Wednesday, July 31, 2019

Importance of Marketing

An explanation of the importance of marketing to your selected organization’s success Marketing is a very important aspect in business since it contributes greatly to the success of the organization. Production and distribution depend largely on marketing. These two concepts are different in many aspects. Marketing covers advertising, promotions, public relations, and sales. It is the process of introducing and promoting the product or service into the market and encourages sales from the buying public. The goal of marketing is to make our product, Mango Power widely known and recognized to the market, marketers must be creative in their marketing activities. In this competitive nature of many businesses, getting Mango Power noticed is not that easy. Strategically, Pepsico must be centered on the customers more than the Mango Power products. Although good and quality products are also essential, the buying public still has their personal preferences. We will need to target more of their needs, they will come back again and again and even bring along recruits. If we push more on the product and disregard their wants and the benefits they can get, we will lose our customers in no time. The hardest part is getting them back. The only means to be made known is to advertise and promote. Pepsico may be spending on the advertising and promotional programs but the important thing is that Mango Power and Pepsico information is disseminated to the buying public. Offline and online marketing make it possible for the people to be educated with the various products and services that they can take advantage of. Pepsico must invest in marketing so as not to miss the opportunity of being discovered. If expense is to be considered, there are cost-effective marketing techniques Pepsico can embark on such as pay-per-click ads and blogging. Marketing helps boost sales and revenue growth. It will generate sales once the public learns about your Mango Power through TV advertisements, radio commercials, newspaper ads, online ads, and other forms of marketing. The more people hear and see more of our advertisements, the more they will be interested to buy. Pepsico aims to increase the sales percentage and double the production, the marketing department must be able to come up with effective and strategic marketing plans. Pepsico and Mango Power must have the ability to conquer the general market, marketers aim to create a brand name recognition or product recall. This is a technique for the consumers to easily associate the brand name with the images, logo, or caption that they hear and see in the advertisements. For example, McDonalds is known for its arch design which attracts people and identifies the image as McDonalds. For some companies, building a reputation to the public may take time but there are those who easily attract the people. With an established name in the industry, a business continues to grow and expand because more and more customers will purchase the products or take advantage of the services from a reputable company. In conclusion, marketing plays a very essential role in the success of a company. It educates people on the latest market trends, helps boost a company’s sales and profit, and develops company reputation. But marketers must be creative and wise enough to promote their products with the proper marketing tactics. Although marketing is important, if it is not conducted and researched well, the company might just be wasting on expenses and time on a failed marketing approach. References: Exforsys Inc. ,Published on: 6th Nov 2009 Last Updated on: 4th Jan 2011 PEPSICO 2010 Full Annual Report Importance of Marketing An explanation of the importance of marketing to your selected organization’s success Marketing is a very important aspect in business since it contributes greatly to the success of the organization. Production and distribution depend largely on marketing. These two concepts are different in many aspects. Marketing covers advertising, promotions, public relations, and sales. It is the process of introducing and promoting the product or service into the market and encourages sales from the buying public. The goal of marketing is to make our product, Mango Power widely known and recognized to the market, marketers must be creative in their marketing activities. In this competitive nature of many businesses, getting Mango Power noticed is not that easy. Strategically, Pepsico must be centered on the customers more than the Mango Power products. Although good and quality products are also essential, the buying public still has their personal preferences. We will need to target more of their needs, they will come back again and again and even bring along recruits. If we push more on the product and disregard their wants and the benefits they can get, we will lose our customers in no time. The hardest part is getting them back. The only means to be made known is to advertise and promote. Pepsico may be spending on the advertising and promotional programs but the important thing is that Mango Power and Pepsico information is disseminated to the buying public. Offline and online marketing make it possible for the people to be educated with the various products and services that they can take advantage of. Pepsico must invest in marketing so as not to miss the opportunity of being discovered. If expense is to be considered, there are cost-effective marketing techniques Pepsico can embark on such as pay-per-click ads and blogging. Marketing helps boost sales and revenue growth. It will generate sales once the public learns about your Mango Power through TV advertisements, radio commercials, newspaper ads, online ads, and other forms of marketing. The more people hear and see more of our advertisements, the more they will be interested to buy. Pepsico aims to increase the sales percentage and double the production, the marketing department must be able to come up with effective and strategic marketing plans. Pepsico and Mango Power must have the ability to conquer the general market, marketers aim to create a brand name recognition or product recall. This is a technique for the consumers to easily associate the brand name with the images, logo, or caption that they hear and see in the advertisements. For example, McDonalds is known for its arch design which attracts people and identifies the image as McDonalds. For some companies, building a reputation to the public may take time but there are those who easily attract the people. With an established name in the industry, a business continues to grow and expand because more and more customers will purchase the products or take advantage of the services from a reputable company. In conclusion, marketing plays a very essential role in the success of a company. It educates people on the latest market trends, helps boost a company’s sales and profit, and develops company reputation. But marketers must be creative and wise enough to promote their products with the proper marketing tactics. Although marketing is important, if it is not conducted and researched well, the company might just be wasting on expenses and time on a failed marketing approach. References: Exforsys Inc. ,Published on: 6th Nov 2009 Last Updated on: 4th Jan 2011 PEPSICO 2010 Full Annual Report

Tuesday, July 30, 2019

Performance Art Essay

Performance art is an essentially contested concept: any single definition of it implies the recognition of rival uses. As concepts like â€Å"democracy† or â€Å"art†, it implies productive disagreement with itself. [1] The meaning of the term in the narrower sense is related to postmodernist traditions in Western culture. From about the mid-1960s into the 1970s, often derived from concepts of visual art, with respect to Antonin Artaud, Dada, the Situationists, Fluxus, Installation art, and Conceptual Art, performance art tended to be defined as an antithesis to theatre, challenging orthodox art forms and cultural norms. The ideal had been an ephemeral and authentic experience for performer and audience in an event that could not be repeated, captured or purchased. [2] The in this time widely discussed difference, how concepts of visual arts and concepts of performing arts are utilized, can determine the meanings of a performance art presentation (compare Performance: A Critical Introduction by Marvin Carlson, P. 103,2-105,1). Performance art is a term usually reserved to refer to a conceptual art which conveys a content-based meaning in a more drama-related sense, rather than being simple performance for its own sake for entertainment purposes. It largely refers to a performance presented to an audience, but which does not seek to present a conventional theatrical play or a formal linear narrative, or which alternately does not seek to depict a set of fictitious characters in formal scripted interactions. It therefore can include action or spoken word as a communication between the artist and audience, or even ignore expectations of an audience, rather than following a script written beforehand. Some kinds of performance art nevertheless can be close to performing arts. Such performance may utilize a script or create a fictitious dramatic setting, but still constitute performance art in that it does not seek to follow the usual dramatic norm of creating a fictitious setting with a linear script which follows conventional real-world dynamics; rather, it would intentionally seek to satirize or to transcend the usual real-world dynamics which are used in conventional theatrical plays. Performance artists often challenge the audience to think in new and unconventional ways, break conventions of traditional arts, and break down conventional ideas about â€Å"what art is†. As long as the performer does not become a player who repeats a role, performance art can include satirical elements (compare Blue Man Group); utilize robots and machines as performers, as in pieces of the Survival Research Laboratories; involve ritualised elements (e. . Shaun Caton); or borrow elements of any performing arts such as dance, music, and circus. Some artists, e. g. the Viennese Actionists and neo-Dadaists, prefer to use the terms â€Å"live art†, â€Å"action art†, â€Å"actions†, â€Å"intervention† (see art intervention) or â€Å"manoeuvre† to describe their performing activities. As genres of performance art appear body art, fluxus-performance, happening, action poetry, and intermedia.

Happy moment in my life Essay

Social networks are becoming increasingly important in higher education as the format of course delivery changes to include hybrid and online models, and as the social network offers students a way to stay in touch, creating face-to-face like conversations and other interactions away from the physical classroom. From this perspective, social networks are particularly important for adult learners who often have complex, busy schedules that may not enable them to participate in face-to-face events at their institutions of choice, or may prohibit them from participating during â€Å"regular† classroom hours. Online social media participation can happen anytime, anywhere, and fills the need of adult or distance (or both) students to feel connected to their classmates, their instructors, and their institutions. My experience teaching both face-to-face and online courses with and without the use of social networks has shown me how valuable they can be to overall student engagement. In both cases, before turning to using a social network (in my case, Yammer) as a web course space, I tried using other formats for student engagement such as blogs, wikis, and forums. I found that the â€Å"chatty† nature of social networks made a big difference in the kind of student participation I saw and the length, depth, and consistency of student-to-student and group-to-group (many-to-many) interactions that occurred in my courses. Read more: Essay About  Happiest Moments in Life Social networks most closely resemble what happens in face-to-face discussions, and therefore resulted in the students feeling more committed, engaged, and known to each other and the course, as well as (potentially) to the institution. Other factors contributing to the increased engagement with the use of social networks are: (1) The low learning curve: Most people are familiar with Facebook, and can therefore easily adopt any similar social network without feeling burdened by having to learn anything new; (2) Familiar faces: The use of a photograph alongside the students and professors or administrators postings goes a long way to heighten a sense of familiarity. Often I found students knew each other and me from the social network so well that when we finally met in person, it felt very familiar; (

Monday, July 29, 2019

Help Desk Essay Example | Topics and Well Written Essays - 1250 words

Help Desk - Essay Example Otherwise you risk sending the customer away. Mobile email and broadband solutions, as well as collaboration tools like web video conferencing enable businesses of all sizes to remain professionally operational at all times. They give you the freedom to work in the way that you need to from any number of locations, so you can respond to colleagues and customers in the way that suits you, and them, best. And now with hosted services available, it’s even easier to stay in-touch as there’s no initial investment or expensive IT infrastructure to maintain as this can all be managed by a service provider on your behalf. In research, Vertex, a customer service company in the UK, found that customer response time should be between two and four hours. It should be long enough to address the query properly and to respond with enough detail but its also short enough not to result in a follow-up email asking, ‘Did you get my first email?’ A large international information hosting company is documented for its customer-friendly approach and fast response times. It’s no answer machines and no voicemail: customers will get straight through to the can work on resolution their problems. It claims to answer â€Å"99.4 per cent of support calls with real folks among 5 seconds†. These days over hr of Fortune one thousand companies2 commit to establish on-line communities by 2010 and to deliver client service social networking retailers. However, the key issue to recollect is that theres no purpose in having or developing contact channels if you are doing not perpetually monitor them and use them to reply back to customers. Many corporations area unit currently interacting with customers via mobile applications that build transactions quicker and less complicated, nonetheless still personalized. As an example, in the UK, Ocado3, a grocery delivery company, helps you to

Sunday, July 28, 2019

Project Management Institute's Project of the Year Award Essay

Project Management Institute's Project of the Year Award - Essay Example Project Management Institute’s Project of the Year Award 1. Summary of how the project manager or team exhibited exceptional and ethical project management practices. The official website of the Project Management Institute’s (PMI) Project of the Year (POY) Award reveals that the organization envisions recognizing and acknowledging the exemplary contribution of nominated project teams in terms of noteworthiness, relevance and adherence to specified standards of their respective projects. As explicitly indicated, â€Å"the PMI Project of the Year (POY) Award recognizes the accomplishments of a project and the involved project team for superior performance and execution of exemplary project management† (Project Management Institute, 2011). In this regard, the winner for 2010 POY Award was the National Ignition Facility Project was deemed to be â€Å"managed by Lawrence Livermore Laboratory (and) was the largest ever scientific construction project completed by the U.S. Department of Energy, resulting in the world's largest and most energetic laser system. The design and project commissioning were accomplished by a worldwide collaboration among governments, academia, and many industrial partners. It will serve a broad scientific community exploring new technologies in energy production and new frontiers in astrophysics, materials science, and nuclear science† (YouTube, 2010). The project team exhibited exceptional and ethical project management practice by complying and adhering to the foundation standards and consistent with the evaluation criteria, to wit: â€Å"(1) met or exceeded Owner/Client’s needs as evidenced by a letter from the Owner/Client; (2) met or improved on budget and schedule performance when compared with original established budget and schedule goals; (3) demonstrated originality and uniqueness of applied project management techniques, including innovative application of practices/methods; (4) exhibited techn ical aspects and advancement of the project management profession through effective application of the nine PMBOK ® Knowledge Areas: (5) demonstrated complexity and challenges of the project and unusual conditions, issues, and barriers requiring special management team action and performance; and (6) identified Risks and established plans to overcome them† (PMI, 2010). In this regard, the National Ignition Facility Project envisioned focusing on nuclear fusion that is harnessed to create limitless and carbon free energy. The project was reported to help scientists create nuclear fusion in the laboratory setting. Accordingly, through collaborative efforts of government, academia and industry, the project was revealed to have been instrumental in fuelling innovation that enabled the establishment of the largest and highest energy laser and the largest optical instrument ever. 2. Discuss the role of the project manager or team, the organizational setting, the recipient’s approach to project integration management, and obstacles that had the potential of adversely impacting the triple constraint. The project manager, the Lawrence Livermore Laboratory in joint efforts and collaboration with the Department of Energy, was reported to have been instrumental in the â€Å"design through commissioning (that) was accomplished by a worldwide collaboration among governments, academia, and many industrial partners. NIF provides an experimental platform for accessing

Saturday, July 27, 2019

Writing assignment Research Paper Example | Topics and Well Written Essays - 500 words - 3

Writing assignment - Research Paper Example Due to the diverse nature of the country’s power, the president is not able to simply command in order to achieve his goals. Different levels of governments have different motivations and sources of power. Due to this, the president needs to be able to convince others that his goals are what are in their best interest. In politics, it is always common to note that even though the president desires an action to be committed does not mean that it will be done. He has to be able to coheres, negotiate and persuade people to act. The second important ingredient is professional reputation within the country and abroad. Presidential reputation is important as it determines how policy makers and other members in Washington view him. This reputation can be noticed by how the infrastructure of the government relies on him to carry out his duties. If a president has a good reputation, it is easy to smooth out negotiations to implement important policies. The final important ingredient is public prestige. Prestige generally denotes how the president is viewed by the public. Although the public is not directly involved in policy making, it is their view of the president that determines how various policies move throughout various levels of the government. The public’s confidence in the president affects how he is viewed by organizations and how these organizations accept his policies. Apart from these main ingredients, Neustadt also notes that a president should be able to think progressively. This will make sure that he decision he makes at a particular point in time will help him I the future. Applying these ingredients to President Obama, it can be noted that he is indeed a powerful president. The president has been able to pass several important policies and legistlation despite constant opposition from congressional Democrats and Republicans. He has been able to persuade these policies

Friday, July 26, 2019

Biology Essay on Diabetes Example | Topics and Well Written Essays - 2500 words

Biology on Diabetes - Essay Example According to Hsieh et. al. (2005 quoted in Morhan et. al. n.d., p. 15), various organs like the kidney and liver showed some lowered levels of mtDNA 8-OHdG when the rats were treated with rice bran oil. It showed that the oil may have certain properties that would be helpful to diabetics. Another study coming from Molnar et al. (n.d. as cited in Morhan et. al. n.d., p. 15) suggested that circulatory system illness and diabetes can be caused by angiotensin-converting enzyme gene insertion and deletion polymorphism. Those who have allele D may experience a heightened oxidative stress. It then leads to the injury of endothelium. Oxidative stress is then detected by the presence of albuminuria. Albuminaria may have some linkage with type 2 diabetes as what was investigated by Molnar et al. (n.d. cited in Morhan et. al. n.d.). With the significant level of fructosamine in the blood, they need insulin and more medicines for combating hypertension than people with the genotype II. Fructosam in is then the substance resulting from the joining of fruit sugar and amine through chemical reaction and releasing water in the process. That substance is used as a detector of the blood sugar level and identify whether an individual has the tendency to have diabetes or not (Lavin 2009, p. 697). It was then proven by the study that patients with allele D have bad metabolic activity and exhibit cell damage development due to oxidative stress. The connection then between the treatment method and the genotype and hypertension treatment had small significance (Morhan et al. n.d., p. 16). Hypertension is then the drastic increase in the blood pressure that passes through the blood vessels and result to tearing of the walls of the vessels. Its complications are heart attack, kidney failure and stroke (Cohen 2004, p. 9). The amount of fructosamin in the bodies of the patients was then affected by inhibitors as its presence reduced the amount while its absence allowed the prevalence of be yond the normal level of fructosamin seen in the body. The study concluded with the patients having resistance to taken insulin led to a degrading state of metabolism that resulted to oxidative stress (Morhan et. al. n.d., p. 16). The study showed how certain genes affect the condition of diabetics. Going on with the oxidative stress, it becomes a complication of diabetes once superoxide has been made in excess through the existence of hyperglycaemia. It happens in detail as such overproduction of superoxide leads to higher levels of nitric oxide creating strong oxidants that hastens the appearance of complications from diabetes. The same method also causes damages to the inner linings of the blood vessels for diabetic patients (Morhan et. al. n.d., p. 17). Hyperglycemia then is the condition of having high concentration of glucose in the blood as a result of not having much insulin in the body to regulate the blood sugar levels. It may progress slowly or may come out abruptly that may pose serious complications. When it goes out of control, it has the ability to dehydrate the person and experience severe chemical imbalance in his body. It is then usually related to diabetes

Thursday, July 25, 2019

Virtual team Research Paper Example | Topics and Well Written Essays - 250 words

Virtual team - Research Paper Example Trust is a very crucial thing in a virtual team, which can reduce uncertainty to the global and technologically based environment. The theory of media richness and social presence questions the possibility of development of relationships and trust among members in a group (Duarte and Synder 30). The same theory asserts that use of computers to communicate may eliminate important types of communication people could use to convey trust, warmth, attentiveness, and other interpersonal affections. However, other studies have shown that communication is not a function of the characteristics of the media, but a function of context, setting, and timing. Therefore, we can view the aspects of context, setting, and timing in any theory that is attempting to argue that virtual teams cannot work in the present global society. A better way of looking at the problem of trust and relationships in virtual teams is considering communication behaviors. Communication among the members should be timed and be within the subject of concern. Also of paramount importance is commitment to communication, as regular communication produces socialization, courtship and social identification (Lipnack and Stamps 35). In conclusion, for virtual teams to succeed there are important steps to follow. These include holding a face-to-face meeting in the beginning, establishing clear codes of conduct for behavior, recognizing and rewarding for performers and every member realizing that most communications may be non-verbal so that they can be careful how they communicate (Duarte and Synder 20). A virtual team refers to a group of people who though separated by distance and/or space still work together towards a common goal by communicating using electronic means or by holding face-to-face meetings occasionally (Lipnack and Stamps Jeffrey 83). Virtual teams come because of reasons such as members not being

Wednesday, July 24, 2019

Ethical Issues in Packaging practices Research Paper

Ethical Issues in Packaging practices - Research Paper Example The main aim of any business is to maximize their profit margin and for this they adopt any strategy available. The main unethical steps taken by entrepreneurs’ to mislead the customer to achieve their motive are taken under view. The marketing efforts made the consumers aware about what a certain company or organization can offer them. When talking about marketing, the first concept that is imparted is that of the 4 Ps. These Ps all signify a separate area; product, price, placement, promotion. However, the more modern teachers of the marketing concept talk about a 5th P, which is the packaging. The fact that packaging has been included in the P goes on to show how important a part of the marketing effort really is (Ayub, 2013). Probably no words are required to explain what packaging is but simply put into words, it is the material use to pack the final product. When talking about packaging in marketing context, it refers not only to the material that is used for packaging but also how that packaging appears to consumers. The outlook of the final product in most cases is dependent on the packaging rather than the product itself. In that aspect, packaging is very important because there are a large proportion of the consumers that buy a product based on how it looks. Ethics are the moral principles or bases that guide the decision making for anything. Before the buyer uses the product what makes him purchase is the packaging of the product which motivates him to pay for it leaving the other same purpose serving products. The article discusses the various ethical issues found in packaging practices by business practitioners. Environmental Paradigm It is a clear fact that not all business fully comply with the societal and environmental ethics that exist in a society. These issues could be local or international and affect the businesses as well as their workplaces. Since there are no specific guidelines for business ethics, it becomes difficult for companies to actually satisfy the customers’ and the workers’ needs related to ethical issues. Every person, every organization or every entity has different ethical standards and sometimes they are so vague that it becomes difficult to meet and understand them. In order to meet these stan dards, organizations often suffer from losses or minimize their profits so as to create a balance between the two factors that are business ethics and business profits (Bone & Corey, 2000). Compromising on profits in the short run has never proved detrimental for any business; it always provides the company with doubled revenues in the long run. Some of the major issues include bribery, gender discrimination, child labour, not paying enough to workers and product packaging etc. The issue that will be focused in this essay is of product packaging. A number of companies intentionally remove the details of the side effects of their product packages while there are some companies that run certain environment specific tests such as animal testing etc. for example; The Body Shop sells only those products that are not animal tested. According to them they sell only vegetarian friendly i.e. natural products. This has created a competitive advantage for the company and ethically sensitive pe ople prefer it over other cosmetic brands. However, a number of other companies are indulging in such practices in order to maintain their customer base (Laczniak, 1983). Packaging Canvas According to a research analyst, the packaging issues of different products are different for the three important groups that are related to the product. First being the packaging professional,

The Direct Cause of the Second World War Essay Example | Topics and Well Written Essays - 1000 words

The Direct Cause of the Second World War - Essay Example Although many historians might state that the Second World War was an inevitable explosion of tensions that had built up over the years due to globalization and European control of resources, this paper insists that the unprovoked actions of the German regime under the orders of Adolf Hitler is the immediate cause of the war. Adolf Hitler's Nationalism Adolf Hitler's rise to power is one that was marked by a call for a strong nationalist leader who could restore Germany to its former glory. This therefore gave him the impetus to rise and fill the vacuum that existed in the German society. The First World War (1913 – 1919) came as a big blow to the Austrian-Hungary Kingdom which was the predecessor of the Germany that Hitler inherited. The First World War, had also been fought over the control of natural resources and the expansion of the most powerful nations of the world to control international trade. Germany had entered the war under the leadership of the Kaiser and Ministe rs of the country and most of the war was fought outside Germany (Axelrod 16). After the War, the victorious allies, led by Britain formed the league of nations which forced Germany to surrender by signing the Treaty of Versailles. The Treaty failed to punish the Kaiser or Ministers of Germany, Austria and Hungary who were truly responsible for the war (Axelrod 15). Instead, the Treaty of Versailles sought to weaken the Germans by forcing them to cede 13% of their lands to allied nations like France, Poland and Czechoslovakia who had supported the British-led campaign during the First World War. Secondly, the Treaty of Versailles limited the German military capabilities with statutes and placed serious economic strains on the German people. In periods of economic depression, nations often look out for someone to blame and they seek strong leaders who can come up with solutions that would lift the masses out of poverty, this gave the impetus for the rise of Hitler. Hitler is quoted a s saying â€Å"In view of the primitive simplicity of their minds, [the masses] more easily fall victim to a big lie than a little one.† in his unpopular manifesto the main kampf. (Axelrod 27). Axelrod goes further to quote the Joseph Goebbels the Propaganda Minister of the Nazi Party as saying â€Å"That's my trade: hatred. It makes you a long way further than any other emotion.† (30). This new position created alongside Hitler's rise and growth of the Nazi party was clearly steeped in settling old scores and misleading the German people into fighting against other nations and peoples they considered were enemies of the German people. Through this, the Nazi party gradually built a one-party state and established a dictatorship. This clearly shows that with the fertile grounds prepared by the problems and challenges of the 1920s Germany, Hitler could easily come in with his malicious thoughts and ideas meant to punish people that he had brooded hatred against in the pa st. Hitler was able to promise Germans that â€Å"he could lead Germany back to the strength, he could overcome the psychological depression of the past defeat and the economic depression of Germany's contemporary situation† (Weinberg 53). This therefore shows that Hitler presented himself as the kind of savior that Germany needed to retain its past glory. However, Hitler did this by arising through the ranks to become a

Tuesday, July 23, 2019

Marketing Program Failures Essay Example | Topics and Well Written Essays - 750 words

Marketing Program Failures - Essay Example Marketing entails the link between economic response patterns and society’s material requirements. In fact, content marketing main aim is to attract customers and retain by consistently curating valuable and relevant content with an intention of changing consumer behavior. This, therefore, means that for any marketing program to succeed, the material requirements must always be appealing. However, if the marketing program has a poor content, then the possibility of the program to fail remains high. A marketing program does not have to be valuable for it to be considered perfect to the audience (Hündgen, 2011). The marketer does not have to overspend in order to achieve quality marketing. Simple programs also sell to the audience. In fact, it needs to be better that the other competing marketing programs. The standards of the marketing program should always be higher. Poor program content does not attract consumers but instead, it creates noise or misleads them, which makes it likely to fail. Poor program content can also be reflected in the grammar of the text. Incorrect grammar in the program sends wrong signals about the program. Therefore, it is always important to proofread and check the spellings of the content before posting. First impressions always send a powerful message to the audience, and they always last a longtime. Being positive in the content will, therefore, sell the company. The content must be done in such a way that it calls the reader into action. It should always tell the reader what they want to hear after reading the program. Many marketing programs simply fail because their recipients never know what to do. Marketers must always close their programs with phrases that give their audience a direction to where they are found. It is quite evident that even some of the best marketing programs are not appreciated

Monday, July 22, 2019

Value Engineering Programs Overview Essay Example for Free

Value Engineering Programs Overview Essay The programs objective is to impart knowledge covering core areas of plant design to enhance constructability and improve construction process. Studies, workshops and research focus on this program. The program covers effective cost saving in constructability in order to make maximum use of knowledge and experience in all phases of construction including planning the construction process, designing, procurement, and to conduct field operations to improve construction process. Lean Construction Lean construction covers how to plan and manage the work of construction. It saves time and improves quality of construction process. That is construction can be accomplished in much less time with proper planning and quality output. Nature of Program â€Å"†¦.. Lean is fundamentally empowering all workers to be partners in your continuous improvement efforts. You ask them to make their work easier and more interesting. You challenge them to grow every day on the job. You ask them to cut costs, to improve safety, to improve quality and reduce the time line to deliver superior products and services to their customers. †¦And then leave you the challenge to figure it out for yourself. They rarely ever had a cookbook approach for you. In fact, Ohno would never let anything be written down on how to do lean. He wanted it to be a system that allowed for constant change. Sure, their disciples created the Kaizen Blitz, which became a million dollar product for them. While others have created Six Sigma another million dollar product. Somehow we just resist change until everyone is doing it then we jump on the bandwagon† (Lean construction) Green Construction and Sustainability Nature of Program How are they implemented? Relation to Value Engineering The core content covers the area of green construction and sustainability. Implementation Establishment of New plant has become very mandatory for the proper working and progress of the company. As older plant is causing huge losses and increased labor cost. The older machinery repair and maintenance is costing $5 million annually. This is also increasing labor workforce due to inadequate plant machinery and declining working condition. With implementation of New Technology and new machinery labor force and cost will be reduced dramatically and work will be enhanced. This includes several tasks: ? Factory management ? Plant operations management ? Production management ? Operations management ? Manufacturing ? Assembly automation ? Automated assembly ? Automated manufacturing ? Industrial automation ? Flexible manufacturing ? Robotic work cell ? Robotic assembly ? Assembly process ? Assembly sequence planning ? Continuous flow manufacturing ? High volume, low cost product assembly ? Manufacturing process development ? Production line ? Process engineering ? Production engineering ? Continuous motion assembly ? Operation analysis Company’s plan for financing the construction Target: New Products Creations competitive edge in the market place depends on getting this new component plant built and functioning within the next 48 months. A lot depends upon securing the financing, including your future with the company. Funding for this project will come from a consortium of Venture Capitalists, a bond offering and bank loans. Flexible manufacturing will make new plan respond to the rising market demand by various new models and products model variants. Support will be gained from Banks and Consortium of Venture Capitalist. The Plant may cost $980 million for proper implementation and working References Report on (Design for constructability studies in support of the DOE ALWR (Advanced Light Water Reactor) Program) 1990

Sunday, July 21, 2019

Political And Economic Stability In Singapore

Political And Economic Stability In Singapore MICE industry is increasing rapidly and create tremendous amount of profits worldwide in tourism sector. MICE stand for meeting, incentives, conferences and exhibition which driving ahead as a key growth driver. The MICE industry plays a very important role and economic contributor in Singapores tourism industry. There are many factors that makes Singapore become a major MICE destination in the world. Singapore is working hard to stay on top of the competitive business event arena and now Singapore is ranked as the top convention city in Asia for ninth times. Singapore has the first class conventions venue such as Singapore Expo. Besides, Singapores pro business environment, multi-ethnic landscape, strategic geographic location and multi lingual populace has attract many business travellers prefer to do their business tourism in Singapore. With its strategic location, government support and all those strengthen factors; it makes Singapore boost them to hit the highest achievement in this sector. The influencing factors are divided into few different categories. 1.2 Problem Statement This research is about how Singapore develops themselves to become a major MICE destination among the world. At the moment, they are doing a very great job as a MICE destination in Singapore. In fact, there are several factors that influence Singapore as a MICE destination. 1.3 Research Question What is MICE industry all about? What are the major factors that influence Singapore as a major MICE destination in the world? What makes Singapore become a major MICE destination in the world? The forecast be for this sector in Singapore and why? What makes Singapore continuously attracts high profile and highly rated international business events? What have Singapores government done in order to boost up their MICE industry among the world? 1.4 Research Objective This research is going to find out the factors that influence Singapore as a major MICE destination in the world. By carry out this research, the MICE industry in Singapore has growth rapidly and future lifestyle as well. Besides, there is also the understanding of how importance MICE industry that could affect Singapores tourism sector and to find out the reason why business travelers loyalty toward Singapore as their favorite MICE destination. Lastly, this research also show the evaluate business travelers benefit and interest by organizing an event in Singapore. 1.5 Conceptual Framework Define MICE industry in Singapore Strategic Location Critical Mass Communication Infrastructure Stability political and economic in Singapore The major factors that influence Singapore as a major MICE Destination in the world Excellent transportation system and telecommunication connectivity. Excellent meeting and conference venue. Pro Business environment and governments support The forecast be for this sector in Singapore Figure 1.1 According to this figure 1.1, it illustrates the major factor that influences Singapore as a major MICE destination in the world. The purpose of showing this figure is to demonstrate the topic of this report. The theory framework will show the reason why Singapore can become a ideal MICE destination to the business travellers. Firstly, this research shows aspect that could influence Singapore as a major MICE destination. Besides this, the report also shows how Singapore develops their MICE industry in tourism sector. Lastly, will be the evaluation of forecast for this sector in Singapore. 1.6 Scope and Limitation The scope for this research is to focus on Singapore MICE industry. Besides that, is to observe how Singapores MICE industry growth rapidly within these few years, how they develop their MICE industry in order to increase the amount of tourist and to predict Singapores MICE industry in the future. The time constraint will be the limitation as this research paper due to the study period of time which is from January 2010 to June 2010. It s about half year time, due to the limited time the researcher may face the difficulties when finding the resources and getting the information from journals, online journals, newspaper, websites, books and etc. There is only limited and restricted literature for Singapore MICE industry that is related in the journal databases such as EBSCO Host, Ebrary, and Google Scholar, and some of the sources that provided were not up to date. But this is a challenge for me to do more on this research. Significance of the Study This research aims to gain an understanding on how Singapores MICE industry growth rapidly in tourism sector. To carry out this research, Singapore is working hard and put themselves out on top of the challenging business events field. This research is very important and very useful. Through this research, the targeted readers which are interested in organize a conference event in Singapore can refer to and to find out the reason why Singapore can be a major MICE destination in the world by maintains their quality and their MICE facilities. Other than that, this research could recommend targeted readers to choose Singapore as their ideal MICE destination. Chapter 2 Review of the Related Literature 2.1 MICE Industry in Singapore MICE industry is increasing rapidly and create a tremendous amount of profits worldwide in tourism sector. MICE are acronym of meeting, incentives, conferences and exhibition which driving ahead as a key growth driver. Europe and North America has been stated as one of the front MICE destination but Asia also one of the country that involves a lot in this industry. Singapore is not an exception. The MICE industry plays a very important role and economic contributor in Singapores tourism industry. A new era of tourism development and attractions will be gearing up for major revitalization by Singapores tourism sector; it will also re-define Singapores tourism landscape. Singapore has the first class conventions and exhibition facilities such as SINGAPORE EXPO and SUNTEC Singapore international convention exhibition centre. In addition, Singapore has outstanding communication infrastructure, it provides more convenience to tourist travel from one place to another domestically and internationally. Singapores pro business environment, multi-ethnic landscape, strategic geographic location and multi lingual populace has attract many business travellers prefer to do their business tourism in Singapore and accompaniment by MICE facilities, infrastructure, expertise and proficient in event management. Singapore put themselves out on top of the challenging business events field. Singapore MICE industry has grown rapidly and now Singapore is ranked the world top three cities for meetings by the Unions of International Associations (UIA). Apparently Singapore has been stated and positioned as the Top Convention City all around Asia for ninth time and the Third Top Convention City around the world for the second consecutive year by ICCA Ranking. Singapore has leapfrogged two score to reach on top of the ranking, defeating Paris and Vienna and providing its goal to be the top of the universe an improvement. 2.2 The factors that could influence Singapore as a major MICE destination in the world. There are many factors that can manipulate Singapore to become a major MICE destination in the world and it also could affect their tourism sector by increase MICE events in their own country. The factors also can be consider as their strength mean while it is a positive factor that can enhance their MICE sector to becoming the Best City for MICE events among the world in the future. 2.2.1 Critical Mass The most important factor is it has critical mass; it has been awarded by the Union of International Association (UIA) and Asias top convention city for several years. By developing a critical mass of MICE event is this industry, this will helps to create an eco-system of business event that harmonize one anothers existence. Business event not only generate enliven of MICE industry in the mean time its also build up Singapores value intention as a MICE destination. For the past few years, Singapore has increase the amount of international meetings. These shows from the creativity and quality of the Singapore MICE industry and construct Singapore constantly catch the attention of high-profile international business event. 2.2.2 Strategic Location Secondly, Singapore has a strategic geographic location which is central location in Asia and also a connection between east and west. It also acts as key district hubs for Asia. This strategic location makes Singapore exert a pull on global businesses and it smoothly links around the world. There were few big events of different industries was held in Singapore such as Asia Aerospace, Food Hotel Asia, Communic Asia and Broadcast Asia and etc. The feedback was great. Singapore is a safe hospitable country; this is also one of the reasons that event organizers choose Singapore. Beside this, Singapore Changi Airport is also one of the busiest airlines in the world, which connects to over 180 cities in 50 countries and is categorize as a premier International Maritime Centre. Its wide ranging air and sea linkages allow ones business to allowed 2.8 billion people within a seven hours flight radius. Singapore Tourism Board claims that Singapore position attest to its appeal as a premium business travel and meetings, incentive travel, convention and exhibition destination 2.2.3 Stability political and economic in Singapore Singapore has a good reputation of efficient, honest and politically stable government compare to other countries. Singapores stability of political gives the trust of safe for business travellers to decide to organise events in Singapore. Singapore is a knowledge-based economy and attracts worldwide investments. This may attract foreign investors flock its shores because of their open trade procedure, social stability, world class infrastructure and international communication links. The stability of Singapores economic also will raise the amount of business travellers invest in promoting their product in Singapore. The IMD World Competitiveness Yearbook 2008 stated that Singapore as the worlds second most competitive economy. The stability political and economic growth is sustain by the government of Singapore, it helps to attract more business travellers to held their event in Singapore with no burden compare to their competitors such as Malaysia and Hong Kong. 2.2.4 Communication Infrastructure Singapore is well known by their efficiency and good communication infrastructure have allow it to attract a whole train of international events including the Asia-Pacific Economic Cooperation (APEC) meetings in 2009 and the forth coming event will be the first-ever summer Youth Olympic Games which falls on 14th August 2010 to 26th August 2010. Singapore also attracts business travellers to contribute to its achievements as a main destination for both business and entertainments. Singapore has rated the top in terms of basic infrastructure and technology infrastructure in the World Competitiveness Yearbook. Its efficiency through latest technology and modern infrastructure makes Singapore MICE industry speedily grow in tourism industry. 2.2.5 Pro Business environment and Government Support Singapore is recognized as a PRO business environment and its recommended as the most beneficial place in the world for businessman to start their business there. In facts, Singapore has been noted as No 1 in terms of Ease of Doing businesses for the past four years by the World Bank. Singapore is one of the lowest corporate and income tax rates among the most of the countries. The government has improves the firm environment to help business manage more efficiently. Singapore has effectively reached a good amount of association meetings by its well-built business basics and plans to assemble a active ecosystem of business events. Singapore Tourism Board (STB) said All vital signs are pointing towards the return of business confidence in the Singapore business event sector, fuelled by dynamic developments taking place within the tourism landscape. Leverage in our sterling track record and a sound business fundamental, Singapore has secured a robust pipeline of business events, including key international association meeting in coming years. The general pro-business environment gives Singapore a competitive boundary as a major MICE destination in the world. There is another reason that makes Singapore become a PRO business environment and MICE destination because of the strongly government support through Singapore Tourism Board (STB), government support was the key to make an event successful. Singapores government give fully support in this sector and contributes Singapore as a vibrant business environment. Singapore devoted a lot in promoting the MICE business and also their tourist attractions because conventions and event have the ability to make more profits and jobs in short term and it can increase the interrelated investment and the amount of visitation on longer term. The Singapore Exhibition and Convention Bureau (SECB), a group of the STB has develop the Business Events in Singapore (BE in Singapore) its help business events organizers release a higher amount of events. Besides, Singapore Tourism Board (STB) also launched another campaign Make It Singapore and it helps to offer marketing support and motivation to potential MICE business. Furthermore, Singapore is has the professionalism in the MICE industry that can makes Singapore to be a global exchange core where people can gather and share their ideas and knowledge. 2.2.6 Excellent meeting and conference venue and offers venue Singapore is a global core for business and leisure and it is also a best option for convention and events. The excellences of hotel ballrooms and with the first class convention centres, Singapore has continuously recreates with new event location and attraction such as Marina Bay Sands Singapore. Marina Bay attractions will create a unique MICE venue that we cannot found elsewhere in Asia with international standard MICE facilities and services. MICE facilities in Marina Bay Sands, Singapore Expo, Suntec International Convention and Exhibition Centre are amalgamate to boost Singapores attractiveness as a business and leisure destination. Suntec Singapore International Convention and Exhibition Centre and Singapore Expo are defined as a favourite choice for all find of business event due to their huge exhibition spacious. A good convention centre, exhibition halls and meeting venue plays a very important role when we organize an event. 2.2.7 Excellent Transportation System and Telecommunications Connectivity Singapore posses of efficiency and excellent public transportation system, which includes cabs, buses and the modern Mass Rapid Transport (MRT) rail system same goes to their air transportation. Tourists can get around in Singapore with no burden due to their excellent transport system. An outstanding network of railway system and buses connect travellers to reach any point of the city and the public transportation prices are reasonable to everyone. Singapore provides convenience for foreign business travellers to reach any destination, conference venues and attractions with their public transport system on time due to their punctuality of railway systems. The newly opened MRT network has made ease of access to conference venue such as Suntec Singapore and Singapore Expo, it made convenient for those business travellers. Beside this, Singapores bus network is tremendously frequent and extensive and it does not only bring convenient to Singapores citizen and also tourists. Singapore is well recognized for their public transportation and telecommunications connectivity. According to a survey carried out by Singapores Land Transport Authority in year 2006, 8 out of 10 Singaporeans were satisfied with their public transportation system such as buses and also railway system, Singapore has 21 Tbps of installed international communication infrastructure capacity, adequate for every business require in telecommunications connectivity. They are one of the more aggressive telecommunication hubs around Asia Pacific. They also provide excellent telecommunication links with broadband network all around business hotels, so those business travellers can surf the internet anytime when inside the hotel room. 2.3 Forecast Singapore MICE industry in the future. From my point of view, I strongly believe that Singapore will finalize to the top spot and becoming the Best City for MICE venue in the future. Singapore will also be leading ahead of other countries. Singapores tourism background is going through a dynamic transformation. On year 2010, there will be more cityscape that gives off more vibrant and enthusiasm on the atmosphere. Singapore are still innovating themselves by introducing newly, modern venue and outstanding facilities to give their foreign business travellers and demonstrators a pleasure knowledge and ambience. They will also keep up their status as Asias premier MICE destination through recommending new transportation system and entertainments. The Asia-Pacific is likely to attract over 100 million business travellers and MICE visitors by 2015 with the growth prospective in the region. Therefore there will be no surprise that Singapore to become a bigger slice of this MICE market. With its stability political and global economy shows signs of reflect, the business event sector is in good chance of taking advantage of on business opportunities. In the upcoming years, Singapore will keep a strong pipeline of business occasion, including the key international association meetings. Ms Melissa Ow, Assistant Chief Executive, Business Travel and MICE Group, Singapore Tourism Board (STB) said: As we move into 2010, and climate of economy recovery the STB will continue to work closely with our industry partners to meet business event organisers evolving needs, explore new business leads and strengthen our international marketing and channel development efforts. Marina Bay sands will be one of the improvement into an amalgamate MICE venue which offers 200,000 square meter of convention and exhibition space which create and grow strategic business occasion. These developments will redefine Singapores downtown and central business region. There are estimate more than 150,000 meeting attendees are to stopover Singapore for those events that already booked at the Marina Bay Sands. Besides, Resort World Sentosa has accommodated 35,000 attendees at a single event. Marina Bay Sands said that it has secured more than 30 events development to be held there from this year to 2012. On the year of 2010, the worlds first -ever summer Youth Olympic Games will be hosted by Singapore. With approximately arrival of 15,000 overseas participants and visitors bring about 180,000 or more visitor to Singapore. Beside this, Singapore is also hosting a series of upcoming events and meetings in these few years, such as International Cruise Terminal 2010, Gardens by the Bay 2010, Sports Hub 2010, National Art Gallery 2013 and many more. Singapore will continue to expand their abilities and upgrading their infrastructure to provide business event travellers in order to guarantee their position as one of the top Asian. Singapore Tourism Board (STB) has planned to upgrade the facilities of Singapore Expo to make sure Singapore Expo is well-organized to sustain the development of MICE industry. The upgraded facilities will ensure Singapore Expo retains their excellent venue for business events. There are many growing competitors out there from other country such as Malaysia, Hong Kong, Thailand, Macau and etc. But Singapore is making every chance to offer good facilities and services to their business event travellers. Besides, STB are working continuously closely with the events industry. The main purpose is to increase the amount of the business event at Singapore and to make sure that the MICE sector continues to move ahead as a key driver of tourism development in Singapore. Lastly, I personally think that Singapore has performed well in this industry and lead Singapore to be on top of the MICE industry, because during the staging events in Singapore, the event organiser can be assured of their quality service, accompanied by its tremendous transportation and professional workforce. Although Singapore has obtain a lot of awards but they dont feel self-esteem, they keep on their good work and maintaining their facilities to achieve and make them the best MICE destination in the world. Furthermore, Singapores MICE industry is on the roadway and I strongly believe that if Singapore put in more efforts on this industry, it can leapfrog to reach the top and becoming the Best City for MICE events among the world in the future. Chapter Three Research Methodology 3.1 Research Method For the methodology, this research will be using questionnaire. Among quantitative method and qualitative method, I use both of the method for my research. It is also known as a mix of approaches. The first method is quantitative method which is a technique to gather quantitative data such as information dealing with numbers and anything that is measurable. While for the qualitative method is to understand the meaning of the numbers produced by quantitative method. We have to observe case analysis with given research imply to qualitative methods and quantitative methods to request respondents to rank their perception about these particular topic. 3.2 Research Design There are two types of research method which is qualitative method and quantitative method. Qualitative method is more on observation and quantitative method is subjective. Qualitative method need to collect date based on quality and is difficult to generalize because everyones perception is different; meanwhile it may affect the quality of the result. For the quantitative method, it is more objective compared to qualitative method because the data must be fact and logic. And it will be in numbers and also in statistics such as graphs or tables. It is essential to use both methods to understand the core of this research. 3.3 Data Collection Apparently the data in this report is collected from the secondary data which is online database. Secondary data can be easily found at journal, articles, websites, textbooks, books and etc. The researcher gets the journal from the college library website and it is mainly taken from the Google Scholar and EBSCO Host.

Saturday, July 20, 2019

Computer Ethics And Impact Of Society Information Technology Essay

Computer Ethics And Impact Of Society Information Technology Essay This report is a study of computer ethics and its relevance to todays society .We live in the age of super computers where everything comes to us in our finger tips. Children get exposure to Internet much before they start their formal education. Computers are electronics devices invented by humans for the convenience and welfare of themselves which does not have any kind of thought process internally about the ethical behaviours. The dos and donts in the information technology and Internet are unknown to many computer users. As new evolving technologies come in and these technologies pays way to create challenges in the areas of privacy and security of people around the world. Ethics refers to code of principles by which people live .Computer Ethics is the branch of information technology which deals with the nature and computer technology and the end users and their varying characters. It sets a certain standards or rules for the will be smooth sailing. Some common computer ethics are intellectual property rights copyrighted electronic content, privacy concerns, by which how computers affect society. It involves social issues, such as access rights, working place monitoring, censorship and junk mail; professional issues such as professional responsibility and code of conduct; legal issues such as legal obligations, data protection, and computer misuse and software piracy. The computer ethics field consists of the problems with computer software and hardware malfunctions by the misuse by humans. Our society depends on the computer and its network to leverage the business and social life, hence both social and personal ethicals issues exists . Without computers and its networks most of the industries will not survive in todays work and will come to a halt. Most of the electronic communications do not guarantee any security and privacy. This report is a journey through the history of computer ethics the pioneers and their perceptions and slants on computer ethic s. Later on walks through the influence of computer ethics at work and the various factors that affects to determine the ethical behaviours. (Bynum, 2008) 2. HISTORY OF COMPUTER ETHICS 1940s As the technology evolves, the studies related to this field evolved as well. The introduction of computer ethics as a study came in the year 1940. Norbert Weiner was known as the father of computer ethics. In 1940s, Norbert Weiner who was an American mathematician and professor of Massachusetts Institute of Technology created the Cybernetics during Second World War. 1950s In 1950 Weiner publishes his second book The Human Use of Human Beings [Page 16 of second edition of 1954] When I communicate with a person, I impart a message to him and when he communicates back with me he returns a related message which contains information primarily accessible to him and not to me. When I control the action of another person I communicate a message to him and although this message is in the imperative mood, the technique of communication does not differ from that of a message of fact It is the thesis of this book that society can only be understood through a study of the messages and the communication facilities which belong to it; and that in the future development of these messages and communication facilities, messages between man and machines, between machines and man, and between machine and machine, are destined to play an ever increasing part. 1960s Later in 1960 Don B. Parker, an Information Security Researcher and Consultant -associated with the ACM(Association of computer machinery) started watching the unethical usage of computer and information technology by computer professionals (Parker, 1999) (Bowling Green State University., 2001) In 1966 a professor from MIT Joseph Weizenbaum wrote ELIZA A Computer Program for the Study of Natural Language Communication between Man and Machine. The first computer crime was in the year 1966 in the United States, a computer engineer manipulated the programs of a banks computer system to prevent the banking account being used flag as overdrawn. In 1966 the Freedom of information Act (FOIA) was the first computer law legal right to access the governments information 1970s 1970s were the time period where the computers revolutionized and Walter Manner who is a Professor of Computer Science and Director of the Artificial Intelligence Project at Bowling Green State University in Bowling Green, Ohio introduced the term Computer Ethics . Manner offered the university students a course on an experimental Course on the subject at Old Dominion University. During the late 1970s through the mid of 1980s, being a lecturer Mr,Maner was much interest in university-level Computer ethics courses. He offered a variety of workshops and lectures at Computer science conferences and philosophy conferences across America. In 1978 he also self-published and disseminated his Starter Kit in Computer Ethics, Which contained curriculum materials and pedagogical advice for university? Teachers to develop computer ethics courses. In 1976 Joseph Weizenbaum published a 300 page book, Computer Power and Human Reason which set the benchmark in computer ethics as a field and is still considered as the classic in computer ethics In 1976: Abbe Mowshowitz published an article, titled: On approaches to the study of social issues in computing. It identifies and analyzes technical and non-technical biases in research on social issues in computing. Five positions-technicism, progressive individualism, elitism, pluralism, and radical criticism-which reflect major streams of contemporary social thought are examined- The ACM digital library, volume 24, issues 3, March 1981 In 1979 Terrell Ward Bynum s Professor of Philosophy at Southern Connecticut State University 1980s In 1985 James H Moor who is a professor of Dartmouth College in Intellectual and Moral Philosophy published an influential article entitled What is computer ethics. In the same year followed by moor, Deborah Johnson of Rensselaer Polytechnic Institute published Computer Ethics This is referred as the first textbook on computer ethics. The Electronic Communications Privacy Act ECPA of 1986 which prohibits the lawful access and disclosure of the law prevents government entities from requiring disclosure of electronic communications from a provider without proper procedure. (AOL Legal Department, 2003) 1990s Donald William gotterbarn in 1991 his paper work Computer Ethics: Responsibility Regained. explained computer ethics as a branch of professional ethics concerned with standards of good practice (Gotterbarn) (computerethics.org, 2000) In October 1992 the executive council of Association for Computing Machinery (ACM) voted to adopt the revised the ACM Code. It is also called Software Engineering Code of Ethics and Professional Practice ACM code of Ethics and Professional Conduct consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment [http://wiki.answers.com/Q/What_is_ACM_code] In 1995, Dr,Simon Rogerson professor of computing at De Montfort University in Leicester, UK created the Centre for Computing and Social Responsibility (CCSR) to organize the first computer ethics conference in Europe, which was named as ETHICOMP95.lateron Rogerson added computer ethics to the curriculum of De Montfort. In 1995 Gordian Kocikowska, predicted on computer ethics giving a statement computer ethics eventually will evolve into global ethics in her article The computer revolution and the problem of global ethics In 1999 Deborah Johnson stood opposite to the statements of Gorniak and told computer ethics will not revolution rather than ethical thinking and analysis, computer ethics is the same ethics with a twist in the flavour. (Comphist, 2004) (Bynum, 2008) VIEWS OF PIONEERS Norbert Wiener Norbert Weiner in his book Cybernetics or control and communication in the animal and the machine in 1948, Cybernetics is formally defined as the science of control and communication in animals, men and machines. It extracts, from whatever context, that which is concerned with information processing and control. His essential goal of cybernetics is to understand and define the functions and processes of systems that have goals. Weiner said that the human nervous system can be compared to It is enough to say here that when we desire a motion to follow a given pattern the difference between this pattern and the actually performed motion is used as a new input to cause the part regulated in such a way to bring its in a state of what is known as ataxia.An ataxia of this type is familiar in the form of syphilis of the central nervous system known ad tabes dorsalis where the kinetic sense conveyed by the spinal nerves is more or less destroyed [page 7 and 8]. Amount of information in a sy stem is the measure of its degree of organization, so entropy of s system is a measure of its degree of disorganization. And one is simply negative the other.study of Maxwell demon [Page 11]. Donn B Parker In an interview with Donn told that he has interviewed more than 200 cyber criminals to understand the motive to get into computer crimes which shows the evidences of common behavioural psychological patterns. Computer criminals universally fear unpredictable circumstances, environments and events that could cause their crime to fail. Unpredictable systems would create an atmosphere of uncertainty (Bowling Green State University., 2001) Parker describes the scenario methodology in computer ethics, a need to identify the participant in the scenario. Sorting the act and non-act classifying as ethical or non-ethical or not in the category Deborah Johnson Deborah has a different view on computer ethics. She said pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms in uncharted realms, even though she do not agree with computer creating new moral problems James H Moor As per Moor in his article What is computer ethics ? defined ethics due to policy vacuum and conceptual muddles with regards to social and ethical use of computers and technology. Computers provide new capabilities and new choices for action. His advices to analyse the framework which results in policy for that action. He also added that computers are logically malleable which can be moulded to do any kind of activities Donald Gotterbarn According to Gotterbarn computer ethics should be considered as branch of professional ethics with focus on standards of good practices for computer professionals whom all are engaged in the design and development of in the everyday activities will add value to their professional value. Co-ordinating with ACM he released code of ethics for computer professionals. (Gotterbarn) (Bynum, 2008) 4. COMPUTER ETHICS IN SOCIETY Computers and human life are inter-related , we relish it in many areas of our day to day life in traffic signals, banking system, tax, and police. People blame on computers for cash machine crashes traffic signal failures where human designed these softwares and networks. the dilemma are the blunders associated with computers like ozone layer remained undetected due to programming error Y2K problem was not detected till we approached 2000.If we dig into the actual history of the computer ethics it started with the use of first computer. Computer and information technology is not limited as it is spreads with branches like a banyan tree; information technology has its branches in all the fields of Industry medical, automotive like that the list is not closed. Internet which is a by-product of ICT is revolutionary link to all these branches. We connect officially as corporate, be in touch with our loved ones, search engines, mail, instant messengers. As a medium of storage of critical to personal data, everything are on fingertip irrespective of the physical location as we can say the information technology moves with us and is available in the same or expected form on the web. (Herold, 2006) (Bynum, 2008) 4.1 COMPUTER CRIMES Most of the cyber criminals are anti-social element who gets motivated by the prior worst personal experience resulting in the crimes. Computer crimes can result in financial loss, information loss. Some major computer crimes in info space and as listed below which affects both work and personal life. (Herold, 2006) Hacking Virus Fraud Identity theft Denial Of Services DoS Child pornography IRC crime Software piracy Hacking Computer hacking has become a status among many youngster.. Hackers are tend to have better understanding of coding and break into computers and are aware of bypassing the security or can remain undiscovered in the network for a certain time without leaving footprints for the forensics by wiping out the log files. When we talk about the evil we should see the other side of the coin the virtuous which is ethical hacking .Ethical hacking is meant for attacking the computer system or network with the full permission of the sole. The most common ethical hacking technique is penetration test by inducing the code to the system and to be aware of the vulnerabilities by negligence as the hackers look for loop holes and create back door. Many corporate create their own IT security policies to secure their network. Virus Computer viruses are in the top most list of threat faced by the Information world. Computer program created to do nasty works inside which enters into a computer by mean of downloading softwares or mp3 files which calls them as Free softwares. Worm is much similar to the virus which gets replicated by human intervention; until and unless provoked remain quiet in the corner of the system. Trojan horses are interested in creating a back-door for the intruders in a compromised machine. Deploying a powerful anti-virus with the latest released virus definitions can help us in leading a peaceful life (Williams, 2003) Identity theft Financial identity theft is the widely asserted crime happening in the Internet. These intruders get into the system pretending the account holder of the bank by inputting false identity. A criminal identity thief uses the personal information including the national insurance number and social security number to do crime and leave it as the proof of identity. Medical identity theft is done by using another persons identity to obtain medical care or drugs where law restricts to purchase drugs. Computer security is the ultimate solution for identity theft by sanitizing the obsolete data in system and spam mails by installing anti-virus software which has powerful tools to protect online transactions. Most of the nations have law in place against these kind of identity thefts which includes heavy financial fine and imprisonment Denial of Services-DoS Denial of service wont affect neither the system security or destruct information loss any files make financial theft but can affect the targeted business by putting on fire ranging from second to days by making unavailability of a critical server, email or website which provides service as business . A buffer overflow with a prior assumption that of the weakness of programming or architecture of the applications used are the famous denial of service attacks that bench marked the history so far. Disabling the ICMP traffic in the firewall can prevent the ping of death. Implementing strong encryption techniques and deploying domain naming service. To overcome DoS attacks are by knowing the infrastructure and regular testing for complexity, keeping spam filters will limit mailbox getting flooded, if the business demands buying a space in the cloud or by keeping dramatically huge processor power and server volume will help to prevent such kind of issues. Pornography Pornography refers to any kind of image displaying a person who is being engaged in explicit sexual activity. In countries like Spain child pornography is a criminal offense if conventional pornography was in the paper based hard copy or video tape as technology advanced the Internet based pornography is image files or video files and on-line buffering. Severely punishing these criminals and these punishments to be brought to the notice of general public for their awareness that it will their experience if they do so. Association of sites advocating child protection ASACP was found in 1996 is meant for reporting child abuses in the society anonymously aiming to catch hold of the pornographers, they have a fully functional hot line and website asacp.org where people are report the crime . The RTA certificate helps children from accessing pornographic websites which is available Internet wide free of cost. (Barrons Educational Series, Inc, 1999) IRC Crimes Many people lose their privacy when then enter the IRC (Internet Relay Chat) rooms. The chat rooms become the playground of cyber criminals, hackers and terrorists. Verbal IRC crimes are where people get abused verbally in the chat rooms. The second category is clone attack where randomly synchronized codes are generated on behalf of usernames by robots to generate a random character which gets multiplied by the per-written code result in flooding and the chat server gets freezes due to Denial of service. Criminals use Cyber stalking to harass women and celebrities. IRC crimes can be stopped by simply ignoring or banning the user id which almost all chat sites allow. Salami Attack All these times we were talking about a crime which is relevant only to single attack , now lets talk about a series of tiny attacks which is categorized as salami slicing in computer cyber terms. The attacker steals a comparatively small amount of money from the account and the actual account holder will assume that it might be a service charge of any bank transactions or transaction which they might have done during shopping and wont be bothered to scrutinise the actual fact. such attacks will be done will multiple users which is like an atomic reaction. Botnet A bot is defined as zombie army which is an interconnected network of computers on the Internet with malicious infected software robots. The zombies army can be controlled only by the owner of the respective program. Botnet which is a malware can result in Denial of service attack. Criminals use this technique to utilize the shared processing power and memory Gradually the users system will face slow down .The solution to overcome the botnet is to install antivirus which can detect the malwares .(Parker, 1999) 4.2 INTELLECTUAL PROPERTY Intellectual property commonly referred as IP in short is associated with creativity of an artistic work, or invention of technologies. Computer professionals and students are committed not to copy other works to part of their work without their consent. Taking the credit of innovative work might not be technically a crime under law but it is unethical. According to Richard stallman the founder and pioneer of Free software , software it should not lie with certain limited people . His version is no one has the monopoly to own, it should be open to all it being claimed as information. The statement of Deborah Johnson is that softwares and applications are the outcomes of a group of professionals effort leveraged by their skill set. I would stand aside Johnson as this an industry which is the bread giving one, but outdated softwares can be release for public use and for students and financially backward people where the light of information world dint fall. Intellectual property is cat egorized into two by world intellectual property society as copyright and patent 4.2.1 Piracy Software piracy is the most controversial talk in the information space, if we never pay for free-ware used, the sharewares has to be payed depending on the usage entitled by the owner. Piracy lies somewhere in the middle where the customer need to be pay relatively small amount which is common in Asian countries. Piracy has spread to video industry as well by where the storage discs of newly released albums and movies are available in market for cheaper price .(Williams, 2003) 4.2.2 Open-source Vs Closed-source. Open-source applications are those applications available free of cost Closed-source applications are available in the market like windows operating system. Open-source softwares can be downloaded free of cost and can be manipulated using the source code. As the word refers closed source softwares are closed in many ways, so we can expect more security from them. It will not be easier for a hacker to create a threat in closed source. For an open source application the source is readily available to the end user, he can experiment the possible vulnerabilities and can create a threat from that. 4.2.3 Plagiarism Students are liable to stick on to plagiarism. Copying a colleagues crucial information is equivalent to theft. Plagiarism is a kind of cheating, school going kids do it by literally downloading and later amend it by changing the overall look by adding font colours. Arranging the referred website and book in a systematic way will help the student falling into plagiarism. Consolidating this data into bibliography will help the student in the safer side. (Bynum, 2008) (Williams, 2003) 4.3 PRIVACY AND ANONYMITY Spoofing Spoofing is the process of doing any kind of on-line data transfer where the origin of the data will be IP- spoofing and email spoofing the subcategories of spoofing . IP-Spoofing is the technique used to hide ones ip address and leverage other persons ip address to do some malpractices. In email spoofing the usually terrorists use this to send threatening email to home affairs department. Man in the middle attack is the by-product of spoofing where a person does the crime pretending the online transaction is done by the poor chap who owns the on-line account by network address translation on a cloud computing . Many corporate have security policies implemented to defend against these attacks Phishing Phishing is the tactics of sending fake emails giving an impression to the end user who receives the email mentioning he is receiving it on behalf of a well reputed organization most of the times from the billing or financial department claiming asking for the credit card details .Phishing sets either an upsetting message or an offer message which enables a psychological reaction in human Phishing scams are dramatically increasing now a day. To overcome in case of any discrepancies the link needs to be avoided and intimating the concerned person may be a good approach. Password protection Passwords are the keys to get into our privacy .Every individual have a bunch of passwords and most of them are identical for our own convenience. .If we are in a business critical position of a corporate or reputed brand. We should adhere to not sharing the passwords even with our friends; need to keep the passwords changed in a time interval of three months .need to make sure we are using complex passwords which contains alphanumeric characters as well. (Bynum, 2008) SOCIAL NETWORKING AND BLOGS Social networking in a spanning innovation of the present world. It is one among the innovations of the decade which if used in a supposed manner common population can make use of it .The advantage of social networking is wherever we go around the world we can be in touch with our loved ones and friends. Social networking can let a business man know the response of his products instantly from the blogs. As mentioned early when new invention is born with twin brother which is a crime . He looks identical twin until being as a crime. Social networking is an unavoidable part of our social life. We are kept updated by the blogs and status updates which is advantageous in many ways for a person who dont look at newspaper , improving his vocabulary, culture and will let him know what is happening around and most of them comes free of cost. An individual can upload a fake profile which can misguide many youngsters. Most of the social networking websites are privately owned and they dont rea lly look into the verification of the information provided in the user profile which might result in the misuse of profile for anti-social activities which can a celebrity or a religiously known influential person. (Barrons Educational Series, Inc, 1999) 5. COMPUTER ETHICS AND PROFESSIONAL RESPONSIBILITY Computer professionals work on many technologies in different domains. They work on different programming languages and evolving technology platforms. They are spread around the world contributing their inventions. The computer professionals are not limited to computer scientists or software engineers. The chain will be incomplete without system analysts, warehouse professionals hardware designers, networking professionals, database administrators and IT managers. The basics of ethics should start from each computer professional .there would not be no one to monitor at work. Computer ethics should be self driven. The computer professionals should voluntary test and validate the errors without leaving any loopholes when the applications are build. There is a saying Engineers build the world where the same engineers destruct the world too. This is complementary as the engineers invented concrete mixing machines and cranes whereas the same engineers invented the bulldozer. It is the sam e case of computer industry where the softwares engineers develop softwares and the same software engineers create viruses. Usage of computer or network without the owners permission physically or virtually and damaging data is unethical and is certainly a crime. This crime can be monitored upto an extend by intrusion detection systems IDS. IDS is capable of monitoring the computers and its network in an organization. The IDSs are configured in such a way that whenever a deviation from standard policies it will trigger an alert to the system administrator. The computer professionals are obliged to certain responsibility, a software developer who develops is responsible to point out the drawbacks to the society during the primitive stage of the development. The professional should we educated towards the legal responsibilities of the applications as it could become a harm to the evolving technologies . According to me the legal and moral responsibility is mutual and the professional should look into the future inflictions. This lies on the shoulder of every member in the team. The members should report any kind of issues to their supervisors. Few disasters in the past which reminds us about the importance of ethics ; 1985 Therac- 25 radiation machine fail 1983 World war 3 Due to bug the soviet intelligence applications 1987 Wall street crash known as Black Monday 1990 ATT network collapse 1995 Airane explosion 1999 Siemens passport bug 2000 I love you virus, 2004 UK child support agency bug These events in the past reminds us the importance of the software testers were morally liable to the fix could have away because of negligence. Assuming the context of software development for a medical ACM Code The association for computing machinery ACM released the code of ethics and professional conduct which is set as a benchmark for computer ethics so far. It is a 24 which talks about the contributing to the society without harming giving credit to intellectual property with respect to privacy and honours confidentiality. Professional responsibilities striving to achieve quality and dignity in work and product. Maintaining competence with respect to the law pertaining professional work. Providing professional review and comprehensive evaluation. We should honour the contract and responsibilities assigned to us. Should improve public understanding. One should access the computer resource when they are supposed to do so. In 1992 Dr.Ramon C Barquin discussed the role of computer ethics through Computer ethics institute and is being used by reputed institutions and organisation which is quoted as below: 5.1 Ten Commandments of Computer Ethics 1. THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE. 2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLES COMPUTER WORK. 3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLES COMPUTER FILES. 4. THOU SHALT NOT USE A COMPUTER TO STEAL. 5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS. 6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 7. THOU SHALT NOT USE OTHER PEOPLES COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION. 8. THOU SHALT NOT APPROPRIATE OTHER PEOPLES INTELLECTUAL OUTPUT. 9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING. 10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS. (Herold, 2006) 6. CONCLUSION Most of the crimes are happening due to underlying vulnerabilities in the system which remains undetected due to ignorance. All the computer relevant evils cannot be sanitized. By applying hot fixes and patches these security concerns could be covered .Privacy can be recalled by adhering by not sharing passwords with friends .A sophisticated intrusion prevention system in place will hinder many intruders and safeguards the system and network. A frequent auditing in the IT infrastructure and review can help in planning and implementing security systems. According to me the best thing is to be in touch with computer professionals and joining their communities and having an eye on the blogs can help us to get rid of the computer. Individuals are the basic building blocks of the society. So the decision making factor should start from the soul of each and every computer user. A focus on the information system failure and research on them could lime light on the computer ethics. Computer ethics need to be a part of the curriculum for students as they get exposure to information world and might get misleaded without guidance. If the communities are doing good it will for sure make a good impact in the progress of a good nation and in turn a good world. To attain this we should respect others privacy, the use of any software should not harm anyone else and end-users should be willing to pay closed source applications and contribute for sharewares .If we come across any discrepancies use our internal sense to relish need to keep the legal people informed about the issue. Employees should adhere to the organizations policies. Honesty and Integrity can strive to ethics. (Tom Forester, 2001) (Stamatellos)

World Trade Center Attack :: 9/11 september 11 patriotism essays

World Trade Center Attack Reactions to the events of September 11, 2001 run the gamut of human emotion and cognition. There cannot be any doubt of the crime's horrendous nature. Disgust and revulsion might be the best way to describe the sense one feels at the calculated murder of innocent thousands. What more, this was not an attack by another sovereign state. It was an attack by an organization in the shadows. In its aim, no one is sure. What does a terrorist organization gain by committing such acts anyway? In the confiscated tapes depicting Osama bin Laden, the violence surpassed his vision. The expected damage was to be far less worse. But it seemed as if the scale and scope of the onslaught did not faze him in the least bit. The martyrs were going to heaven. And the United States had a lot to say about that. Most denounced the terrorists as cowards, but there were a few, such as Susan Sontag and Bill Maher, who did not feel the same way. There was a sense of overwhelming patriotism, and to say anything otherwise, was foolhardy. And the American flag was everywhere. Even shoes came in the red, white, and blue. Defiling the flag seemed to become downright patriotic. Courage became debatabe, heroism standard. Soon both Sontag and Maher were denounced, even called traitors. What kind of new war was this? Albert Camus states that: By attributing too much importance to admirable actions, one ends up paying indirect homage to evil. For one leads others to assume that such admirable actions are so valuable only because they are rare, and that human activity is far more frequently motivated by nastiness and indifference. (The Plague) These words are full of implication. But to hone in on the media treatment of the events of 9/11 and the war on terrorism in general, one sees the role mass media plays in shaping today's heroism. It is difficult to turn to media and find information without some moral connotation. This after all, is not the proper role of mass media. Or is it? The over-saturation of images and commentary regarding the terrorist actions in the United States is potentially dangerous. This is not to say the issue be taken lightly. That would be delusional. But with recent news of a documentary detailing the events to air on network television, one is left to ponder the merits of this. World Trade Center Attack :: 9/11 september 11 patriotism essays World Trade Center Attack Reactions to the events of September 11, 2001 run the gamut of human emotion and cognition. There cannot be any doubt of the crime's horrendous nature. Disgust and revulsion might be the best way to describe the sense one feels at the calculated murder of innocent thousands. What more, this was not an attack by another sovereign state. It was an attack by an organization in the shadows. In its aim, no one is sure. What does a terrorist organization gain by committing such acts anyway? In the confiscated tapes depicting Osama bin Laden, the violence surpassed his vision. The expected damage was to be far less worse. But it seemed as if the scale and scope of the onslaught did not faze him in the least bit. The martyrs were going to heaven. And the United States had a lot to say about that. Most denounced the terrorists as cowards, but there were a few, such as Susan Sontag and Bill Maher, who did not feel the same way. There was a sense of overwhelming patriotism, and to say anything otherwise, was foolhardy. And the American flag was everywhere. Even shoes came in the red, white, and blue. Defiling the flag seemed to become downright patriotic. Courage became debatabe, heroism standard. Soon both Sontag and Maher were denounced, even called traitors. What kind of new war was this? Albert Camus states that: By attributing too much importance to admirable actions, one ends up paying indirect homage to evil. For one leads others to assume that such admirable actions are so valuable only because they are rare, and that human activity is far more frequently motivated by nastiness and indifference. (The Plague) These words are full of implication. But to hone in on the media treatment of the events of 9/11 and the war on terrorism in general, one sees the role mass media plays in shaping today's heroism. It is difficult to turn to media and find information without some moral connotation. This after all, is not the proper role of mass media. Or is it? The over-saturation of images and commentary regarding the terrorist actions in the United States is potentially dangerous. This is not to say the issue be taken lightly. That would be delusional. But with recent news of a documentary detailing the events to air on network television, one is left to ponder the merits of this.

Friday, July 19, 2019

Senior Trip :: essays research papers

On Wednesday, April 6th, I woke up from a deep sleep just like every other ordinary school day, but this particular day was going to be much more fun! I got to school around 7:15, dropped off my luggage in the conference room, and went off to class. In my next 3 classes I waited excitedly until the enouncement was made for all seniors going on the Senior Trip to head down to the office. And this is where the great trip began.   Ã‚  Ã‚  Ã‚  Ã‚  We all got on 2 busses and headed to the airport where we dropped off out luggage and got through security rather quick. Then we all anxiously waited for our plane to arrive. When the plane finally arrived we all got on board and before we knew it we were in Orlando Florida. The bus from there to Walt Disney World eventually arrived and within 30 minutes we were in our rooms and getting ready to go to Downtown Disney for the first day.   Ã‚  Ã‚  Ã‚  Ã‚  Downtown Disney was very large, with lots of stores, arcades, and restaurants. The arcade was free, which was very cool and convenient because I really didn’t feel like paying for anything. Walking around this place was fun in itself, just seeing all the sites and seeing all the people. There were many good looking girls, everywhere! One thing I will remember for a long time is Jason buying a very large cigar, and after his first puff Mrs. Vanderhoff rushing up to him and taking it away.   Ã‚  Ã‚  Ã‚  Ã‚  MGM was a great park. This park had the best rides out of them all, which include the Tower of Terror, and the Roller Coaster. The park was very nicely kept and was also fun just walking around. All of the rides had so much detail to them, even after going on them numerous times I still saw things I hadn’t seen before. This was great because it made it just as interesting as the first time.   Ã‚  Ã‚  Ã‚  Ã‚  The nights were always fun and entertaining. From phone calls from girls in other rooms, to Josh sleeping in the corner. Everything seemed to make it fun. Spying on the guard outside was fun, as well as joking about sneaking out and going into other peoples rooms. We didn’t end up going to bed until very late†¦ or early.

Thursday, July 18, 2019

Corrupt Societies Essay

In today’s society I find that a lot of people have become materialistic. It’s a new coach purse, the brand new cell phone from Verizon or a plasma screen TV that is the hype and everyone wants. Either way a person is to look at it, society is based on who has what. There is an emphasis on a person’s status in their society and it is very important. I always hear my boss saying â€Å"it’s all about the Benjamin’s! † and he’s right. Not a day goes by that a person doesn’t think about what they want to buy next. Does this make us bad people? Have we all succumbed to an unconscious norm that is all materialistic? What is it to be materialistic? The Webster definition is that a person is concerned with material wealth and possessions at the expense of spiritual or intellectual values. I see it as a person that wants something so much that they would stop at nothing to have it whether it is by means of purchasing, stealing or cheating someone else out of it. It’s about judging a book by its cover and not looking at the big picture of life and the world around us. When my mom was younger, things that were sought after were high diplomas and bachelors degree. Now as I grow up it’s a master’s degree and the BMW that I may drive that gives me a status in society. There are so many times when things are taken for granted and some people find nothing wrong with this. How can a person go on in life only wondering about if they can have that brand new car or cell phone? Do the things we have define who we are as a person? I feel that every society is corrupt in its own way. It’s the people, the government, our morals, values and our adaptive way of life. This is not just in fantasy books but in our real world as well. When I see how things have changed from when I was little I wonder how it all could have happened. I remember the first computer I ever got in my life and when I compare it to my laptop, it’s almost one eighth of what my whole computer used to be. But it’s not just the technology that has changed. Our perception of the world, the role we play in it and how that role has changed. Attitudes have changed and there is a difference between how people relate to each other.