most common complaints advertising companies make about their clients is that they have not clarified their strategies. Although positioning statements are not advertising messages, they provide excellent difficulty. According to Kalafatis, Tsogas, Blankson (2000) positioning statements comprise a vital role in helping to guide rts in the marketplace, they are both crucial internally and externally.Scientists Rossiter, Piercy (1997) define the following models for product positioning statement creation X-YZ macromodel I-D-U mezomodel A-b-e micromodel Creating positioning statement according to the X-YZ model, a marketer should decide on the following issues nded target audience (Y) product category ( X) what benefit (benefits) does the product draw to consumer (Z) Any kind of advertising attempts should emphasize the benefit to the consumer, which should be unique emotions. he emphasized benefit must be important to the whole product category (I) not mention at all or forewarn consumer of possible product weaknesses (D). Conclusions Having completed the theoretical studies of product positioning in the market the following conclusions can be made Positioning plays a key role when reaching the desired place in the mindsets of potential and existing consumers. Most scientists of the field of marketing define product positioning as arrangements for a product to occupy a clear, distinctive, and desirable place in the minds of target consumers, relative to competing products in the market.The position of a product is formed by products attributes relative to the attributes of competitive products Product positioning is an inseparable and most important part of the STP model. If the first two steps (segmentation and targeting) contain flaws or are inadequately or incompletely performed, successful product positioning is infernal to fail. Summarizing the opinion of various scholars, it is obvious that product positioning is a complex, Overpositioning Confused positioning Doubtful positioningCreation of the positioning statement From the research data obtained in the first steps of product positioning process and the marketing strategy developed, it is necessary to formulate a positioning statement that is in argumentation with the promotional objectives. continuing and chain process. piece of music positioning a product marketers should at least (there can be more) go through the following steps 1. signalise and analyze competitive products in the market, 2. line the determinant attributes and measure their significance to the user, 3. select positioning or repositioning strategy, 4. ompose the positioning map, 5. determine the desired position of the produ ct, 6. rate the current position of the product and other competing products according to determinant attributes, 7. create positioning statement. References 1. 2. Aaker, D. A. Strategic market centering. wise York The vindicate Press, 2005. Arora R. Product positioning based on search, experience and creedence attributes using conjoint analysis // journal of product and brand centering, Nr. 5, 2006. Bhat, S. emblematic and functional positioning of brands / S. Bhat, S. Reddy //Journal of Consumer market, 1998, No 1, p. 2-43. Boone, L. Contemporary marketing 10th version/ L. Boone, D. Kurtz. Harcourt, 2001. Brooksbank R. The anatomy of positioning strategy. // Marketing cognizance and planning. 1994, No. 4, Capon, N. Marketing Management / N. Capon, J. M. Hulbert. velocity attach River, 2001. Dik ius, V. Marketingo tyrimai teorija ir praktika. Vilnius, 2006. Doyle, P. Marketing management and strategy Fourth discrepancy. / P. Doyle, Ph. Stern, Harlow, 2006. Etzel, M. Mar keting eleventh edition / M. Etzel, B. Walker, W. Stanton. New Jersey, 1997. 24. intelligence and planning, No. 5, 2002. 25. Pranulis, V.Marketingo tyrimai / Vilnius, 1998. 26. Ries, A. Positioning The Battle for Your Mind / A. Ries, J. Trout. New York McGraw-Hill, 1986. 27. Rossiter, J. Advertising Communications and Promotion Management / J. Rossiter, L. Piercy. New York McGraw hill, 1997. 28. Sheinin, D. A. Positioning brand extensions implications for beliefs and attitudes // Journal of Product & patsy Management, 1998, No 2. 29. Winer, R. S. Marketing Management. Third edition / Upper lodge River, 2007. R ta Ostasevi i t Prek s pozicionavimo rinkoje teoriniai aspektai Santrauka Pasaulyje nerasime prek s, kuri netur t pozicijos.Prek s pozicija yra tai, kaip pirk jas suvokia prek pagal tammy tikrus apsisprendimo tos pa ios kategorijos preki . Prek identitetu ir orientacija potenciali ar esam pirk j norus ne tik bus noriai perkama, bet ir gali garantuoti didesnius pelnus, kada ngi yra sukuriama didesn prid tin vert . Dauguma organizacij bando valdyti savo preki vairias pozicionavimo strategijas, kad patekt naujas (norimas) pozicijas potenciali ar esam pirk j galvosenose ir taip susikurt ias prekes. Anks iau pozicionavimas buvo laba jimo barjer charakteristikos gali b verslui. N ti ir gana intensyvaus pozicionavimo.Tyrimo problema savaime suprantama, kad s kmingai prekei rinkoje geros kokyb turi ir tinkam viet esam ir potenciali vartotoj galvosenoje. Norimos pozicijos vartotoj galvosenoje pasiekimas (arba nepasiekimas) yra s kmingo (ar nes kmingo) pozicionavimo rezultatas. tur t b ti pozicionuojama rinkoje. Tyrimo objektas prek s pozicionavimas rinkoje. Tyrimo tikslas iai informacij apie prek s pozicionavimo koncepcij viet s rinkoje, kaip rekomendacijas s kmingai gyvendinti prek s pozicionavim rinkoje. Tyrimo metodai atliekant teorin prek s pozicionavimo rinkoje tyrim , naudota sistemin bei lyginamoji mokslin s literat ros analiz .Prek s pozicionavimo konc epcija Mokslin je marketingo literat roje galima rasti labai daug parry prek s pozicionavimo rinkoje apibr . Boone ir Kurtz (2001) pozicionavimo koncepcij apib dina kaip prek s traukim tam tikr viet potenciali pirk j galvose. Autoriai Etzel, Walker ir Stanton (1997) marketing apib dina kaip vadybinink sugeb jim atkreipti vartotoj d mes prek ir palankiai diferencijuoti (pozicionuoti) j tarpaulin kit preki . Jungtini Amerikos Valstij mokslininkai Ries ir Trout (1986) kit marketingo teoretik , teigdami, kad pozicionavimas vertinti ir suprasti savo ir konkurent preki pozicij prek s rinkoje.Pozicionavimas n ra tai, k darome prekei, tai kaip veikiate potencialaus pirk laiko ir k rybiniu s, paslaugos, mon s ar iau pozicionuojant nedaroma Tuo tarpu Kotler (2006) teigia pinimas, kad prek , atskir ir norim viet i preki tikslini vartotoj mintyse. Apibendrinant prek s pozicija rinkoje yra vartotojo suvokimas apie prek s atributus, palyginant juos su konkuruojan ios prek s atributais. Kiekvi enas pirk jas kasdien daro daug ir vairi apsisprendim pirkti. nuolatinio preki jai paprastai prekes grupuoja, arba pozicionuoja savo m stysenoje, tam, kad supaprastint ir sutrumpint savo sprendimo pirkti pri mimo proces .Kad pirk jai nepozicionuot preki bandyti veikti pirk j suvokim apie prek . 3. 4. 5. 6. 7. 8. 9. 10. Ferrel, P. Marketing 10th edition / Boston, 1997. 11. Fill, Ch. Marketing communications engagement, strategies and practice / Harlow, 2006. 12. Grancutt, J. Marketing essential principles, new realities / J. Grancutt, P. Leadley, P. Forsyth. London, 2004. 13. Holley, G. Market -Focused resources, competitive positioning and upstanding performance / G. Holley, G. Greenley, J. Fahy and J. Cadogan //Journal of Marketing Management,2001, No 5/6, p 503-520. 14. Hooley, G. Marketing strategy and competitive positioning / G. Hooley, J.Saunders, F. N. Piercy. apprentice Hall, 2005. 15. Hutt, M. D. line of merchandise marketing management. 8th edition /M. D. Hutt, T. W. Sp ech. Prentice Hall, 2004. 16. Janonis, V. Brand Image Formation / V. Janonis, R. Virvilait // 78-90. 17. Kalafatis S. P. , Positioning strategies in business markets / S. P. Kalafatis, M. H. Tsogas, C. Blankson // Journal of business and industrial marketing. No 6, 2000 p. 416-437. 18. Knox S. Positioning and brand your organization // Journal of Product and Brand management, Nr. 2, 2004. 19. Kotler, Ph. Marketing management 12th edition / Ph. Kotler, K. L. Keller. Upper Saddle River, 2006. 20. Kotler, Ph.Principles of marketing sixth edition / Ph. Kotler, Armstrong, G. New Jersey, 1994. 21. Kotler, Ph. Rinkodaros principai / Ph. Kotler, G. Armstrong, J. Saunders, V. Wong. Kaunas, 2003. 22. Kotler, Ph. A fabric for marketing management. Third edition. / Ph. Kotler, K. L. Keller. Upper Saddle River, 2007. 23. Lamb, W. younger Marketing. 7th edition / W. Lamb, Jr. , W. Hair. Jr. , C. McDaniel. Thompson south Western, 2004. Pozicionavimo pagrind postulat sudaro vienas svarbiausi mark etingo s skirtingi, ir prek absoliu iai vardyti STP modelio naudojimo prasm potencialiai jo norintiems ir j galintiems vartotojams prek pasi lyti? tam naudojami pirmieji du STP modelio s rinkos nustatymas. Tik po to prek gali b ti pozicionuojama nustatoma jos pozicija tikslini vartotoj galvosenoje. tai nuomoni apie konkuruojan ias prekes (preki pozicij pasirinktos grup s asmen s mon je schema (Pajuodis, 2000). stymo pozicionavimo strategijas, mon nustato savo viet rinkoje vartotoj ir konkurent sti d l vartotoj grupi (segment ), kurioms bandys daryti poveik , ir kartu d l savo veiklos profilio, kuris patenkint min t vartotoj segment reikalavimus (tikslin s rinkos strategija). s irstomas etapais.Skirtingi autoriai pateikia skirting etap skai i , skiriasi ir j daugelio mokslinink si lomus prek straipsnio autor s pateikia tok j skai i konkuruojan i preki apsisprendimo atribut identifikavimas ir j vertinimas esamos prek s pozicijos nustatymas lapio suk rimas norimos pozicijos rinkoje n ustatymas pozicionavimo arba perpozicionavimo strategijos parinkimas pozicionavimo teiginio suk rimas. Konkuruojan i preki pozicionavimo r mus prekei, pirmiausia reikia nustatyti nario kategorij , kitas prekes, kurios konkuruoja su preke ir gali b ti jos pakaitalai.Geriausias b ias prekes yra kiekybinis tyrimo apklausa, nes , kuris paprastai responder ias prekes, galima naudoti ir giluminio interviu metod , ta laiko s naudas ir efektyvum , patogiau atlikti vartotoj apklaus . G. J. Hooley, J. A. Saunders ir N. F Piercy (2006) teigia, jog iomis prek mis Konkurencija preki grup je poreik Konkurencija su kitomis t pat tenkinan iomis prek mis Konkuruoti to paties poreikio lygmenyje. Taigi nustatant konkurentus svarbu ne tik identifikuoti visas prekes, esan ias toje pa ioje parduotuv s lentynoje, bet ir nustatyti, kas konkuruoja su visa lentyna. teikiami naudos aspektai yra tinkami vartotojams. Anot D. A. Aaker (2005), atributas s savybes ir naud vartotojui, bet ir asociacijas su prek s vartojimu ir vartotoju. Kit mokslinink (G. J. Hooley, J. A. igimu, atributus geriausia yra grup . Pasak identifikuoti naudojant kokybin tyrimo metod V. Dik iaus (2006) tam gali b ti naudojamos tokios projekcin s asociacijos, testas, temos suvokimo testas, vaidmen vaidinimas. Atrinki atributai bus vertingi tik t pozicionavimo instrumentas, skirtas tiksliai vizualiai apibr vietoje pagal psichologinius veiksnius yra mon s prek s, palyginti su prek mis.Norint nustatyti, kaip skirtingi preki pasi lymai yra suvokiami rinkoje, turi b ti numatomi pagrindiniai prek s atributai, pagal kuriuos suvokiama prek kaip tokia. Labai didel rezultatas) turi b rim . Tolesn l kes ius bei pirmum , ir kaip j plane atrodo prek su savomis savyb mis. Tam tikslui pasiekti ir sudaromas lapis. lapyje yra tas, kuris reprezentuoja labiausiai apsisprendimo atribut kombinacij ideali prek . mon s pasirenka norim savo prek s pozicij kuo ar iau idealios prek s pozicijos. augelis mokslinink (Fill, 2006 Kotler, 2007 Arm strong, 2004 Doyle, Stern, 2006) s pozicionavimo rinkoje Pagal prek s savybes Pagal prek s teikiam naud Pagal vartojimo b d ar situacij Pagal vartotoj Pagal konkurent Pagal preki grup Pagal kokyb ar kain Pagal kult rinius simbolius ar kilm . Svarbu pamin ra diskre tiesiog dalys sud ting hibridini strategij , kurias pozicionuodami prekes rinkoje, naudoja marketologai. 1. X-YZ makromodelis 2. I-D-U mezomodelis 3. a-b-e mikromodelis.Juose nurodoma, kas yra pozicionuojama, kam tai yra skiriama, kas turi b ti pabr Atlikus teorin prek s pozicionavimo rinkoje studij , Pozicionavimas yra svarbiausias instrumentas norint pasiekti norim prek s pozicij esam ir potenciali vartotoj galvosenoje. Dauguma marketingo srities mokslinink prek s pozicionavim rinkoje apibr pinim , kad prek , atskir ir norim viet i preki tikslini vartotoj mintyse. Prek s pozicija formuojama per prek s atribut suvokim , lyginant su konkuruojan iomis prek mis. Prek s pozicionavimas yra neatskiriama ir pati svarbiausi a STP modelio dalis.Jei pirmi STP mode ar nepilnai, s kmingai pozicionuoti prek s rinkoje nepavyks. Apibendrinant daugelio mokslinink nuomones, akivaizdu, kad prek s pozicionavimas rinkoje yra sud tingas ir t stinis procesas. Pozicionuodami prek gali b 1) Konkuruojan i preki 2) Apsisprendimo atribut identifikavimas ir j vertinimas 3) Esamos prek s pozicijos nustatymas 4) lapio suk rimas 5) Norimos pozicijos rinkoje nustatymas 6) Pozicionavimo arba perpozicionavimo strategijos parinkimas 7) Pozicionavimo teiginio suk rimas. prek s pozicionavimas, prek s pozicionavimo etapai, lapis, pozicionavimo ir perpozicionavimo strategija, pozicionavimo teiginys. rieinamumas, pelningumas. Svarbu pateikti atribut , kurio nesi lo konkurentai, arba atribut pateikti specialia forma. nusta ius vartotoj apsisprendimo atributus, reikia numatyti, kaip pagal juos vartotojai vertina prek ir konkurent prekes. Tam geriausiai tinka kokybiniai vertinti prek ir konkurent prekes pagal svarbiausius apsisprendimo technikas, kurias V. Pranulis (1998) rio matavimo vertinimo skal s, Likerto (sumini vertinim ) skal , semantin diferencialin skal , Stapel skal vertinimo skal , fiksuotos sumos skal r , por pasirinkimo skal . The article has been reviewed.