Thursday, November 28, 2019

The Open Systems Interconnection Referencing Model

Introduction One of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of computer networks. The interconnection capability of computer systems is arguably the feature that makes them most versatile and invaluable to their users.Advertising We will write a custom research paper sample on The Open Systems Interconnection Referencing Model specifically for you for only $16.05 $11/page Learn More With this realization, many manufacturers in the early days of computing set out to develop devices that could be used in internetworking. At the onset, various manufacturers designed network architectures that were specific to their devices leading to a lack of interoperability between devices by different manufacturers (Wetteroth 4). This was very inefficient and as such, there arose a need to come up with a common standard which would guarantee the seamless interconnection of various heterogeneous arch itectures. The International Standards Organization (ISO) was therefore formed as a body charged with developing and publishing international standards. This body came up with the Open Systems Interconnection referencing model (OSI). This paper shall set out to explain the components of the OSI reference model as well as the need for adopting the standard. Importance of the Open Systems Interconnection Referencing Model The OSI reference model was produced in 1974 by the ISO encourages the creation of network equipment that is non-proprietary in nature by the various vendors in the field (Wetteroth 4). This model consists of seven layers with a description of the services that each layer must provide to the layer above it. An important point to note is that the OSI model is not a specific network architecture but rather a description of what each layer must do. As such, manufacturers are required to use this as a guideline when coming up with their own specific network architecture. Any device that conforms to the OSI standard is guaranteed to be able to communicate with another device that meets the same standards and functionality of devices is also Operating System independent. This results in great interoperability of the various network devices. In coming up with the various layers of the OSI, various principles were considered. Most notably, it was seen as necessary for each layer to have well defined functions; these functions had to be chosen in a standardized manner and the boundary between them was such as to minimize data flow through the interfaces. As a result of this, the model allows for the investigation of various network errors which would otherwise be very hard to find without the existence of layering as outlined in OSI. The seven layers of the OSI model Figure 1. The Open Systems Interconnection reference modelAdvertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn Mor e Source: The Manual Page The different layers of the OSI model. 2009. Layer 7: The Application Layer This layer is the interface between the user and the network. The application layer â€Å"controls how the operating system and its applications interact with the network† (Hallberg 32). The functions of this layer include providing application programs with access to the network, control of data flowing through and the recovery from any error that might occur. At the application layer, the data been sent is encapsulated with an application header and the application data which constitutes the data being sent through the network. The protocols that exist at this layer include Telnet, FTP, SMTP and HTTP. The data transmission process begins with this level receiving data from the user application. Layer 6: The Presentation Layer This layer provides certain functionality which result in readability of data for the application layer. This is done through a number of coding a nd conversion functions which result in information that can be read across systems. The layer â€Å"transforms the data from the session layer to provide a standard interface for the application layer and from the application layer to a network format† (Lowe 397). The presentation layer in essence takes the data from the lower levels and puts them into a format that an be understood by the system. Hallberg reveals that some of the functions that take place at the layer include: compression and decompression as well as data encryption and decryption (31). In addition to this, this is the layer responsible for setting standards for different systems.Advertising We will write a custom research paper sample on The Open Systems Interconnection Referencing Model specifically for you for only $16.05 $11/page Learn More Layer 5: The Session Layer This layer controls the various sessions between communicating devices by establishing, maintaining, and whe n communication is over, terminating the connection between the communicating devices. This layer performs negotiations between the communicating devices on issues such as flow control and user identification and authentication on the network (Hallberg 30). The Session layer also delegates who is to send or receive data at a given time and goes on to stipulate as to how long this will take place. The session layer allows for graceful closure and provides synchronization services. Layer 4: The Transport Layer The transport layer provides data transfer between communicating users by managing flow of information from one node to the other. This transfer is transparent in nature thereby the higher level layers need not concern themselves with the specifics. This layer also manages the flow of data and divides the streams of data into packets which are reassembled at the other end. At this layer, data is segmented and a TCP header placed at the end of each segment. This header includes c ontrol information such as start and end flags so as to enable the recipient to establish the size of the message (Lowe 397). Sequence information is also provided so that even if data is transmitted non-sequentially, it can be reassembled back to the original form in the right order. This layer ensures that the all the data packets sent are received and that they are decoded in the proper sequence. The two major protocols which function at this layer are TCP and UDP. Layer 3: The Network Layer This layer provides the functional means of transferring data sequences of varied lengths from source to destination (Lowe 397). The packets of data obtained from the session layer are segmented into frames and their logical addressing is done. This layer covers the issue of addressing and routing. At the network level, an IP header is added. This makes the segments packets. The header information at this layer includes the IP address of the source and the destination. This is necessary for t he logical-physical address mapping routers use this information to forward data to the required destination. This is done by translation of the IP address and MAC addresses. The network layer relies on the routing information provided to send individual packets to the correct destination and to notify the recipient of the source from which the packet originated. Layer 2: The data-link layer This layer turns the frames provided by the network layer into raw bits of zeros (0) and ones (1) in readiness for transmission at the physical layer and reconstitutes them to frames at the other end.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More The data link layer encapsulates a header which contains LLC information identifying network layer protocols, Frame check sequence for error checking and the MAC address of the source and the destination. As such, at the data link layer a frame contains a header which has the IP address, MAC address and various control information (Lowe 398). This information is necessary for hubs and switches to enable them tell where to forward information. The Data Link Layer ensures that there is an error-free communication between the two communicating nodes and as such, if any error is detected, the layer requests for a retransmission of data from the transmitting node. The error detection mechanism method employed by this layer is the Frame Check Sequence. Layer 1: The physical layer The physical layer is responsible for the â€Å"transmission of the streams of bits through a physical media† (Wetteroth 3). This may be through a sequence of electrical impulses or through light variation s. Wetteroth states that the Physical Layer specifies the attributes of the physical medium that will be used for network communication (3). As such, definition of how the physical cable is attached to the Network interface Card is provided at this layer. In addition to this, the layer is also responsible for monitoring data error rates. Hubs, repeaters, network adapters perform on this level. Memorizing the Seven Layers To enable me memorize the seven layers, I have come up with a simple mnemonic which is fairly easy for me to remember: â€Å"Please Do Not Take Salty Pork Always† The first letter to every word in my formulae represents a level in the OSI reference model starting from Layer 1 all the way to Layer 7. Conclusion This paper set out to perform a concise yet informative research on the OSI (Open System Interconnect) standard model that was created by the International Standards Organization. The paper began by reaffirming the need for standardization in the comput er network industry. From the discussions provided, it has been seen that without standardization, the industry would have been full of devices that cannot interoperate which would greatly limit the choice for consumers since they would be forced to buy all devices from one vendor so as to avoid running the risk of devices not working together. From this paper, it is also clear that the OSI reference model plays a crucial role in ensuring interoperability among various networking devices. Works Cited Hallberg, Bruce. Networking, A Beginner’s Guide, Fifth Edition. McGraw Hill Professional, 2009. Print. Lowe, Doug. Networking For Dummies. For Dummies, 2007. Print. The Manual Page. The different layers of the OSI model. 2009. Web. Wetteroth, Debbra. OSI Reference Model for Telecommunications. USA: McGraw-Hill Professional Publishing, 2001. Print. This research paper on The Open Systems Interconnection Referencing Model was written and submitted by user Jeremiah W. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

The Parthians as Intermediaries in the Silk Trade

The Parthians as Intermediaries in the Silk Trade The ancient Chinese invented sericulture- the production of silk fabric. They opened the silkworm cocoon to extract silk filaments, twisted the threads, and dyed the fabric they produced. Silk fabric has long been prized, and correspondingly expensive, so it was a valuable source of revenue for the Chinese, so long as they could monopolize production. Other luxury-loving people were eager to prise their secret, but the Chinese guarded it carefully, under pain of execution. Until they learned the secret, the Romans found another way to share in the profit. They manufactured silken products. The Parthians found a way to profit, too by serving as middlemen. The Chinese Monopoly on Silk Production In The Silk Trade between China and the Roman Empire at Its Height, Circa A. D. 90-130, J. Thorley argues that the Parthians (c. 200 B.C. - c. A.D. 200), serving as trading intermediaries between China and the Roman Empire, sold fancy Chinese brocades to Rome and then, using some deceit about silkworm cocoons in the Roman Empire, sold re-weavings of gauzy silk back to the Chinese. The Chinese, admittedly, lacked the technology for the weaving, but they might have been scandalized to realize they had provided the raw material. The Silk Road Prospered Although Julius Caesar may have had silk curtains made from Chinese silk, silk was in very limited supply in Rome until the time of peace and prosperity under Augustus. From the late first century to early in the second, the whole of the silk route was at peace and trade prospered as it never had before and never would again until the Mongol Empire. In Roman Imperial history, the barbarians kept pushing at the borders and clamoring to be let in. These would-be Romans had been displaced by other tribes further out. This is part of a complicated stream of events that led to the invasions of the Roman Empire by Vandals and Visigoths, nicely treated in Michael Kulikowskis The Gothic Wars. The Barbarians at the Gates Thorley says that a stream of similar border-pushing events led to the efficiently functioning silk route of the period. Nomadic tribes called the Hsiung Nu harassed the Chin dynasty (255-206 B.C.) into building the Great Wall for protection (like Hadrians Wall and the Antonine Wall in Britain were supposed to keep out the Picts). Emperor Wu Ti forced out the Hsiung Nu, so they tried to get into Turkestan. The Chinese sent forces to Turkestan and took possession of it. Once in control of Turkestan, they built trade route outposts from North China to the Tarim Basin in Chinese hands. Thwarted, the Hsiung Nu turned to their neighbors to the south and west, the Yueh-chi, driving them to the Aral Sea, where they, in turn, drove out the Scythians. The Scythians migrated to Iran and India. The Yueh-chi later followed, arriving in Sogdiana and Bactria. In the first century A.D., they migrated into Kashmir where their dynasty became known as the Kushan. Iran, to the west of the Kushan empire , came into Parthian hands after the Parthians wrested control from the Seleucids who ran the area after the death of Alexander the Great. This meant that going from west to east in about A.D. 90, the kingdoms controlling the silk route were only 4: the Romans, the Parthians, the Kushan, and the Chinese. The Parthians Become the Middlemen The Parthians persuaded the Chinese, who traveled from China, through the Kushan area of India (where they presumably paid a fee to allow them to travel through), and into Parthia, not to take their merchandise further west, making the Parthians middlemen. Thorley provides an unusual-looking list of exports from the Roman Empire that they sold to the Chinese. This is the list that contains the locally acquired silk: [G]old, silver [probably from Spain], and rare precious stones, especially the jewel that shines at night, the moonshine pearl, the chicken- frightening rhinoceros stone, corals, amber, glass, lang-kan (a kind of coral), chu-tan (cinnabar?), green jadestone, gold-embroidered rugs, and thin silk- cloth of various colours. They make gold-coloured cloth and asbestos cloth. They further have fine cloth, also called down of the water- sheep; it is made from the cocoons of wild silk-worms. They collect all kinds of fragrant substances, the juice of which they boil into storas. It wasnt until the Byzantine era that Romans really had their own silkworms. SourceThe Silk Trade between China and the Roman Empire at Its Height, Circa A. D. 90-130, by J. Thorley. Greece Rome, 2nd Ser., Vol. 18, No. 1. (Apr. 1971), pp. 71-80.

Thursday, November 21, 2019

Balanced Scorecard Assignment and Paper Essay Example | Topics and Well Written Essays - 1750 words

Balanced Scorecard Assignment and Paper - Essay Example The report will also define the segments which need to be addressed by the baby shop in order to enhance its business. The balanced scorecard is an extension of traditional financial measures. Financial measures are solely not enough as they only provide information about the past events. These were applicable for the companies in the industrial age when investments in long-term capabilities and customer relationships were not given any preferences. In the modern technological age only financial measures are not adequate. In order to remain competitive and successful in business it is important for a business to create future value through investment in customers, suppliers, employees, processes, technology, and innovation."Â   (Balanced Scorecard Institute, 2009)Â   c. Customer value: Continuous customer support through online and telephonic support. With the changing business attitudes a need of rebounding between the customers and the business corporations is also felt. The call centers are seen as an important instrument in order to explain the sales executives what is being required by the customers in shape of products and services and hence improving the sales by targeting the actual requirements of the customers. The following advantages are attached with the use of call centers There must be a continued effort to improve all business and production processes. Quality improvement projects, such as on-time delivery, order entry efficiency, billing error rate, customer satisfaction, cycle time, scrap reduction, and supplier management, are good places to begin technical techniques such as SPC, benchmarking, quality function deployment, and designed experiments are excellent for problem solving. Employee involvement should be encouraged on every step of organisational planning, from decision making to implement change in the organisation. A program can be found effective when the employers guarantee the involvement of the employees at each

Wednesday, November 20, 2019

Creative paper Consider yourself to be a political candidate for Assignment

Creative paper Consider yourself to be a political candidate for national office - Assignment Example He has lost sight of what is best for the people and instead, allows his own political ambitions, and party affiliations to dictate the moves that he shall make. We were once known as the Last Remaining Super Power in the world. We were the international police. Our presence in turmoil filled countries brought peace and stability. Our political, social, and economic system was once the envy of other nations. We were the allies of those oppressed and the enemies of those who wished to dominate the world. We have lost that standing now. These days, thanks to the cowardly leadership in Washington, North Korea thinks they can aim bombs at our allies, build nuclear weapons, and threaten the peace in South Korea. China has been flexing its muscles in the international community and bullies countries that dare to question their occupation of the Spratly Islands. Rogue nations now think that because America has lost its way, there is no need to fear the countrys position as an international leader anymore. After all, our president has decided that we are spending too much on military improvements and wars abroad. Totally missing the point that witho ut our well equipped military forces, and fighting wars abroad, we would be fighting the terrorist battle right here on our very soil. Causing more sociopolitical and economic problems for the citizens of this country. It isnt surprising that he cant handle diplomatic relations with other nations. That is why he hired Hillary Clinton to be his Secretary of State. Barack Obama doesnt have any international relation skills at all. He was just a newbie senator when he decided to run for president. On his first international trip to Germany as president the first thing he did was apologize for the actions of America during the war. And he has done that every country that he has visited since. He has turned America in a â€Å"lame duck† country. Further proving that he was in no way, shape, or form ready for the

Monday, November 18, 2019

Marketing Strategy of Marc Jacobs Essay Example | Topics and Well Written Essays - 1000 words

Marketing Strategy of Marc Jacobs - Essay Example The paper "Marketing Strategy of Marc Jacobs" examines the fashion label of Marc Jacobs and its marketing strategy. Marc Jacobs launched his first Marc Jacobs Collections in 1986 and had won many awards. Before his collection was launched, he made a tremendous mark in the fashion designing world which increased the popularity of his collections. This drove him to launch Marc brand. Marc Jacobs has developed his brand as a fashionable brand with uniqueness with the intention to attract the consumers. Being in New York which is also known for its fashion trends, it made the brand more successful by the acceptance level of the consumers towards the brand. The value is generated when the consumers are willing to pay and are satisfied with the brands. The innovation technique is important in marketing strategy towards the consumers. Marc Jacobs had an innovative idea for developing a marketing strategy that would attract more consumers’ attentions and make the brand more eminent. M arc extensively used YouTube before it was used in an attempt to generate attention towards the brand. Consumers got attracted towards the brand offerings of different category of fashionable merchandises and till today the brand is successful and it illustrates the brand loyalty. Marc Jacobs offer women and men, ready to wear garments, accessories, bags, shoes, fragrance, eye wear and many more fashionable types of merchandise. Young people are more attracted towards the high fashionable merchandises that are offered by the brand.

Friday, November 15, 2019

Saudi Arabia and Iran Relationship

Saudi Arabia and Iran Relationship Syria and Lebanon: the main scene for Saudi-Iranian rivalry Relations between Saudi Arabia and Iran are characterized by religious-ideological antagonism and competition for regional influence. The current turmoil in the Middle East is often reflected in the hostility between the two states as their struggle over the character of the region has escalated and intensified.[1] The potential negative implications of the Arab spring, along with the initial Iranian attempt to consolidate regional achievements, have largely roused Saudi Arabia out of its relative passivity in foreign policy and led it to attempt to promote a new inter-Arab alignment as a potential counterweight to Iran. Saudi Arabia perceives Iran as a main threat for several reasons. The first relates to Iran’s desire to promote a security system in the Gulf free of foreign involvement—particularly that of America—in which Iran will assume a greater leadership role. The second refers to Iran’s view of itself as the more genuine representative of the Muslim world and as the state that is challenging Saudi Arabia’s role of dominance (alongside its Wahabi religious establishment) within the Muslim world, as a depiction of the Sunni–Shia rift. Iran’s pursuit of military nuclear capability and the potential impact this capability would have on shaping the regional agenda also threatens Saudi Arabia. Iran’s ambition and its military capabilities might be used, in a Saudi perspective, to further Iranian influence over OPEC and over the Shiites minority population in the Saudi kingdom.[2] The Sunni-Shiite conflict plays a critical role in relations between the two opposing sides of the Gulf in general and between Saudi Arabia and Iran in particular. Saudi Arabia has committed intense efforts to draw pro-Iranian Middle East players into the Saudi-Sunni camp and to establish a multi-national front, based upon sectarian divisions, against Iran’s regional ambitions. Saudi Arabia’s relations with Syria, Iran’s main ally have deteriorated due to the violent suppression of the protests in Syria, which began in March 2011. Even prior to this, Saudi Arabia failed in its attempt to rescue Syria from the clutches of Iranian influence and create a united anti-Iranian bloc composed of Sunni states. The protests in Syria gave the kingdom a new opportunity to promote its agenda. By weakening the Assad regime, the Saudis hope they will help reduce the power of the â€Å"Shiite axis†.[3] In this vein, the Saudi media has regularly criticized Iran’s less-than covert attempts at supporting the Syrian regime. Saudi Arabia’s current policy constitutes a change in its attitude toward the Assad regime. After the rift between the two states in the wake of the assassination of Lebanese Prime Minister, Rafik Al-Hariri in 2005, King Abdullah led a policy of relative openness toward Syria in an attempt to drive a wedge between it and Iran. As unrest in Syria grew, however, he recalled his ambassador back to Riyadh in August 2011. This, along with its support to quell Shiite insurgency in Bahrain, is evidence that Saudi Arabia intends to stand up to the radical front headed by Iran.[4] Saudi Arabia, together with Qatar, has also taken action in order to further weaken the Iranian-Syrian axis. The two nations, for example, worked together to suspend Syria’s membership in the Arab League and continue to provide financial and military support to different elements within the Syrian opposition.[5] These measures fit with the approach Saudi Arabia has adopted since the beginning of the Ar ab spring, which is both more assertive than in the past, and expresses its attempt to reshape the map of alliances in the region in accordance with its interests. Over the years, Saudi Arabia have preferred to avoid confrontation, focusing on attempts at mediation in the Arab world for the purpose of eliminating dangers while attempting to avoid being aligned with any side.[6] In the case of Syria, the kingdom has preferred American leadership. When this did not materialize, however, Saudi Arabia, with its large coffers and affluent Sunni Islamic influence, entered the resulting vacuum. As noted its previous attempts at distancing Assad from the Iranian axis were unsuccessful, but the rebellion against Assad gave the Saudis an unusual opportunity to weaken Iranian influence in the area. The Arab world began to adopt a tougher stance vis-à  -vis Assad in the summer of 2011, when the Gulf Cooperation Council called on Syria to stop its â€Å"deadly suppression of citizens, followed by an unusually sharp statement by Saudi King Abdullah, who demanded that Syria â€Å"stop the killing machine†.[7] This new tone resulted from the King’s frustration with the Alawite minority regime (which he considers heretical) regarding Saudi attempts at mediation, combined with the realization that Syrian opposition achievements are likely to tip the balance against Iran. The King’s anger increased following the killing of members of cross-border tribes that were the tribal lineage of his mother and two of his sisters, and the widespread killing of Sunnis during the holy month of Ramadan. Since then, Saudi Arabia, with some coordination with Qatar (which has since cut back on its involvement) and the United Arab Emirates, has been aiding rebel forces that it regards as suitable for the Anti-Iranian cause in Lebanon and the Syrian opposition sometimes without taking into account American restrictions on armaments.[8] The strategic goal of overthrowing Assad (and weakening Iran and Hizbollah) currently spearheads Saudi Arabias foreign policy. Its aim is to strengthen elements among the rebels, so that if and when Assad falls, those elements will gain control over what remains of the Syrian state. The Arab Gulf countries tried to persuade the United States that the Assad regime had crossed the red line announced by President Obama in August 2012 and again in March 2013 concerning the use of chemical weapons. According to the Wall Street Journal, Saudi Arabian intelligence found proof that this weapon was used already in February 2013, and presented this evidence to the United States.[9] However, American disinclination to get involved in Syria has caused the Gulf States to doubt the credibility of the US, their main â€Å"defense provider, to deliver. A manifestation, in their eyes, of Americas diminishing regional influence. It was reported that the Saudi king, frustrated with American policy in the region, sent Obama a message saying â€Å"Americas credibility was on the line if it let Assad prevail†.[10] Elements within the Gulf States, notably in Kuwait and the UAE, started privately financing different Sunni rebel groups – causing further radicalization and fragmentation within the rebel ranks in a rampant competition for funds and influence. The Saudis are reportedly providing 3 billion dollars as an aid package to the Lebanese armed forces, as a part of their effort to support Pro–Sunni factions in Lebanon.[11] These efforts are backed, according to Hizbollah members, by an unprecedented intelligence campaign, led by the Saudi prince Bandar bin Sultan to cripple the Shia organization’s infrastructure, target its assets and weaken Hizbollah’s political position within the Lebanese political arena.[12] This may very well be a Saudi attempt to force Hizbollah to allocate more forces back to Lebanon and away from Syria, while delegitimizing it on the home front as a destabilizing and a sectarian force. There are no Saudi illusions about a sweeping victory in Syria and Lebanon. They too are aware of advantage in weaponry, organization, and external support enjoyed by Assad and his allies. They hope, however, that the support they provide will tip the scales in their favor, bleeding their adversaries financially and militarily,[13] as an historical payback for supporting Shiite subversion over the years in Iraq, the gulf and in the Saudi kingdom. Their enemies – the Assad regime, Iran, and Hizbollah – have been weakened on a daily basis, and are suffering economically, with thus far at little to no significant cost to the kingdom. Concern based on past experience, however, indicates that ramifications of radical elements operating in Syria and Lebanon are liable to boomerang back to the Gulf and upset stability between Shia and Sunni communities in Iraq, Kuwait and the Saudi Kingdom itself.[14]Tensions between Shiites and Sunnis are joined by tensions between parties favoring stability and anti–Iranian hardliners within different regimes in the gulf. Along, with many in the Arab countries, the hardliners believe that the overthrow of the Assad regime could restrain Iran and restore Iran to its natural size, hopefully without leading to a frontal confrontation between Iran and the Saudis. This confrontation has been avoided until now. Those in the Sunni side vying for stability in contrast are alarmed at the possibility that by funding fighters abroad, they might be fueling extremists and Sunni radicals, such as Al Qaeda.[15] With these seasoned veterans bound to return to their Sunni homelands eventually, those concerns might be realized in the form of subsequent radicalization and implementation of terrorist tactics from abroad in the Saudi kingdom and across the gulf. The Saudis have at times acted as a revolutionary force and at times as a counter-revolutionary force, depending on their interests. They engineered the deal on the removal of Yemens President Saleh from office, were involved in consolidating the new regime in Tunisia, and helped to overthrow the Qaddafi regime. On the other hand, they used force to maintain the al-Khalifa regime in Bahrain and sought to keep Mubarak’s regime in power in Egypt. When this effort was unsuccessful, they gave billions in aid to the military regime in Egypt, which recently regained power. Saudi efforts in Lebanon and Syria to assist Anti–Iranian parties[16] are consistent with these trends. With the Saudis testing Iranian resolve to the limit, despite the kingdom’s inferior demographic and geopolitical position and Iran and its allies, cornered by a vast Sunni majority yet more than eager to fight,[17] it is unclear how and when this bloody deadlock will be resolved. 1 [1] Paul Aarts, and Joris Van Duijne, Saudi Arabia after US-Iranian dà ©tente: left in the lurch.Middle East Policy16.3 (2009), p. 70. [2]Vali Nasr When the Shiites rise.Foreign Affairs85 no. 4(2006): p. 59. [3]AdamEntousandSioban Gorman, Behind Assads Comeback, a Mismatch in Commitments.Wall Street Journal, 31Dec.2013 [4]MehranKamrava, â€Å"The Arab Spring and the Saudi-led counterrevolution†.Orbis, 56, no.1,(2012):101 – 103 [5] Assad: Our Battle With Saudi Is Open-Ended. Al Akhbar, 30 Nov. 2013 [6]HermanF. Elits.Saudi Arabias foreign policy.Diplomacy in: L C Brown (ed.)the Middle East: The International Relations of Regional and Outside Powers (London: I.B. Tauris,2004), pp. 238 – 240. [7]AdrianBlomfield, Syria unrest: Saudi Arabia calls on killing machine to stop.,The Telegraph, 8 August, 2011 [8]Kim Ghattas, Saudi Arabia to give Lebanon army $3bn grant,BBC,29Dec.2013. [9]Adam Entous, NourMallas, and Margaret Coker. A Veteran Saudi Power Player Works To Build Support to Topple Assad, Wall Street Journal, 25 Aug. 2013. [10] Ibid. [11]Anna Barnard, â€Å"Saudis’ Grant to Lebanon Is Seen as Message to U.S†, The New York Times, 6 Jan 2014. [12]Nasser Chararah, Hezbollah escalates rhetoric against Riyadh.,Al Monitor 10 Dec. 2013. [13]JobyWarrick. Syrian conflict said to fuel sectarian tensions in Persian Gulf,Washington Post, 19Dec.2013. [14]Elizabeth Dickenson,.Playing with Fire: Why Private Gulf Financing for Syria’s Extremist Rebels Risks Igniting Sectarian Conflict at Home. The Saban Center for Middle East Policy at Brookings (6 Dec. 2013), p. 6. [15]Ibid: 18 20 [16]Nasser Chararah, Hezbollah escalates rhetoric against Riyadh., Al Monitor 10 Dec. 2013. [17]Doyle McManus, â€Å"Syria and the perils of proxy war†, LA Times, 12 Jan 2014.

Wednesday, November 13, 2019

the learnin org :: essays research papers fc

TABLE OF CONTENTS INTRODUCTION  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  1 SUMMARY  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  3 AN ARCHETYPICAL ENTRY AND CONTRACTING PROCESS  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  5 LAWLER’S ENTRY AND CONTRACTING PROCESS  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  9 ASSESSING LAWLER’S ENTRY AND CONTRACTING PROCESS  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  11  Ã‚  Ã‚  Ã‚  Ã‚   WHAT WOULD I HAVE DONE DIFFERENTLY  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  14 THEORIES AND MODELS TO MAKE SENSE OUT OF THE DIAGNOSTIC DATA  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  17 ORGANIZING THE INFORMATION FOR FEEDBACK  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  22 CARRYING OUT THE FEEDBACK PROCESS  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  23 ADDITIONAL INFORMATION THAT COULD BE COLLECTED  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  25 CONCLUSION  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  28 BIBLIOGRAPHY  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  29 APPENDICES  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  30 B.R. RICHARDSON TIMBER PRODUCTS CORPORATION INTRODUCTION   Ã‚  Ã‚  Ã‚  Ã‚  Organizational Development (OD) is concerned with the performance, development, and effectiveness of human organizations. OD is directed at bringing about planned change to increase an organization’s effectiveness and capacity. It is an applied behavioural science that is focused on the organization as a system, and among other issues is concerned with the health of the organization, its effectiveness, its capacity to solve problems, its ability to adapt, change or of self renewal, and its ability to create a high quality of life for its employees. An organization is defined as two or more people brought together by one or more shared goals. OD promotes the notion that a successful change is a planned change. Monitoring of both internal and external influences needs to be conducted on a continuous basis. To understand how change can be managed, OD draws knowledge and concepts from other disciplines (notably behavioural science, psychology, organization theory). One of the early approaches to organizational change was provided by Kurt Lewin and his associates. It starts from the premise that targets of change and the social processes underlying them are relatively stable, when forces driving for change are roughly equal to forces resisting the change. To change this status quo requires a three-step process: 1.  Ã‚  Ã‚  Ã‚  Ã‚  unfreezing 2.  Ã‚  Ã‚  Ã‚  Ã‚  movement 3.  Ã‚  Ã‚  Ã‚  Ã‚  refreezing Unfreezing underscores the need to assess the present situation before change is contemplated. It examines the driving and restraining forces in the change situation that maintains the status quo. This information is essential for unfreezing the current situation and creating a readiness for change among organization members. Movement involves intervening in the situation to change it. This addresses organizational issues such as human processes, strategic choices, work designs and structures. It shifts the behaviours, attitudes and values of the organization, department and individuals to new levels. Refreezing stabilizes the organization at a new equilibrium state. If this step is ignored the organization reverts to its previous state. Refreezing rebalances the driving and restraining forces in the changed situation so it remains stable. Output of change is highly dependent on how the change process unfolds, and the change process will need to be facilitated. The OD process is a recurring cycle (Appendix II).

Monday, November 11, 2019

Agriculture Revolution Essay

The agriculture revolution occurred in the Eighteenth Century. It was the age of new inventions and methods which caused agriculture to boom and end the long problem of famine. The agriculture revolution also caused social and economic consequences. What are some of these methods, inventions an also, the downfalls and consequences of the agriculture revolution? In the eighteenth century it was important to improve agriculture to feed the rapidly increasing population. This meant they needed to make inventions to grow more food at a more rapid rate. This is about the time when they discovered crop rotation, which is rotationing the crop to refurnish the nutrients in the soil by switching the crops that used the nutrients in the soil with the ones that replaced it. This system gave farmers the opportunity to farm all their land at all times, instead of having to let some land set for a long period of time. Some of the important crops were peas, beans, turnips, potatoes, clovers and grasses. Other inventions like the seed drill, threshing machine, along with the enclosure of fields helped produce enough food for the growing population. The enclosure of fields was a new invention, which took a farmers scattered land and put it together in fenced in fields to farm a lot smarter and more efficiently. Not all the people of the eighteenth century went to farming in this new style, they were used to the traditional style and preferred to continue farming that way. The Low Countries and England were the main people that used crop rotation. New crops made ideal feed for animals, which meant farmers could increase their herds, which ultimately meant more meat and better diets for all. Some downfalls of the agriculture revolution meant that if a farmer wanted to experiment with new methods they would have to get all landowners in the village to agree. Enclosure didn’t seem to help the poor rural families; this meant that they couldn’t do the things they traditionally did. They liked using common pastureland to graze stock, forests and marshlands for firewood and berries, therefore the poor highly opposed the idea of enclosure and created allies with the wealthy land owners. The wealthy land owners were also against enclosure, because it required large risks and investments? The agricultural revolution had a very big impact on women; the new inventions and the machinery were much harder for them to handle. This meant women had to find another role in society, working at Cottage Industries or as Domestic Servants. The agriculture revolution was the start of a great stepping stone. The new inventions like Crop Rotation and Enclosure helped form the age we live in today. There were ups and downs to the agricultural revolution, as there is in any new ideas that are trying to be implemented. The revolution ended famine, the methods used caused distress with the poor and even the wealthy at times; they also wanted to keep the traditional ways of farming. The transformation and experimentation of new crops and systems of crop rotation was not completed until the nineteenth century. Agricultural revolution allowed farms to be more compact and increased investments. The agricultural revolution was an essential prelude to the Industrial Revolution.

Friday, November 8, 2019

Free Essays on Diet Pills; Not Quite The Easy Way Out

Diet Pills; Not Quite the Easy Way Out In today’s modern society diet pills such as Hydrocycut, Stackers and Xenadrine FRA-1 are all the new rave. They are supposed to be an easy, quick and healthy way to loose weight and gain energy without the burden of dieting or proper exercise. On the contrary, most individuals do not realize the health risks involved with taking theses so called â€Å"natural ingredient pills.† In fact, since ICOF last covered performance-enhancing diet pills in December 1998, the U.S. Office of National Drug Control Policy charged that almost 30% of Olympic athletes were using them (1). Are Diet pills safe? Just because a pill is made of natural ingredients, does not mean that those ingredients are not harmful. All of the diet pills on the market contain different ingredients. Ephedrine, the all-natural stimulant is, generating the most controversy. Ephedrine is a natural chemical found in the Ephedrine Sinica plant. As Dee Murphy has noted, â€Å"Ephedrine as a pill, has many side effect including but not limited to, rapid irregular heart beat, dizziness, headache, shortness of breath, sleeplessness, tremor, nausea, loss of consciousness and many other serious health problems.(18)† But some weight-loss experts believe such supplements are vital to helping many overweight people cope. Carlon colker, a weight-loss doctor in Greenwhich, Conneticut, says the message that Americans should simply eat healthy and exercise â€Å"just isn’t working.† If it were he argues that obesity-related problems from heart disease to diabetes would not be increasing as quickly as they are right now. He contends supplements like ephedrine, which he says is â€Å"absolutely safe† when taken as directed, give many people the extra push they need to begin taking proper care of themselves (1). There are many ways to loose weight in a healthy way. For some people it does take a little more than exercising daily and eatin... Free Essays on Diet Pills; Not Quite The Easy Way Out Free Essays on Diet Pills; Not Quite The Easy Way Out Diet Pills; Not Quite the Easy Way Out In today’s modern society diet pills such as Hydrocycut, Stackers and Xenadrine FRA-1 are all the new rave. They are supposed to be an easy, quick and healthy way to loose weight and gain energy without the burden of dieting or proper exercise. On the contrary, most individuals do not realize the health risks involved with taking theses so called â€Å"natural ingredient pills.† In fact, since ICOF last covered performance-enhancing diet pills in December 1998, the U.S. Office of National Drug Control Policy charged that almost 30% of Olympic athletes were using them (1). Are Diet pills safe? Just because a pill is made of natural ingredients, does not mean that those ingredients are not harmful. All of the diet pills on the market contain different ingredients. Ephedrine, the all-natural stimulant is, generating the most controversy. Ephedrine is a natural chemical found in the Ephedrine Sinica plant. As Dee Murphy has noted, â€Å"Ephedrine as a pill, has many side effect including but not limited to, rapid irregular heart beat, dizziness, headache, shortness of breath, sleeplessness, tremor, nausea, loss of consciousness and many other serious health problems.(18)† But some weight-loss experts believe such supplements are vital to helping many overweight people cope. Carlon colker, a weight-loss doctor in Greenwhich, Conneticut, says the message that Americans should simply eat healthy and exercise â€Å"just isn’t working.† If it were he argues that obesity-related problems from heart disease to diabetes would not be increasing as quickly as they are right now. He contends supplements like ephedrine, which he says is â€Å"absolutely safe† when taken as directed, give many people the extra push they need to begin taking proper care of themselves (1). There are many ways to loose weight in a healthy way. For some people it does take a little more than exercising daily and eatin...

Wednesday, November 6, 2019

Tutankhamun essays

Tutankhamun essays What does archeological evidence from Tutankhamuns tomb reveal about death and burial in New Kingdom Egypt? Ancient Egyptians believed that when a Pharaoh died they would journey on into another life, the After Life and they would take their possessions from this life into the next. Preparations for the after life included the mummification process which took 70 days and consisted of wrapping the body In linen to preserve it for the after life, A funeral procession, paintings from inside Tutankhamuns tomb showed it was much like a funeral from modern times except the mourners wore white clothes instead of black, and the construction of a great tomb in which the body would be buried. Mummification was a long process, it took roughly 70 days. This time was hectic with planning and organizing to the slightest perfection, including that all ritual objects required for a burial were made and finished, family possessions were often collected to place in the tomb for after life use. The Pharaohs body was passed to the embalmers workshops also called House of Vigour. The process of mummification included: Brain removal through nostrils using small hooks. Viscera (internal organs) were removed through an incision on the side of the torso. Organs were placed in jars for preservation, with lids sculpted in the Pharaohs image. The jars were then put in golden coffins in a canopic shrine in the treasury of the tomb. The body is then covered in natron for 70days to suck up all moisture and dry out the body. Body dried and rested on a bed with legs in the shape of animals. The last stage was bandaging, this was the most complicated job because it consists of 143 objects being placed between 2 bandages while prayers were recited. The objects included: # Rings # Amulets #Pendants # Bracelets # Daggers The fingers, toe...

Monday, November 4, 2019

The linked article from The Atlantic magazine presents statistics Essay

The linked article from The Atlantic magazine presents statistics presents statistics documenting the current extent of wealth a - Essay Example Economists, through the media, have been enumerating the benefits of income and wealth inequality in terms of economic efficiency. Most of them assert that the current levels of disparity are just right to spur innovation of new technologies, maintain high levels of productivity among citizens, and increase competition among citizens and workers. However, this has not affected the views of most Americans regarding what they think are ideal levels of income and wealth inequality (Ariely, theatlantic.com). John Rawls’ definition of social inequality is based on the notion that people know everything about the society’s wealth distribution, and are willing to enter the spectrum at any level. Rawls refers to this notion as the ‘veil of ignorance’ because people’s decisions are disconnected from the level of wealth they will attain after making the decision. As a result, their view of the ideal level of income and wealth distribution reflects a level of e quality higher than that of any state in the world, with little disparity between the highest and the lowest levels of income and wealth (Ariely, theatlantic.com). ... Extensive media coverage of the issue of wealth and income disparity increases people’s awareness of the existence of this massive inequality, especially those at the low end of the wealth distribution spectrum. This massive exposure naturally stirs their materialistic tendencies, which translates to a great desire to attain wealth levels equal to those of citizens at the high end of the spectrum. Ultimately, this desire becomes too strong to be restrained among members of the society with a low threshold for maintaining social norms and desirable values. When this critical barrier breaks down, these people will do almost anything to acquire the level of wealth they desire immensely, and they end up getting involved in various illegal and immoral means of earning large amounts of income with as little productive effort as possible. The ultimate result is a high level of muggings, robberies, prostitution, corruption and numerous other social vices and illegal activities. Theref ore, reduction of the inequality of wealth and income distribution between the rich and the poor will benefit the society tremendously. Both the rich and the poor will reap benefits from this reduction because both groups experience the effects of these social evils and crimes. The poor are vulnerable because they lack the resources to ensure their security, whereas wealthier individuals are vulnerable because they are mostly the target of perpetrators of these social crimes and evils. Although the rich have the resources necessary for ensuring their security within the society, the fact that they are mostly the target group in these acts makes them just as vulnerable to crime as individuals at the low end of the wealth distribution spectrum.

Friday, November 1, 2019

Strategic Management of Information System Essay

Strategic Management of Information System - Essay Example Evidences suggest that individual IT service management systems may not enable an organization to develop a stable and responsive IT environment, which would be adaptive to changing business conditions. To illustrate, consider the application of ITIL version 3. ITIL is one of the key tools to IT service management as it provides a cohesive set of well developed and effective IT practices. As Blokdijk (2008, p. 23) points out, the ITIL version 3 contains provisions for developing service strategy and service design, enhancing operational services and service transition, and promoting continuous service improvement. Carvalho et al (n.d) also agree that ITIL can address range service management aspects. However, it does not authentically address enterprise architecture and this situation raises some potential challenges to the management in meeting many of its operational objectives (ibid). Therefore, the blended use of ITIL version 3 and enterprise architecture approach may be benefici al for the organization to effectively coordinate its IT operations and establish a stable and responsive IT environment. Shuja (n.d) believes that an integrated use of ITSM practices may aid an organization to deliver cost-effective and quality services to its clients. In addition, this practice promotes integrated centralized processes, which in turn help an organization keep its various departments inter-connected, and this condition will certainly offer improved services that can meet business and end user needs. Furthermore, if there is a good connection between various departments of a company, then the management can reduce its workforce strength and thereby cut down operating costs. This structure is also very useful to respond to some unforeseen