Tuesday, December 31, 2019
Biography of Sarah Good Salem Witch Trial Victim
Sarah Good is most known for being among the first to be executed in the 1692 Salem witch trials; her newborn died during her confinement and her 4- or 5-year-old daughter, Dorcas, was also among the accused and imprisoned. Sarah Good Facts Age at time of Salem witch trials: about 31Birth: Exact date unknownDeath: July 19, 1692Also known as: Sarah Goode, Goody Good, Sary Good, Sarah Solart, Sarah Poole, Sarah Solart Good Before the Salem Witch Trials Sarahs father was John Solart, an innkeeper who committed suicide in 1672 by drowning himself. His estate was divided among his widow and children, but his daughters shares were to be in his widows control until the daughters were of age. When Sarahs mother remarried, Sarahs stepfather had control of Sarahs inheritance. Sarahs first husband was Daniel Poole, a former indentured servant. When he died in 1682, Sarah remarried, this time to William Good, a weaver. Sarahs stepfather testified later that he gave Sarah and William her inheritance in 1686; Sarah and William sold the property to settle debts that year; they were held responsible for the debts Daniel Poole had left. Homeless and destitute, the Good family relied on charity for housing and food and begged for food and work. When Sarah begged among her neighbors, she sometimes cursed those who did not respond; these curses were to be used against her in 1692. Sarah Good and the Salem Witch Trials On February 25, 1692, Sarah Goodââ¬âalong with Tituba and Sarah Osborneââ¬âwas named by Abigail Williams and Elizabeth Parris as causing their strange fits and convulsions. A warrant was filed on February 29 by Thomas Putnam, Edward Putnam, and Thomas Preston of Salem Village against Sarah Good. She was accused of injuring Elizabeth Parris, Abigail Williams, Ann Putnam Jr. and Elizabeth Hubbard over two months time. The warrant was signed by John Hathorne and Jonathan Corwin. The constable was George Locker. The warrant demanded that Sarah Good appear at the house of Lt Nathaniell Ingersalls in Salem Village by the next day at ten. In the examination, Joseph Hutchison was also mentioned as a complainant. Brought to the hearing on March 1 by Constable George Locker, Sarah was examined that day by John Hathorne and Jonathan Corwin. She maintained her innocence. Ezekiel Cheevers was the clerk who recorded the examination. The accusing girls responded to her presence physically (they were all tormented according to the transcript), including more fits. One of the afflicted girls accused Sarah Goods specter of stabbing her with a knife. She produced a broken knife. But a man among the spectators said that it was his broken knife he had thrown away the day before within sight of the girls. Tituba confessed to being a witch, and implicated Sarah Good and Sarah Osborne, saying they had forced her to sign the devils book. Good declared that Tituba and Sarah Osborne were the true witches, and continued to assert her own innocence. An examination showed no witchs marks on any of the three. Sarah Good was sent to Ipswich to be confined by a local constable who was her relative, where she escaped briefly and then voluntarily returned. Elizabeth Hubbard reported that during that time, Sarah Goods specter had visited her and tormented her. Sarah was taken to Ipswich jail, and by March 3 was in Salems jail with Sarah Osborne and Tituba. All three were questioned again by Corwin and Hathorne. On March 5, William Allen, John Hughes, William Good, and Samuel Braybrook testified against Sarah Good, Sarah Osborne, and Tituba. William testified to a mole on his wifes back, which was interpreted as a witchs mark.à On March 11, Sarah Good was again examined. Sarah Good and Tituba were ordered to be sent to the Boston jail on March 24.à Dorcas Good, Sarahs 4- or 5-year-old daughter, was arrested on March 24, on complaints that she had bitten Mary Walcott and Ann Putnam Jr. Dorcas was examined by John Hathorne and Jonathan Corwin on March 24, 25, and 26. Her confession implicated her mother as a witch. She identified a small bite, likely from a flea, on her finger as being caused by a snake her mother had given her.à Sarah Good was examined again in court on March 29, maintaining her innocence, and the girls again were in fits. When she was asked who, if not her, had hurt the girls, she accused Sarah Osborne. In jail, Sarah Good gave birth to Mercy Good, but the baby did not survive. The conditions at the jail and the lack of food for mother and child likely contributed to the death. In June, with the Court of Oyer and Terminer charged with disposing of the cases of accused witches, Sarah Good was indicted and tried. One indictment lists witnesses Sarah Vibber (Bibber) and John Vibber (Bibber), Abigail Williams, Elizabeth Hubbard, and Ann Putnam Jr. A second indictment lists Elizabeth Hubbard, Ann Putnam (Jr.?), Mary Walcott, and Abigail Williams. A third lists Ann Putnam (Jr.?), Elizabeth Hubbard, and Abigail Williams. Johanna Childin, Susannah Sheldon, Samuel and Mary Abbey, Sarah and Thomas Gadge, Joseph and Mary Herrick, Henry Herrick, Jonathan Batchelor, William Batten, and William Shaw all gave testimony against Sarah Good. Her own husband, William Good, testified that he had seen the devils mark on her. On June 29, Sarah Goodââ¬âalong with Elizabeth How, Susannah Martin, and Sarah Wildesââ¬âwas tried and convicted by the jury. Rebecca Nurse was found not guilty by the jury; spectators hearing the verdict protested loudly and the court asked the jury to reconsider the evidence, and Rebecca Nurse was convicted on that second attempt. All five were thus condemned to hanging. On July 19, 1692, Sarah Good was hanged near Gallows Hill in Salem. Also hanged that day were Elizabeth How, Susannah Martin, Rebecca Nurse, and Sarah Wildes who had also been condemned in June. At herà execution, when urged by Salems Rev. Nicholas Noyes to confess, Sarah Good responded with the words I am no more a witch than you are a wizard, and if you take away my life, God will give you blood to drink. Her statement was remembered widely when he collapsed and died later of a brain hemorrhage. After the Trials In September of 1710, William Good petitioned for compensation for his wifes execution and his daughters imprisonment. He blamed the trials for the destruction of my poor family and described the situation with their daughter, Dorcas, this way: a child of 4 or 5 years old was in prison 7 or 8 months and being chaind in the dungeon was so hardly used and terrifyed that she hath ever since been very chargeable haveing little or no reason to govern herself. Sarah Good was among those named by the Massachusetts Legislature in a 1711 act restoring all rights to those who had been convicted of witchcraft in 1692. William Good received one of the largest settlements for his wife and his daughter. Sarah Good in The Crucible In Arthur Millers drama, The Crucible, Sarah Good is an easy target of the early accusations, as she is a homeless woman who behaves strangely.
Monday, December 23, 2019
Forensic Anthropology An Examination Of Human Skeletal...
Physical Forensic Anthropology ForensicOrensic anthropology is the examination of human skeletal remains for law enforcement agencies to determine the identity of unidentified bones. That is the definition of forensic anthropology. This paper will discuss the study of forensic anthropology: the education needed, how to study the remains, and work activities. To become a forensic anthropologist you have to reach many education requirements. If you want to be a very successful forensic anthropologist, you have to have a masterââ¬â¢s degree and a bachelorââ¬â¢s degree. You will have to know how to read dental records and learn about ethnobotany. In order to be a forensic anthropologist, you will have to know everything about osteology;. tThat is one of the very important teachings. You will also have to know about chemistry, anatomy, archaeology and genetics. The last two education requirements are a type of anthropology;, physical anthropology, and cultural anthropology. There are also undergraduates. They stu dy the occupation and they have to be educated in osteology also. To get an internship to help the forensic anthropologist you have to be very academic (Forensic Anthropologist). You might have to travel to a college that you do not want to go to because there are not very many colleges that have this major. When the forensic anthropologist is called to work, he/she will be recovering human remains. They find out how they died, how long ago they died, and who diedShow MoreRelatedAnthropology : Anthropology And Anthropology1550 Words à |à 7 Pagesimagined the endless careers that are available to anthropology majors, before taking Professor Sharrattââ¬â¢s Intro to Anthropology course. The things that I have learned in anthropology have opened my mind to a variety of different career paths that is possible with a degree in anthropology. Anthropology majors go off to a plethora of careers with their degrees in anthropology. Anthropology is ââ¬Å"the study of humankind in all ti mes and placeâ⬠. Anthropology has four different subfields which include: Physical/BiologicalRead More_x000C_Introduction to Statistics and Data Analysis355457 Words à |à 1422 Pagessources. Most examples and exercises in the book are of this nature; they cover a very wide range of disciplines and subject areas. These include, but are not limited to, health and ï ¬ tness, consumer research, psychology and aging, environmental research, law and criminal justice, and entertainment. A Focus on Interpretation and Communication Most chapters include a section titled ââ¬Å"Interpreting and Communicating the Results of Statistical Analyses.â⬠These sections include advice on how to best communicate
Sunday, December 15, 2019
Sample of Document Free Essays
Entity:| Vietcombank| | Period ended:| 31/12/2012| Significant class of transactions/significant disclosure process name:| Credit origination ââ¬â Transaction processing| | Significant class of transactions/ significant disclosure process owner:| Credit Policty at HODebt management division Client Division | | We obtain an understanding of the significant classes of transactions (SCOTs) and significant disclosure processes to identify and understand the risks of material misstatement at the assertion level (i. e. , what can go wrongs (WCGWs)) and, when applicable, to identify and understand the controls over the WCGWs. We will write a custom essay sample on Sample of Document or any similar topic only for you Order Now This template assists with completing S03 Understand significant classes of transactions and significant disclosure processes. Significant accounts affected and key business and financial statement risks related to these accounts: * Loan Acc * Interest Acc * Provision Acc * Expense Acc * Receivable Acc| Relevant assertions: * Valuation * Completeness * Right and Obligation * Presentation and Disclosure * Existence | Nature of the SCOT (routine, non-routine, estimation): * Routine| Starting point (initiation) and timing of initiation and recording of the SCOT or significant disclosure process: * Customerââ¬â¢s application| Specific circumstances affecting the form and extent of the documentation: * None| Name of the IT application that supports the SCOT * | Inputs/outputs of the critical path of significant class of transactions/significant disclosure process| Inputs/outputs of the supporting IT application| Inputs: * | Inputs: * | Outputs: * | Outputs: * | Critical path (initiating, recording, processing, reporting, correcting incorrect information) We obtain an understanding of the SCOTs and the significant disclosure processes by obtaining an understanding of their critical path. The critical path includes: * Initiation: the point where the transaction first enters the entityââ¬â¢s process and is prepared and submitted for recording * Recording: the point where the transaction is first recorded in the books and records of the entity * Processing: any changes, manipulation or transfers of the data in the books and records of the entity * Reporting: the point where the transaction is reported (i. e. posted) in the general ledger. When we obtain an understanding of the critical path, we obtain an understanding of how incorrectly processed information is detected and corrected on a timely basis. We also obtain an understanding of how transactions are accumulated and posted from the sub ledger to the general ledger, including controls over associated journal entries. We obtain an understanding of the policies and procedures in place that management uses to determine that directives are carried out and applied, including: * Authorization * Segregation of incompatible duties * Safeguarding of assets * Information processing * Performance reviews We use our understanding of the critical path and the policies and procedures to identify WCGWs and, when applicable, relevant controls. In the course of acquiring an understanding of the processing procedures, we frequently learn of many of the controls in use. Thus, while the emphasis at this point is not to identify the presence or absence of controls, we are alert to the possible absence of controls, and to the points at which errors could occur and controls are needed. We consider the effect IT has on the SCOTs and the significant disclosure processes. The manner in which we document our understanding of the SCOT or significant disclosure process is left to professional judgment of the engagement executives. However, for critical paths related to routine transactions, a graphical depiction of the flow (e. g. , flowchart), supported with narrative notes (e. g. , use of this template) normally provides for easier identification of the types of errors that can occur. No. | Describe the critical path for the significant class of transactions/significant disclosure process| Describe the automated aspects of the significant class of transactions/significant disclosure process, including: * Manual aspects that depend upon computer functionality or computer generated data * IT applications/infrastructure| 1 | Credit appraisal and granting proposal 1. 1. Loan application:For both HO and Branches, Credit Dept. s organised into 3 divisions:- Client and Project Investment (optional): responsible for receiving and appraising loan request, monitoring and finalizing/ liquidating the loan. ââ¬â Debt Management: mainly responsible for storing credit contract and other supporting documents as well as updating required information into system; work with Client Division in monitoring the loan. And two Risk Management division : involved in credit approving process in terms of risk assessment. One is under HO and one is based on Ho Chi Minh CityFirstly, Client/ Project Investment officer receives clientââ¬â¢s Loan Application and supporting documents ââ¬â which are clearly stated in Article 14 ââ¬â Decision 228/NHNT. HTQT: Lending Regulations1. 2. Loan appraisal: * Secondly, Based on documents obtained and the present credit regulations, Client/ Project Investment officer appraises clientââ¬â¢s application under the following aspects: * Suitability (in relation to approved Credit limit, related regulations and current risk management policies of the bank) * Feasibility, efficiency and level of risk (if exist) related to clientââ¬â¢s business plan * Solvency * Collaterals: Client officer who receives and appraises loan request also responsible for monitoring and appraising collateral. Deliverable of the officer at this stage is Collateral Appraisal Report (Form BD 1. 1. v002), including signature of client officer-in-charge and Head of Client Division. Regarding valuation, branches except for compulsory circumstances, are encouraged to cooperate with Independent Appraisal Firms (selected within the list of allowable firms, attached with Document 946/VCB. CSTD ââ¬â Appendix 01). In case collateral is valued by VCB, Valuation Memo (Form 2. 2: Bien Ban Dinh Gia) must be prepared with signature of client and bank representative, under Decision 30/ VCB. CSTD. For collateral of over 20 billion VND, branch must send to HO the appraisal documents by Appraisal firm and Appraisal/ Periodic Revelation Report (Form BD 1. 2. v002), within 2 days since the reports are given their approving authority. | Manual | | * Next, Client/ Project Investment officer prepares and signs Report of Credit appraisal and granting proposal (Bao cao th? m d? h va D? xu? t c? p TD), following Form 1. 4A, 1. 4B and 1. 5. * The Report is then submitted to Head of Client/ Project Investment Division (TP KH) for revising and signing in case the deliverables of Clie nt/ Project Investment officer are accepted. Otherwise, he/she needs to document reasons as well as additional opinions * Credit/ Project Investment officer then prepares submission documents. a) For clients granted Credit limit, Client officer submits to Branchââ¬â¢s Director/ Vice Director or Client Director (GD KH) for HO clients. b) For clients granted Credit limit but required by Credit limit approving authority (C? p th? m quy? n phe duy? ) to seek for higher authorityââ¬â¢s approval when granting the loan, Client officer submits to both Branchââ¬â¢s Director/ Vice Director and the authority which is stated in Announcement of Credit limit Approval (Thong bao phe duy? t GHTD). If the higher authority is Local Credit Committee (HDTD co s? ), there is no need to submit to Branchââ¬â¢s Director/ Vice Director. c) For clients not yet granted or beyond Credit limit, Project Investment loan is issued. ââ¬â Branch-based client: Client/ Project Investment officer submit s to Local Credit Committeeââ¬â¢s Director to organise meeting based on its Regulation on Operations. ââ¬â HO-based client: Client/ Project Investment officer submits to authorised Client Director. For the credit limits beyond authority of Client Director, submission is sent directly to HOââ¬â¢s Credit Risk Management Division for subsequent steps. Submission documents include: * Clientââ¬â¢s Loan Request (original) * Report on Credit/ Project investment appraisal and granting proposal (original) * Credit Scoring and Rating Table (original) * Legal documents for new customers * Financial statements * Other relevant documents (if available)| | 2. | Loan approvalBased on Report of Credit appraisal and granting proposal, signed by Client officer and Head of Client Division together with supporting documents, the following parties in accordance with their specific authority will start the approving process:2. 1. Branchââ¬â¢s Director/ Vice Director * In case credit grant ed within Credit limit, Branchââ¬â¢s Director/ Vice Director approves the credit grant based on Report of Credit appraisal and granting proposal signed by Client/ Project Investment officer and Branchââ¬â¢s Director/ Vice Director, as well as accompanying submission documents. In case credit is granted within Credit limit but required by Credit limit approving authority to seek for higher authorityââ¬â¢s approval when granting the loan, Client officer submits to both Branchââ¬â¢s Director/ Vice Director and the required authority (If the higher authority is Local Credit Committee (HDTD co s? ), there is no need to submit to Branchââ¬â¢s Director/ Vice Director). 2. 2. Local Credit Committee * Following its Regulations on Organisation and Operations, Local Credit Committeeââ¬â¢s Director organises meeting based on submission documents prepared by Client/ Project investment officer. This Committee includes Branchââ¬â¢s director, Vice director and head of Client, I nvestment project and Debt management division. Local Credit Committee approves credit grants which fall within its authority. Otherwise, based on acceptance opinion of Local Credit Committee, submission documents are then sent to Risk Management Division by client officer for subsequent steps. * For branches under the processing range of HCM-based Risk Management Division, Client officer submits set of Loan Proposal documents directly to HOââ¬â¢s Risk Management Division and 1 copy of Loan Proposal Form (Form 3. 2) to HCM-based Division in case of beyond its authority. * Branchââ¬â¢s set of documents include: * The original Request for Loan approval Form 3. 2 (T? trinh d? ngh? phe duy? t tin d? ng/DTDA) signed by Local Credit Committeeââ¬â¢s Director. A copy of Local Credit Committeeââ¬â¢s Meeting minutes * Submission documents to Local Credit Committee| Manual| | 2. 3. Risk Management Division * Based on set of Loan Proposal documents from the Branch, Risk officer eval uates credit risks and prepare Credit Risk Assessment Report (Bao cao ra soat r? i ro c? p tin d? ng) using Form 2. 3A/2. 3B/2. 4 * The report is then signed by Risk officer before being submitted to at least 2 controllers of Risk Management Division, who later provides their approval plus signature. * Afterwards, Risk officer prepares and signs off every page of Announcement of Credit/ Project Investment Approval( Thong bao phe duy? t c? p tin d? ng/DTDA) Form 4. , before: * submitting to Head of Risk Management Division and Risk Management Director for signature; * sending an original to the proposing Branch; a copy to General Director as well as relevant Branches. 2. 5. HO-based clients/ projects within Client Directorââ¬â¢s approving authorityCredit proposals under this case are only considered ââ¬Ëapprovedââ¬â¢ when the Report of Credit appraisal and granting proposal is signed and given acceptance opinion by Client Director. Accordingly, Client/ Project investment off icer prepares (Thong bao tac nghi? p) and transfers documents to HO Debt Management Division for storage, system entering and other subsequent steps. 2. 6. Risk Management Director and Client DirectorUnder this circumstance, Risk officer duplicates the steps within the approving authority of Risk Management Director as stated above. The proposal is only considered ââ¬Ëapprovedââ¬â¢ when obtaining signature of both, except for either of them is absent. | | | 2. 7. Central Credit Committee * Central Credit Committee bases on Credit Risk Assessment Report (signed by at least 2 controllers of Risk Management Division) and Branchââ¬â¢s document set (original) prepared by Risk officer to call a meeting. * According to Meeting minutes, Risk Management Division prepares and signs off every page of Announcement of Credit/ Project Investment Approval (Form 4. 2) before submitting Director Central Credit Committee for signature. Then submit to: * Client Division at HO an original for subsequent steps * relevant Branches 01 copy * HCM-based Division a copy in case of approving the proposal of branches under its authority. 2. 8. Board of Di rectors * Under this circumstance, after being approved by Central Credit Committee, Risk Management Division prepares submission documents in accordance with Regulation of Loan grants under approving authority of BOD. * Risk Management Division then prepares Approval Announcement and sends documents in such a way as cases under Central Credit Committeeââ¬â¢s authority; in which, documents to Debt Management Division must include Loan Approval Form by BOD. | | 3. | Making loan contract and collateral contractBased on approving results, Client officer continues to seek signature for loan and collateral contract. 3. 1. Loan contract/Collateral contract * Client/ Project Investment Division signs off (ky t? t) every page of loan contract/collateral contract and send to client for confirmation. After signing off by Client and Bank ââ¬Ës representer, Loan contract was sent to Accounting division and Debt management Division. collateral contract was sent to Storage division * If any disagreement arises, Client/ Project Investment officer must report to Head of Division. If necessary to amend content or approval conditions, Client/ Project Investment Division issues Form 1. 6: Report on Appraising and Proposing Credit Adjustment, submit to authorised bank representatives for approval. After obtaining clientââ¬â¢s signature and original of collateral contracts, Client/ Project Investment Division register collateral transactions. * Client/ Project Investment officer prepares 02 (Thong bao tac nghi? p m? HDTD), sign off and submit to Head of Division for signature, before sending to Debt Management Division (relevant documents included) for storage and entering into system. * In case clients do not have CIF yet, Client Division prepares Thong bao tac nghiep mo so CIF (Form 5. 8) then sends to Transaction Accounting dept. to open new CIF. | Manual| 4. | Putting data into system and managing credit file * After signing loan contract, Client officer prepare and sign on ââ¬Å"Thong bao tac nghiep m? h? p d? ng tin d? gâ⬠containing all information needed to put into system, conditions to disburse, a list of documents needed to store and special conditions needed to manage the loan. After that, debt management officer recheck and sign on ââ¬Å"Thong bao tac nghiepâ⬠. * Basing on ââ¬Å"Thong bao tac nghiepâ⬠, Debt Management officer is responsible for putting data into system. However, only when it is approved online by head/vice of debt management Division, will client data be disclosed on system. Debt Management officer stores all the documents listed on ââ¬Å"t hong bao tac nghiepâ⬠| IT Dependent| 5. | Disbursement of loanThe disbursement of loan involves the following steps which depend on the appointed approving authority. However, all of the appointed divisions are held responsible for checking the conformity of clientââ¬â¢s withdrawal documents with credit contract. 5. 1. Client/ Project Investment DivisionIf withdrawal request is valid, Client officer prepares ââ¬Å"Thong bao tac nghiep du dieu kien rut vonâ⬠(Form 5. 4), signs off and submits to Division Head for signature before transferring documents to Debt Management officer for disbursement. 5. 2. Debt Management DivisionThe division directly receives withdrawal request from client and perform checking procedures. Client is required to amend information if found unsuitable. Otherwise, Debt Management officer starts disbursing the loan. 5. 3. Client/ Project Investment Division receiving request, Debt Management Division performing checking proceduresWithdrawal documents after being received and checked by Client officer, Debt Management officer takes over for disbursement, based on Credit Approval Announcement and Credit contract. If documents are found invalid, they are sent back to Client Division for completion. 5. 4. Higher authorityClient officer prepares ââ¬Å"Thong bao tac nghiep du dieu kien rut vonâ⬠(signed by him/her and Head of division). Afterwards, based on credit approval results, Client officer submits the above document and other supporting ones to higher authority. If approved, the documents are transferred to Debt Management for disbursement. The details of disbursement process are briefed as follows: * Debt Management officer opens loan account, fills in CIF, signs off Loan Receipt Note before updating into system for online approval of Divisionââ¬â¢s Head. * Next, the officer sends: * 01 Loan Receipt Note to client * 01 Loan Receipt Note and supporting documents to relevant departments for disbursement * The last Loan Receipt Note stored in the division. | IT Dependent| 6. | Post-disbursement Monitoring of Loan * At least every 6 months, Client/ Project Investment Division must recheck the loan usage status (usage purpose, collateral status, the balance between assets resulting from the loan and the outstanding balance). This is implemented in accordance with the predetermined plan (monitoring schedule and methodology), which is proposed by Client officer when preparing Report of Credit appraisal and granting proposal or when ââ¬Å"Thong bao tac nghiepâ⬠at the latest. * For collateral monitoring, the following aspects must be assured: * Status compared to previous visit * Forecasted revaluations * Clientââ¬â¢s conformity in preserving collateral * Proposal to modify collateral management methods (optional) * Proposal to add/ replace collateral (optional) * Debt Management Division is held responsible for reminding Client/ Project Investment Division about loan monitoring schedule. The result must be documented on Loan Monitoring Records (Bien b? n Ki? m tra), which is signed by Borrowerââ¬â¢s representative and submitted to Head of Client/ Project Investment Division for revision and comment. * In case Client/ Project Investment Division detects any signals of risk, officer takes the ini tiative to propose the corresponding solution (included in Loan Monitoring Records) before submitting to Head of Division, Director of Client Division (for HO-based clients) or Branchââ¬â¢s Director/ Deputy Director. * After finalizing the Record, officer sends 01 original to Debt Management, 01 copy to Risk Management Division for co-monitoring. | Manual | 7. Credit Adjustment * Depending on the real situation and clientââ¬â¢s demand after credit approval, credit adjustment can be made correspondingly. * Procedures of Credit Adjustment are conducted in the same manner as that of Credit Proposal and Approval (only those who are authorised to approve credit are able to approve credit adjustment). Client / investment project officer prepares Report of credit appraisal and credit adjustment- bao cao th? m d? nh va d? xu? t di? u ch? nh tin d? ng. At risk management division prepares Credit risk assessment for adjustment report ââ¬â Bao cao ra soat r? i ro di? u ch? nh c? p ti n d? ng. * Client/ Project Investment Division prepare Thong bao tac nghi? p di? ch? nh HDTD. | Manual| 8. | Loan and interest collection * At least 10 days before due date, Debt Management officer prints out the list of loans and transfer to Client/ Project Investment Division whose officer prepares a document to inform clients and in charge of pushing clients to pay principal and interest * System automatic calculate interest income for loan group 1 * At the due date of loan, Debt Management officer prints out the report of principle and interest up to due date and checking. Then this report is submitted to Head of Debt management for approving. This report is then transferred to Accounting Division for collecting. If collected in cash, Client has to pay at first at Cash Division. ; after collecting enough and checking, Cash Division. will sign on ââ¬Å"Deposit slipâ⬠(Cash receipt) then transfers Cash Receipt Note to Accounting Division for booking entry. * Accountant makes the following entries: * With principal collection:Dr. : Cash/ BankCr. : Loan to Customer * With interest collection:Dr. : Cash/ BankCr. : Interest Income * Accounting voucher printed out and signed by controller and chief accountant. | Application A*N*t Interest = ââ¬âââ¬âââ¬âââ¬â- 360*100 A: Outstanding balance N:Days (From the last payment day to the next payment day). t:interest rate | 9. Overdue Debt Management * When the loan turns into overdue, debt management officer sends a Reminding Letter to the customer (at least once a month), approved by the Head/Vice of Debt Management Division. This letter is transferred to clients and a copy is also to deliver to the credit officer. * If the customers still donââ¬â¢t make payment after more than 3 times received the Reminding Letter, credit officer proposes to the Head of Client/ Project Investment Division to work directly with the customerââ¬â¢s representative to cover the debt. * Client/ Project Investment Division combines with Risk Management Division and Legal Division if necessary to protect all the interests of VCB. | 10. | Contract liquidation and Collateral Release Collateral * After the client pays all principle and interest, Debt Management officer prepares and signs on Loan Closing Announcement (Thong bao dong h? so vay). * Client officer informs client of Loan Contract Liquidation (Form 7. 2). * Debt Management officer hands over all relevant documents to Client/ Project Investment Division before the former Division transfers to clients and sends the original of Handover Record (signed by both handover and takeover) to Debt Management for storage purpose. * Finally, Client/ Project Investment Division cancel Collateral Transaction Registry. | | How to cite Sample of Document, Papers
Saturday, December 7, 2019
Introduction to Computing Visits Actorâââ‰â¬ÅNetwork Theory
Question: Collect, analyse, present and comment upon business data. Identify the relationship between computer hardware and software. Describe the most common types of software programmes and explain how they may be used to enhance management functions. Answer: Introduction Various actants, including both non-technical and technical, comprises the theory of computing. In a computing network, changes occur in a network when any actants connect to or act upon another actant. This specific statement reveals the significant role and relationship between the different actants in modern computing. The applications the Actor Network Theory in computing helps in understanding the interconnection and relationship between the human and non-human actants acting within a network. The approach of actor-network theory helps in appreciating the complexity existing in an organization or reality (Liebenberg, 2012). Furthermore, the application of the Actor Network Theory helps in understanding the social effects that are promoted as the result of the association of different actants in the network. This particular assignment focuses on evaluating the two modern computing stories IBM is one step closer to mimicking the human brain and Google wants to stop you entering passwords with the application of Actor Network Theory. Two contemporary stories related to modern computing Relevancy of Actor Network Theory for understanding computing Actor-Network Theory is one of the most influential theories in the theory of modern computing. Michel Callon, Bruno Latour, and John Law first developed the Actor Network Theory in the early 1980s for exploring the structure and growth of information. Bajde, (2013) has defied ANT as a computing approach for practicing sociology. The actor-network theory does not only limit to the social science but comprises the science and criteria of association between the actants. The relevant reasons for applying the Actor Network Theory for studying computing are as follows: The ANT allows identifying the interconnection between the human and non-human actants acting upon a network; ATN analyzing the relationship between the actants while hiding the individual characteristics of the connected actants; iii. ATN reveals the technological influence on society and human actants that possess the potential for changing the social interactions and interconnections between the actants; Computing Story 1: IBM is one step closer to mimicking the human brain, 3 August 2016 Story Description Imitation of the human brain is the focus of research for the last decades. Recently, the scientists of IBM were successful in mirroring the biological function of human brain. The creation of randomly spiking artificial neurons can thoroughly process a huge amount of data and store them (Bell, 2016). The artificial neurons have made a breakthrough in cognitive computing and development of neuromorphic, energy efficient and ultra dense technologies. The artificially developed neural brain has shown influential phase-change characteristics and computations primitives while using very less energy similar to the human brain. In addition to that, the artificial brain has been able to react to the external stimulation (electrical pulse) causing a phase- change material to crystallize. Categorizing the actants For categorizing, the various actants in the story the theory of ANT has been applied. In this particular story, the artificial neural brain, Internet of Things, neuromorphic technologies and neuron are the digital actants. While on the other hand, the computers and Blue-ray are defined as the hardware actants that acts on the network. The technology and algorithms used in developing the artificial neural brain are considered as the software actants and the scientist, and IMB team is defined as the human actants in the current story. The software actants pull on the software actants in this story that has brought significant changes in the artificially designed neural network. Enhancing the Management Functions In this contemporary computing story, the application of the Actor Network Theory reveals the relationship and interconnection between the identified actants in the network. The development of the artificial neural brain network has provided the scientist with the imitation of the human brain that also shows computation problems like data correlations (Horowitz, 2012. Mimicking the activities of the human brain is one of the critical tasks that have resulted in hundreds of research and theoretical study previously. The practical application of the artificial neural networks still required more demonstration. The result in of experiment has provided sustainable switching cycles and complex signals. There remains an area of management functionalities to improve the computation performance of the artificial neural brain that can be used for high volume and velocity of information processing. Linking the Story to larger issues and contemporary debate With the interconnection of thousands of devices on the internet, a high volume of data is being generated at high velocity. It is difficult to control and process the huge volume of information. Pollack, Costello, and Sankaran, (2013) cited that the time and power required for processing the huge volume of information are much higher that affordable. The use of artificial neural network was able to compute multiple easy of data processing with the frequency of mere 100Hz. The high processing speed and less power consumption significantly impact the human actants and neuromorphic technologies in this story. Computing Story 2: Google wants to stop you entering passwords, 5 August 2016 Story Description With the recent trends, Goggle is currently supporting its users to use YOLO attitude for managing password. The YOLO (You Only Login Once) allows the users to online to devices only once. Google has teamed up with the Dashlane and Android developers to allow access using third party software. The open source YOLO API stores all the user id and password for all the applications for easy management (Reynolds, 2016). Currently, the application is developed only for the Android Operating System. The use of password management system allows the users for easy access and managing password of different applications at the same time. Categorizing the actants The application of the Actor-Network Theory has revealed the different actants and network in the current story. Android Operation systems, YOLO software, Dashlane, YOLO API are identified as the software actants in the computing story. The tangible mobile devices like mobile phones and tablets are considered as the hardware actants. On the other hand, the people using the Android devices are the human actants in the current contemporary story. The software and hardware actants in the story significantly impact the human actants with its interconnections. Enhancing the Management Functions Google and Android system has together connected millions of people together with different applications and services. Every application uses its specialized user id and password for login. Its become very difficult for the users to remember all the password of the different applications and log-in every time to use the applications (Bueger, 2013). The open source YOLO API allows the users to store and manage the password for all the applications. The linking of the different applications and websites through the YOLO third party software only needs the users to log in once with the password and user-id. Currently, the YOLO application is only developed for the Android devices. There remains a scope of management functionalities of developing the YOLO system independent of the operating system. Linking the Story to larger issues and contemporary debate In linking to the second contemporary story about the Googles encouragement of password management system using YOLO, there lay significant issues (Wissink, 2013). The YOLO application stores the user id and password for a variety of applications and websites. Being an open source application on the android system, the YOLO has faced various password leaks and hacks currently. Although the system provides an easy login to the different applications with one click fails to ensure safety and security of the user data (Vezyridis, and Timmons, 2014). The larger issue is to ensure the data integrity and security of the users of Android devices. Moreover, since a massive number of data is being generated nowadays, is required to control the security of the information. Limitation of Knowledge Long Term Effect of Computing: The use of computing for a long time results in the generation of the huge volume of structured and unstructured data (Durepos, and Mills, 2012). Understanding the impact of the data to the human actants is much required for analyzing the relation between the human and non-human actants in any network. Problems of ANT: The utilization of the Actor Network Theory is not possible in every case. The use of ANT in research study causes more time and financial resource (Fioravanti, and Velho, 2016). In the research study, if there is efficient time, the number of cases to analyze ANT is not sufficient. Dwiartama, and Rosin, (2014) have stated that ANT is useful in providing social interconnections between the actants but fails to produce any statistical data to the applications. Conclusion The application of the Actor Network Theory in the two modern computing theories has identification of the actants and network in the computing stories successfully. The selected stories have provided in-depth analyzing of the modern computing with the application of ANT. In the first story IBM is one step closer to mimicking the human brain the analyzing with the Actor-Network Theory has revealed the impact of artificial neural network in big data and data processing. In the second story "Google wants to stop you entering passwords", the ANT has revealed the different underlying relations between the human actants and security of data. Therefore, the applications of the ANT in the computing stories have provided connections between the actants and its impact on the social environment. References Bajde, D., (2013). Consumer culture theory (re) visits actornetwork theory Flattening consumption studies. Marketing Theory, 13(2), pp.227-242. Bell, L. (2016).IBM is one step closer to mimicking the human brain. [online] WIRED UK. Available at: https://www.wired.co.uk/article/cientists-mimicking-human-brain-computation [Accessed 7 Aug. 2016]. Bueger, C., (2013). Actorà Network Theory, Methodology, and International Organization. International Political Sociology, 7(3), pp.338-342. Durepos, G. and Mills, A.J., (2012). Actor-network theory, ANTi-history and critical organizational historiography. Organization, 19(6), pp.703-721. Dwiartama, A. and Rosin, C., (2014). Exploring agency beyond humans: the compatibility of actor-network theory (ANT) and resilience thinking. Ecology and Society, 19(3), p.28. Fioravanti, C. and Velho, L., (2016). Let's follow the actors! Does Actor-Network Theory have anything to contribute to science journalism?. Transcultural, 6, p.04. Horowitz, L.S., (2012). Translation Alignment: Actorà Network Theory, Resistance, and the Power Dynamics of Alliance in New Caledonia. Antipode, 44(3), pp.806-827. Liebenberg, J., (2012), October. Unravelling the Text Book as Embodied Curriculum: An Actor-Network Theory View of an Android-based eBook Implementation in a South African Secondary School. In M. Specht, M. Sharples and J. Multisilta eds.,, mLearn (pp. 302-307). Pollack, J., Costello, K. and Sankaran, S., 2013. Applying ActorNetwork Theory as a sensemaking framework for complex organisational change programs. International Journal of Project Management, 31(8), pp.1118-1128. Reynolds, M. (2016).Google wants to stop you entering passwords. [online] WIRED UK. Available at: https://www.wired.co.uk/article/google-dashlane-password-manager-openyolo [Accessed 5 Aug. 2016]. Vezyridis, P. and Timmons, S., (2014). Implementing an Emergency Department Information System: An Actor-Network Theory Case Study. International Journal of Actor-Network Theory and Technological Innovation (IJANTTI), 6(1), pp.17-30. Wissink, B., (2013). Enclave urbanism in Mumbai: An actor-network-theory analysis of urban (dis) connection. Geoforum, 47, pp.1-11.
Friday, November 29, 2019
The Tragedy Of Hamlet Essays (902 words) - Shakespearean Tragedies
The Tragedy of Hamlet The Tragedy of Hamlet Arguably the best piece of writing ever done by William Shakespeare, Hamlet the is the classic example of a tragedy. In all tragedies the hero suffers, and usually dies at the end. Othello stabs himself, Romeo and Juliet commit suicide, Brutis falls on his sword, and like them Hamlet dies by getting cut with a poison tipped sword. But that is not all that is needed to consider a play a tragedy, and sometimes a hero doesn't even need to die. Not every play in which a Hero dies is considered a tragedy. There are more elements needed to label a play one. Probably the most important element is an amount of free will. In every tragedy, the characters must displays some. If every action is controlled by a hero's destiny, then the hero's death can't be avoided, and in a tragedy the sad part is that it could. Hamlet's death could have been avoided many times. Hamlet had many opportunities to kill Claudius, but did not take advantage of them. He also had the option of making his claim public, but instead he chose not too. A tragic hero doesn't need to be good. For example, MacBeth was evil, yet he was a tragic hero, because he had free will. He also had only one flaw, and that was pride. He had many good traits such as bravery, but his one bad trait made him evil. Also a tragic hero doesn't have to die. While in all Shakespearean tragedies, the hero dies, in others he may live but suffer "Moral Destruction". In Oedipus Rex, the proud yet morally blind king plucks out his eyes, and has to spend his remaining days as a wandering, sightless beggar, guided at every painful step by his daughter, Antigone. A misconception about tragedies is that nothing good comes out of them, but it is actually the opposite. In Romeo and Juliet, although both die, they end the feud between the Capulets and the Montegues. Also, Romeo and Juliet can be together in heaven. In Hamlet, although Hamlet dies, it is almost for the best. How could he have any pleasure during the rest of his life, with his parents and Ophelia dead. Also, although Hamlet dies, he is able to kill Claudius and get rid of the evil ruling the throne. Every tragic play must have a tragic hero. The tragic hero must possess many good traits, as well as one flaw, which eventually leads to his downfall. A tragic hero must be brave and noble. In Othello, Othello had one fatal flaw, he was too great. Othello was too brave, too noble, and especially too proud to allow himself to be led back to Venice in chains. A tragic hero must not back down from his position. He also has to have free will, in order to stand up for what he believes in. Finally, the audience must have some sympathy for the tragic hero. In MacBeth, although MacBeth commits many murders, one almost feels sorry for him and his fate. Hamlet is the perfect example of the tragic hero. Hamlet has all the good traits needed to be a tragic hero. He is brave and daring. One example of this is that when he went to England, he was taking a big risk. If his plan didn't work, he would have been executed He also is also loyal. His loyalty to his father, was the reason he was so angry at Claudius and his Mother. Another trait was that he was intelligent. He was able to think up the idea of faking insanity, in order to get more information about Claudius. But Hamlet like all other tragic hero's had a flaw. He couldn't get around to doing anything, because he couldn't move on. He was a full grown adult, yet he still attended school in England, because he couldn't move on. Also, it took him a long time to stop grieving about his father, because he didn't want to move past that part of his life. And after he finally did, Hamlet couldn't get around to killing Claudius. He kept pretending he was insane even after he was sure that Claudius killed his father. The final example of Hamlet's inability to get around to do anything was that he was dating Ophelia for a long time, but never got around to marrying her. The audience was able to feel sympathy for Hamlet too. He had just lost his father, and his mother remarried so
Monday, November 25, 2019
Free Essays on Price & Promotion Analysis
In these modern times of technology many companies have to use different strategies to compete with online shopping. Hallmark is one of them. There are many people who send cards and gifts and flowers online. Hallmark themselves have a web site that you can purchase cards, gifts and flowers. But Hallmark must also support their franchised stores. So they have to come up with ways to bring the customers into the stores. They use print, television, direct mail and internet to do this. They started a couple of years ago, when along with other retail stores offering the ââ¬Å"Hallmark Gold Crown Cardâ⬠. This was a courtesy card to their customers and it could be used in any Gold Crown Hallmark store in the United States. This gave the customer points for cards they purchased and dollar amount spent. Then every three months they send you dollar amount coupons in the mail to use in the store on any Hallmark product. You also get a $5.00 coupon for your birthday. If you make suggestions and Hallmark likes the idea they will send you a $20 coupon. Everyone loves getting mail that has coupons attached and can be used for money. So when a Gold Crown Card holder sees a Hallmark mailing they know they are getting something good inside. The card has increased the customer traffic but they needed another way to draw more. So they started offering promotions at different times during the year. They usually coincided with the current holiday. Right now the current promotional items are for two types of bunnies for the Easter holiday. Valentineââ¬â¢s Day there was a heart shaped box with three scented candles in them. At Christmas there were holiday plates and Christmas books for the children. The promotional items are appealing to the customers. Other promotional items might be: card holders, stationary items, potpourri, candle holders or even puzzles or games. They can be given as gifts or kept for oneself. A Hall... Free Essays on Price & Promotion Analysis Free Essays on Price & Promotion Analysis In these modern times of technology many companies have to use different strategies to compete with online shopping. Hallmark is one of them. There are many people who send cards and gifts and flowers online. Hallmark themselves have a web site that you can purchase cards, gifts and flowers. But Hallmark must also support their franchised stores. So they have to come up with ways to bring the customers into the stores. They use print, television, direct mail and internet to do this. They started a couple of years ago, when along with other retail stores offering the ââ¬Å"Hallmark Gold Crown Cardâ⬠. This was a courtesy card to their customers and it could be used in any Gold Crown Hallmark store in the United States. This gave the customer points for cards they purchased and dollar amount spent. Then every three months they send you dollar amount coupons in the mail to use in the store on any Hallmark product. You also get a $5.00 coupon for your birthday. If you make suggestions and Hallmark likes the idea they will send you a $20 coupon. Everyone loves getting mail that has coupons attached and can be used for money. So when a Gold Crown Card holder sees a Hallmark mailing they know they are getting something good inside. The card has increased the customer traffic but they needed another way to draw more. So they started offering promotions at different times during the year. They usually coincided with the current holiday. Right now the current promotional items are for two types of bunnies for the Easter holiday. Valentineââ¬â¢s Day there was a heart shaped box with three scented candles in them. At Christmas there were holiday plates and Christmas books for the children. The promotional items are appealing to the customers. Other promotional items might be: card holders, stationary items, potpourri, candle holders or even puzzles or games. They can be given as gifts or kept for oneself. A Hall...
Friday, November 22, 2019
The Effectiveness of the Blackboard Learning System as an Online Research Paper
The Effectiveness of the Blackboard Learning System as an Online Education Tool - Research Paper Example Objectives The objectives of this study are: To conduct a literature review of Blackboard and its position in virtual learning environments. To conduct a survey among students at UNSW in order to measure the overall effectiveness of current Blackboardââ¬â¢s features. To determine the best and worst features of Blackboard. To make recommendations based on the research findings on improvements that can be made to enhance the effectiveness of Blackboard as an online education tool. Literature review Blackboard is one of the interfaces used in provision of online education or distance learning, usually referred to as virtual learning environment. The basic features of all virtual learning environment models are that they are based on the web and use certain tools to ensure two-way interaction is possible. They also feature a content management system. Besides these, they simulate traditional classroom delivery concepts of education in terms of instruction, assessment, discussions and homework assignments among other features. The basic goal of all virtual learning environment models is to make the learning experience in online education as interactive as possible. Some of the tools used to achieve this are aimed at enhancing communication, uploading and downloading course content and supportive material, class administration, instructor assessment, self evaluation assessment tools through automatic scoring and online questionnaires among other profound tools like three-dimensional environments and use of emoticons to promote interaction (Iskander, 2007). Blackboard has a suite of applications that are supported by Blackboard Global Solutions to enable efficient and integrated planning and implementation of the desired system for... The intention of this study is blackboard as one of the interfaces used in provision of online education or distance learning, usually referred to as virtual learning environment. The basic features of all virtual learning environment models are that they are based on the web and use certain tools to ensure two-way interaction is possible. They also feature a content management system. Besides these, they simulate traditional classroom delivery concepts of education in terms of instruction, assessment, discussions and homework assignments among other features. The basic goal of all virtual learning environment models is to make the learning experience in online education as interactive as possible. Some of the tools used to achieve this are aimed at enhancing communication, uploading and downloading course content and supportive material, class administration, instructor assessment, self evaluation assessment tools through automatic scoring and online questionnaires among other profo und tools like three-dimensional environments and use of emoticons to promote interaction. Blackboard has a suite of applications that are supported by Blackboard Global Solutions to enable efficient and integrated planning and implementation of the desired system for clients. The applications by Blackboard include Blackboard learning system, Blackboard content system, Blackboard portal system and Blackboard transaction system. The Blackboard learning system is utilized by organizations in the use of the internet as an effective instructional system.
Wednesday, November 20, 2019
Research Designs Assignment Example | Topics and Well Written Essays - 250 words
Research Designs - Assignment Example This helps us to verify that the effects seen are actually due to the said Independent variable and not other factors. A true experimental design has all these components; and thus offers the most reliable data and analysis (Kerlinger, 1986). An example of a true experimental study would be when a new medicine is being tested, and different dosages are given to different groups to test itââ¬â¢s efficacy. A control group in not given the medicine, but a placebo instead. The dosage levels are varied as per to opinion of the professional researcher; and the sample chosen is such that it represents the larger population from which it comes. On the other hand, a cross-sectional design and a quasi-experimental design would not allow for manipulation of the independent variable or for the presence of a control group given the nature of the Independent variables under study (Frankfort-Nachmias & Nachmias, 2008). An example of a cross-sectional study would be a study that tried to verify the type of music preferred across different age groups. Although the experimenter can choose the range of each group; there is no ââ¬Ëcontrol groupââ¬â¢ for this study. On the other hand, a quasi-expeimental design would be one where the efficacy of different treatment options for an illness are compared (Frankfort-Nachmias & Nachmias, 2008). The researcher cannot assign treatment options and has to collect data from participants who choose the said options. There can be a control group only if there are people who choose to abstain from treatment. The least strong type of study is one that uses a pre-experimental design (Frankfort-Nachmias & Nachmias, 2008), which only allows for comparison or observation. A typical pre-experimental design is when a group is tested for knowledge before and after a training procedure and then the two scores are compared for difference. The strength of the research design
Monday, November 18, 2019
Research Methodolgy Essay Example | Topics and Well Written Essays - 3000 words
Research Methodolgy - Essay Example Knowing the manner of data collection readers would be able to evaluate the validity as well as reliability of the results, and the conclusions which were drawn from them. A method of a certain research depends on the type of research conduction and approaches used in the study. The study can be Quantitative type or a Qualitative Research. Quantitative methodologies assume that collected data are measurable, or if they are not, it is necessary to design an experiment or computer simulation in a way that respective measurements can be taken. Once the measurements are done, the problem is to fit (in a broad sense) the data adequately. Derived dependencies are then interpreted in the context of the initial problem formulation with a possible test of the hypothesis about the nature of the data and the errors in the measurements. In qualitative methods, the interest is centered on the qualitative characteristics of the phenomenon. Rather than trying to quantify every detail, these methods try to grasp the Quantitative and qualitative methods are relatively distinctive in the emphasis they position on each (Stake, 1995). For quantitative inquiries, argumentation is based on a demonstration of the phenomenon as a fixed set of variables. There, systematic statistical or further functional relations between the factors or variables. Meanwhile, in qualitative researches, argumentation is with reference on a description of the research observation units fairly than on approximation of some degree of number of variables. The purpose of quantitative research is simply to elucidate observed phenomena; to provide the capacity to predict as well as to control examined concepts. As a result, these concepts call for quantification. The proceeding pages present summaries and criticisms of the two selected research topics (one quantitative and the other one is the qualitative research), as well as the
Saturday, November 16, 2019
A SWOT Analysis Of PTCL Systems
A SWOT Analysis Of PTCL Systems There is no skimpy competitor of PTCL in landline but with the growth of telecommunication business of Pakistan rivalry increasing specially in mobile phone sector. There are more then 800 million subscribers of cellular phone. There are 03 big players in mobile phone industry but 3 of them are the competitor of PTCL: Mobilink, Telenor, Warid Tel. Mobilink is the largest mobile phone company of Pakistan. Mobilink is currently having more then 31,958,597 users base which is the 36% of total cellular industry of Pakistan. Mobilink is basically challenging Ufone which is subsidiaries of PTCL. Telenor is another cell phone company it have 17,841,074 subscribers which is 20 % of total mobile industry. Warid Tel Waridtel is also providing cell phone services in Pakistan. Waridtel have more than 15,114,678 subscribers which are 17% of Pakistan mobile industry. NEW COMPETITORS Other than mobile land line PTCL is facing competition in F.W.T (Fixed Wireless Telephone) product market. Below are the main competitors. Telecard, World Call SWOT ANALYSIS OF PTCL Here I am giving my SWOT analysis of PTCL. I tried to use my keen observation in order to find the strengths, weaknesses, opportunities and threats. As it is very difficult for an internee to discuss with the employees of any organization about its weaknesses, moreover they are also not so much open in telling their strengths and opportunities. Where there is a company in operation it has to work in two kinds of environment i.e. The external environment and The internal environment of the company. For a company to avail maximum and avoid maximum, it has to know what it has to avail and what it has to avoid. The external environment has scanned by the management for any arising opportunities or any critical threats. The resources of a company constitute its strengths and weaknesses. External factors are broadly categorized into; Economic forces Social, cultural, demographic, and environmental forces Political, governmental and legal forces Technological forces Competitive forces etc Internal factors are; Marketing strength of firm Financial/Accounting resources Management Computer information system Production/operations etc Why SWOT analysis A SWOT Analysis is conducted by the company so that it is able to position itself to take advantage of particular opportunities in the environment and to avoid or minimize environmental threats. In doing so, the organization attempts to emphasize its strengths and moderate the impact of weaknesses. The analysis is also useful for uncovering strengths that have not been fully utilized and in identifying weaknesses that can be corrected. Matching information about the environment with the organizations capabilities enables management to formulate realistic strategies for attaining its goals. Strengths A professional management is running PTCL. PTCL Management is continuously allocating funds for new technology, enhancing knowledge pool, acquiring professionally skilled personnel and so many arrangements regarding meeting the requirements of rapidly changing environment. PTCL has the largest network coverage in the country including almost all the cities and their peripheries which others lack yet. The company has got a very vast and very strong infrastructure within the country based on the landline network PTCL is rich in assets as compared to others in the industry, as it possesses and owns all of its machinery, stations and places PTCL is the biggest data service in Pakistan home users. It provide dialup internet and also DSL services at low prices with unlimited download so PTCL by providing these services is getting its place in the market as a leader in data services providers. PTCL also provides the data services to other operators which include PIE (Pakistan Internet Exchange), DSL and provides domestic and international lease circuits. PTCL is offering many value added services to its home and corporate customers and which includes Toll Free 0800, UAN, UIN, VPN, and premium services 0900, voice messaging services (VMS). It has the largest no of employees in Pakistan. PTCL is providing its services in all over the Pakistan do it has large number of offices and telephone exchanges which contain large number of skilled and unskilled employees. It is also strengthen with state of the art technology. PTCL is keen to acquire new technologies to provide quality and valuable services to its customers. It provides maximum range of services. PTCL is the largest converged services carrier providing all telecommunication services from basic voice telephony to data, internet, video conferencing and carrier services and business all over the country. Weaknesses After the success and completion of Voluntary Separation Scheme (VSS), PTCL is facing shortage of the employees because some of the exchanges have been left non functional as all of the employees in those exchanges have opted the VSS and that had been approved after which the vacancies have not been filled yet. There is no job description at PTCL; the employees have made them at their own in the company among themselves. ERP department is under process of up gradation at presently which is costing a lot to the company in terms of both money and time as well. The clashes between new employees and the old regular employees affect the working of the company due to professional rivalry and discrimination. Reference check form is an important element of selection process of an employee, the company used reference check but there was no form designed for this purpose formally. PTCL is not providing customer services up to the mark. Poor customer services leads to customers dissatisfaction and cause disconnections which ultimately results in high mix rate. No company wants to have high churn rate. Opportunities PTCL has a vast network spread all over Pakistan. Due to its experience in the field of telecommunications and a trained workforce, PTCL has a great opportunity to do well in the deregulated scenario under the Etisalat Management. Privatization liberalization of IT sector. Wireless local loop (WLL) is the alternative for landline phone lines. PTCL has the great opportunity to expand its market through WLL base subscribers. PTCL has the great opportunity in data services. There is a great potential in data services market. Through proper segmenting the market, PTCL can explore new segments and can increase its business significantly. Threats Deregulations not only provide new opportunities but also pose some threats. Up till now PTCL is enjoying a monopoly in fix line telephony but after deregulation of telecom market PTCL is facing competition from other telecom companies. This may result in fall of traffic and revenue. Being a semi-government organization PTCL has direct effect of the political and domestic instability, which affects the working of the company. As government has permitted the reactivation of labor unions recently, it can be a serious threat to the company. The competitors of the company that are other telecom companies are well organized and well managed, they have their focus on the operations and on the competition in the market while PTCL is still under the process of reorganization and up-gradation. The company is facing new competitors, Wateen Telecom, in landline services which may offer a great competition to the company in landline and internet services in the country. Large number of disconnections has the greatest threats to PTCL. Which lowering the share of its prime business of land line phone. Conversion towards mobile. Increasing competitions between mobile companies resulting in better mobile packages. So its customers are switching towards mobile phones. New entrants in the markets. New companies are entering in voice and data services which can cause lowering the market share of the PTCL. Continuously decreasing call rates by mobile phone companies cause the low new connection rate. Because new customers preferring mobile phone instead of landline phones. Fiber optic damages are other threats to PTCL which cost a lot to the company. Recommendations No doubt PTCL financial results show a fair picture of its excellent performance over the year but it is not enough there are number of issues that need to be address in order to raise its performance and also to successfully face the challenges set by the globalization and rapidly changing economic world. On the basis of my experience I have put some recommendations and findings as under. I during the internship found out that there is poor staffing, some of the departments are over populated and some even dont have the number necessary to run the department. Customer services should be improved, that will help to improve customer satisfaction and results in low churn rate. PTCL should recheck its marketing strategies as currently very few people know the services offered by PTCL. It should install more billboards, use print and electronic Medias. Employees attitude and behavior towards work and customers must be improved as due to staff competition every individual customer is vital. Increase service offering at competitive and affordable rates. Minimize exposure to Governments (PTCL) revenue in the short term. Working environment should be improved by introducing good corporate culture in the organization so the employee satisfaction can be achieved, which results in low employee turnover. Coordination among the departments should be improved by introducing new practices through which department interact with each other properly. So they work together to achieve organizational goals. Strategies should be built by using proper market information, so the good strategies lead towards accomplishment of organizational goal efficiently. PTCL should also focus on WLL services which can be helpful in increasing its market size. PTCL should have more focus on data services which has the great potential and company has the sources to avail this opportunity. Proper segmentation should be done so the new segments can be explored and targeted. CONCLUSION PTCL is the largest telecommunications provider in Pakistan. The company maintains an important position in Pakistan as a communications provider to other telecom operators and corporate customers of the country. It has possible to be an instrumental agent in Pakistans economic growth. PTCL has laid an Optical Fiber Access system in the main urban centers of Pakistan and local loop services have started to be modernized and upgraded from copper to an optical network. PTCL have the monopoly in providing the Land-Line Telephone Connection in Pakistan and its playing its role magnificently. In current scenario PTCL has increases its Revenue quite dramatically and probably that as soon as this organization has become privatized it will flourish its revenue in better manner. PTCL should at once change its Finance upper level of chain of command and should stream line in the good manner. PTCL should also give confidence to the Billing On line system that each and every customer should have to pay his/her bill on line base. The system of E-PAYMENT which though survive in PTCL finance system but there is need of development in this facility. The image of PTCL being most important Telecom providing is not good in the eyes of ordinary customers particularly there are lot of complaints about including the bogus local calls in the monthly bills of various customers. PTCL should also give the detail of local calls made from any Land Line Number which would be provided in Micro level to the customer. Defective Telephone link should be Fault Free within 24 hours in order to maximize the Revenue, as Revenue of PTCL should give up at the cost of defective Telephone. PTCL should make Customer Care Centers in distant areas If I have to express my experience of internship in PTCL I would briefly say: PTCL is a good Organization in the way that anybody can join it for his/ her long-term career. Overall working environment is at ease. Management of branch cares a lot of its staff and considers them as the plus point of PTCL. The customers are entertained individually because customer is the king of all activities. Same kind of actions and attention is given to all the customers. Getting ideas for development from customer side is a new idea and that is working very well in PTCL. The customers are asked to fill a suggestion form and the standards of the organization are enhanced through them. In PTCL, all the activities are done on computers that enhance the organizations ability. I found my internship training at PTCL to be a very pleasing experience. The training was helpful because it helps me a lot to learn bout real life working environment.So far my learning is concerned; all the employees at branch were quite helpful. They helped me to understand the activities of an org to possible extent. Their good attitude gave me more self-confidence to learn more and to ask if I have any query in my mind.
Thursday, November 14, 2019
Social Security Systems in the Netherlands :: essays research papers fc
From decades social security policies are in question all across the Europe. Moreover, the future expectations of changes in the social security systems due to the variations in household structures and ageing of the society bear new social security systems. As most of the European countries the Netherlands, had a substantial growth in the 1960s. After the oil crises, the economy of the Netherlands worsened. Despite the successful creation of a large number of new jobs in the 1980s the growth of unemployment continued and remained persistent in character and still today. However, the social security system in the Netherlands is not alike to the 1970s and 1980s. The Dutch government expenditure on social benefits is characteristic of the well-developed welfare states - at 27.4 percent it is now above the EU average of 22.9 percent. It is among the high taxation countries and over average GDP per capita. Public employment is low and it has one of the lowest poverty rates. The extraordinary level of economic growth of the 1960s created the economic surplus in the Netherlands but by the worldââ¬â¢s two oil crisis in the early 1970s the economic climate started to deteriorate. A stunning increase of unemployment in the late 1970s provoked a policy of labor cost reduction and cuts in the social security budget. It was believed that an increase in the real wages and social benefits would imply a further rise of unemployment. Moreover, it was predetermined by the government that the country could only recover from the economic downfall of the 1970s if free entrepreneurship and the functioning of market mechanisms would be restored. Gradually social policy lost its position as a more or less independent domain. It became the servant of economic policy as it was strongly believed that once the aim of a healthy economy was reached, social and economic deprivation would consequently vanish. In the 1980s the reduction of public expenditures became a keystone of Dutch socio-economic policy, partly to decrease a growing budgetary deficit of the state, partly to reduce the costs of labor as many social insurances were paid for by employersââ¬â¢ and employeesââ¬â¢ contributions. As a result the levels of social security benefits like social assistance, unemployment and disability benefits were significantly lowered, while at the same time the definitions as to the eligibility for these benefits were reduced. Moreover, the Dutch social security system offered too few incentives for the non-active part of the labor force to participate in the market.
Monday, November 11, 2019
Last three paragraphs of ââ¬ÅThe Great Gatsbyââ¬Â Essay
This passage is the last three paragraphs of the story. The passage is Nickââ¬â¢s thoughts on Gatsby and the future. This passage ends the story and concludes Nickââ¬â¢s narrative. It happens while Nick is going home to Minnesota in a train. It illustrates the main theme of the un-attainability of the American Dream. In the first sentence of the passage, Fitzgerald uses the word ââ¬Å"broodingâ⬠to show the mood of Nick, the narrator. Brooding gives an impression of deep, dark thinking. Next, he talks about the green light at the end of Daisyââ¬â¢s dock, a symbol that pervades the writing throughout the work. It symbolizes Gatsbyââ¬â¢s hopes and dreams for the future. Fitzgerald uses the word ââ¬Å"wonderâ⬠to show Gatsbyââ¬â¢s excitement for his future with Daisy. Fitzgerald also uses the word ââ¬Å"obscurityâ⬠to describe the land west of New York. This gives the tone a careless tone because Nick doesnââ¬â¢t explain what he really means. Nick also proceeds to call the Midwest ââ¬Å"the dark fields of the republic.â⬠In the second paragraph, Fitzgerald mentions the green light again, calling it ââ¬Å"the orgastic future.â⬠This description shows the expectations everyone has for future, but only a few people attain it. The diction of the second paragraph adds to the tone of the passage, showing the un-attainability of the American Dream. The last paragraph is only one sentence and is also the last sentence in the book. Fitzgerald uses this sentence to show that the ââ¬Å"currentâ⬠is flowing towards the East, and hence corruption. He uses the word ââ¬Å"ceaselesslyâ⬠to describe the movement of time into the past. Nickââ¬â¢s physical movement west is also his movement into the past and traditional values. Fitzgeraldââ¬â¢s word choice affects the mood of the passage in many ways. In the first paragraph, Nick sounds bitter about the un-attainability of Gatsbyââ¬â¢s dream. He says that it was ââ¬Å"so close that he could hardly fail to grasp it.â⬠This sounds bitter and resentful. Nick then goes on to talk about how the dream that Gatsby strove for was fake and an illusion. He says that what he was really looking for was in the vast Midwest. In the second paragraph he becomes sentimental and dreamy, using ellipses to show how he keeps stretching for the American dream, which is just ahead of him. Nick turns even more sentimental in the third paragraph, saying that he is moving intoà the past and embracing traditional values in spite of the overwhelming corruption. The Great Gatsby is dedicated to the theme of the decay and the unattainability of the American dream and the last three paragraphs of the book fully illustrate that theme.
Saturday, November 9, 2019
Compare and Contrast the Historical Significance Essay
Compare and Contrast the historical significance between the two world WARS. http://www. diffen. com/difference/World_War_I_vs_World_War_II Similarities Topical sentence: A) Both war led to heavy casualties. 1) WW1: Estimated to be 10 million dead, 21 million wounded, and 7. 7 million missing or imprisoned. 2) WW2: More than 40 million men and women were serving in the armed forces by 1944 and civilian and military deaths exceeded 55 million. Topical sentence: B) same both created a new international co-operation hoping to prevent further conflicts in the future. ) WW1: The League of Nations was formed in the hope of preventing another such conflict. 2) WW2: The United Nations was established to foster international cooperation and prevent conflicts. Topical Sentence: C) Similarly, Both brought out the creation of new and dangerous weapons. 1) WW1: Supported by artillery and machine guns, infantry assault, early airplanes and poisonous gas. 2) WW2: a) Nuclear power and missiles were used, modern concepts of covert and special operations. Submarines and tanks were also more heavily used. ) Encryption codes for secret communication became more complex. Topical Sentence: D) Similarly, Genocide was used to torture people from weaker countries. 1) WW1: The Ottoman Empire (Turkey) carried out genocide of Armenians. 2) WW2: German Nazis committed genocide against Jews. Topical Sentence : E)Both sowed the seeds of future wars. 1) WW1: Several alliances formed over the past decades were invoked, so within weeks the major powers were at war; as all had colonies, the conflict soon spread around the world. 1)Rise of Nazism in Germany (regain national glory and prestige) a) Treaty violations and acts of aggression on various fronts. b) Political and economic inst ability in Germany including with humiliation over its defeat in World War 1 and the harsh terms of the Treaty of Versailles. c) Rise of power of Adolf Hitler of the Nazi Party. 1) In the mid-1930s Hitler began secretly to rearm Germany, in violation of the treaty. 2) Adolf Hitler signed alliances with Italy and Japan to oppose the Soviet Union. 2) Rise of Fascism in Italy (regain national glory and prestige) a) Joined the allies in 1915 in hope in getting Dalmatia and Fiume however was only given Istria and Tyrol at the Paris and Peace Conference. b) Italian nationalists occupied Fiume in September 1919 WW2: The wartime conferences and wartime conferences revealed the mutual distrust and disagreements between the USSR and USA cause Cold War. (1)Launching opposing plans and forming opposing organizations a) US- Marshall Plan and formed the North Atlantic Treaty Organization. ) USSR- Molotov Plan formed the Warsaw Pact within the communist bloc. (2) Organizing spy activities out of deep suspicion and a great sense of insecurity. a) US- Central Intelligence Agency b) USSR ââ¬â Committee of State Security (3) Using political propaganda to promote each other ideas and attack the other side. a) US- Voice of America to attack communism b)USSR-Radio Moscow to attack capitalism (4) Stopping all kinds of communication to prevent people of its bloc from going over to the other side. ) US- stops communication and stop all cultural exchange b) USSR- tightened all controls and no contact to the west was allowed. Differences Topical Sentence: A) Politically, WW1 had just brought the first recognition & partial actualization of the principle of national self-determination. BUT, after WW2 no people even for colonies could accept their national right being deprived.
Thursday, November 7, 2019
How to Manage and ID Japanese Maple
How to Manage and ID Japanese Maple Japanese maple is one of the most versatile trees for any yard, patio, or garden. Often grown for its unique 7-palmed green or red colored leaf, the maple also has an interesting growth habit, with a fine leaf texture and muscular-looking multiple trunks. Japanese maples have extraordinary fall colors that range from bright yellow through orange and red, and is often striking, even on trees grown in total shade. Specifics Scientific name: Acer palmatum Pronunciation: AY-ser pal-MAY-tum Family: Aceraceae USDA hardiness zones: USDA hardiness zones: 5B through 8 Origin: not native to North America Uses: Bonsai; container or above-ground planter; near a deck or patio; trainable as a standard; specimen Availability: generally available in many areas within its hardiness range Physical Description Height: 15 to 25 feet Spread: 15 to 25 feet Crown uniformity: symmetricalà canopyà with a regular (or smooth)à outlineà and individuals have more or less identical crown forms Crown shape: round; vase shape Crown density: moderate Growth rate: slow Texture: medium Foliage Descriptions Leaf arrangement: opposite/subopposite Leaf type: simple Leaf margin: lobed; serrate Leaf shape: star-shaped Leaf venation: palmate Leaf type and persistence: deciduous Leaf blade length: 2 to 4 inches Leaf color: green Fall color: copper; orange; red; yellow Fall characteristic: showy Popular Maple Cultivars There are many cultivars of Japanese maple with a wide variety of leaf shapes and color, growth habits, and sizes. Here are some of the most popular: Atropurpureum - has reddish leaves with only five lobesà Bloodgood - new foliage is bright red, some leaves darkening to a dim greenà Burgundy Lace - reddish foliage with cut leaf (sinus nearly down to the petiole)Dissectum - finely dissected leaves in green or red, growing 10 to 12 feet tallà Elegans - leaves with rose-colored margins when they first unfoldà Ornatum - leaf is beautifully cut and reddish Trunk and Branch Descriptions Trunk/bark/branches: bark is thin and easily damaged from mechanical impact; droop as the tree grows, and will require pruning for vehicular or pedestrian clearance beneath the canopy; routinely grown with, or trainable to be grown with, multiple trunks; showy trunk; no thorns Pruning requirement: requires pruning to develop a strong structure Breakage: resistant Current year twig color: green; reddish Current year twig thickness: thin Pruning a Maple Most maples, if in good health and free to grow, need very little pruning. Only train for developing a leading (or multiple) shoot(s) which will eventually establish the trees framework. Maples should not be pruned in spring and could bleed profusely. Wait to prune until late summer to early autumn and only on a young tree. A habit should be encouraged in which the branches develop low and grow up at sharp angles. If suckering of green-leaved root stock occurs below the graft line on your red-leafed grafted variety, remove the green sprout immediately. Japanese Maple Culture Light requirements: tree grows best in part shade/part sun but can also handle the shade. Soil tolerances: clay; loam; sand; slightly alkaline; acidic; well-drained Drought tolerance: moderate Aerosol salt tolerance: none Soil salt tolerance: moderate Common Pests Aphids can infest Japanese maples and heavy populations can cause leaf drop or a dripping of honeydew. Scales can be a problem. Neither insect will cause the tree to die. If borers become active, it probably means you have an already sick tree. Keep the tree healthy. Leaf scorchà may become a problem during periods of high temperatures accompanied by wind. Planting Japanese maple in a bit of shade will help. Keep trees well-watered during dry periods. Symptoms of scorch and drought are tan dead areas on foliage. Bottom Line The growing habit of a Japanese maple varies widely depending on cultivar. From globose (round or spherical form) branching to the ground, to upright to vase-shaped, the maple is always a delight to look at. The globose selections look best when they are allowed to branch to the ground. Be sure to clear all turf away from beneath the branches of these low growing types so the lawn mower will not damage the tree. The more upright selections make a nice patio or small shade trees for residential lots. A large selection or compact cultivars make wonderful accents for any landscape. Japanese maple tends to leaf out early, so it may be injured by spring frosts. Protect them from drying winds and direct sun by providing exposure to partial or filtered shade and well-drained, acid soil with plenty of organic matter, particularly in the southern part of its range. Leaves often scorch in hot summer weather in USDA hardiness zones 7b and 8, unless they are in some shade or irrigated during dry weather. More direct sun can be tolerated in the northern part of the range. Be sure drainage is maintained and never allow water to stand around the roots. The tree grows fine on clay soils as long as the ground is sloped so water does not accumulate in the soil. It responds well to several inches of mulch placed beneath the canopy.
Monday, November 4, 2019
Introduction to Accounting - AAS1 Essay Example | Topics and Well Written Essays - 1000 words
Introduction to Accounting - AAS1 - Essay Example There is a significant relationship exist between revenue and expense. The company incurs expenses to generate revenue so, the matching principle states that all the expenses that were incurred in a period to generate revenue should be subtracted from the revenue of the same period for the purpose of computation of the net income (Nikolai, et al., 2010). Going Concern Concept Going concern is also a key concept accounting that assumes that the company will continue its operation for a foreseeable future. This important assumption is made because the amount of time, the company will continue its business cannot be predicted (Carl, 2011). IAS 1 states that if the company has serious threats to going concern they must be adequately disclosed in the financial statements and if the management concludes that the entity is not going concern the financial statements should not be prepared on going concern assumption. Business Rates In the previous year the company paid total amount of ?9,600 on account of business rates, in the two equal installments of ?4,800 each. Now if the rates for the bills are higher by 5% in the current year, the total amount of the bill will be ?10,080 (9,600*1.05) making it ?5,040 each installment. First installment has already been paid and the second installment is due in December 2012. The business is liable to pay this amount, so it should be recorded as current liability in the balance sheet and an equal amount of expense shall be recorded in the income statement according to the matching principle. Following journal entry will be required to record this transaction on accrual basis; Description Debit Credit Profit & Loss Account 5,040 Rates payable 5,040 Credit Sales If the credit sales are made, the transaction will be recorded on accrual. The business is entitled to record the sales even if the payment will be relieved next year. In case of credit sale following entry is required. Description Debit Credit Account Receivable XXX Revenu e XXX If 120 days credit is allowed there are certain chances that the business will be able to obtain more revenue. However, this is not good for the business to have that extended credit limits. In this situation it is reasonable to offer discounts to the customers to encourage them to make early payments. With this discount policy the company will be able to generate more business as well as there are chances of quick recovery from the customers. Stock Valuation Stock is one of the most valuable assets of the business. Its value is determined with the guidelines provided by IAS 2 Inventories, which prescribes that the inventories should be measures at lower of cost or net realizable value (NRV) (IASB, 2011). In this case the original value of the stock was ?25,000 and due to the flood there was a major damage to it. Now the company believes that it will be able to obtain only ?8,000 from the same stock items. The value of the inventory should be reduced to ?8,000 and a loss of ?1 7,000 should be charged to profit and loss account. Following journal entry shall record the effect of this incident; Description Debit Credit Profit & Loss Account 17,000 Inventories 17,000 Depreciation Depreciation is a method of allocating cost of the tangible long term asset over its useful life. IAS 16 Property, Plant & Equipments requires that every asset should be depreciated over its useful life, so depreciating every asset is essential in order to meet the requirement of the international accounting standards. IAS 16
Saturday, November 2, 2019
Assignment 6 Essay Example | Topics and Well Written Essays - 500 words - 2
Assignment 6 - Essay Example Thus, this will basically explain how we each deal with emotions. There are many factors that explain the universality of emotional expression in various cultures. These factors are expression, perception, experience, antecedents, appraisal, and concept. These factors basically shape who we are. Charles Darwin gave us the basis on which to discover the universality of human emotion. He suggested that facial expressions, like other behaviors, are biologically innate and evolutionary adaptive. And humans express emotions in their faces in exactly the same ways around the world regardless of culture or race. In this he was right. Culture plays a major role in how we react to different situations daily. Whether these situations are social, business, with family, with friends, or with strangers; we react differently. We use cultural display rules to help guide our reactions to each and every situation that we are in. These rules are learned early in life and by adulthood our reactions to these rules are pretty much automatic. Thus, facial expressions of emotion are under the dual influences of universal, biologically innate factors along with culturally specific learned display rules. Furthermore, when the displays rules do not apply to the situations, the innate universal facial expressions tend to come forth. That explains why people can differ in their emotional expression despite the fact that out expressional base is all the same. Culture has shown me that our expressions can vary. However, the value of morality that I choose to uphold allows for my general reactions to various situations to be somewhat different than other people. I choose to go with a more Christian value base and a more professional base when I am at work. I try to be friendly to everyone that I meet. Thus, I am generally regarded as a dependable person and a well liked person. I feel that culture is now more degrading a person than ever before in my life. Thus,
Thursday, October 31, 2019
Businesses within the Small Business Administration (SBA) 8A Program Research Paper
Businesses within the Small Business Administration (SBA) 8A Program - Research Paper Example The Federal Government of U.S has, since a long time, actively promoted the socio-economic welfare of small businesses. It is for this particular reason that the Small Business Administration (SBA) was founded to ensure that small businesses have the business acumen and resources to survive and grow in the competitive marketplace. Several opportunities have been provided to small businesses, including the securing of no-bid contracts and granting of prime contracts. In recent years, the 8(a) business development program by SBA has gained a lot of attention owing to generous incentives and growth capabilities offered by the SBA for businesses that meet the criteria for this program. The 8A program was introduced by the SBA with the main objective of assisting and facilitating small and disadvantaged businesses so that they can compete in the competitive marketplace. The popular 8(a) Business Development program is specifically targeted towards small businesses that where individuals who are ââ¬Å"socially and economicallyâ⬠disadvantaged own and control at least 51% of such businesses (Koprince, 2012). Accordingly, it helps such entrepreneurs to get accessibility to mainstream business in the American market. Furthermore, it helps harness the aspirations of entrepreneurs by securing government contracts for such businesses to help them grow. The 8(a) program is separated into two stages: the developmental 4 year period and the transitional 5 year period (SBA.gov). The 8(a) program offers several benefits for disadvantaged entrepreneurs. Firstly, the program entails the ââ¬Å"sole-sourceâ⬠no-bid contract which implies that participant businesses shall not have to bid for contracts and shall be the sole providers of the products to be provided under the contractual agreement (SBA.gov). This holds true for contracts under $3.5 million worth of
Tuesday, October 29, 2019
A Farewell to Arms by Ernest Hemingway Essay Example for Free
A Farewell to Arms by Ernest Hemingway Essay Hemingway and the Struggle of Masculinity in WarMen in A Farewell to Arms and For Whom The Bell TollsThe name of Ernest Hemingway has long been associated with the idea of a strong, stubborn man who is very socially inept. In both A Farewell to Arms and For Whom the Bell Tolls, we are introduced to an extremely cold, unfeeling character and we see how they evolve from one type of man into another. Frederic Henry and Robert Jordan are both Americans serving overseas in some conflict, Henry being in World War I and Jordan in the Spanish Civil War between the fascists and communists, and they originally see these conflicts as a way for them to prove their manhood. They soon realize that war is not meant for all people and that it should not be glorified. They either die for their new ideas or simply vanish from our world into a realm of nothingness. This transition needs to be analysed more closely in order for us to understand it better. In A Farewell to Arms and For Whom the Bell Tolls, we see how the main character is, in the beginning, a cold and sometimes insensitive person who loves the idea of war. In Arms, we see how Henry is a calm, calculating man who tries to live up to the Western impression of how a man should act. In American history, men have tried to reassociate themselves with a deeper meaning of manhood as a way to prove to themselves that they are acting like a man should: A broad spectrum of American men soon came to view war as the only way to cure a hopelessly flagging national masculinity(Donnell para 35). In the beginning, Henry the confidence of a man who is able to survive anything by himself and not show any emotion about it. War itself is a glorious game to him that is a test of manhood, a way for him to prove himself to the world and still be able to walk away from it: Well, I knew I would not be killed. Not in this war. It did not have anything to do with me. It seemed no more dangerous to me than war in the movies (Arms Detzler 237). Henry is a man who thinks that he is unable to be harmed and tries to live a life that is morally correct while struggling through a chaotic world. The Austrian mountains around Henry are full of temptation(ie bawdy houses) and yet he never visits them. Also, he is surrounded by constant barrages of shellfire and wounded, since he is an ambulance driver, and never shows any emotion towards these men. To him, they are simply chess pieces and he is the ambulance that comes to take away the wounded from thisà great game. In Tolls, the main character is an American teacher, Robert Jordan, who is fighting in the Spanish Civil War. He is only in the mountains because he sees war as a glorified game for men only. When he is confronted with a task, such as blowing up a bridge to slow down enemy troop movements, he does not think about it and only focusses on what he needs to do: He would not think about that. That was not his business. That was Golzs business. He had only one thing to do and that was what he should think about and he must think clearly and take everything as it came along, and not worry. To worry was as bad as to be afraid. It simply made things more difficult(Tolls 8). He distances himself from the men he may have to kill and dehumanises his actions, allowing him to succeed at his job without showing any emotion or weakness. Jordan sees war as a mans job and that women have no place in it. When he first meets Maria, he tries to hide his feelings for her. He says that she should not be in the mountains with the guerillas and tries to hide how he feels an attraction to her when he looks at her. Jordan sees his emotions as a weakness and buries them deep down inside of himself, only to have them rise up later on in the novel. In conclusion, both Henry and Jordan begin as calm, cool, calculating men struggling to prove to the world who they are. These men live by a strict code of honour, chivalry, honesty, and courage, allowing their soul to survive many tough times. They originally see a war as a way to prove themselves but this soon changes. Detzler 3Towards the middle of both Arms and Tolls, we see how both Jordan and Henry become confused and disoriented by the events around them. They are faced with tough choices and are forced to reevaluate their beliefs. In Arms, Henry is wounded during the Italian retreat and is sent back to a hospital for recovery. There, he sees his helplessness as a sign of his weakness and feels that he should not have been hurt. After recovery, he returns to the front but becomes trapped with few other men from his battle group. After the men refused to help him in their struggle to make it back, Henry shoots them at point blank range in an effort to encourage the men to work harder. After this, Henry himself is almost executed after beingà mistaken for an Austrian. His near-death experience during his escape caused him to reassess his beliefs because he is beginning to see that men are not meant to try and slaughter each other. He flees the army and gives in to his desires to see Catherine, a sign that he is going back on his belief that a man should never show any emotion. Henry travels to Switzerland with Catherine and tries to live out a normal life there, but now he is a confused man struggling with internal demons about his actions: The war seemed as far away as the football games of some one elses college. But I knew from the papers that they were still fighting in the mountains. . . . (Arms 277). Henry still remembers the men that he left behind at the lines and still wishes to be with them, fighting against a common enemy and united through courage, bravery, and the desire to stay alive. In Tolls, Jordan struggles with his ideas of courage and bravery as he is faced with various situations leading up to the destruction of the bridge. At different times, he is tested by other men, such as when he is forced to kill an enemy soldier who is actually just a boy. This action causes Jordan to rethink how war should be fought: should it be a cruel, merciless battle between soldiers and civilians, or should the young and innocent be spared, even if it is a sign of weakness. Also, when El Sordo and his men are trapped by the Fascist Army, they are left alone Detzler 4to fend for themselves, as to not expose the revolutionaries true numbers. Jordan wishes to go and help them because they are his comrades, but if he is to that, then he would be killed because of what some would call courage and what others would call stupidity. He is faced with either death or living a life of shame. El Sordo himself thinks the same as Jordan, wanting to die a glorious death since he knows that he should want to run away from the Fascists: Dying was nothing and he had no picture of it nor fear of it in his mind. . . . Living was a hawk in the sky. Livng was an earthen jar of water in the dust of the threshing with the grain flailed out and the chaff blowing. (Tolls 313). El Sordo does not fear death because he accepts that it is an inevitable part of life. Both Henry and Jordan begin to have second thoughts of their long held beliefs that men should be cold, merciless soldiers and start to wonder if their new ideas about wanting to be afraid are the ones they should listen to guide their lives. At the end of the novels, both Henry and Jordan face death, either directly or indirectly caused by war, and try to cope with it. In Arms, Henry is faced with the death of his wife and child in Switzerland. During child birth, Catherine develops complications and needs to be heavily medicated to numb the pain. Their child is still-born and Catherine soon after dies from massive blood loss. The loss of Henrys wife forces him to think about how he has lived his life. He begins to wonder if it was worth it shooting those men for refusing to help him. He questions if he should have even joined the army in the first place. Henry even begins to think that perhaps the war is not some game and that even the innocent can be affected by it. He simply retreats back into his own thoughts because he cannot face the world anymore. Henry displays such self control that it cannot be healthy. He is trying to not show any weakness, an idea that he has always held to be true, even though he does not want to glorify war anymore: Such illustrious-control is a visible expression of the self-discipline, knowledge, skill, and poise a man must Detzler 5achieve-as well as the honesty, courage, persistence, and stoic endurance he must possess in order to confront the vicissitudes of his life and the inevitability of . . . death on his own terms and with honour (Miles para 9). Henry develops a strong resolution towards death and does not feel anymore that war, a vast death machine, should be promoted since it can hurt even the most innocent people in the world, such as unborn children. He then proceed to vanish from this world and become like a walking zombie, unable to move on with his life but unafraid of anything anymore that might threaten him since he has already lost what is most precious to him. In Arms, Jordan is faced with death at the end of the novel in many different ways. His friend Anselmo is killed during the bridge demolition while trying to protect Jordan. Anselmo himself did not like death but was willing to face God if it meant the completion of Jordans task. Jordan himself is gravely injured while trying to flee from the Fascists and resolves to take out as many as he can before he dies. Jordan does not show any weakness towards his friends, even though he is terrified and wants to run. Jordan changes from seeing death as something far away as something that affectsà everyone. It is a chance for Jordan to redeem his past life and try to come to grips with how he sees death and war. He realizes that he has lived his life wrong and that the war that he is fighting in is not the one he thought he would be fighting for. Jordan originally thought that he was fighting to save the Spanish people from the Fascists but he eventually realized he was not fighting to save the people but rather to replace one corrupt leader for another. He then comes to accept that he will die soon and waits for his time on Earth to end, hoping to take an enemy with him when he goes:Dying is only bad when it takes a long time and hurts so much that it humilates you. . . . [T]here is something you can do yet. As long as you know what it is you have to do it. As long as you remember what it is you have to wait for that. Come on. Let them come. Let them come. Detzler 6Let them come! . . . And if if you wait and hold them up even a little while or just get the officer that may make all the difference (Tolls 468-470). To Jordan, death is an inevitable part of life and now he is dedicated to taking someone down with him. His part in war is over forever but he does not want to just fade away. He understands that war is glorious but if the next man is an enemy, that man is marked for death. Therefore, both Henry and Jordan come to understand death better and to know that war is not a glorious event. War is simply a big political game with the small people taking most of the fall. In conclusion, we see how both Henry and Jordan have changes brought about to their perceptions of war. They originally join their cause simply because it is something that all men were doing at that point in life. War was someplace that boys could go and become men. War was some far off land where men would run towards each other twice, shake hands and become friends again. Henry and Jordan soon see that war is nothing like this, with innocent people being killed simply because they are in the wrong place at the wrong time. Both men evolve from their original selves and change their ideas about life and death. Henry and Jordan lose a part of themselves during their battles, becoming better men in the end. They may be alone in the world but they are better men than they originally were: [T]he individual is on his own, like a Pilgrim walking into the unknown withà neither shelter or guidance, thrown upon his own resources, his strength, and his judgement. Hemingways style is the style of understatement since his hero is a hero of action, which is the human conditon (Hallengren para 17) These men, even though sometimes shallow, exhibit many qualities that both genders should live up to: honesty, courage bravery, morality, intelligence, affection, pride and sometimes sentimentality. These are the qualities that allow the two main characters to see through the fog of war and come to the basic conclusion: war is not meant for all people to be involved in and it should not Detzler 7be put up on a pedestal but rather looked upon with a logical mind. Even though peace is a lofty goal, it is very unlikely for humanity to succeed in achieving world peace. Until that day, war will be an everyday aspect to our lives and we need to step back and take another look at it. We need to stop viewing war as a big game and see it as a big political game, one that is not meant to help the little people, just like Henry and Jordan learned. Works Cited Donnel, Sean M.. Hemingways Short Fiction and the Crisis of Middle Class Masculinity. [Online] Available http://www.elcamino.edu/Faculty/sdonnell/hemingways_ masculinity.htm , May 12, 2006. Hallengren, Anders. A Case of Identity: Ernest Hemingway. [Online] Available http://nobelprize.org/literature/articles/hallengren/index.html , April 21, 2006. Hemingway, Ernest. A Farewell to Arms. New York: Charles Scribners Sons Publishing Company, 1957. . For Whom the Bell Tolls. New York: Charles Scribners Sons Publishing Company, 1968. Miles, Melvin C.. An Introductory Overview to Hemingway. [Online] Available http://www.elcamino.edu/Faculty/sdonnell/hemingway.htm , May 10, 2006.
Subscribe to:
Posts (Atom)