Monday, September 30, 2019

Bases of Power and Their Effects on Employee Communication

All major business organizations dealing with economic conditions of uncertainty, opportunity costs, and scarce or depreciating resources have to develop capital budgets. The three major steps to developing a capital budget are: conducting a decision analysis to establish a base for knowledge building, establishing option pricing to secure an accurately assessed market position, and creating discounted cash flow (DCF) for making appropriate investment decisions for the organization.No organization can manage capital projects by simply looking at the numbers of discounted cash flows.A financial analyst for any organization must look at the entire decision and assess all relevant variables and outcomes within an analytical hierarchy. Decision-making regarding capital budgeting is increasingly complex today because of uncertainty, particularly in the health care environment where safety assessments of pharmaceuticals, health care insurance allotments, and other factors may affect the fu ture of the organization. All capital projects will involve numerous variables and possible outcomes—but health care perhaps more than most. (Evans, pp. 1-2)In the second phase of capital budgeting, financial management, or consideration of options within capital budgeting is called contingent claims analysis or option pricing. Timing (when to enter certain ventures), abandonment (what past ventures to discontinue) and growth (what ventures to expand upon) are all critical—one must ask such questions as, what aspects of health care in the organization are revenue-producing and/or necessary to the community, what areas are more necessary at certain times of year, and what can be discontinued? (Evans, p. 3) Discounting refers to taking a future amount and finding its value today.Future values differ from present values because of the time value of money. Financial management recognizes the time value of money because of inflation, uncertainty, and opportunity for investm ent. Thus, the more uncertain the economic environment or industry, the more necessary such revenue analysis becomes—and hence, once again, the necessity of such capital analysis for health care. Bibliography : Evans. Matt. H. (2003) â€Å"Course 3: Capital Budgeting. † Excellence in Financial Management: Professional Training Course Files. Retrieved 17 Apr 2005 at http://www. exinfm. com/training/pdfiles/course03. pdf

Sunday, September 29, 2019

My View of the World Essay

As I stand here looking over the lush green foliage of thousands of trees, I glanced down toward the base of the mountain to see curvy, windy roads, weaving in and out between tiny little box houses, plotted around here and there. I can see for miles and miles, the views are breath taking. That’s mostly why people come to see me, to look out with me, to see the fantastic views. My arms are sore from standing here for about 75 years, just doing nothing but wondering. For many months I have started to think what is beyond the horizon of the sea. There could be a whole new world over the edge. Is there even an edge? Who knows? Years ago those little things climbed on my feet, just to get a better view or to pose in front of a compact box, with a blinding flash for a couple of seconds, but now there are large metallic fences at my feet. This is predominantly because I am old, weary and wearing out so I need protecting. People get here in many different ways, clear boxes which travel up and down continuously, moving stairs, or climbing 222 steps reaching the summit, exhausted. Oh yeah! I forgot to say about the odd people that walk all the way up the ridge of mount Corcovado who wear small shorts, long pulled up socks, big chunky boots, weird hats and really, really big bags on their backs. They come in there hordes, they come in all shapes and sizes; big ones; small ones; fat ones; thin ones; some are noisy; some are quiet; some just scream and laugh; some are in awe of me and gaze up at me, as I gaze out at the horizon. These people see me as a god, but if only it were true because all I want to do is just fly to the moon, to the white wonderful wide space, where I could rest my sore painful arms and legs. No one knows the pain I’m in or even know I have any feelings. I remember the journey of how I came to be here. I was created by a local engineer called Heitor da Silva Costa. He made me out of reinforced concrete and layers of soap stone. Firstly I was going to be made out of steel but that wouldn’t of had much of a chance against extreme weather conditions. I was built in small chunks and slowly brought to the top by a struggling train on the Corcovado Rack Railway. Then I was pieced together bit by bit, slowly rising above the ridge to embrace the people of the world. Through my amazingly large nostrils I can smell the wondrous cuisine from the land below swirling and rising up the mountain side. Just after dark the surroundings black out and all attention is drawn towards the bright lights of the city. Although no one else sees it, it’s not all happiness up here. I have seen many things in my life like robbery’s, suicides, murders, but what always happens almost every night is groups of people sell drugs and sit there injecting liquids into their arms, snorting dust and sniffing corrosive fumes of acids. The fumes are so strong even I get a headache and my heads made out of concrete! It is disgusting what they do, but it is what they want to do, and what could I do any way. As dawn emerges it makes up for the previous night. The sun rises and a new day begins. In the early morning, the mountain air is fresh and crisp; the sun rises leisurely, bringing a slow warmth to the city. The most beautiful part of the day is now, when it is peaceful and you can hear the chirping of the birds below. The heat from the sun breaks through my layers of soap stone reaching into the hard cold concrete inside.

Saturday, September 28, 2019

The Aesthetics of Parent-Child Shared Reading Wordless Storybooks Research Paper

The Aesthetics of Parent-Child Shared Reading Wordless Storybooks - Research Paper Example Scholars have attached more value to quality reading rather than quantity of reading at the elementary level of learning, and more parent-engaging strategies to cultivate a child’s aesthetic abilities. The purpose of this research is to investigate the extent to which parent-child shared reading influences the aesthetic ability of a child.In this case, the research will focus on the application of parent-child shared reading of a wordless book, or rather a book that has no words but only contains images and a non-verbal gestures (Tompkins, 2007: Wasik, 2010). By measuring the participation of a parent in this a child’s learning experience and observing the child’s engagement in play, role play, drama, relationship with peers, it is possible to assess the influence of a child-parent shared reading in a child’s learning abilities. ... oo (2013), children find it a complex matter to decode the message in a wordless book and while the book may amuse them, they may end up without grasping the intended meaning in the pictography. In addition, parents disregard the picture story books and pay more attention to the worded books; a matter that often suppresses the child’s learning abilities as they get to elementary schools (Wolfeand Flewitt, 2010). Consequently, the child’s performance is limited and their optimal productivity cannot be tapped, an issue that concerns every society that has value for civilization in the society (Schickedanz, & McGee, 2010: Teale, Hoffman & Paciga, 2010).). By investigating the efficiency of parent-child shared reading of wordless books would help in boosting this habit within families and consequently contribute to the development of instructional methods at the elementary level. According to Koshy (2009), research is one of the most powerful tools in curriculum development strategy. Purpose of the Research General Objectives To investigate the effectiveness of parent-child shared reading in developing aesthetic abilities in a child’s learning. To investigate the key virtues of Parent-Child shared learning that are critical in development of child’s aesthetic abilities. Specific Objectives To conduct an interview for a mother and her child and their experience in shared reading. To observe the child free play, role play, drawings and interaction with its peers. To analyze the progress of the child’s learning abilities change within a period of one year of shared reading. To draw conclusions and design recommendable shared-reading strategies that can improve a child’s aesthetic abilities. Research Hypothesis This research seeks to test the hypothesis that states

Friday, September 27, 2019

Using Quality Methods to Ensure Consistency of Care Assignment

Using Quality Methods to Ensure Consistency of Care - Assignment Example Mostly, the health professionals in the emergency department of any health care are not in a position to diagnose the disease the patient is suffering from. In the case study, the paramedics respond fast enough and give prompt treatment after a quality assessment of the patient’s condition. The paramedics in this study demonstrate professionalism in that they treat the patient on site before admitting him to the hospital for further diagnosis. It is also evident that it takes a lot of time before the patient could receive relevant medical care due to lack of facilities at the local community hospital. Once again, the paramedics show commitment by frequently assessing the patient at every level of treatment (Dlugazc, 2006). Most surprisingly, the paramedics use radio to send messages to the tertiary center which demonstrates poor communication. The recruitment of highly trained professionals requiring high remuneration is relevant for attaining quality performance evaluation. Additionally, organizations require relevant equipment and vehicles for ambulance services which require a huge sum of capital. The establishment of a better communication system such as the global positioning system in EMS requires allocation of hefty resources. The establishment of a quality management department is costly and the development of strategies to monitor improvement is important for achieving the defined goals (Dlugazc, 2006). A well trained emergency team is relevant for the realization of improved health care services. As highlighted before, the paramedics in the case are well trained and discharge their duties diligently. Reliable and accurate data for performance evaluation will heavily rely on the skills from these professionals and therefore the need for skilled practitioners. The various systems developed to offer services to the patients should have the capacity to collect relevant data for measuring performance. Training should be offered to the staff on

Thursday, September 26, 2019

Modern Diplomatic History Essay Example | Topics and Well Written Essays - 1000 words

Modern Diplomatic History - Essay Example In this paper, for the purposes of clarity, the researcher would define the first half of the nineteenth century from the years 1800 to 1850. In addition, the researcher would also try to look at the significant events in modern European history in these years, as well as the status of the major powers, in order to root out the causes of why no major war occurred in this period. One of the most important historical backgrounds of early nineteenth century Europe was the conclusion of the Napoleonic Wars (McLynn 215). This war, which actually lasted from the years 1803-1815, actually proves to be the last major war between great European powers in the first half of the nineteenth century; in addition, this also set the tone for the establishment of the period of â€Å"Pax Britannica,† which would be a major reason why there would be no major war again in continental Europe until the second half of the nineteenth century, as the researcher would expound later in the paper (Fremon t-Barnes and Fisher 321). These wars were actually resulted by the creation of the French Empire by the French General Napoleon, which proved to be the last major challenge to the supremacy of the British Empire until the First World War. The final stages of the Napoleonic Wars (which covered the period of the early years of the nineteenth century) actually pitted the French Empire lead by Napoleon against various coalitions (from the Third to the Seventh Coalition) composed of the British Empire and its allies, most notably Russia, Prussia, Austria, the Netherlands, Sweden, and a number of German States (Fremont-Barnes and Fisher 259). At first, the French Empire (through the use of mass conscription and shrewd diplomacy) actually conquered most of continental Europe (except Great Britain), who at its peak created and/or controlled the client states of the Kingdom of Spain, the Kingdom of Naples, the Kingdom of Italy, the Swiss Confederation, the Confederation of the Rhine, the Low Countries, and the grand Duchy of Warsaw, among others (Fremont-Barnes and Fisher 15). However, constant warfare with the continental alliances, along with their failure to conquer the British Empire, actually brought about the downfall of the French Empire, resulting in Napoleon’s defeat at Russia and finally at Waterloo (Fremont-Barnes and Fisher 306). The Congress of Vienna, where the terms of the surrender of the French Empire, the reestablishment of the French Bourbon Monarchy, and the restructuring of Europe was discussed by the â€Å"Four Great Powers† (Prussia, United Kingdom, Austria and Russia), one of the greatest manifestation of diplomatic negotiation and compromise in Modern European History was witnessed (Chapman 1). Of course, these four great powers actually had their own territorial ambitions, as well as other objectives; however, the main objective among these powers was to resolve the issues caused by the French Empire, and by creating stability in Europe through the balance of powers (Chapman 16). There are many diplomatic provisions that were provided in the Congress of Vienna; however, this paper would focus on the most important provisions that would result to the relatively peaceful Europe for the next four decades (Chapman 55). As a result of the Congress of Vienna, Russia actually received the former French controlled Duchy of Warsaw,

Wednesday, September 25, 2019

Fundamental Concepts What is ethics What is morality Are they one and Coursework

Fundamental Concepts What is ethics What is morality Are they one and the same - Coursework Example Morality traces its origin to a Latin word â€Å"moralis† which translates to â€Å"custom†. Morality guides individuals in coming up with ethics in societies. In addition, morality is concerned with individual judgment and conduct. Morality influences behavior and character of individuals in a society (Mizzoni, 2009). Morality and ethics mean values within a society’s context. Religion and other forms of faith guide morality for the most part, while for ethics, it is multifaceted and based on ideologies. In addition, what a society considers moral in some cases can be contrary to personal values. In studying morality, ethics guides in knowing what constitutes morals. Ethics and morals both promote social justice, with their foundation on the principles of equity. Ethics and morality when adhered to, enhances fairness in a society (Mizzoni, 2009). Ethics guides administrators in instilling virtues that promote morality within institutions. Policies and rules based on the morals promote achievements in institutions (Mizzoni, 2009). In administration, standard codes of practice by the management allows for flexibility in the morals applied. Concepts of Libertarianism and liberalism in the administrative context ensure peace and stability. Libertarianism is much concerned with ideology where authorities have limited control over their people. In Libertarianism, each one expects mutual benefits as a duty and obligation of the authorities. People attain social justice using ethics in administrative systems. Libertarianism is more moderate when instilling ethics as compared to liberalism. In administration, liberalism aims at individual freedom while libertarianism targets masses and general family values (Mizzoni, 2009). In Liberalism, individuals are free to choose their own ethical code for behavior. However, it insists on some form of regulation to harmonize differences on human

Tuesday, September 24, 2019

Oil Essay Example | Topics and Well Written Essays - 750 words

Oil - Essay Example Oil is the world’s biggest industry. It has often been referred to as the â€Å"black gold† and the devils excrement. Oil is found in the world’s most democratic and well governed countries such as Norway and Canada and also in some of the most autocratic nations such as Saudi Arabia and Nigeria (Roberts, 2004). In countries like Ghana and Nigeria, oil has become a curse. When oil was being mined in Ghana, the local people hoped for a better living standard and an improved sanitation. Everyone in Ghana was very excited and waited anxiously for the mining of oil for the first time in the country. They hoped that Ghana would be able to break the â€Å"curse† that had been associated with the mineral. This event only saw a few getting richer and the poor getting poorer. The same problem faced its neighbor Nigeria which is the largest crude producer in the continent. There was such a big gap between the rich and the poor because of corruption in the oil industry in Nigeria (Roberts, 2004). Oil on the other hand has had a positive influence to all the countries that have mined it. Despite all the negative impacts of oil, countries have been able to develop and upgrade their infrastructure. Third world countries have been able to export their oil to developed countries and have been able to use this to put up infrastructure like roads, schools and even hospitals. Oil has been referred to as ‘power’ in terms of its influence in political dominance and control. Oil is needed in order to grow food, put up infrastructure, manufacture food and transports them to the market and to advance technology. However, it lubricates both national and international politics. The following are some of the reasons that make oil such a powerful political force in the world today. We need oil every day in order to survive. Oil is universal and it is cheaply available, we do have other sources of energy such as electricity but there has not been any other

Monday, September 23, 2019

Criminal identification procedures Essay Example | Topics and Well Written Essays - 1500 words

Criminal identification procedures - Essay Example Just as many other things have during the course of the last decade, the technological advancement in the pursuit of legal justice has been astonishing. Never before in history have investigators had tools at their disposal to solve a case and as such, giving the victim(s) some much needed closure for healing and getting the sense of justice which is entitled to them. With all of this advancement, each innovation in its own right played an instrumental role in crime solving. In that case, two of the specific advancements in technology to observe are DNA Analysis and the use of Intra-agency databases for DNA. DNA plays such a crucial role in legal matters with the fact that it is a genetic picture of a person. DNA is defined as, "Deoxyribonucleic acid (DNA) is a nucleic acid that contains the genetic instructions used in the development and functioning of all known living organisms and some viruses. The main role of DNA molecules is the long-term storage of information. DNA is often compared to a set of blueprints, since it contains the instructions needed to construct other components of cells, such as proteins and RNA molecules. The DNA segments that carry this genetic information are called genes, but other DNA sequences have structural purposes, or are involved in regulating the use of this genetic information," ("DNA" p.1). As for how exactly forensic experts can use DNA in their investigations, the online Encyclopedia Wikipedia answers this further down in their discussion on the subject of DNA and the multiple roles in which it can play a part. "Forensic scientists can use DNA in blood, semen, skin, saliva or hair at a crime scene to identify a perpetrator. This process is called genetic fingerprinting, or more accurately, DNA profiling. In DNA profiling, the lengths of variable sections of repetitive DNA, such as short tandem repeats and minisatellites, are compared between people. This method is usually an extremely reliable technique for identifying a criminal.[104] However, identification can be complicated if the scene is contaminated with DNA from several people.[105] DNA profiling was developed in 1984 by British geneticist Sir Alec Jeffreys,[106] and first used in forensic science to convict Colin Pitchfork in the 1988 Enderby murders case.[107] People convicted of certain types of crimes may be required to provide a sample of DNA for a database. This has helped investigators solve old cases where only a DNA sample was obtained from the scene. DNA profiling can also be used to identify victims of mass casualty incid ents, [108" ("DNA" p.1). An advantage for the use of DNA Analysis and by extension having Intra-agency databases for DNA is that DNA itself acts as a blueprint for the criminal who chose to commit the crime in the first place and with tools for analysis and a database to maintain the information achieved through the study of the DNA, investigators will be able to maintain a cohesive list of DNA evidence from criminal cases which may otherwise have been far more difficult to have solved had it not been for the technology in the first place. Within recent years, many people have been freed from jail after spending numerous years behind bars for crimes that, had the technology been there at the time of trial; they would not have been convicted in the first plac

Sunday, September 22, 2019

Characteristic and performance of the video game Industry Essay Example for Free

Characteristic and performance of the video game Industry Essay A detailed analysis of the video games industry, the relationship between the console, the developer and the gamer and the case studies of Nintendo, Sony and Microsoft has conclusively proved the hypothesis that a symbiotic relationship exists in the video games industry between the console, developer and the consumer which impacts on the overall growth and performance of the business and will also have an effect on future trends. A survey of data analysis will reveal that there are excellent prospects for growth of the console video gaming industry despite threats from other areas of the same business such as online and mobile gaming. The details of the research outcome and the salient conclusions and recommendations are as per succeeding paragraphs. The overall growth of video and computer games world wide is likely to grow from $ 27,000 million to approximately $ 54, 000 million or double during a period of three years from 2005 to 2008. The console video games industry is set to grow from $ 15,000 million in 2005 to over $ 20, 000 million in 2008. This is a growth of over 30 percent which is likely to surpass the growth in all other segments of entertainment. This growth is driven by the popularity of console games in general as well as certain technological factors such as development of online console gaming facilitated by upgraded consoles and broadband connections which can facilitate easy transfer of images and videos. Apart from this economic factor, there are other profound changes which will come about in society as predicted by Doug Lowenstein who has indicated that it would transform the total social and cultural thinking in the years ahead. (Conference, 2000). The numerous voices raised against the growth of video games and their influence on children in America has decried the growth of this industry. Such protests and developments will certainly affect the growth of the video industry and it is likely to create more benign games in the future. Of greater concern to social scientists is the inculcation of hyper competition and deviant sexual values in children due to games. (Squire, 2002). This issue is likely to place pressure on the gaming industry to ensure that it follows the norms set by bodies such as the industry content regulator, Entertainment Software Rating Board (ESRB) in America. Another important facet is content creation and retailing online. This mode will develop at much faster pace than at present. This will enable greater participation of gamers and will consolidate the existing relationship between the console, the developer and the gamer. Technology as the MMOG will further boost the growth of the industry as well as the relationship between the stake holders in its growth. Relationship between console, developer and consumer The research has conclusively established a positive relationship between console, developer and consumer. Video gaming is a highly interactive process in that there has been a total shift in the relationship between the producer of goods, the developers of content and those who are partaking off that content, the gamers. This relationship has become of mutual support rather than of give and take. The mediums used for such an interaction have been consciously developed in some cases as Nintendo which started with a special magazine and has now come up with various other actions to support the developer as well as the consumer in providing the company effective inputs for development of games. A similar trend has been observed in the case of Sony and Microsoft. The growth of the internet has further added to the impetus and this will be supplemented by on line gaming which is providing gamers an opportunity to respond actively to their entertainment requirements. The response of all companies has been active in fostering this relationship. The other aspect is the active involvement of console and developers. While all major console producers have in house developers, they are including the information technology behemoth; Microsoft actively seeking the assistance from external developers. Companies have fostered special programs as Game Play Counselors and Digipen to cultivate the loyalty of the developer community along with community participation program called as NSider forum by Nintendo.

Saturday, September 21, 2019

Hubspot Case Question Essay Example for Free

Hubspot Case Question Essay 1. Analyze HubSpots Marketing Mix in the context of an overallMarketing Strategy 2. Do you agree with HubSpot that the rules of marketing have changed? If so, how? Is inbound marketingthe answer? Why or why not? 3. Is HubSpot finding and serving the right set of customers? Given its position as a start-up company,should it widen its focus to serve any customer that comes its way? Or narrow their target, by focusingexclusively on either Owner Ollies or Marketer Marys? Or by focusing exclusively on either B2B or B2Ccustomers? 4. HubSpot has begun to differentiate its products as it has learned more about its customers. Should it domore? Should its pricing strategy change too? Does the software-as-a-service (SaaS) pricing model workfor both Marketer Marys and Owner Ollies? Should HubSpot try to immediately capture more value for either of these customers? 5. Are Halligan and Shah being too stubborn by not doing any outbound marketing? Or should they continueto practice what they preach by focusing on inbound marketing alone? 6. Halligan and Shah want HubSpot to be to marketing, what salesforce.com is to sales. What would your plan of action be to make this happen? Why would you take these actions? What keeps you up at nightabout your plan? This case follows the growth of HubSpot, an entrepreneurial venture which faces significant challenges including:developing a market segmentation, deciding which customer to serve and which customers to turn away,configuring a pricing strategy which is aligned with the value being delivered to customers, and determiningwhether inbound marketing programs can generate enough scale to grow the business or whethertraditionaloutbound marketing methods need to be employed to accelerate growth. The HubSpot case focuses on issuesaround marketing channels, specifically inbound marketing and the use of Web 2.0 tools and applications suchas blogging, search engine optimization, and social media

Friday, September 20, 2019

Network Physical Topology of ISP TechnMaster

Network Physical Topology of ISP TechnMaster Network Physical Topology of ISP TechnMaster ISP Infrastructure Physical Topology ThechMaster is the Uk leading virtual ISP (Interner and Services Provider), with it HQ in London where all main services and infrastuture and resource are located, the main secondary branche are locate in Scotland and have similar inftrasture as in london with some others branches around the country, in Wales and in NorthIreland that represent small branches and provide some on the server provided by HQ. Internet Backbone (external) Infrastructure Diagram Internet Backbone is a part of computer network located at the back-end connection between two different networks, strategically interconnect networks and core routers on the Internet, used for the large high speed and capacity between networks that are located remotely and transport very high volume of data. As the Internet high speed links it require high-speed bandwidth connections and high-performance servers/routers devices. As one of the main service provided by ISP is the internet service, so prior to outline all the infrastuture network, the main backbone newtork of ISP are connected with other provider from diferentes continent by undersea fiber optic cable (Figure-3), as well as connection to other sub-region, inter-branches plus DC or transmition station that are related to ISP (Figure-2). Moreover are the responsabilite of each ISP enterprise to take care or troubleshoot and more important reassure the operational of its termination part of fiber optic connection cable, even do some risck and threads are present independently of the location. [1]As an Internet Provider Services that provide differente type of services (Cloud, Broadband, Telefone, VoIP, P2P Caching, IPTV, etc) the funtion and role of the bacbone is very crucial as it is the infrastuture that interconnects various segments of network, mainly in this case it provide all the principal data routes (Figure-3), between large, strategically and interconnected networks from different ISP (intercontinental) to and from our ISP core routers and internal infrastructure and vice versa. ISP Internal Infrastructure Diagram A robust and concise internal network and server infrastructures as the base and spine of all services is highly required to support ISP internal, external and remote services as well to provide at the highest level standards quality of all advertised type of service to the customers and business partner. As the business high requirement and demand the network spinal infrastructures (Netwwork, Server, CCTV, Access Control, Power Source and UPS, Phisical DR System and all subsystem) was designed with highly availability, elasticity and reliability in mind to overcame mainly 75-95% of any considered possible incident that could happen based on a preview and periodic Risk Assessment and Strategic Planning Processes delivery as one of the main police of ISP enterprice to assure its business continuity. More over if have a look at spine network topology we can verify that at the bacbone device and after it for each connection more them one fiber cable sink is used to avoid fail, as well for realibility and better traffic troughput, this police and strategy is followed for the rest of the network as well on secondary inftrastuture system. Altought is not describet but it is clear from (figure 4) that for each infrastuture layer was takem is consideration all advice from report of RASP (Risck Assessiment Stratgey Planning) team related of a list of Risk (natural or artificial) prior to design the all ISP infrastuture, to prevent lack of redundacny, avalibility, reliability or even elasticity, the RASP Risk Handling Decision Points guidince was takem in hight consideration. Risk Assessments/Management Strategy Planning Techmaster ISP, as telecon enterprise that operate in highly demanding national and international market providing variety of tech service need to relay on its infrastuture as well on its human resource team capacity to deal and overcame all the possible threats and risck present daily and the RASP team is responsably to investigate and help creat or provide safe environment and soluction to help the company achive the point. RASP help on the process to identifying, assessing and managing risks and uncertainties, affected by internal and external events or scenarios, that could restrain the ISP capacity to accomplish its methodology and key targets with a definitive objective of making and securing company and custumes value. The RASP team conduct periodic and ocasional whem necessary the risk analysis involving risk identification, assessing the likelihood of the event occurring, and defining the severity of the events consequences. As well are they reponsability to conduct a interanl and external vulnerability assessment, which helps identify situations in which the enterprise may be putting itself at increased risk by not performing certain level of Security police. As any other researche or assessiment the RASP as well condut with final comclusion and recomendadction based on the risk analysis results are summarized in a report to management, with recommended mitigation activities, some of the riscks, threats and vulnerability found and take in consideration by team are: Risks, Threats and vulnerability associate to Internet Backbone infrastructure. As any other infrasturure the backbone area and device are not immune to riscks and threats, are they natural as earthquake, tsunami, or even human as theaf, intentional damange by undersea investigation veicule or other nachine, and deep sea fisher ships all those riscks mast be take in consideration, some of the risck and threts are: Undersea animal can bite and damage the fiber optic cable (figure-6). Rusting of the cover or protective layer of the fiber optic cable, because of the poor quality manifature (figure-6). Acidental or intentional cuting or damange of fiber cable by fish shipping or any other undersea machine. Acidental or intentional damange of infrastuture at the border end cable connection (sea-earth location), by criminal, curious, hacker, etc when not well safeguarded. Risks, Threats and vulnerability associate to internal spine infrastructure and services. The ability to anticipate opportunities and effectively respond to any risk or threats is critical for any company infrastructures, as it is no longer isolated by type of industry or geography location. Although it becoming more complex in nature and global in consequence, the rapidly capacity response to managing as well as mitigating risk and threats are a requirement to survival for company business continuity, driving a companys into success of fail. To assure the confidentiality, integrity, and availability of all the spine infrastuture, system and services components in the company the RASP, identiy and listed some of the main risk, threats and vulnerability that should be aware of : People awarnese (any one that can have access in to company are, guest, cusntumes or even trusted employees, etc) Access violation into restrited area (by unaoutorized persons) Natural Incidentes (earthquike, flooding, humidity, hight temperature, fire, air (dust) etc..) Absence or insuficient source of quality resource (Electricity, wather, fuel.) Hight restintion to all service provided and accessible by custumer even for roaming employee. All knowing and unknow cyber threat and attack, (DDoS Attacks, Direct SQL attack, Session Hijacking, Buffer Overflow, Port Scan, etcà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..) Remote exploits (RAT, Trojan Horse, Bakdor, Worms, Trojans, Bots), Device Firmware and OS vulnerability, system out update, system and services missconfigured.. Sniffing, spoofing, phishing, Social engieering, Port Scaning on border or any infrastuture devices, system Inadequately trained IT staff Intrusion, Hackers, theft (electronically and physically), Backup operators, etc. Security Police to manage and mitigate any incident related to spine infrastructures. As always, The confidentiality, integrity and availability of information, in all its forms, are critical to the on-going functioning and good governance of LSE. Failure to adequately secure information increases the risk of financial and reputational losses from which it may be difficult for LSE to recover. Disaster Recovery plan to manage and mitigate any incident any incident related to spine infrastructures. Cloud Citrix Infrastructure We have Citrix Infrastructure in two collocations, Xen-Server 1 in Site 1 (Headquarter) and Xen-Server 2 in Site 2 (Secondary Data Centre). Both Xen Server infrastructure is running under DMZ network as we have deployed Xen service for in house use only. We have two major running service from XenApp and XenDesktop. The following architecture will elaborate each components of Xen server and how we have deployed it in our infrastructure. XenApp and XenDesktop Architecture We have seven major components studios, director, store front console, pvs console, hypervisor console, license administrator console and machine service console to run Xen App and Xen Desktop in our infrastructure. To have access over the citrix environment users will require Thin Client or Thick Client Machine with citrix receiver. Studios: Citrix Studio it is the main management console that enable us to manage, configure, deploy, eliminate the service. We have delivered application and desktop according to the application, processing, numbers of people associated and policy to the specific departments. We have hosted Windows Server 2012 R2, DataCenter Editions to each department so when they are getting citrix desktop session from windows server itself as it work on the shared environment. Example: In Support Department: We have hosted applications like putty, open ssh as the employee working in Support Department have to deal with the customer to check their internet connectivity and access other networking device and servers. In Account Department: We have not delivered them putty and other networking application as they dont use and it is not required for they. For the people working under account department we have delivered them accounting application like tally, excel. Citrix Director: It is one of the major important components in the Citrix Xen application and desktop. Citrix Director is basically a web-based tool that helps the IP Support and Help Desk team to monitor and troubleshoot. We have provisioned Administrative Privileged in each department Head of Department(HOD) where s/he can administrator each activity that the employee is performing. Even they can have the real time monitoring when the employees are dealing with the customer with some specified trouble ticket. We can even modify the role for the administrative user on monitoring using Citrix Group Policy. The best thing on deploying Citrix Director is that if any of the customer is having problem with accessing certain portal or need help on dealing with some stuff then the person do not need to be physically there to solve the problem. Example: One of the employee from the Account Department have problem opening the web Brower and he call the IT Support Department for help. Back then before we deployed citrix in our environment one of the employee from IT Support Department had to be in the Account Department physically and try to solve the problem resulting high time consumption and delay in work as the employee must travel whereas using Citrix Director the IT Support Engineer and take shadow (Remote Desktop Connection) within the browser and start assisting. Even there are many different way of assisting user i.e text only mode where the IT Support Engineer will not be able to view the user desktop but will be able to assist him using text communication in order to maintain user privacy, next one is Shadowing in citrix technical term which is similar to remote desktop connection in two way one without write permission where the Support Engineer can view the user desktop and assist with the issue and the next one is IT Sup port Engineer and ask keyboard, mouse controller where the support engineer itself and take over and work on the issue. Hypervisor: To share a resorudes of a device with multiple virtual machine for XenApp and XenDesktop we have Citrix XenServer using Citrix XenCenter to manage all servers. Store Front: User will access to the specific web page which is hosted in IIS using store front according to the department on the browser where the users will be able to access to the specific delivered site using citrix reciver. In the above figure we can see how user can access to citrix infrastructure. Here in the above figure a user is trying to access to provisioning services i.e. VDI or HSA first the user get to in the store front from NetScaler which is firewall that we have defined for Citrix Infrastructure the user will use Citrix Gateway then once he will get through the storefront which is basically URL the user will pass his username and password over the browser then the request will move other to the XenDesktop Deliver Controller where it will provide specific provisioned department then the request will further move to ADDS to check the user account name and password over the SQL to check weather it have the permission or not then finally it will check the citrix license server to check the license avalibality for the user if its form the machine it will check Device License and if its a user request than it will check the User License and then the user will get the session from the provisionin g server. Figure: Pool of Xen Server 1 and Xen Server 2 with its components We have deployed all these seven components individually; we could even deploy all seven components with in one singe Windows Server but at the end It will generate a lot of CUP utilization with the risk of single failure so we have deployed each component in each individual windows server so we have better performance and easy to manage. For Citrix Infrastructure on top of Windows Server Data Centre Edition 2012 and Mysql Server 2010 for managing database. For users to access citrix we have deployed Atrust Thin Client device where, users will get login using Citrix Store Front on web browser where they will be required to pass their username and password. All the username and password will be managed by Active Directory in windows server. Figure: Atrust T60 Model Thin Client: User can have their Hosted Shared Desktop (HSD), Virtual Desktop Infrastructure(VDI), Hosted Shared Application (HSA) using thin client device like Atrust t60. Thick Client: User can even access to the Hosted Shared Desktop (HSD), Virtual Desktop Infrastructure(VDI), Hosted Shared Application (HSA) using their own laptop machine or any end device like tables, cell phone. Citrix Cloud Redundancy: For Citrix Cloud Redundancy, Whole Citrix Infrastructure have been deployed in two major Sites Site1 (Headquarter) and Site2 (Data Centre) Figure: HP Blade Server Generation 9 with chasis Xen Server 1 and Xen Server 2 have been deployed in two blade servers in heart beat mode Both Xen Servers are in different colocation zone so if one goes down the service is provided from another source site 2 KDC all the license associated with the Citrix and Windows services are within the Key Distribution Center in cloud so there is no change of getting access over the key physically or change the key. All the licensing service are monitored through Microsoft License Management Console All user or device license are monitored by the team of System Engineers where if anyone from the organization leaves or enrol they will update the license where the missuse of licensing is minimal Xen Server 1 and Xen Server 2 both service Xen App and Xen Desktop service license is only accessed by the Chef Technical Officer (CTO) hence, no other employee and stop the server license and if so there is always another license that can we up on from Citrix itself upon urgent request Disaster Recovery Plan: Both Xen Server 1 and Xen Server 2 works in heart beat mode so if one goes down there is another server as a backup As blade server runs with in the chassis in case of any failure citrix service can be migrated immediately with zero data loss Figure: HP MSA SAN 2040 SAN storage have been configured with two controllers within itself Controller A and Controller B where if any array of SAS Drives goes down it will recover from another array. We have deployed dedicated SAN in each individual Site1 and Site2 where all the configuration and user data are stored. So, in this case even if one SAN goes down there is always another one so its 99.99% safe. Both SAN storage have been configured in RAID 1+0 mode for higher performance. In case of any disaster we have xen center from where we can manage each Xen App and Xen Desktop components. We have clustered both Xen Servers as a DataHub Pool name where we will be notified within the central management in case of any disaster. Xen Server 1 and Xen Server 2 both have been configured in our monitoring environment as well so if in case of any network failure our outage in the server we have notification in our monitoring application dashboard as well as it will be informed in the email along with the cell phone sms features. So if in case of any disaster in datacentre or if there is any failure in servers the team of system engineers can get into troubleshooting and response quickly. Both of our Data Centre Site1 and Site2 have passed ISO standard for building for data centre so if there is earthquake of 8.5 hector still our data centre will be operational and in case of fire we have advance fire prevention system. Power supply can be one of the biggest result of disaster, in our environment we have two power supply unit PDU A and PDU B (Power Distribution Unit) so there is always power supply to Xen Server Infrastructure if one goes down there is another one for continue power supply. Threats Associated: According to the recent research the internal threat is increasing more than external threat. Citrix have its own threat control mechanisms and one of its components controlling threats is using Citirx Director. Citrix Administrator can monitor and keep log of each individual users, so every activity performed by the users are captured and monitored. As the Virtual Desktop is provided to user using Citrix provisioning service users will only get the access and permission to files and the application. Where the users cannot copy any data or file from anyone as we have defined permission to make change and view only its own file, so this reduce the threat of miss using informations from one another or if any unusual actives are found performed by the user beyond their access then it will be reported by the system automatically hence can reduce threat. Each user activity is monitored using Director, for example if any of the user want to install any suspicious malicious code or application the citrix service will not allow them to do so if found then the Citrix administrator and take over the user session and eliminate the task. No any other application can be install in the Xen App or Xen Desktop other than those applications which are predefined by the citrix administration so there are no any threats associated with in this technology and the user they cannot make any comment on server. We have group of system engineers monitoring citrix infrastructure using Citrix Director so if in case of any unusual traffic or activities are seen it will act in an instant. All the Citrix request must past though Citrix NetScaler which is firewall and gateway for the internet traffic. Policies: Citrix Xen App and Xen Desktop have over more than 3000 policies, where we have defined few from them Users can not access another department other than their own. For Example: Employee working for Account Department cannot access the IT Support Department. User only have read/write/delete policy with in their user account If user make mistake while passing their username password more than 3 times in a day, then it is suspected to threat or any unauthorized access hence the system will block the user itself. Or if its a genuine request then the user can make a request to change the username and password. Users user name and password authentication have been defined within the windows active directory with citrix policy Each department have its own printer so account department and not use IT department printer this policy have been deployed using Citrix UPS (Universal Printer Service) Figure: Defining Citrix Policy for Very High Definition User Experience In the above figure the Citrix Administrator have defined the policy for Legacy graphic mode which will enable user to feel real desktop like a physical desktop graphic. ISP Different Department and Their Role Level 1 (L1) Support Department Sub Category for L1 `Support Department 1. Technical Customer Support Department * Technical Customer Support Department handle all the calls from the customer regarding different services that are provided by the ISP. Example: In our ISP our major business is bandwidth and Cloud Service so the our Support Team deals with all the trouble tickets related with the Cloud Service and Bandwidth i.e. a Customer want to have a VPS service over Vmware Exsi with some specific configuration they take the customer requirement and forward it to Level 2 System Department. 2. Technical On Field Customer Support Department: * Technical Support Engineers will go on site customer end to configure basic router along with the username and password provided by the L1 Customer Support Department for the Internet Connectivity. Level 2 (L2) and Level 3 (L3) Support Department Sub Category for L2 and L3 Support Department 1. L2 System Department * L2 System Engineers are responsible to maintain their internal running services and network that are interconnected along with the servers. To manage the running service we have different cloud platform Openstack, Exsi Vmware, Citrix. These department is more over with the operational task to all they need to take care is make sure all the service is up and running. 2. L3 System IP Engineering Department * All the Research and Development is done in this department. If there is any new technology in the market this team will to research on it and work closely with the porcument and management team to further continue organization with the advance technology and good business. 1. L2 Network Department: * This department is more over like l2 system department. They make sure all the internal and external network is operational and working fine. They are responsiable more in manageing internal network and if there is some basic configuration that is required to be done. 2. L3 Network IP Engineering Department * This department is responsiable for doing research and development on existing top level network like core network. They are responsiable to test the new device and alanyse whether they are reliable and cost efficient or not for the organization. 3. Account Department * Managing Company employee salary, customer billing 4. Project Department * Bidding project brining new project 5. SPI Department * Working with the CMTS network 6. NOC Department * Monitoring Different Data Center network connectivity link and mainting all the servers and networking equipment with the data center 7. Enterprise Customer Department * Dealing with the big size company 6. Retail Customer Department Dealing with the retail home user customers Public Cloud: The Techmaster ISP offers a public cloud to the users where they can pay as you go model. The cloud has several payment options which are provided by the third-party gateway. These payments are Visa/ Mastercard and paypal. There are firewalls and risk management server on the public cloud. The risk management server is provided Viewtrust by Dell to manage the risks ingests all the data and logs. The below diagram explains the way the public cloud is setup: Risk Management on Techmasters Public Cloud The techmaster risk management department uses the ISO 31000 for risk management. The risks are evaluated and reviewed time and again. The below diagram explains how the risks are handled on different stages: Due to the high rate of risk Techmaster has implemented the Risk management server which is used to ingest all the logs from the network and the servers online. There are several risks associated to the cloud. Below are the risks associated: Risk Assessment Table for Public Cloud: Score Rating Definition of risks Risks like-hood for Cloud: Score Like-hood Rating Probability Frequency 5 Expected 90-100% Almost quarterly 4 Highly Likely 70-90% Yearly 3 Likely 50-70% Every 2 to 4 years 2 Not likely 10-50% Every 4 to 6 years 1 Slight Every 7 Years and Beyond Enterprise Risk Management Server: Techmasters has a risk management server which ingest all the logs from the servers and presents it on different level. Viewtrust solution provides a scalable data ingest, collection, storage, processing platform which is currently supporting critical enterprise environments monitoring several devices and processing multitude of data input types from number of sensors as shown below. The Sensor sub-system collects data from multiple legacy and new sensors for collecting Hardware, Software, Vulnerability and Configuration information about assets within the enterprise. The Collectors are centralized and distributed to collect, process data close to the source. The data once processed is then sent to the warehouse for data normalization and transform using the Business Logic component of Viewtrust. This in turn results into a Common Operational View of the data from multiple sensors. The following diagram depicts and describes the Viewtrust Risk Management Analytics with the continuous monitoring dashboard architecture: Disaster recovery plan Disaster recovery plan is one of the most important thing in managing a network. The reason for it is, when a disaster happens, there should be a proper plan in order to recover the network. So, every organization should have a proper disaster recovery plan with them. What is a disaster? Disaster is an event that can make great harms and damages. There are natural disasters and disasters which occurs because of human activities. Natural disasters can be floods, fires, earthquakes and etc. Because of these natural disasters, physical damages can be happened for the network. Non-natural disasters can be happened because of the events such as hacking network and denial of service. Disaster recovery plan is the method which can be used to avoid these types of disasters. Disaster recovery plan helps to restart operations of a network after a disaster. Disaster recovery plan works with three methods to recover a network after a disaster. Those methods are, Restoring Recovering Replications and backups According to the ISO 22301 standard for business continuity plan, the following things should be studied, Users, purpose and the scope :- here, the reasons for the need of the business continuity plan should be discussed and the objectives of it. Refenc

Thursday, September 19, 2019

Essay --

To Kill a Mockingbird Essay The highest level of courage is staying true to yourself. Being honest to yourself and standing up for what you believe in takes great courage. Unfortunately, being courageous comes at a high cost and you may not always be rewarded for it. In To Kill a Mockingbird by Harper Lee, many characters show courage at the topmost level. Their acts may seem foolish and immoral to others, but they do what they believe in. The book shows that true courage is fighting in what you believe no matter what the consequences. We see this type of courage in Jem, Scout, Atticus and even Boo Radley throughout the course of the book. Firstly, Atticus demonstrated mental courage when he undertook the task of defending Tom Robinson, a black man who was wrongly accused of rape, in court. He had to persevere through many hardships in order to make a statement in the community. Atticus knew he would not win the case against the all white jury and like Mrs. Dubose in her struggle against morphine, Atticus lost before he even began. Nevertheless, Atticus knew that Tom was innocent and was willing to stand up for him because nobody else would. Since Atticus stayed true to himself and did only what is morally correct, he fought this case with great determination. He wanted the people of Maycomb to know the truth about what happened to Mayella Ewell, but even the truth would not free Tom Robinson. "That boy might go to the chair, but he's not going till the truth's told." (Lee, 146) Atticus showed true courage in going against Maycomb, a mostly prejudice town. He was given names like â€Å"nigger lover† and was loo ked down upon heavily but that did not stop him. On the other hand, Mayella Ewell decided to lie about the case because othe... ...ack home, Scout puts her arm around his arm to signify to the neighbors that Boo is a friend, not an enemy. In conclusion, true courage is shown in the story in many different ways by many different characters. There was not just one protagonist in this story who turns out to be a hero. In this story we had two plots. Each of the plots contained many heroic characters who not only did what they deemed morally just, but put their life behind what they believed in. Whether physically or mentally exerting themselves, almost every character, showed qualities like Martin Luther King Jr. They made bold statements in the community. They sent out messages that people would not forget. It is unfortunate that only now can we admire these type of people for what they did. Thankfully, they are remembered for their courage and that is what makes these characters world famous.

Wednesday, September 18, 2019

Love and Money in Kurt Vonneguts God Bless You, Mr. Rosewater :: God Bless You Mr. Rosewater

Love and Money in Kurt Vonnegut's God Bless You, Mr. Rosewater "A sum of money is a leading character in this tale about people, just as a sum of honey might properly be a leading character in a tale about bees." (p.7) God Bless You, Mr. Rosewater; or Pearls Before Swine is a satirical story of a millionaire Eliot Rosewater, the president of a fabulously rich Rosewater Foundation, who suffers from total love for all humanity. He decides to go his own way and moves with his money to Rosewater, Indiana. There he becomes a volunteer fireman (one of his obsessions) and opens an office where he helps all people who need help. A lot of people, however, don't approve of Eliot's behavior (his father, for instance, and many many influential and powerful people who are somehow concerned). They look for a way to deprive Eliot Rosewater of his presidential post and, thus, to save the money from being spent on dirty people. The most obvious way is to prove Eliot's insanity. God Bless You, Mr. Rosewater is Kurt Vonnegut's fifth novel and, I daresay, it is his most positive and humane work yet. As you might guess from the quote in the beginning of this essay, it is a book about money. Kurt Vonnegut managed to write a book about money and love without the ugly word versus between them. It shows that money and love can exist together. Mr. Eliot Rosewater is an example of a man who found his own answers, who re-invented himself and the world he was living in, who dumped the future that had been carefully planned for him, and who started to love people and help them with the inherited millions. "...we may not be able, Vonnegut is saying, to undo the harm that has been done, but we can certainly love, simply because they are people, those who have been made useless by our past stupidity and greed, our previous crimes against our brothers. And if that seems insane, then the better the world for such folly..." (John R. May) The novel tells us that we do not have to accept the world as it is, that we can find our own, individual answers to everything and, if not change the world (the book does not end with a promise of a perfect world), then at least help it. And Eliot succeeds. Even though he is considered to be crazy, he helps hundreds of people in need.

Tuesday, September 17, 2019

Congestion Charging Essay

Resolving London’s transport problems was the highest priority of the Mayor of London, Ken Livingstone. His goal was to create a world-class transport system that would improve business efficiency, supports greater economic prosperity and improves the quality of life for every one living in London or visiting London. The Mayor’s transport strategy, which was published on 10 July 2001, it had ten key priorities: * Reducing traffic congestion; * Rising money for underground investment; * Rising money for radical improvements to bus services across London; * Better integration of the National Rail system with London’s other transport systems; * Increasing the capacity of London’s transport system; * Improving journey time reliability for car users; * Supporting local transport initiatives; * Making the distribution of goods and services in London more reliable and efficient; * Improving the accessibility of London’s transport system; * Bringing forward new integration initiatives. What is Congestion Charges? * Congestion charging is a way of ensuring that those using valuable and crowded road space make a financial contribution. * It encourages the use of other modes of transport and is also intended to ensure that, for those who have to use the roads, journey times are quicker and more reliable. * This scheme requires drivers to pay à ¯Ã‚ ¿Ã‚ ½5 per day if they wish to continue driving in central London. Tube station Wide line – zone ring road Jam Cam – see what the traffic is like Charging zone area Parking Train station River services This map shows all the areas that are affected by congestion charges. By looking at the map you can see all of central London zone 1 and zone 2 has being affected, so anyone living within that area would have to pay the congestion charge to travel to their local area or outside the congestion zones. Advantage and disadvantage of congestion charging Advantage * Reduce congestion * Reduce through traffic * Further encourage use of public transport in central London * Benefit business efficiency by speeding up the movement of goods and people * Create a better environment for walking and cycling Disadvantage o Traffic may increase on orbital routes by up to 5% o Traffic would be reduced on radial routes by 5 – 10% o Overall reduction in traffic by 1 – 2% o London scheme could simply make traffic worse elsewhere o Will hit disadvantaged hardest o The scheme had no pilot scheme to test the effectiveness of congestion charges o It will take months to establish whether it is a success Conclusion Congetion charges has it adavantages and disavantages an asthmatic would would totally spport congestion charges, as pollution caused by cars is a factor of asthame. It is also a class question. Those who can afford to have moved, those who can’t have to stay and choke. If congestion charges give them and thier families a chance to breathe then I would fully support it. However, they need to be part of a plan aimed at enhancing the environment and improving the quality of life. This could include cheaper public transport and improvements in its quality, safety and reliability; more nurseries and play schools nearer to where people live, more on-line shopping, local markets and food co-ops, reduced hours with no loss of pay; repopulating city centres and the countryside, more home working and home schooling; a guaranteed income to give parents the option of being full time carers; offering those willing to give up their car free bikes or public transport. But there is also an agrument about Who is prepared to pay à ¯Ã‚ ¿Ã‚ ½10 a day, à ¯Ã‚ ¿Ã‚ ½50 a week, or à ¯Ã‚ ¿Ã‚ ½3,500 a year for congestion charging and à ¯Ã‚ ¿Ã‚ ½2,000 for workplace parking–which is à ¯Ã‚ ¿Ã‚ ½6,000 of taxed income–for the privilege of bringing their car into London? It is the riche man ie stockborker, banker, law ect who wants to come in from Surbiton to the City of London. Their would not mind the charges. thier puts them down to they companies and it pays the à ¯Ã‚ ¿Ã‚ ½5,000 or à ¯Ã‚ ¿Ã‚ ½10,000 a year. â€Å"Who cares anyway†? He will just say, â€Å"That’s great, thank you very much.† I believe It is a fat cats charter. What about people on a low wage, old people, young mothers who are dependent on their motor car not only in London but throughout the nation? To those people, à ¯Ã‚ ¿Ã‚ ½5,000 or à ¯Ã‚ ¿Ã‚ ½10,000 a year is a lot. What I want to know is this. What consultations has the Labour party had with groups of disabled people? What consultations has it had with the unions in regard to low wage earners? What consultations has it had with old people–people who need their motor cars, and who will be taxed off the road if the charges are to work? If the Government say that is not their intention, and that such people will not be taxed off the road, I put it to them that there is no chance that their congestion charge will work. It is certain that the fat cats will not be taxed off the road. If the Government find a way of allowing housewives, young mothers, disabled people or members of the other categories to stay on the road, the amount of congestion will not be reduced, and all that we shall have is a revenue raiser for the mayor.

Monday, September 16, 2019

Shipper Manufacturing Company Case Study

In order for the APD Division at Shipper to gradually shift from a low volume/sole-source product line to a higher volume/continuous product, manufacturing will need to adopt new operations objectives with respect to cost, delivery, quality and flexibility. The current customized products allow for costs to be passed through to the customer but with a producer designed product, more of the costs could fall internally and have a larger affect on profits. The price tag of the product will become a more important objective due to increased competition and we will therefore want to reduce costs and should be emphasized as the mission objective. The shift from customer to producer designs will reduce flexibility since Shipper will aim for fewer manufactured products marketed at a wider audience. The quality objective should not change much from the current; Shipper would still want to maintain the quality standards they are known for, which may already provide for a distinct competence. Quality would be an order qualifier supporting the order winner of cost and can aide in positioning APD’s products as a strong competitor in the anticipated market. Delivery as a qualifier will also help win orders in a more competitive environment and thus the objective should be to trim it down. New expectations may require stocking a finished goods inventory and possibly maintaining supplies to quickly produce the goods during peaks of demand. Higher and more normal volume shipping routines may also benefit the end of delivery process. Shipper can help solidify a competitive role in the expected market by establishing a competitive advantage derived from maintaining these objectives when moving towards a multiple customer and high production volume strategy. Many, if not all elements of operations will need adjustment to account for this change in strategy and manufacturing operations objectives. A low cost and improved delivery objective will put a more normal routine on many items and that ideally can improve a number of processes and costs along the way. The process should trend toward a high volume/low cost basis and involve repetition ov er a long period of time. Since these processes would be continually run, it would now be worth the investment of capital into more automated equipment to speed up production and duplication. This should also reduce the labor intensity needed to produce the finished good and be more effective as a line flow as opposed to the current job shop approach. Furthermore, placing orders and stocking inventory will no longer run parallel as easily and may need to be separated in the process for more direct control and efficiency. The materials supply is already integrated vertically and is an existing benefit of the structure, greater possible savings might be achievable due to economies of scale with higher volumes. The work force would be directly affected by the changes in the manufacturing equipment towards automation. Fewer and lower skilled laborers will be necessary, which will draw lower wages and reduce costs but open the potential for dissatisfaction with the job. Management of labor will still be as important as always and the need to maintain morale and a positive attitude could possibly come into play in order to keep workers motivated and production at a high level of quality. More growth opportunities may reveal themselves to laborers with the need for more direct control in manufacturing. Quality control would need to evolve to consider the newer higher volume production versus the existing project orientation. The teamwork mentality may also suffer from the change to a line flow and may require a quality control panel to make up for the quality attitude lost by leaving a group project orientation. Other control factors need to evolve to accommodate the shift. More raw inputs and finished goods may have to be stocked on site and require better organization than the manual system. Production and inventory control will need to get the manual system updated to the new computer system, to eliminate the dependency for expediting and stock chasing, which could only get worse with a larger production. Improved capacity should follow once operations move more towards the higher volume product line and fully utilize new equipment. Scheduling will most likely get more intricate and be streamlined to ensure maximum efficiency from the growing capacity as the operation changes to a line flow. The organization may want to accommodate the new strategy and open up a trained production/inventory control position specific to APD, in addition to the materials management service for all divisions. Developing a quality control area directly under APD also may be advantageous, to incorporate quality assurance into the different steps of manufacturing instead of an end process inspection. It might create a better opportunity to prevent errors in house and reduce the need to correct them after the fact, preventatively reducing costs.

Sunday, September 15, 2019

Working Poor

The Struggle of the Working Poor Revised Essay Sociology 113 Yvonne Barney October 19, 2012 The Struggle of the Working Poor Society often describes the impoverished with one word, lazy. Society has taught us that if a person wants to be financially successful, it is a simple process of education and hard work that will equate to a successful income. This is the American dream. If the impoverished simply would get a job instead of being lazy, they would not need to rely on programs like welfare. The impoverished would succeed if they only would apply themselves.However, in an attempt to present another point of view, The Working Poor Invisible in America by David K. Shipler (2004) explored multiple variables this group struggles with daily. Chapter 1, â€Å"Money and Its Opposite,† explains the workings and effects of tax payments and refunds, the abuse of the poor by public and private institutions, the spending habits of the working poor, the consumerist culture of the Unite d States, and the omnipresence of money as a guiding factor in the lives of the working poor.Chapter 2, â€Å"Work Doesn’t Work,† chronicles the struggles of three working women as they attempt to climb out of poverty through employment. They hold jobs that pay between $6 and $7 per hour and attempt to eke out a living with the additional assistance of welfare checks, food stamps, Medicaid, and other services. However, a slight raise in their pay creates an offsetting loss in benefits. Chapter 3, â€Å"Importing the Third World,† addresses the poor immigrant workers, both legal as well as illegal, laboring in sweatshop conditions in the United States.Shipler recounts the working conditions of numerous sewing shops in Los Angeles, where legal and illegal immigrants from Mexico, Honduras, Korea, Vietnam, Ethiopia, Thailand, Cambodia, and other nations work for wages below the federal minimum wage and without overtime pay. Chapter 4, â€Å"Harvest of Shame,† tells of the harsh living conditions of migrant farm workers across the United States. They receive low wages—mostly minimum wage; live in deplorable housing; are exposed to azardous pesticides and herbicides; face little government enforcement of labor laws; are difficult to organize due to the transient nature of their work and the undocumented status of most; and are constantly on the move, which does not allow their children stable access to education. Chapter 5, â€Å"The Daunting Workplace,† addresses the diverse challenges the workplace holds for those from the lower rungs of the socioeconomic ladder. Many working poor have no work experience, no education, a criminal record, a drug addiction, and a lifelong absence of role models.Dysfunctional families in which no one works, or even ventures outside the neighborhood, have provided no support system or role models. Chapter 6, â€Å"The Sins of the Fathers,† begins by unveiling an epidemic of sexual abuse that affects all classes and races in the United States. Both the wealthy and the poor are abused; however, the wealthy tend to have the financial as well as the family resources that enable them to overcome abuse. Chapter 7, â€Å"Kinship,† emphasizes the role that kinship plays in overcoming the hardships of poverty.Shipler writes, â€Å"Kinship can blunt the edge of economic adversity† (p. 179). He describes a family of five that has faced all forms of hardship and poverty—from job loss to cancer to the death of the mother—yet holds together through bonds of love and caring. He also chronicles the story of a woman who chose to earn significantly less and be plunged into poverty and debt in order to spend time with her children, one of whom eventually attended Dartmouth College. Chapter 8, â€Å"Body and Mind,† addresses health issues affecting poor families.Shipler mentions malnourishment, susceptibility to infections, disease, chronic conditio ns (such as asthma, diabetes, and allergies), premature birth, retarded cognitive and physical development, stress, and emotional distress, as well as material support that can help a family endure. It is not uncommon for children in poor families to suffer from poor diets, which can be the cause of numerous related health problems. Chapter 9, â€Å"Dreams,† begins with the ambitious professional aspirations of sixth and eighth grade children from poor families in Washington, DC.Shipler contrasts these aspirations with the enormous faced problems beyond their control. Chapter 10, â€Å"Work Works,† is dedicated to the positive impact that job training and working has had on some poor individuals and families. Job training programs that teach soft skills as well as hard skills and are successful in instilling confidence and self-esteem are appreciated by employers. Chapter 11, â€Å"Skill and Will,† emphasizes that American society must understand what it can do using the skills and resources it has to combat poverty.The approach to remedying poverty, Shipler argues, must be holistic, tackling all problems associated with it at once. The United States is often described as a place where anyone can â€Å"pick themselves up by their bootstraps† and realize the American dream of a comfortable lifestyle. But, for over 30 million Americans, this dream is no longer possible. Though we live in the richest and most powerful country in the world, there are many individuals who are living under or at the poverty level. While the United States has enjoyed unprecedented affluence, low-wage employees have been testing the American doctrine that hard work cures poverty† (Shipler, 2004). The status of poverty translates to families of four making around $ 18,850 a year. And as soon as they find work or move just slightly above the $ 18,850 a year (which is still a meager and deprived way to live), they are cut off from welfare subsistence and lose other support designed to help them, such as food stamps and health insurance; This situation often leaves them no better off, and sometimes worse off, than when they were not working.Proponents of welfare reform have verbalized that the working poor are poor because of their lack of effort and laziness; this statement is an oxymoron. The working poor work longer hours, with less pay and few, if any, benefits. Some make the right choices and save a little money, avoid overwhelming debt, and live modestly. Even for those who live carefully off a working wage, it only takes one issue for their world to crumble around them. If the car breaks down or a family member is injured at work, what little savings they have accumulated could be gone in an instant.Why do people stay poor when popular opinion tells us if we work hard, we will be okay. The answer lies in the valued social inequalities; the opportunities available to each socioeconomic status level differ greatly. One factor t hat seems to distribute over the impoverished is lack of education. Lack of knowledge affects every aspect of life from basic health care to effectively raising children in a safe and secure environment. Children who come from a working-wage family should not be disadvantaged.There is no reason why the public education system should not give every child an equal opportunity to graduate high school and continue on to college or trade schools. The fact is public schools are funded to a large degree by property taxes. Impoverished schools receive considerably less funding and have to find ways to make their budgets work. Furthermore, the best teachers are often in school districts that can offer competitive salary. It is a well-known fact that children from affluent families tend to do better in school.Children from low income families tend to do poorer on tests, have a lower graduation rate, and are less likely to attend and complete college (Melville 2012). Yet the income divide has received far less attention from policy makers and government officials than gaps in student accomplishment by race. Now, in analyses of long-term data published in recent months, researchers are finding that while the achievement gap between white and black students has narrowed significantly over the past few decades, the gap between rich and poor students has grown substantially during the same period (Levitan, Magnum & Magnum 1998). We have moved from a society in the 1950s and 1960s, in which race was more consequential than family income, to one today in which family income appears more determinative of educational success than race,† said Sean F. Reardon, a Stanford University sociologist. Professor Reardon is the author of a study that found the gap in standardized test scores between affluent and low-income students had grown by about 40 percent since the 1960s and is now double the testing gap between blacks and whites (Tavernise 2012).A-1 In another study, by resear chers from the University of Michigan, the imbalance between rich and poor children in college completion — the single most important predictor of success in the work force — has grown by about 50 percent since the late 1980s (Tavernise 2012). Tavernise (2012) concluded that 8 % of the working poor hold college degrees compared to 26% of all workers. Although, two-thirds of the working poor hold high school degrees; this proportion is much lower than the 88% of all workers who hold high school degrees.The consequence of not holding a high school degree is often poverty. 22% of workers who do not hold high school degrees fall below the official poverty level which is $23,050 for a family of four, and 34% fell below 150% of the poverty level which is $ 34, 575 for a family of four (â€Å"Problems facing† 2012) . There is some evidence that the working poor are less likely to receive job training from their employers. The combination of lower education and lack of training compared to other workers make it difficult for the working poor to climb out of poverty.Only 30% of the working poor live in married couple families, compared to 65% of all workers. Single, female-headed families are especially overrepresented among the working poor. Among the working poor, 49% live in families headed by a si ngle woman. Of those who live in families headed by a single female, 28% work but live below 150% of the poverty level. In addition, almost half (46%) of all single parents who work and have children under six years old are in poverty.Workers who were never married or those who were once married also face relatively high rates of working poverty. Twenty percent of workers who have never been married and 21% of those who were divorced, widowed, or separated lived below 150% of the poverty level (â€Å"Problems facing† 2012). The working poor are less likely to be covered by health insurance by their employers. Only 18% of the working poor are co vered by health insurance available through their employer or their union, compared to 55% of all workers.Malnourishment, susceptibility to infections, disease, chronic conditions (such as asthma, diabetes, and allergies), premature birth, retarded cognitive and physical development, stress, and emotional distress can be a side effect of lack of health insurance. It is not uncommon for children in poor families to suffer from poor diets, which can be the cause of numerous related health problems. Although many of the working poor qualify for food stamp benefits, few receive them. The average food stamp benefit for a family of four is $ 496 per month (Center on Budget and Policy Priorities 2010).Of those who qualify for these benefits, two-thirds do not receive them. It is unclear why the working poor do not receive these benefits, but lack of need does not seem to be the reason. Research suggests that the working poor do not know that they qualify for these benefits. In addition, we lfare administrators in some states incorrectly tell applicants, especially men, that they do not qualify for these programs. Finally, often local agencies create added barriers to discourage welfare participation.The City of New York, for example, used to require that applicants return to the welfare office for a second visit in order to apply for food stamps. This requirement was eliminated only recently because of a court order (FamiliesUSA. org 2012). Many working poor families cannot find affordable housing. Almost one in six households are cost-burdened, paying more than 30% of household income on housing expenses. Median level shelter costs, including mortgage payments, real estate taxes, property insurance, rent, nd utilities, account for 20% of the average non-poor household's income. For poor households, the median expenditure can be as high as 60% of household income (Levitan, Mangum ; Mangum, 1998). In addition, poor families may face long waiting lists for available sub sidized housing units, especially in rural areas. However, access is improving as extension educators provide the working poor with information about home ownership and special mortgage programs, and how to access them. Balancing employment and parenting demands is especially challenging for the working poor.They have fewer financial resources, and the types of jobs for which most are eligible provide little independence, authority, and flexibility to respond to conflicting demands (Henly 1999). Child care is an important obstacle. Nationwide, high-quality child care is scarce and expensive. Respondents in one study paid, on average, $70 per week for child care, about 22% of their earned income. In the same study, about one-fifth of respondents reported they had no regular child care provider and had to piece together care for their children at the last minute or leave children home alone or with an older sibling.Thirty percent of respondents reported having left a job because of a child care disruption (Henly, 1999). According to a study conducted by the Urban Institute in 2005, more than two thirds of children ages 5 and under from low income families spend a significant amount of time in child care each week. This is significant because the quality of child care available to low income families is much worse than that available to higher income families, and the quality of the child care affects the child's development. High quality, center-based care is expensive and is simply not an option for many low income families.Instead, they turn to informal, sometimes unregulated child care (Melville, 2012). There are federal programs to improve and fund early childhood education, but these programs do not work with the hectic working schedule of low income parents. Child care subsidies are available in some states, but not available to all low income workers. In other words, low income families often have difficulty accessing support systems that help them balanc e work and family life. As a result, the children of low income families are not given the same opportunities as their middle class counterparts (Melville, 2012).Unfortunately, high-quality care tends to be more expensive, and childcare subsidies in many states pay only the average market rate. Moreover, childcare subsidies cover only a minority of the low-income workforce (Henly, 1999). Parents who choose to enroll their children in high-quality child care often would have to pay the additional costs; a choice many cannot afford to make given other demands on the family income. For many working poor families, these additional costs; make selecting high-quality child care financially impossible (Schulman & Adams, 1998).Extension educators can make sure the working poor know about and take advantage of available subsidies, and tax credits can offset the high costs of child care. Transportation is also a major barrier to financial self-sufficiency for many working poor families. Many of the working poor do not get to work with the ease that most working non-poor enjoy (Lambert, 1998). Even though some communities have identified creative solutions to local transportation needs, transportation remains a problem for many of the working poor. Mass transit, if available, is often sparse, not taking direct routes to most job locations.Outside of heavily populated metropolitan areas, public transportation is largely unavailable. Working poverty does not affect everyone to the same extent, and certain segments of our population are more likely to become members of the working poor. Individuals in this category include workers who are most likely to be allocated to the low-wage jobs that fail to provide full-year employment. Women make up a greater share of the working poor than do men, probably because on average they earn lower wages and work fewer hours.Although women comprise 47% of workers between the ages of 18 and 56, 56% of the working poor are women (FamiliesUS A. org, 2012). Non-citizens of the United States are also disproportionately represented among the working poor. Fifteen percent of such workers live below poverty, and 30% live below 150% of the poverty level. Blacks and Hispanics are especially affected; working poverty affects people of color to a much greater extent than it does white Americans. A surprisingly large number of blacks and Hispanics work below the poverty level.Twelve percent of all blacks who work fall below the poverty level, and 23% fall below 150% of the poverty level. Among working Hispanics, the poverty rates are even higher: 14% live below the poverty level and 29% of Hispanic workers fell below 150% of the poverty level (Shipler, 2004). The working poor face a number of difficulties: low wages, insufficient hours, layoffs, lack of skills along with limited health benefits affect their health and other conditions that may affect their work performance. Thus, prescribing one solution is not likely to solve th e problem of working poverty.The working poor need higher wages and jobs that offer full-year employment, wage supplements such as the Earned Income Tax Credit, and access to services such as health care and child care. Most importantly, we should not assume that we can solve the problems of working poverty without income supports. Because many of the working poor are disabled or suffer from other serious health limitations, some workers may not be able to work more hours or in higher paying jobs and must rely on income supports in order to survive above the poverty level. References Center for American Progress (2012. Retrieved October 10, 2012 from http://www. mericanprogress. org/issues/women/report/2008/10/08/5103/the-straight-facts-on-women-in-poverty/ Center on Budget and Policy Priorities. (2010). Retrieved October 10, 2012 from http://www. cbpp. org/cms/index. cfm? fa=view&id=1269 FamiliesUSA. org. (2012). Retrieved October 10, 2012 from http://www. familiesusa. org/resource s/tools-for-advocates/guides/federal-poverty-guidelines. html Henly, J. (1999). Challenges to finding and keeping jobs in the low-skilled labor market. Poverty Research News, 3(1), 1-5. Levitan, S. , Mangum, G. , & Mangum, S. (1998). Programs in aid of the poor.Baltimore, MD: John Hopkins University Press. Melville, J. (2012). Effects of low family income on children. Retrieved 0ctober 10, 2012 from http://www. ehow. com/list_6195251_effects-low-family-income-children. html Problems Facing the Working Poor. (2012). Retrieved September 30, 2012 from http://www. dol. gov/oasam/programs/history/herman/reports/futurework/conference/workingpoor/workingpoor_toc. htm Shipler, D. K. (2004). The working poor: Invisible in America. New York: Alfred A. Knopf. Tavernise, S. (2012, October 10). Education gap grows between rich and poor, Studies say New York Times, February 9, 2012, A1.

Saturday, September 14, 2019

Fall of the House of Usher

â€Å"The Fall of the House of Usher† by Edgar Allen Poe is a story riddled with deeper meanings than the superficial plot line and analogies to draw. With the first read through, the story seems quite confusing in a sickly twisted sort of way, but upon further reading, it becomes clear that there are meanings hidden deep down in the plot. There are many comparisons that can be made in this story but the most obvious one would be the connection between the lives of the characters and the house in which they dwell.Poe does a good job at purposely confusing the reader as to whether he is talking about the literal house of Usher or the metaphorical house of Usher. The literal house is described as being in rough condition, with a crack from the top of the house to the bottom. It has tarn around the outside of it and is in a general state of disrepair. As Poe describes how the literal house of usher is nearly ready to crumble, he also speaks of the metaphorical house of Usher. The metaphorical house of usher is also ready to crumble. This is because the house of Usher was inbred, leaving all of its members except two diseased.Roderick Usher and Madeleine Usher were the only two Ushers left in the line of Ushers, and they were both very ill. Madeleine suffers from fits that render her immobile, and appearing dead. Roderick on the other hand has heightened senses and is acutely aware of every tiny last detail that is happening around him. Both Roderick and Madeleine are on the verge of death and it is only a matter of time who goes first. This can again be related to the literal house of Usher because due to the fissure running down the foundation of the house, it is only a matter of time which side collapses first.Poe does a good job at creating a sense of claustrophobia in the house by making it seem small and difficult to navigate. He also creates a sense of mental claustrophobia within the narrator by making the narrator unable to get away from the literal and figurative house of Usher. In the end of the story, when Madeleine breaks out of her tomb and kills Roderick, this is the fall of the metaphorical house of Usher, because after this point, there are no more ushers seeing as they have both died.As soon as the narrator flees the madhouse, this is the fall of the literal house of Usher. Immediately after the narrators departure from the house, the fissure from the top to the bottom of the house enlarges and the house literally collapses. It is clearly seen throughout Poe's story that both the literal and figurative houses of Usher are meant to have a nearly perfect parallel plot throughout the entire story. The literal house collapses, as does the figurative, and they both collapse in the same way.

Friday, September 13, 2019

Abolition of Death Penalty

According to Republic Act No. 7659, death penalty is a penalty for crimes that are heinous for being grievous, odious and hateful offenses and which, by reason of their inherent or manifest wickedness, viciousness, atrocity and perversity are repugnant and outrageous to the common standards and norms of decency and morality in a just, civilized and ordered society. Death penalty is a cruel, futile and dangerous punishment for very serious reasons and with due judicial process. According to  Amnesty International, a worldwide movement of people working for internationally recognized human rights; death penalty is the ultimate, irreversible denial of human rights. Thus, they worked towards abolishing it in order to end the cycle of violence created by a system riddled with economic and racial bias and tainted with human error. BACKGROUND Next, I would like to present a brief background on death penalty in the Philippines. In 1987, the Philippines made history by becoming the first Asian country in modern times to abolish the death penalty for all crimes. However, six years later, in 1993, the death penalty was reintroduced in the Philippines for 46 different offences. Such of those are murder, rape, parricide, infanticide and qualified bribery, among others. Executions resumed in 1999 until year 2000 when former President Estrada announced a moratorium on executions. This has been continued by current President Arroyo, in practice, throughout her presidency. Now, under her rule, the death penalty is again abolished . STANCE I am in favor of abolishing the death penalty law in the Philippines. Allow me to present my arguments. First, it violates the right to live. Second, it is a very cruel practice. Third, it is anti-poor. Last, death penalty defeats its purpose. ARGUMENTS First, the imposition of death penalty violates a persons right to live. Article III Section 1 of the 1987 Constitution, otherwise known as  the Bill of Rights, states that No person shall be deprived of life, liberty, or property†¦ By imposing death penalty, the right of a criminal to live is being violated. Furthermore, it is a known fact that majority of Filipinos are Catholics. As said, we have one of the worlds largest Christian populations. According to  the Ten Commandments  of the Church, thou shall not kill. Therefore, nobody is given the right to commit the lives of others. Whether that person is a criminal or not, nobody has the right to play God and take the life that He has given. Filipinos should respect and value the sanctity of human life and uphold the virtue and religious doctrines that are expected of us as a dominant Christian nation. Second, it is a very cruel, inhuman and irreversible practice. It is very cruel and in human because persons are killed. This alone is proof. Once a person is killed, the act cannot be reversed. Third, death penalty is anti-poor. In a country like the Philippines with a very slow, sometimes inefficient, unfair and unjust judicial system, death penalty is simply not viable. Majority of the 1200 people on the death row are poor. Maybe, for some, being there is what they deserve. But for many, it is poverty that brought them there. Not everyone in that row should die. Many are simply there because they ran against some filthy rich and powerful person or they could not afford to get a good lawyer to defend them. A study showed that death penalty is anti-poor as the underprivileged who cannot afford the services of competent counsels are oftentimes the ones convicted of death penalty. Studies have shown that the death penalty is disproportionately imposed on the poorest, least educated and most vulnerable members of society. It takes the lives of offenders who might otherwise have been rehabilitated. Lastly, death penalty does not live up to its purpose. It is not able to serve its purpose which is to prevent crimes and to preserve peace and order. According to the President, in a letter she sent to Senate President Franklin M. Drilon, the imposition of death penalty was shown to have not served its principal purpose of effectively deterring the commission of heinous crimes. Clearly, even with death penalty imposed, the Philippines still continued to project high and rising crime rates in the country. If death penalty is effective, there should have been less crimes but it is quite the contrary. Also, there are no concrete evidence like studies or tests that could prove that the imposition of death penalty really prevents crime thus maintaining peace and order in the country. SUMMARY To cap off this essay, death penalty is the punishment served to those who have committed crimes that are heinous for being grievous, odious and hateful offenses and which, by reason of their inherent or manifest wickedness, viciousness, atrocity and perversity are repugnant and outrageous to the common standards and norms of decency and morality in a just, civilized and ordered society. I am in favor of the abolition of death penalty because first, its imposition violates the right to live. Second, it is a very cruel, inhuman and irreversible act. Third, death penalty is anti-poor. Lastly, death penalty does not serve its purpose of preventing crimes and preserving peace and order. I wish to end this speech by saying that I commend the Congress for passing a legislation calling for the abolitio n of death penalty. As CBCP puts it, this step has finally led the country to move from justice that kills to justice that heals. But the new Vice President of the Philippines Jejomar Binay thinks it so as he utter his desire to bring back death penalty in the Philippine in his outburst emotional response when he attended the wake of the brutally murdered son of attorney Oliver Lozano at media interview. â€Å"Dapat ibalik na ang death penalty†¦Ã¢â‚¬  ( â€Å"It is high time to bring back death penalty†) —-Jejomar Binay Death Penalty has been in the Philippines since the Marcos administration but was only removed at the time of former Philippine president Corazon Aquino and was revived during between the administration of former Philippine presidents Fidel V. Ramos and Joseph Ejercito Estrada and was removed again at the time of the recent former Philippine President Gloria Macapagal Arroyo because of the mistake and failure of the execution of the First ever Filipino to receive death penalty by lethal injection –Leo Echagaray for the crime of rape which was found eventually that he is not guilty or was innocent of the crime he was accused of and the true rapist is at large and unknown. What a big slap on the Philippines justice system, thus it was removed. It was the roar and pro-death penalty campaigns in the media which influenced unlearned people that Leo Echagaray succumb into untimely death before he was proven innocent; so sad that people at that time were driven by brainless wrath to revenge for the rape victim. But now Vice president Binay, is wishing to bring it back? ; To repeat this â€Å"sad scenario† just to tell to the world that â€Å"we do justice†, WHAT JUSTICE Does he think well when he utters a wish for its revival or is he just emotional overwhelmed at the wake of the brutally murdered son of attorney Oliver Lozano? There are many bad consequences to the justice system of the Philippines when Death penalty will be rekindled its frightening presence in the Philippines. More injustices will be engendered in the end by mistakenly sentencing to death innocent poor Filipinos and foreigners once they could not proven themselves innocent at the allowed period of presenting evidences and proofs that one is not guilty of the crime being accused of and by the influence of ignorant brainless and heartless wrathful masses. Moreover, if one is financially poor and destitute how can one find a trustworthy attorney that cannot be bought by money, to depend one’s innocence? Truly more innocent lives will be shredded unjustly by this satanic capital punishment. Furthermore, we already know that the financially rich and wealthy prosecuted and accused ones could pervert justice and could buy money-face attorneys, lawyers and judges. Therefore, is this â€Å"death penalty† will stop heinous crimes or will just added more unjust crimes perpetrated by its revival and presence, wherein â€Å"death penalty† is also a heinous crime concealed by the law of legality of the state or country. For death penalty is an act of torturing a person until it dies, which has no difference with the sadistic and psychotic behavior of seemingly soulless criminals who torture first their victims before they eventually kill their victims. Bestial act (death penalty) against bestial act (heinous crimes) will not solve or eliminate crimes within the country or state. Fear is not the answer and will not uproot the main cause of crimes. it just controls but never solves; it just control the symptoms but never cures and heals. JC tortured and received Death Penalty A more humanitarian solution is the key to solve bestial problems like crimes; for every effect (activities) there is a cause (reason for the activity). The cause should be addressed to solve the problem and not controlling the effects without removing the cause; For the effects will not end if the cause is not removed. Remember Filipinos, your National Hero, Dr. Jose Rizal was a victim of Death penalty or capital punishment which is Firing squad during the Spanish occupation but he is innocent. Remember also Filipinos, your beloved colonial religious deity Jesus Christ was also a victim of Death penalty or capital punishment which is crucifixion but Jesus Christ is innocent.