Thursday, September 3, 2020

Responsibilities of a Professional with Respect to the Law

Question: What are the duties of an expert concerning the law utilize the BCS code of training as a guide. What an expert ought to do, what mustnt they do how might they guarantee they act expertly in meeting their duties concerning the law? Answer: Obligations of an expert as for the law Obligation in basic words implies the assignment or the activity which is to be appropriately finished or done by a specific. The other word which clarifies obligation is obligation. Calling of a people characterizes it proficient in its field.9 Parker, R. (2009). The expert. New York: G.P. Putnam's Sons). To play out the job of that calling the abilities set, information characterizes it calling. Assume an individual is an architect so its calling is specialist and he/she is proficient in its field. (Demetriades, D. (2003). Data innovation. ) Oxford: Oxford University Press. As an I.T proficient the standards and guidelines characterized by the British Computer Society known as BCS must be followed. In correlation of general laws these laws are a greater amount of expert guidelines it is accepted by the specialists in the I.T field. Cooper, L. what's more, Felãšâ ¹dman, D. (2011). BCS. New Jersey: World Scientific. BCS has its own implicit rules which assists in setting the exper t norms, laws and rules. The BCS code clarifies the standards of practices corresponding to the contemporary all-around request in I.T. The BCS set of principles is utilized to portray the measures of training identified with I.T. The individual picking calling as ICT (Information Communication Technology) or IS (Information System) faculty needs to conveyance their obligations contemplating the code of practices of BCS. The BCS may set measures for the calling working in U.K just as for the expert working outside the nation. Bott, F. (2005). Proficient Issues in Information Technology. Swindon: British Informatics Society. Dos and Donts of the experts The expert is encouraged to follow all the normal practices yet he/she may choose the practices pertinent to the given aptitudes sets and streams. The code of good practice is structured as an electronic record which is accessible in a few configurations and the expert need to traverse it before beginning their work. The experts need to adhere to the measures applicable to the companys business, innovation and advancement strategies. The principles must be utilized in the successful and astute way so the outcome accomplished is acceptable. The norms must be refreshed occasionally and the organization ought to persuade the workers to receive it. In the event that the expert is having any uncertainty about the laws and guideline, he/she ought to counsel to the specialists. For making the law refreshed different apparatuses and strategies must be used.(Rotunda, R. furthermore, Dzienkowski, J. (2010). Proficient duty. [St. Paul, Minn.}: West, a Thomson Reuters business.) Confirmation that they are playing out their duties The specialists ought to consistently ensure that everybody is keeping the laws and guideline under the BCS norms. The specialists ought to consistently look for the open door for expanding the consciousness of it in the organization (Rowland, D., Kohl, U. furthermore, Charlesworth, A. (2012). Data innovation law. Abingdon, Oxon: Routledge.) Everyone ought to know about the laws and the measures pertinent to their activity. These aides in expanding the degree of best act of the person in the organization. To urge the calling to adjust the standard in their work life there ought to make mindful with the advantages of utilizing the gauges. The specialists should ensure that the extension, timescales; obligations are disclosed appropriately to the individual as it will help in choosing the standard identify with his work. The laws, gauges are created taking regarding people in general, society, and workplace of the I.T experts. References Bott, F. (2005). Proficient Issues in Information Technology. Swindon: British Informatics Society. Cooper, L. what's more, Felãšâ ¹dman, D. (2011). BCS. New Jersey: World Scientific. Demetriades, D. (2003). Data innovation. Oxford: Oxford University Press. Parker, R. (2009). The expert. New York: G.P. Putnam's Sons. Rotunda, R. what's more, Dzienkowski, J. (2010). Proficient obligation. [St. Paul, Minn.}: West, a Thomson Reuters business. Rowland, D., Kohl, U. what's more, Charlesworth, A. (2012). Data innovation law. Abingdon, Oxon: Routledge.

Saturday, August 22, 2020

The Subtle Knife Chapter Eight Free Essays

Section Eight The Tower Of The Angels Will stated, â€Å"Who is this man who’s got the knife?† They were in the Rolls-Royce, passing up through Oxford. Sir Charles sat in the front, half-convoluted, and Will and Lyra sat in the back, with Pantalaimon a mouse currently, relieved in Lyra’s hands. â€Å"Someone who has not any more right to the blade than I have to the alethiometer,† said Sir Charles. We will compose a custom article test on The Subtle Knife Chapter Eight or on the other hand any comparable theme just for you Request Now â€Å"Unfortunately for us all, the alethiometer is in my ownership, and the blade is in his.† â€Å"How do you think about that other world anyway?† â€Å"I know numerous things that you don’t. What else would you anticipate? I am significantly more seasoned and impressively better educated. There are various entryways between this world and that; the individuals who know where they are can without much of a stretch go to and fro. In Cittagazze there’s a Guild of educated men, supposed, who used to do so all the time.† â€Å"You en’t from this world at all!† said Lyra out of nowhere. â€Å"You’re from that point, en’t you?† What's more, again came that peculiar bump at her memory. She was practically sure she’d seen him previously. â€Å"No, I’m not,† he said. Will stated, â€Å"If we’ve got the opportunity to get the blade from that man, we have to find out about him. He’s not going to simply offer it to us, is he?† â€Å"Certainly not. It’s the one thing fending the Specters off. It’s not going to be simple by any means.† â€Å"The Specters fear the knife?† â€Å"Very much so.† â€Å"Why do they assault just grownups?† â€Å"You don’t need to realize that now. It doesn’t matter. Lyra,† Sir Charles stated, going to her, â€Å"tell me about your momentous friend.† He implied Pantalaimon. Also, when he said it, Will understood that the snake he’d seen disguised in the man’s sleeve was a daemon as well, and that Sir Charles must originate from Lyra’s world. He was getting some information about Pantalaimon to put them out of control: so he didn’t understand that Will had seen his own daemon. Lyra lifted Pantalaimon near her bosom, and he turned into a dark rodent, whipping his tail around and around her wrist and frowning at Sir Charles with red eyes. â€Å"You weren’t expected to see him,† she said. â€Å"He’s my daemon. You think you en’t got daemons in this world, yet you have. Yours’d be a fertilizer beetle.† â€Å"If the Pharaohs of Egypt were substance to be spoken to by a scarab, so am I,† he said. â€Å"Well, you’re from one more world. How intriguing. Is that where the alethiometer originates from, or did you take it on your travels?† â€Å"I was given it,† said Lyra angrily. â€Å"The Master of Jordan College in my Oxford offered it to me. It’s mine by right. What's more, you wouldn’t comprehend how to manage it, you inept, stinky elderly person; you’d never read it in a hundred years. It’s only a toy to you. However, I need it, thus wills. We’ll get it back, don’t worry.† â€Å"We’ll see,† said Sir Charles. â€Å"This is the place I dropped you previously. Will we let you out here?† â€Å"No,† said Will, since he could see a squad car farther not far off. â€Å"You can’t come into Ci’gazze due to the Specters, so it doesn’t matter on the off chance that you know where the window is. Take us farther up toward the ring road.† â€Å"As you wish,† said Sir Charles, and the vehicle proceeded onward. â€Å"When, or on the off chance that, you get the blade, call my number and Allan will come to pick you up.† They said no more till the escort attracted the vehicle to an end. As they got out, Sir Charles brought down his window and said to Will, â€Å"By the way, on the off chance that you can’t get the blade, don’t trouble to return. Go to my home without it and I’ll call the police. I envision they’ll be there without a moment's delay when I disclose to them your genuine name. It is William Parry, isn’t it? Indeed, I suspected as much. There’s an awesome photograph of you in today’s paper.† What's more, the vehicle pulled away. Will was puzzled. Lyra was shaking his arm. â€Å"It’s all right,† she stated, â€Å"he won’t tell any other person. He would have done it as of now on the off chance that he was going to. Come on.† After ten minutes they remained in the little square at the foot of the Tower of the Angels. Will had enlightened her concerning the snake daemon, and she had halted still in the road, tormented again by that half-memory. Who was the elderly person? Where had she seen him? It was nothing but bad; the memory wouldn’t come clear. â€Å"I didn’t need to tell him,† Lyra said discreetly, â€Å"but I saw a man up there the previous evening. He looked down when the children were making all that noise†¦Ã¢â‚¬  â€Å"What did he look like?† â€Å"Young, with wavy hair. Not old by any means. Be that as it may, I saw him for one minute, at the top, over those towers. I figured he may be†¦ You recollect Angelica and Paolo, and Paolo said they had a more seasoned sibling, and he’d come into the city too, and she made Paolo quit letting us know, as though it was a mystery? All things considered, I figured it may be him. He may be after this blade also. Furthermore, I figure all the children think about it. I think that’s the genuine motivation behind why they return the first place.† â€Å"Mmm,† he stated, turning upward. â€Å"Maybe.† She recalled the kids talking before that morning. No youngsters would go in the pinnacle, they’d said; there were terrifying things in there. What's more, she recollected her own sentiment of anxiety as she and Pantalaimon had glanced through the open entryway before leaving the city. Perhaps that was the reason they required a developed man to go in there. Her daemon was rippling around her head now, moth-framed in the splendid daylight, murmuring tensely. â€Å"Hush,† she murmured back, â€Å"there en’t any decision, Pan. It’s our issue. We got the opportunity to make it right, and this is the main way.† Will strolled off to one side, after the mass of the pinnacle. At the corner a tight cobbled rear entryway drove among it and the following structure, and Will went down there as well, turning upward, getting the proportion of the spot. Lyra followed. Will halted under a window at the second-story level and said to Pantalaimon, â€Å"Can you fly up there? Would you be able to look in?† He turned into a sparrow without a moment's delay and set off. He could just barely arrive at it. Lyra panted and gave a little cry when he was at the windowsill, and he roosted there for a second or two preceding jumping down once more. She moaned and took full breaths like somebody safeguarded from suffocating. Will glared, confused. â€Å"It’s hard,† she clarified, â€Å"when your daemon leaves from you. It hurts.† â€Å"Sorry. Did you see anything?† he said. â€Å"Stairs,† said Pantalaimon. â€Å"Stairs and dim rooms. There were blades held tight the divider, and lances and shields, similar to a historical center. Furthermore, I saw the youngster. He was†¦ dancing.† â€Å"Dancing?† â€Å"Moving back and forth, waving his hand about. Or on the other hand as though he was battling something invisible†¦ I just observed him through an open entryway. Not clearly.† â€Å"Fighting a Specter?† Lyra speculated. Yet, they couldn’t surmise any better, so they proceeded onward. Behind the pinnacle a high stone divider, bested with broken glass, encased a little nursery with formal beds of herbs around a wellspring (indeed Pantalaimon flew up to look); and afterward there was a rear entryway on the opposite side, taking them back to the square. The windows around the pinnacle were little and profoundly set, such as glaring eyes. â€Å"We’ll need to go in the front, then,† said Will. He climbed the means and pushed the entryway wide. Daylight struck in, and the substantial pivots squeaked. He made a stride or two inside, and seeing nobody, went in farther. Lyra followed not far behind. The floor was made of flagstones worn smooth over hundreds of years, and the air inside was cool. Will took a gander at a trip of steps going descending, and went far enough down to see that it opened into a wide, low-ceilinged stay with an enormous coal heater toward one side, where the mortar dividers were dark with sediment; yet there was nobody there, and he went up to the passage lobby once more, where he discovered Lyra with her finger to her lips, gazing upward. â€Å"I can hear him,† she murmured. â€Å"He’s conversing with himself, I reckon.† Will listened hard, and heard it as well: a low warbling mumble interfered with every so often by a brutal snicker or a short cry of outrage. It seemed like the voice of a crazy person. Will passed out his cheeks and set over to climb the flight of stairs. It was made of darkened oak, massive and expansive, with ventures as worn as the flagstones: unreasonably strong to squeak underneath. The light decreased as they climbed, on the grounds that the main enlightenment was the little profound set window on each arrival. They ascended one story, halted and tuned in, climbed the following, and the sound of the man’s voice was presently blended in with that of stopping, cadenced strides. It originated from a room over the arrival, whose entryway stood slightly open. Will pussyfooted to it and pushed it open another couple of inches so he could see. It was an enormous live with spider webs thickly grouped on the roof. The dividers were fixed with shelves containing gravely protected volumes with the ties disintegrating and chipping, or mutilated with moist. A few of them lay lost the racks, open on the floor or the wide dusty tables, and others had been pushed back helter skelter. In the focal point of the room, a youngster was †moving. Pantalaimon was correct: it looked precisely like that. He had his back to the entryway, and he’d mix to

Friday, August 21, 2020

Target Audience Sample Essay Example For Students

Target Audience Sample Essay †¢ At what period of class advancement would it be a good idea for you to dissect the profile and requests of the imprint crowd? So as to get down the improvement of any class ( on the web. eye to eye or mixed ) you have to hold in head an imprint crowd and a profile of who it is you are working with. Be that as it may. it is non adequate to make this the one time and non return to this at any ulterior stage: you will require to break down the profile of the crowd one time they have enlisted on the class ( Are they who you figured they would be and were your premises about them amend? ) . what's more, you will require to return to the substance of the classs. or on the other hand the way where the substance is introduced as a result of your examination. In add-on. once a class is finished and you begin selecting for the accompanying cadence. it is of import to think about any modifications you hope to your imprint crowd. which can be influenced by modifications in strategy. the business showcase. your support. your profile etc†¦ †¢ What variables would it be advisable for you to see while breaking down the imprint crowd? You may accept about things, for example, individual highlights. old experience. social foundation. course to building, etc. There are two boss goals for analysising an imprint crowd 1 ) to do sure that you are fliping your class to run into their requests and securing habits and 2 ) to put the gatherings of individuals that you aren’t effectively arraigning that you could/ought to be. For the primary expectation it is of import ( in arrangement, for example, the business related planning that we convey ) to hold a diagram of the kind of organization they work for. their capacity in that organization and their focuses on go toing the class. You other than need to cognize about their handiness. their course to the required IT frameworks and their capability and confirmation in using IT. Not at all like with up close and personal readiness where geographics is colossally of import. this doesn’t sway on online obtaining. by the by their best procurement way and securing to cognize something roughly them as an individual turns out to be a greater amount of import as this should be made up for so as to build up any signifier of connection between the coach and the researcher in an on-line setting. For the second goal it will be of import to examine the cosmetics of your enrolled researchers to do sure that you are gotten to by the equalization you are taking for in footings of sex. age. disablement and ethnicity. †¢ What features of the crowd profile. cause you to accept. are probably going to hold the best effect on the plan of a web based larning program? The components which would affect most on the plan of an online obtaining project would hold to be around the best procurement habits and handiness to IT of the researchers. There would be little point in planing a class that concentrated on the use of picture building if the learners’ IT didn’t bolster that designing or the researchers wanted to course data from perusing. The accompanying the vast majority of import variables would hold to associate with what they planned to get from the class and how they would for all intents and purposes use it. Except if the class apparently holds importance and incentive past the larning setting it will hold little supplication to most time-poor researchers.

Sunday, June 7, 2020

Imaginitive Architectures - Literature Essay Samples

On her long journey from Rome her mind had been given up to vagueness; she was unable to question the future. She performed this journey with sightless eyes and took little pleasure in the countries she traversed, decked out though they were in the richest freshness of spring. Her thoughts followed their course through other countries‹strange-looking, dimly-lighted, pathless lands, in which there was no change of seasons, but only as it seemed, a perpetual dreariness of winter. She had plenty to think about; but it was neither reflexion nor conscious purpose that filled her mind. Disconnected visions passed through it, and sudden dull gleams of memory, of expectation. The past and the future came and went at their will, but she saw them only in fitful images, which rose and fell by a logic of their own.(606)This passage, from the last chapters of The Portrait of a Lady, strikes me as one of the most brutally sad moments in the entire novel. Here Isabel, who has defied Osmon d ¹s wishes that she defer to the ÂÅ'sanctity ¹ of their marriage has, with a solemn and ghostly nod to the liberty and independence that has characterized her throughout, come to be beside her cousin Ralph as he dies. What makes the passage so effectively tragic is that in its tone, language and imagery, it picks up on notes that have been sounded again and again from the beginning of the novel; at the same time, however, we cannot fail to register the differences in the workings of our heroine ¹s mind as she tries to make sense of what has become of her.Much of the poignancy of the above-quoted lines comes from the way in which they contrast with James ¹ earlier descriptions of Isabel ¹s mentality. It is surely part of her aptness as a protagonist that from the very beginning of the novel, her mind is constantly and sparklingly alive: Her imagination was by habit ridiculously active(86). The most fertile ground for her imagination is her own life: She was always plan ning out her development, desiring her perfection, observing her progress. (It is interesting to note, here and elsewhere in the novel, the way James often has Isabel treat herself in her own mind as an external, abstract, almost objectified subject: James might well have written ÂÅ'her own development ¹ or ÂÅ'her own perfection ¹, but chose not to, leaving us with the subtle impression that she is somehow disconnected from herself in her own mind.) Given these first descriptions of Isabel, it is hard not to register the simple power of the statement that, she was unable to question the future‹she, and by natural extension the reader, has been deprived of one of her liveliest faculties, and James has ensured that we feel the immensity of this momentary loss.Another thing to note in this passage is James ¹ metaphorical use of landscape. In the opening chapters of the novel, we are told of Isabel: Her nature had, in her conceit, a certain garden-like quality, a suggesti on of perfume and murmuring boughs, of shady bowers and lengthening vistas, which made her feel that introspection was, after all, an exercise in the open air, and that a visit to the recesses of one ¹s spirit was harmless when one returned from it with a lapful of roses.(107) Now that her narrative is no longer an abstract question before her, her thoughts move through other countries‹strange-looking, dimly-lighted, pathless lands, in which there was no change of seasons, but only as it seemed, a perpetual dreariness of winter. (606) Compared with the seemingly infinite openness of the initial descriptions, this new landscape is bleak indeed. The passage quoted at the top of this paper continues, picking up another metaphorical thread that is woven through the fabric of the novel: now that she knew something that so much concerned her and the eclipse of which had made life resemble an attempt to play whilst with an imperfect pack of cards, the truth of things, their mutual relations, their meaning, and for the most part their horror, rose before her with an architectural vastness.(606) Like physical landscape, architecture figures prominently throughout The Portrait as an index of internal workings. The first detailed ÂÅ'portrait ¹ in the book is of Gardencourt, and from that moment on, we learn to take important cues from James ¹ elaborate descriptions of structures of all kinds. Perhaps one of the most pointed examples is our first encounter with Osmond. As at the opening of the novel, we get a detailed view of the home before the inhabitant: The house had a front upon a little grassy, empty, rural piazza which occupied a part of the hill-top; and this front, pierced with a few windows in irregular relations this antique, solid, weather-worn, yet imposing front had a somewhat incommunicative character. It was the mask, not the face of the house. It had heavy lids, but no eyes The windows of the ground-floor, as you saw them from the piazz a, were, in their noble proportions, extremely architectural; but their function seemed less to offer communication with the world than to defy the world to look in. They were massively cross-barred.(279) With this brief image of Osmond ¹s house comes a definitive, palpable change in mood; whether we are aware of it or not, the consequent introduction of our new character is colored at the very root by the somewhat sinister language of this description. Our information here diverges from that of our heroine, and so, long before Osmond ¹s full nature is revealed to us, we cannot fully ÂÅ'get behind ¹ him as the man that should cause Isabel to drop to the ground. (395) Now, late in the novel, when James has Isabel relate the great trick played on her to architecture, it resonates with all the times throughout the book when people, and especially our heroine, have been metaphorically linked with houses and structures. To draw again on a quote I have already used in part: Her imagination was by habit ridiculously active; when the door was not open it jumped out of the window. She was not accustomed indeed to keep it behind bolts(86) A little further on, in Ralph ¹s musings about his cousin, James writes: He surveyed the edifice from the outside and admired it greatly; he looked in at the windows and received an impression of proportions equally fair. But he felt he saw it only by glimpses and that he had not yet stood under the roof. The door was fastened, and though he had keys in his pocket he had a conviction that none of them would fit.(116)In returning to the architecture metaphor as Isabel runs to the ÂÅ'sanctuary ¹ of Gardencourt‹She had gone forth in her strength; she would come back in her weakness(607)‹James only too vividly draws the contrast between Isabel ¹s initial freedom and her eventual imprisonment within the secretly and malevolently-built structure of her marriage. It is with one word that James sums up the centra l tragedy of Isabel ¹s story when, fitted with this new, terrible consciousness, she concludes: The only thing to regret was that Madame Merle had been so‹well, so unimaginable.(607) Once again, James strikes a note that has sounded again and again over the course of our reading. Indeed, imagination is in many ways the novel ¹s primary subject, as it is our heroine ¹s ruin; by the end of this almost unspeakably cruel and sad story, we can only hope that it will be her redemption and transcendence as well.

Sunday, May 17, 2020

Origins of the Cold War Essay - 1179 Words

Origins of the Cold War Revisionist historians tend to regard the outbreak of the Cold War as a result of American hostility or, at least , diplomatic incompetence, while the more traditional view lays the responsibility squarely at the feet of the Soviet Union. Assess the validity of each view. The Cold War,said to have lasted from the end of World War II to the dismantling of the Soviet Union in 1991, was one of the most significant political events of the 20th century. For nearly 40 years the world was under the constant threat of total devastation, caught between the nuclear arsenals of the United States, Great Britain, and France on one side and the Soviet Union and the Peoples Republic of China on the other. Any†¦show more content†¦One such act of aggression came when the Soviets attempted to gain complete control of Berlin by forming a blockade against all of the other Allied forces. Despite the barrier, the United States airlifted tons of supplies to those who were in need of them in Berlin. This was the very beginning of antagonistic relations. Another form of aggression that angered the Americans was Stalins refusal to hold free elections in Eastern Europe, while he covertly set up their governments to act as puppet satellites, forming a protective barri er around the U.S.S.R. The Soviets reluctance to reunify Korea and the strong Communist atmosphere in North Korea also disgruntled Americans and hurt diplomatic relations. Overall, each step that the Soviet Union took to strengthen its power and the power of the Communist party was viewed as an act of aggression, and there are many historians who strongly believe that the Soviets were at fault in the instigation of the Cold War due to these immense acts of aggression. The period in the United States following World War II could more aptly be named American Hysteria rather than history according to the more revisionist historians. As the Soviet Union grew more and more powerful, every American grew more frightened of the Communist movement. No event greater exemplified this than McCarthys Communist witch hunt of the 1950s. The Cold War tensions stemmed from the fear and paranoia thatShow MoreRelatedThe Origins Of Cold War1550 Words   |  7 PagesThis research looks at the origins o f Cold war, the political, ideological and economical rivalry between the United States and Soviet Union. This research draws upon mostly primary sources including memoirs, interviews and scholarly studies of cold war era conflicts. Most research on this topic focuses on its connection to the famous events and upheavals, which shaped that era. â€Å"From Stettin in the Baltic to Trieste in the Adriatic an â€Å"Iron Curtain† has descended across the continent. Behind thatRead MoreOrigins Of The Cold War1465 Words   |  6 Pages18.1- Origins of the Cold War †¢ Allies Clash o After World War II finally came to an end, the United States and Soviet Union had conflicting ideas of how to restore the world back to normal. ï‚ § Stalin wanted complete and ultimate control over the countries that were within the borders of the Soviet Union, spreading communist regimes. ï‚ § Meanwhile, the United States wished for all these states that were under Nazi rule to have self-determination. o This essentially formed a rivalry between the idealsRead MoreThe Origin Of Cold War1987 Words   |  8 PagesThe Origin of Cold War: Ideology Clashes According to some sources, the fall of the Berlin wall on November 9th 1989 marks the significant ending of the years long Cold war between the two super power; the United States and the Soviet Union. The Cold War is unlike any other wars as there are no big battles but instead the two superpowers focus their competition on politics, economics, military, and ideological might. Since the Cold War is unique for the aforementioned reason, experts have long debatedRead MoreThe Origins Of The Cold War2356 Words   |  10 PagesHI742/HI747- The Cold War, 1941-1991 How Important were individual figures in the origins of the Cold War? The Cold War refers to a period post World War II characterised by a state of political tensions between the Soviet Union and the United States both supported by their allies from the Eastern and Western blocs respectively. Despite this being such a pivotal point in modern history there is a lack of clarity stemming from much debate regarding the catalyst for the Cold War and the ‘start’Read MoreOrigins of the Cold War Essay1295 Words   |  6 PagesOrigins of the Cold War The purpose of this paper is to explore the origins of the Cold War. To accomplish this exploration, the works of W.A. Williams, Robert Jervis, and Arthur Schlesinger, Jr. serves as the foundation. Before a closer examination of these works, a short explanation of the three common viewpoints regarding the study of the Cold War is warranted. These viewpoints are Attribution, Structural, and Misperception. With these viewpoints to guide the way, the above authorsRead MoreEssay on The Origins of the Cold War817 Words   |  4 PagesThe Origins of the Cold War The Cold War period from 1945 to 1985 was a result of distrust and misunderstanding between the USSR and the United States of America. This distrust never actually resulted any fighting between the two superpowers but they came very close to fighting on several occasions. The Cold War was a result of many different events and factors including the Bolshevik Revolution of 1917, the Potsdam Conference of 1945, the differences between communismRead MoreOrigin of the Cold War Essay775 Words   |  4 PagesAfter the Second World War America and the Soviet Union gained power in Europe. Though these to countries never fought one another, they waged a cold war of economic, military and ideological rivalry which last through the second half of the twentieth century. The origin of the Cold War began with the Russian Revolution in nineteen-seventeen, which created a Soviet Russia. The Soviet Russia did not have the same economic and ideological state as the United States. The Civil war in Russia in whichRead MoreEssay about The Origins of the Cold War679 Words   |  3 PagesThe Origins of the Cold War The Cold War was a state of extreme hostility and confrontation but without direct militant action between the two world powers, the USSR and the USA. The USSR and the USA were originally wartime Allies during the Second World War; however a string of events and issues caused a built up of suspicion and distrust which finally escalated to what was known as the Cold War. The start of Cold War can be simply defined as the period of time wherebyRead More The Historiography of the Origins of the Cold War Essay2691 Words   |  11 PagesThe Historiography of the Origins of the Cold War There have been many attempts to explain the origins of the Cold War that developed between the capitalist West and the communist East after the Second World War. Indeed, there is great disagreement in explaining the source for the Cold War; some explanations draw on events pre-1945; some draw only on issues of ideology; others look to economics; security concerns dominate some arguments; personalities are seen as the root cause for some historiansRead MoreThe United States And The Origins Of The Cold War1717 Words   |  7 PagesProfessor Calvo AMH2042 23 July 2015 The United States and the Origins of the Cold War Essay Thinking about the decisions, strategies and goals of Soviet Union and the United States views on world domination and the possible accomplishment of such. The first and main would be to think and observe critically concerning the worldwide political scenery in the years after World War II (1945). This moment in history; taking all the way through the Cold War, may be seen as a lapse of severe ideological polarization

Wednesday, May 6, 2020

Ibsen, Henrik Subplots - 992 Words

In this very popular drama from the playwright Henrik Ibsen, Mrs. Linde and Krogstad make an important contribution to the drama as the subplot of the play â€Å" A doll’s house â€Å". The playwright’s intent of this play was to dramatize Victorian society and it is clear that without these characters help, the main characters would have probably remained stagnant. Nora would have most likely, never would have come to a self-realization of her own lost identity without these subplot characters. Krogstad and Mrs.L. clearly help the main characters in their evolution throughout the drama with the benefit of their own past experiences being similar to Nora’s. Making mistakes is all a part of life, but the most important thing to do is to learn from†¦show more content†¦This led her to being so submissive and not being able to have her own mind, which she hated. Being alone can also have a toll on your appearance, when they see each other for the first time Mrs.L seems older and Nora from what we read never changed. â€Å" Nora: You are a lot paler, Christine, and perhaps a little thinner. Mrs.L: And much, much older, Nora.† (Ibsen. P 6) At the very end of the play there is a dramatic twist between both worlds. The poor Mrs.L from the beginning becomes happy again when she reveals herself to Krogstad and they get back together. The ability for Christine to rebuild her life with Krogstad can be accepted as a note of hope in Nora s case for the letter that will change her life. Nora ends up deciding that she could not accept the reaction of her husband and decides to leave her children and husband behind. This subplot shows how fast two world can change, some for the better and some for the worst. â€Å" Krogstad: I have never had such an amazing piece of good fortune in my life. Mrs.L: What a difference! What a difference! Someone to work for and live for – a home to bring comfort into. That I will do indeed†¦Ã¢â‚¬  (Ibsen, p 55) Work cited Ibsen, Henrick. A doll`s house,Show MoreRelated Essay on the Growth of Nora and Kristina Linde in Ibsens A Dolls House1025 Words   |  5 PagesThe Growth of Nora and Kristina Linde in A Dolls House      Ã‚  Ã‚   A Dolls House by Henrik Ibsen, is a play that was written ahead of its time. In this play Ibsen tackles prevailing social norms by presenting two strong-willed women. Both Kristina and Nora chose the men they married by an intellectual rather than an emotional process: Kristina gave up the man she loved (Nils Krogstad) to provide economic security for her mother and her two younger brothers; Nora married Torvald Helmer at a timeRead MoreThe American author Napoleon Hill once stated â€Å"think twice before you speak, because your words and800 Words   |  4 Pagesonly expected to only care for matters within the realm of her home and family. However, growing up in a home where a woman occupied many of the dominant male roles, Ibsen was able to look past the menial labels society placed on women and portray them as the strong, level-headed individuals they are. In his play A Doll’s House, Ibsen further exemplifies his beliefs through the characters of Mrs. Linde and Nora Helmer. In the beginning of Act I, Nora Helmer is presented as a somewhat childish andRead MoreAnalysis of the Character of Mrs. Linde in A Dolls House1084 Words   |  5 Pagesimportance such as finances or other issues (Intro to Franz Kalfka). However, growing up in a home where a woman occupied many of the dominant male roles, Ibsen was able to look past the menial labels society placed on women and portray them as the strong, the levelheaded individuals they are, such as Mrs. Linde. In his play A Doll’s House, Ibsen further exemplifies his beliefs through the characters of Mrs. Linde, a hard working independent individual, and Nora Helmer a dependent seeming naive individualRead MoreThe Sonnet Form: William Shakespeare6305 Words   |  26 Pagesdrama: A ritualized form of Japanese drama that evolved in the 1300s involving masks and slow, stylized movement. * ï‚ · Problem play: A play that confronts a contemporary social problem with the intent of changing public opinion on the matter. Henrik Ibsen popularized this form in plays such as Hedda Gabler. * ï‚ · Tragedy: A serious play that ends unhappily for the protagonist. Sophocles’ Antigone is one of the best-known Greek tragedies. * ï‚ · Tragicomedy: A play such as Shakespeare’s A Winter’s

A Lesson Before Dying Lesson Before Dying Es Essay Example For Students

A Lesson Before Dying Lesson Before Dying Es Essay says A Lesson Before Dying In A Lesson Before Dying, Mr. Grant Wiggins life crises were the center of the story. Although he was supposed to make Jefferson into a man, he himself became more of one as a result. Not to say that Jefferson was not in any way transformed from the ;hog; he was into an actual man, but I believe this story was really written about Mr. Wiggins. Mr. Wiggins improved as a person greatly in this book, and that helped his relationships with other people for the most part. At the start of the book, he more or less hated Jefferson, but after a while he became his friend and probably the only person Jefferson felt he could trust. The turning point in their relationship was the one visit in which Jefferson told Mr. Wiggins that he wanted a gallon of ice cream, and that he never had enough ice cream in his whole life. At that point Jefferson confided something in Mr. Wiggins, something that I didnt see Jefferson doing often at all in this book. I saw a slight smile come to his face, and it was not a bitter smile. Not bitter at all; this is the first instance in which Jefferson breaks his somber barrier and shows emotions. At that point he became a man, not a hog. As far as the story tells, he never showed any sort of emotion before the shooting or after up until that point. A hog cant show emotions, but a man can. There is the epiphany of the story, where Mr. Wiggins realizes that the purpose of life is to help make the world a better place, and at that time he no longer minds visiting Jefferson and begins becoming his friend. Mr. Wiggins relationship with his Aunt declined in this story, although it was never very strong. His Aunt treated him like he should be a hog and always obey, yet she wanted him to make a hog into a man. His Aunt was not a very nice person, she would only show kindness towards people who shared many of her views, and therefore was probably a very hard person to get along with. The way Mr. Wiggins regarded his relationships most likely would have been different were he white. Mr. Wiggins feels, and rightly so, that several white men try to mock or make a fool of him throughout the story. This was a time of racial discrimination with much bigotry, so if the story took place in the present, it would be much different. In fact, there probably would have not even been a book because in the modern day, and honest and just jury would have found him innocent due to the lack of evidence. It wasnt really clear what sort of situation Mr. Wiggins was in regarding money, but he could not have been too well off because he needed to borrow money to purchase a radio for Jefferson, and he commented about the Rainbow Cafe: ;When I was broke, I could always get a meal and pay later, and the same went for the bar.; I suppose he had enough money to get by, but not much extra. As the book progresses he probably had less money to work with due to the money he was spending to buy the radio, comic books, and other items for Jefferson. Mr. Wiggins seemed to be well respected by the community, and he felt superior to other African Americans because he was far more educated than they were. That makes Mr. Wiggins guilty of not practicing what he preaches, although Jefferson probably made it clearer to him that the less intelligent are still humans with feelings. At the start of the book, Mr. Wiggins did not understand this. He went to visit Jefferson because Miss Emma and his Aunt more or less forced him to do it. He really had no motivation except that he would be shunned by his Aunt if he did not comply. .u00b825b6cbd1980280cadf4c0e7b70a5 , .u00b825b6cbd1980280cadf4c0e7b70a5 .postImageUrl , .u00b825b6cbd1980280cadf4c0e7b70a5 .centered-text-area { min-height: 80px; position: relative; } .u00b825b6cbd1980280cadf4c0e7b70a5 , .u00b825b6cbd1980280cadf4c0e7b70a5:hover , .u00b825b6cbd1980280cadf4c0e7b70a5:visited , .u00b825b6cbd1980280cadf4c0e7b70a5:active { border:0!important; } .u00b825b6cbd1980280cadf4c0e7b70a5 .clearfix:after { content: ""; display: table; clear: both; } .u00b825b6cbd1980280cadf4c0e7b70a5 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u00b825b6cbd1980280cadf4c0e7b70a5:active , .u00b825b6cbd1980280cadf4c0e7b70a5:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u00b825b6cbd1980280cadf4c0e7b70a5 .centered-text-area { width: 100%; position: relative ; } .u00b825b6cbd1980280cadf4c0e7b70a5 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u00b825b6cbd1980280cadf4c0e7b70a5 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u00b825b6cbd1980280cadf4c0e7b70a5 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u00b825b6cbd1980280cadf4c0e7b70a5:hover .ctaButton { background-color: #34495E!important; } .u00b825b6cbd1980280cadf4c0e7b70a5 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u00b825b6cbd1980280cadf4c0e7b70a5 .u00b825b6cbd1980280cadf4c0e7b70a5-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u00b825b6cbd1980280cadf4c0e7b70a5:after { content: ""; display: block; clear: both; } READ: Oedipus Essay Paper The whole process of Mr. Wiggins development and the plot of this story both spawn from the crimes .

Monday, April 20, 2020

Music Of The 70S Essays - British Rhythm And Blues Boom Musicians

Music Of The 70'S Freewheeling War mixed rock, jazz, and soul influences into a spicy stew throughout the '70s, resulting in a series of R&B and pop hits sporting funky melodies and politically aware messages. Born in Long Beach in 1969, the large combo initially served as rocker Eric Burdon's group, backing the ex-Animal on his 1970 million-seller Spill the Wine. Bidding Burdon adieu, the band signed with United Artists in 1971 and enjoyed its first smash the next year with Slippin' into Darkness. Tapping into a sizzling, horn-fueled rock/soul synthesis, The World Is a Ghetto, The Cisco Kid and Why Can't We Be Friends? all went gold during the mid-'70s. Despite numerous personnel and label changes, War remained eminent throughout the '80s. In the early '90s, War experienced a revival, partially due to the fact that all of their albums were reissued. But the group was also acknowledged as a primary influence on contemporary R&B and hip-hop. War returned to recording in 1994 capitalize on their new-found popularity. While 94's War wasn't a blockbuster, it was a moderate success, enabling the group to continue recording into the late '90s. War may be available for your next special event. Call us! Please note that the above images may not accurately portray current band membership. Specifically, Harold Brown and Howard Scott do not play in the group WAR any longer. On January 11, 2001 we were informed that the ownership of the name WAR is currently in litigation in the United States Court of Appeals for the 9th Circuit. Music Essays

Sunday, March 15, 2020

Storing Record Data in a BLOB Field in Delphi

Storing Record Data in a BLOB Field in Delphi In Delphi, a record data type is a special kind of user-defined data type. A record is a container for a mixture of related variables of diverse types, referred to as fields, collected into one type. In database applications, data is stored in fields of various types: integer, string, bit (boolean), etc. While most data can be represented with simple data types, there are situations when you need to store images, rich documents or custom data types in a database. When this is the case you will use the BLOB (Binary Large Object) data type (memo, ntext, image, etc. - the name of the data type depends on the database you work with). Record as Blob Heres how to store (and retrieve) a record (structure) value into a blob field in a database. TUser record ...Suppose you have defined your custom record type as: TUser packed record   Ã‚   Name : string[50];   Ã‚   CanAsk : boolean;   Ã‚   NumberOfQuestions : integer; end; Record.SaveAsBlobTo insert a new row (database record) in a database table with a BLOB field named data, use the following code: var   Ã‚   User : TUser;   Ã‚   blobF : TBlobField;   Ã‚   bs : TStream; begin   Ã‚   User.Name : edName.Text;   Ã‚   User.NumberOfQuestions : StrToInt(edNOQ.Text) ;   Ã‚   User.CanAsk : chkCanAsk.Checked;   Ã‚   myTable.Insert;   Ã‚   blobF : myTable.FieldByName(data) as TBlobField;   Ã‚   bs : myTable.CreateBlobStream(blobF, bmWrite) ;   Ã‚   try   Ã‚  Ã‚  Ã‚   bs.Write(User,SizeOf(User)) ;   Ã‚   finally   Ã‚  Ã‚  Ã‚   bs.Free;   Ã‚   end; end; In the code above: myTable is the name of the TDataSet component you are using (TTable, TQuery, ADOTable, TClientDataSet, etc).The name of the blob field is data.The User variable (TUser record) is filled using 2 edit boxes (edName and edNOQ)and a check box (chkCanAsk)The CreateBlobStream method creates a TStream object for writing to the blob field. Record.ReadFromBlobOnce you have saved the record (TUser) data to a blob type field, heres how to transform binary data to a TUser value: var   Ã‚   User : TUser;   Ã‚   blobF : TBlobField;   Ã‚   bs : TStream; begin   Ã‚   if myTable.FieldByName(data).IsBlob then   Ã‚   begin   Ã‚  Ã‚  Ã‚   blobF : DataSet.FieldByName(data) as TBlobField;   Ã‚  Ã‚  Ã‚   bs : myTable.CreateBlobStream(blobF, bmRead) ;   Ã‚  Ã‚  Ã‚   try   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   bs.Read(user,sizeof(TUser)) ;   Ã‚  Ã‚  Ã‚   finally   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   bs.Free;   Ã‚  Ã‚  Ã‚   end;   Ã‚   end;   Ã‚   edName.Text : User.Name;   Ã‚   edNOQ.Text : IntToStr(User.NumberOfQuestions) ;   Ã‚   chkCanAsk.Checked : User.CanAsk; end; Note: the code above should go inside the OnAfterScroll event handler of the myTable dataset. Thats it. Make sure you download the sample Record2Blob code.

Friday, February 28, 2020

E COMMERCE LAW Coursework Example | Topics and Well Written Essays - 2250 words

E COMMERCE LAW - Coursework Example Pp. 194) Section 5 of the English Civil Evidence Act of 1995 stipulates instances when electronic evidence is admissible. It states â€Å"in a civil suit, a statement, which is obtained from a document generated by a computer, shall be considered as evidence of any facts contained therein of which direct oral evidence would carry much weight, if it was shown that some conditions are met in relation to the statement and computer under consideration†. Subsection 2 gives the conditions that are to be satisfied (Friedman, 2005. Pp. 63). One of the conditions to be satisfied is that the document having the statement has had to be produced during times over which the computer was used to store the information for the purposes of the tasks that are frequently carried on over that time by an individual or a corporate body. Another condition is that, over time, there was regular supply to the computer, information that is similar of the kind found in the statement or of the type from which the content is derived. Additionally, and throughout the material time, the computer must have been in proper operation, or if not, that its in-operation at the time was incapable of affecting the production of the article or the accuracy of what is contained in the document. The last condition stipulates that the information that is contained in the statement is derived from the data supplied to the pc in the ordinary cause of those activities (Hedley, 2006. Pp. 22). The best evidence rule provides that he who wants to produce evidence in a court of law must Endeavour to give the court the original evidence or the best evidence to assist the court to come up with the best legal conclusion. In Garton vs. Hunter (1969) and Springsteen vs. Masquerade Music Limited (2001) EWCA Civil case number 563, both Lord Denning and Parker LJ agree that the best evidence rule of admissibility has been overtaken by time. Parker LJ in his judgment points out that the

Tuesday, February 11, 2020

Case study #1 HRD #394 Example | Topics and Well Written Essays - 500 words

#1 HRD #394 - Case Study Example tance of repairing the machines and also improve the conditions and the equipments that would help reduce the cases of accidents and injuries in the work. The programs of behavioral based safety focus the employees as the main cause of accidents and injuries at workplaces. In this, many employees blame their employees for most of the accidents at workplaces, in most cases; however, behavioral based safety targets improving the safety behaviors in the workplaces by the use of employee involvement. It involves identifying the employees practices and behaviors that would help in reducing the risk of injury. Management accountability and engineering control both affect safety issues at workplaces, managers should understand that the safety of their employees also fails in their hands. They should understand that they have the responsibility to provide a safe and healthy workplace for their employees. Management should also ensure that the organization has adequate resources focused towards ensuring that the organization meets the safety and health implementation strategies and objectives. With this in mind then the management is accountable to all its employees in regard to health and safety. Engineering control also affects safety issues at the workplace; regular fixing of the engineering systems in an organization reduces the incidences of accidents and injuries at the workplaces. This fixing of the engineering systems helps improve the hazardous conditions and equipments that help eliminate the potential causes of accidents. This paper concurs with the critics of behavior based safety, the critics of the BBS state that the employees are not always responsible for the accidents and injuries as the advocates put it. Injuries and accidents in the workplaces mainly rise from the unsafe conditions with bad designs, the failure of the organizations to provide the safeguards required and the failure of the organizations to take the best preventive measures. This proves

Friday, January 31, 2020

Competition to Gain Competitive Advantage among Firms Essay Example for Free

Competition to Gain Competitive Advantage among Firms Essay In the current world market, there are many products and services available to fulfill the needs of individual and businesses. According to Barney, Wright and Ketchen (2001), to succeed in such a competitive market, a competitive advantage is required to provide any firm with necessary tools, useful in increasing sales and market share, improving profit margins for a given period of time in a new existing market, ensure survival of the firm in extremely competitive markets and also develop hard to copy mixes. A firm that lacks competitive advantage can imitate firms that already have an edge in competition, either through direct duplication of resources or substitution (Combe, 2006). The firm can determine which way to go, by first conducting a research of the main competitors, so as to identify the resources they have, that contribute to their success in the market (Porter, 1980). When this is established, the firm should then evaluate itself so as to know the resources it has, and whether it is feasible to invest on these resources so as to improve its competitiveness in the market. Among the things that the firms can do to improve its competitive advantage is to introduce new products and processes, it can also adopt managerial methods and organizational form from the better firms and also engage in timely investment during market entry (Combe, 2006). In addition to this, the firm should learn what the customers want, carefully analyze their competitors and create product differentiation with creative techniques. The goal of any new introduction is to meet consumers’ needs with a quality product at the lowest possible cost in order to return the highest level of profit (Combe, 2006). Introduction of new products can be broken down into five distinct parts which include idea validation, conceptual design, specification and design, prototype and testing and commercialization (Porter, COMPETITIVE ADVANTAGE 1980). If the new product satisfies the consumers needs then it going to be appreciated well in the market, and put the company in a good competitive edge. Adopting managerial methods and organizational form is also important. The firm should adopt the managerial methods practiced by the better firm so as to realize a competitive edge (Barney et al. , 2001). This poses some challenges in terms of resources in cases where additional input of capital is required. Nevertheless if the investment is worth, then we should not give up. Also investments in the market should be carried out timely so that the prevailing market conditions do not negatively affect the investments leading to big loses incurred by the firm (Porter, 1980). The firm should investigate to know the best investment periods so that it’s on the correct path of competition. Bad timing of entry into the market can really make any firm to lose grip of the market by incurring great loses that might take time for the firm to recover (Barney et al. , 2001). Thirdly the firm should analyze the market to know what the consumers want and the form in which they want it. If the customer becomes the priority in any firm, then the firm should realize some benefits as a result of customer loyalty (Porter, 1980). The design of the products should also be done creatively in a way that is most convenient to the customers. Products may be similar in all aspects but a small difference in presentation can greatly increase its demand in the market. Competitive advantage can be attained if the current strategy is value-creating and not currently being implemented by present or possible future competitors (Barney et al. , 1991). Competitive advantage has the ability to be sustained but a competing firm can enter the market with a resource that has the ability to invalidate the priors’ firms’ competitive advantage and is COMPETITIVE ADVANTAGE therefore independent of timeframe. When imitation actions comes to an end without disrupting the firms competitive advantage then the firms strategy can be called sustainable. Porter (1985) portrays contrary views that competitive advantage is maintained when it provides above average returns in the long run.

Thursday, January 23, 2020

Pregnancy in the Military :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚   As the United States military moves towards a more bi-gender dependant force, it will be necessary for leaders and managers to combat the growing increasing of junior enlisted pregnancies. Through leadership skills, communication, and understanding the causes of the problems, leaders will be able to lower the rate of pregnancy, henceforth, increasing fleet readiness.   Ã‚  Ã‚  Ã‚  Ã‚  To even consider any type of resolution or solution to the problem of pregnancy amongst junior enlisted members, we must first analyze the concept of fleet readiness and the units that comprise it in today’s military. As the post-Cold War military is downsized to fit the new world order and the decreasing defense budgets, there is increasing concern about the readiness of the military. If the military is called upon to achieve our national objectives, will they be where they are needed, when they are needed, and prepared to perform their missions? Since no one wants another episode of the ill-equipped, poorly trained â€Å"hollow force† that existed in late 1970’s, both President Clinton and former Secretary of Defense Perry cited readiness as the top defense priority.1   Ã‚  Ã‚  Ã‚  Ã‚  The joint forces Publication 1-02 defines readiness as the ability of forces, units, weapon-systems, or equipment, to deliver the outputs for which they were designed (this includes the ability to deploy and employ without unacceptable delays).2 In other words, deployability of servicemen/women and equipment to accomplish tasks around the globe is paramount. With this broad definition of fleet readiness, we can determine that the deployability of junior servicemen and women is a major factor to accomplishing fleet readiness within any force. While junior enlisted personnel comprise the majority of service people deployed throughout the world, this paper will explore the impact of the junior enlisted servicewoman and how different factors within command climate cause pregnancy to be a fleet readiness problem.   Ã‚  Ã‚  Ã‚  Ã‚  Since readiness of the military is a high priority issue, Public Law 103-337, Section 533 requires the Department of Defense to submit an annual report on readiness factors by race and gender, beginning in FY96. As part of this report, deployability trends must be tracked. To ensure the data is reported correctly, a contract was issued to Logistics Management Institute to provide â€Å"a comprehensive analysis of the impact of non-deployable personnel on readiness. This study will also look at the degree to which individuals in active component units, who are non-deployable, are adversely affecting readiness.†1 With all the attention being given to readiness, it is important to understand some of the factors that may impact readiness

Wednesday, January 15, 2020

Dell Corporation

Dell Corporation 1. Introduction A . Company History In 1983, Michael Dell, an 18-year-old freshman at the University of Texas at Austin, Spent his evenings and weekends pre-formatting hard disks for IBM-compatible PC upgrades. A year later, he dropped out of college to continue with his rapidly expanding business, which had grown from zero to $6 million in 1985, simply by upgrading IBM compatibles for local businesses. In 1985, Dell shifted its focus to assembling it own brand of computers which led to a dramatic growth of the business, with $70 million in sales at the end of 1985.By the year 1990 sales had grown to more than $500 million and Dell was able to supply a number of Fortune 500 Companies. The company now had a broad product line of desktop and portable computers with Intel processors and had earned a strong reputation for quality products and service. Throughout the company’s history, a big part of Dell’s success was due to its unique and distinctive  "Dell Direct Model. † This model took efficiency to new heights by eliminating the intermediaries between maker and user of PC’s and lowered costs by eliminating inventory with the help of an efficient supply-chain management system and internet sales.Today, as the world’s largest PC manufacturer, Dell Computer Corporation offers a great variety of computing products directly to customers, with build-to-order systems and Comprehensive services that fulfill the needs of its customers. Dell’s customers range from Major corporations to individuals all over the world. Efficient cash management has enabled Dell to have both extremely high inventory returns and a â€Å"negative cash conversion cycle. † This cash flow system permits Dell to pass on cost savings to customers in the form of lower prices for the best technology available.These competitive advantages have helped the company achieve a solid cash position with outstanding liquidity B.. In search of a company culture The culture at Dell had always been driven by a continuous program to drive down costs And improve the â€Å"customer experience. † Facts were more important and more highly valued than emotions and personal feelings. As the company grew and succeeded, the company culture that pushed the drive to be number one and to make a personal fortune was based solely on economic terms.But in the year 2000, Dell’s margins in the hardware business began to decline due to a slowing demand for PC’s and a price war with competitors. Investors were disappointed, layoffs were frequent, and employees began to wonder why they worked in a high-tech industry, and why they worked for Dell. Kevin Rollins was aware that all great companies have great cultures. They have a Purpose and a leadership model. Aware of an urgent need to define his company’s culture, he Looked for inspiration, reading books on Franklin, Jefferson, Monroe, and Washington.He soon dis covered that what the founding fathers of the United States believed in went well beyond logic. They were passionate, very idealistic, and had a vision that exceeded their personal gain and involved the risk of losing their lives. Mr. Rollins found this remarkable, and it caused him to think about the country’s soul and its leaders. He believed this was an â€Å"interesting paradigm for a company to examine, as opposed to simply adopting the business paradigm. † With this foundation, he began to develop what became known as The Soul of Dell. C. . Key Players Michael Dell is the founder and CEO of Dell Computers.During the past 18 years, he Has grown the company’s sales from $6 Million to $33. 7 Billion and opened sales offices Worldwide, employing more than 38,000 people around the world. In 1992, Michael Dell Became the youngest CEO of a company to be ranked as a Fortune 500 firm. He has been Honored in numerous occasions for his vision and leadership. One of t he main goals for his Company is to double company profits by 2005 Kevin Rollins became Dell’s President and Chief Operating Officer in March of 2001. Before then, he was president of Dell Americas. He managed all company operations in the United States, Canada, Mexico, and Latin America.During Mr. Rollins’ tenure at Dell, the Company has gone through a dramatic growth process increasing revenues from $5 Billion to $31 billion in just five years. Before joining the company, he functioned as vice president and Managing partner of Bain & Company Management Consultants, where he specialized in Corporate strategy and the management of high-tech companies. With his development of The Soul of Dell, he would like people to refer to Dell as a place where respect, integrity, honesty, and forthrightness are valued. Elizabeth Allen is currently the vice president of Corporate Communications at Dell.Her Responsibilities include the direction and global management of Dell’s corporate communications functions, including media relations, employee communication, and liaison with brand and product advertising divisions. Allen has spent more 20 years of her career in corporate communications. Before joining Dell, she was vice president of corporate communications at Staples Inc. , where she expanded investor, government, community and media relations. Previously, she worked for Raytheon Company and Loral Corporation as vice president of corporate communications in each.Allen has the responsibility of diffusing The Soul of Dell both inside the company and externally. 2. Current situation A. Vision statement It’s the way we do business. It's the way we interact with the community. It's the way we interpret the world around us– our customers needs, the future of technology, and the global business climate. Whatever changes the future may bring our vision — Dell Vision —    will be our guiding force. So Dell needs full customer sat isfaction. In order to become the most successful computer company, they need the newest technology and loyal customers. B.Mission Statement Dell's mission is to be the most successful Computer Company in the world at delivering the best customer experience in markets we serve. In doing so, Dell will meet customer expectations of: †¢Highest quality †¢Leading technology †¢Competitive pricing †¢Individual and company accountability †¢Best-in-class service and support †¢Flexible customization capability †¢Superior corporate citizenship †¢Financial stability 1- Customer The customer of dell according to the mission statement is the whole world because their aim is to be the most successful computer company in the world 2- MarketDue to the point that Dell wants to be the most successful computer company in the world it is automatically understood that their market is the whole world 3- Concern for profitability and growth Due to aiming to conquer t he whole world their will always be a place for growth which leads to more profitability 4- Concern for employees The mission statement does not talk at all about the employees I think this is the only flaw in the mission statement but if a company has such big goals the employees must be very qualified especially in this filed. The filed of computers because it is very competitive market with the other competitors. . Philosophy: From day one, Dell has built his company up on the premise that what the customer says goes. When he first started Dell Computer at the age of 19 in his University of Texas dorm room, Dell says his concept was simple: buy parts, assemble them, and sell the finished products directly to customers. He effectively eliminated big distributors and was able to reduce the end price he could charge. â€Å"You tell us what you want – how fast you want the programs to operate, how much memory, how expandable – and we will build it for you and ship it o ut, usually within three days,† he says. And if ever you have a question or a problem about your system, you call us direct. We take direct responsibility for the complete satisfaction of each and every customer. † After his company had been in business for three years, Dell created the industry’s first on-site-service program. If there was a problem with your computer, you didn’t have to return to the store to have it looked at. You simply called Dell and a serviceman would come to your house and fix it. â€Å"That was a pretty important plus because we didn’t have any stores,† Dell jokingly recalls.Dell claims that his company operates on a relatively simple concept: â€Å"The most important thing is to satisfy our customers,† he says. â€Å"The second most important is to be profitable. If we don't do the first one well, the second one won't happen. † Thus, the focus of his company remains on concrete issues, such as improving delivery time, cutting operating costs and maintaining customer service. Dell believes in the importance of adding value â€Å"beyond the box†, looking at the customer’s total experience. To this end, he often aligns his company with complementary partners for increased efficiency.Today, Dell builds computers only in response to orders that the company has actually received from users, either by phone or the Internet. Users are able to dictate the company’s supply, relieving Dell of the risk that comes along with trying to predict market demand in the extremely unpredictable computer industry. Because Dell customizes its products, the company is also able to provide unmatched levels of customer service. For instance, on October 27, 1997, after the Asian economic crisis overwhelmed Nasdaq’s online trading site, Nasdaq called Dell, which proceeded to build eight custom-made PowerEdge servers in just 36 hours.Three days later, they were up and running for N asdaq. By prioritizing his customers, Dell was rewarded with their business and loyalty. http://www. evancarmichael. com/Famous-Entrepreneurs/646/Lesson-2-Develop-a-CustomerFocused-Philosophy. html 6. Concern for public image The point that â€Å"Dell's mission is to be the most successful Computer Company in the world† means only one thing and that is the public image for the company must be very good not only domestically but also internationally. 7. Production servicesThe way how dell operates is actually a very smart way to cut of cost and inventory accounting wise leading to more profit for the company also the quote â€Å"Best-in-class service and support† convinces you that any service this company does can only be the best. 8. Technology Technology plays a very important role for dell simply because of the nature of the business. The computer filed is all about technology and service that is what gives any company the edge of survival in this filed so technolog y must be very high. â€Å"Leading technology†, http://www. samples-help. org. uk/mission-statements/dell-mission-statement. htm http://retailindustry. bout. com/od/topusretailcompanies/p/dellincprofile. htm C. Values statement Extending Our Global Success Leadership. Performance. A commitment to expansion. These are the principles that have secured our success in the marketplace and enhanced our ability to anticipate and address the industry’s needs. Our unique position as a technology leader ensures that you’ll always be challenged in your work and supported in reaching your most ambitious goals. [pic][pic][pic][pic] Showing results 1-2 of 2 1. Collaboration. Ambition. A commitment to unique solutions. When you work at Dell, you embody these principles every day. 2.Commitment to Diversity Collaboration. Empowerment. Opportunity. These are the tenets of Dell's strong commitment to diversity. http://content. dell. com/us/en/corp/careers-our-values. aspx D. Dell policies 1. Dell Global Environmental Policy Dell aspires to be a company in which environmental excellence is a priority in  everything we do. Our goal is to fully integrate environmental stewardship into the business of providing quality products, best-in-class services and the best customer experience at the best value. http://content. dell. com/us/en/corp/d/corporate~corp-comm~en/Documents~dell-global-environmental-policy. df. aspx 2. Global social media policy Scope This Global Policy on Social Media (Policy) is a Corporate Compliance Policy and applies to all Dell employees, employees of any Dell subsidiary, assigned workers, as well as to third parties performing services on Dell's behalf (hereinafter collectively referred to as â€Å"You†). For employees, compliance with this Policy is an expectation of employment (subject to local legal requirements). For assigned workers and third parties, compliance with this Policy is a condition of access to Dell facilities and resources, and of being permitted to perform services forDell. Definitions for capitalized terms used in this Policy may be found at the end of the Policy. Purpose Dell recognizes that Social Media tools such as blogs, micro-blogs, online forums, content-sharing Websites and other digital channels established for online interaction and connection are increasingly used to: promote Dell to colleagues, customers, the media and other Dell stakeholders; and/or share personal opinions and participate in online dialogue as individuals.The purpose of this Policy is to establish standards and expectations regarding any Dell-related use of Social Media. Dell's commitment to being direct, supports open communications, provided such communications adhere to this Policy. Policy Statement You must adhere to the following when engaging in Social Media: †¢ Appropriate Use of Information Technology Resources. Dell's Information Technology (IT) resources are company property dedicated to achiev ing Dell's business objectives. Inappropriate use is not acceptable.This includes, but is not limited to, using Dell IT assets to post offensive material on content-sharing websites, publish defamatory remarks about colleagues or customers on web forums or blogs, and leaking Confidential Information. †¢ Speaking On Behalf of Dell. Blogging and other online dialogue are far-reaching forms of communication; distribution is meant for a vast public audience. Information purported to be published by Dell contained within blogs and other Websites could have a negative impact to Dell and our stakeholders, with potential legal implications.Unless You have successfully completed Dell's Social Media training courses and have been certified to speak on behalf of the company  using Social Media, You shall never claim to be speaking on behalf of Dell or expressing an official company position in such communications. †¢ Ethical Conduct. You shall not conduct activities that are illega l or contrary to Dell's Code of Conduct, Privacy Statement Regarding Customer and Online User Information, or other Dell policies. Always respect the dignity and privacy of colleagues, customers, other Dell stakeholders and Dell competitors.Harassing, intimidating, offensive, abusive, threatening, menacing or hostile content communicated through blogs and other online communications is prohibited. Data related to others, including, but not limited to, personal details and pictures, shall only be posted with that party's consent. †¢ Transparency of Origin. You shall disclose Your connection to Dell in all communications with customers, the media or other Dell stakeholders when speaking on behalf of Dell (if authorized to do so) or discussing or recommending Dell or its products or services (even when doing so in Your personal capacity).You must also provide Your Dell contact information upon request. Unless you are certified to speak on behalf of Dell, You should make it clear t hat the opinions are Yours alone and do not necessarily reflect Dell's views or positions. †¢ Accurate Information. Never knowingly communicate information that is untrue or deceptive. Communications shall be based on current, accurate, complete and relevant data. Dell will take all reasonable steps to assure the validity of information communicated  using any channel but it is Your responsibility to assure accuracy in the first instance.Anecdotes and opinions shall be identified as such. †¢ Protection of Confidential Information. You shall protect Confidential Information as such information represents one of Dell's most important assets. It is never appropriate to share, post, publish or otherwise disclose Confidential Information unless You are explicitly authorized to do so. You must respect securities and financial disclosure laws, and must not post or otherwise comment in any capacity on Confidential Information that may be considered financial information (such as earnings, future business performance, business plans or prospects). Accountability. You will be held accountable for the information You share in online activities. Be careful what You share, publish, post or otherwise disclose. You are personally responsible for what You share and should remember that anything You post may be public for an indefinite period of time (even if You attempt to modify or delete). Try to ensure Your online communications reflect Dell's brand attributes of openness, responsiveness, integrity and optimism. Procedures and Training Dell has adopted training materials to assist You in complying with this Policy.Dell's Social Media  and Communities (SMaC) Team will deliver role-appropriate training. Asking Questions You are encouraged to ask any questions You may have about this Policy. To learn more about how to use Social Media in accordance with this Policy, contact Dell's SMaC Team at [email  protected] com. You may also ask Your leader or Human Resou rces representative, or contact the Global Ethics  and Compliance Office at [email  protected] com, or the Legal Department. Reporting and Investigation It is very important that You immediately report any suspicious behavior regarding Dell employees or Dell third parties.To report known or suspected violations of this Policy, contact your leader or another member of management, your Human Resources representative, an Ethics  and Compliance team member, or call the Ethics Helpline, a confidential toll-free, third party-operated telephone service, You may also submit a report  using the Ethicsline, a confidential Web-based online reporting vehicle. Reports made  using the telephone Helpline or the Web-based Ethicsline may be made anonymously where permitted by local law. Anyone reporting a suspected or actual violation of this Policy is protected from retaliation under Dell's Code of Conduct.All good faith allegations of violations of this Policy will be fully and confident ially investigated pursuant to Dell's Global Policy on Raising and Investigating Potential Ethics  and Compliance Violations. You are required to cooperate with all investigations of alleged Policy violations. Discipline and Other Consequences Employees who violate this Policy will be subject to appropriate disciplinary action or other remedial measures up to and including termination of employment if warranted under the circumstances and permissible under applicable law.Assigned workers and third parties who violate this Policy are subject to being denied access to Dell facilities, personnel and assets, and permission to perform services on Dell's behalf. Waivers The provisions of this policy cannot be waived. Dell management does not have the authority to approve waivers to this Policy. Revision and Revocation This Policy is not a contract between Dell and any employee, assigned worker, or third party. This Policy may be revised or revoked by Dell at any time, without advance no tice or cause. Local Policies and ProceduresDell operates in many countries and it is Dell's intention to comply with all applicable legal requirements. Accordingly, if a provision of this Policy conflicts with applicable local legal requirements, Dell will follow the local legal requirement (provided the local requirement does not conflict with U. S. law). In addition, Dell may adopt regional or country-specific policies on this subject to accommodate local conditions or legal requirements, and will inform employees in the applicable region or country of the terms of any such policy. DefinitionsConfidential Information  Ã¢â‚¬â€ Important or valuable business information that is not available to the public. It includes trade secrets and other intellectual property that has been developed, licensed or acquired by Dell. It can also include information of customers, business partners or others that has been disclosed to Dell under obligations of confidentiality. Examples include una nnounced financial information, strategic business plans, unannounced product or services and solutions offerings, planned or contemplated mergers or acquisitions, lawsuits and other legal proceedings, roduct design and technical knowledge, customer and team member personal information. Social Media  Ã¢â‚¬â€ Web-based technologies used to broadcast messages and participate in dialogues. Examples of Social Media software applications on the Internet include social networking applications such as Facebook; video-sharing applications such as YouTube; micro-blogging applications such as Twitter; collaboration applications such as Wikipedia; and Dell's official corporate blog, Direct2Dell. Examples of Social Media applications used within Dell are Dell's internal blog, One Dell Way, and Dell's internal networking tool, Chatter.Global Policy on Social Media Effective Date: August 5, 2010 http://content. dell. com/us/en/corp/d/corp-comm/social-media-policy. aspx 3. Privacy and Data Secu rity At Dell, your right to privacy and data security is a primary concern. That's why, when you visit dell. com, we help you maintain control over your personal data on the Internet. Below are the guidelines we use for protecting the information you provide us during a visit to our Internet sites (www. dell. com/ap) or when you use our online support offerings such as support. ap. dell. com.Other Dell and Dell Co-branded sites may operate under their own privacy and security policies. 3. External scanning A. PEST ANALYSIS PEST analysis is very important that an organization considers its environment before beginning the marketing process. In fact, environmental analysis should be continuous and feed all aspects of planning. The organization's marketing environment is made up from: PEST analysis stands for â€Å"Political, Economic, Social, and Technological analysis† and describes a framework of macro environmental factors used in environmental scanning.It is also referred t o as the STEP, STEEP or PESTLE analysis (Political, Economic, Socio-cultural, Technological, Legal, and Ethical). It is a part of the external analysis when doing market research and gives a certain overview of the different macro environmental factors that the company has to take into consideration. Political factors include areas such as tax policy, employment laws, environmental regulations, trade restrictions and tariffs and political stability. The economic factors are the economic growth, interest rates, exchange rates and inflation rate.Social factors often look at the cultural aspects and include health consciousness, population growth rate, age distribution, career attitudes and emphasis on safety. The technological factors also include ecological and environmental aspects and can determine the barriers to entry, minimum efficient production level and influence outsourcing decisions. It looks at elements such as R&D activity, automation, technology incentives and the rate o f technological change. The internal environment e. g. staff (or internal customers), office technology, wages and finance, etc.The microenvironment e. g. our external customers, agents and distributors, suppliers, our competitors, etc. The macro-environment e. g. Political (and legal) forces, Economic forces, Socio cultural forces, and Technological forces. These are known as PEST factors. Political Factors The political arena has a huge influence upon the regulation of businesses, and the spending power of consumers and other businesses. You must consider issues such as: .How stable is the political environment? For example what is happening because of 25 of January revolution? Will government policy influence laws that regulate or tax your business? .What is the government's position on marketing ethics? And this is not clear in Egypt those days What is the government's policy on the economy? Does the government have a view on culture and religion? Is the government involved in t rading agreements such as EU, NAFTA, ASEAN, or others? Economic Factors Marketers need to consider the state of a trading economy in the short and long-terms. This is especially true when planning for international marketing. You need to look at: . Interest rates 2. The level of inflation Employment level per capital Sociocultural Factors The social and cultural influences on business vary from country to country. It is very important that such factors are considered. Factors include: l. What is the dominant religion? 2. What are attitudes to foreign products and services? 3. Does language impact upon the diffusion of products onto markets? 4. How much time do consumers have for leisure? 5. What are the roles of men and women within society? 6. How long are the population living?Are the older generations wealthy? 7. Do the population have a strong/weak opinion on green issues? Technological Factors Technology is vital for competitive advantage, and is a major driver of globalization . Consider the following points: 1. Does technology allow for products and services to be made more cheaply and to a better standard of quality? 2. Do the technologies offer consumers and businesses more innovative products and services such as Internet banking, new generation mobile telephones, etc? 3. How is distribution changed by new technologies e. g. ooks via the Internet, flight tickets, auctions, etc? 4. Does technology offer companies a new way to communicate with consumers e. g. banners, Customer Relationship Management (CRM), etc? http://www. nishanw. org/Corporate%20Strategy%20lession%202%20tools. doc B. Porter’s model 1. New entrants:- From the point of view of Dell this is considered a low risk simply because to enter a market like this you need a lot of capital, to start up and to get the latest technology. Seconded of all there are a lot of established companies in this field so entering it would be nearly impossible. ttp://www. photopla. net/wwp0503/entry. ph p 2. Rivalry:- Rivalry will always exist in such a market because there are lot of establish competitors such as HP, Sony, Toshiba. And many more. www. csus. edu/indiv/h/†¦ /ComputerIndustryAnalysis8-06. ppt – 3. Threat of substitute products:- In the computer filed you would think there are no substitute products. It matters on exactly what the customer wants if the customer wants a computer just to serf the internet there are substitute products. Like the high tech mobiles and I-Pad.However if the consumer uses a computer to play games or other things computer a pretty much the only product you can buy to do these stuff therefor the computer becomes a nessatiy . In the case of dell laptops are not considered a substitute products compared to the normal Personal computer. Due to that dell is one of the main players in the computer market and are aiming to be the best in all computers as to oppose of Gamma or Philips for example. http://www. vodafone. co. uk/personal/ind ex. htm 4. Bargaining power of buyers:-The consumer or buyer in this case has a lot of power therefore any company that wants to serve has to play by one rule an that rule is. To produce a product at the lowest cost possible selling that same product at the highest cost possible. The highest cost possible is the selling price your competitors sell there product. Consider if you will that the cost the competitor sells his product that to be your ceiling of a price there for you will always find that competitors all there prices are very close if not even the same.Only if there is a huge difference in quality. 5. Bargaining power of suppliers. As for suppliers bargaining power this is a very high risk for any company because a supplier may rise prices or less the quality of the product. There for it is a must for every company to have an excellent relation with its supplier. Relative power or other stakeholders Governments play a big role on any company with law and Terries and so on there for it might not be that easy to enter a new market. C. Strategic groupsIn the case of dell or in general the computer industry you will find that there are a lot of players in the market such as Sony, HP, Compaq, all of these companies just mentioned all work under the IBM Bracket as to oppose of apple which uses Macintosh a completely different operation system. This is more used by advanced users such as engineers and musicians. So from by point of view if we were to compare price of the final product and quality you will find Apple in the top right while dell and all the others will be under apple also on the right because dell always thrive on the highest quality product. pic] D. Strategic types Dell is a reactor company because in this filed of computers all of them work as a reactor company simply because all what dell does is that is manufactures and assembles the computer the only thing that changes in this field is the technology and power of the computer example for the companies that create that technology is Intel and AMD E. Issue priority Matrix Impact on organizationHigh Medium Low | | | | | |Medium priority | |Increasing Turn over |high | | |High priority |rate | | | | | | | |Low priority |Financial crisis |High priority |Medium | | | |Medium priority | | |Swine flu |Low priority | |low | Probability of occurrence The issue priority matrix is a matrix that helps you measure the priority of external factors and its effect on the organization. the financial crisis have a medium level of occurrence, while it have a medium priority, while the swine flu has a low level of occurrence with a low priority, the rate of turn over rate has a high priority with a high rate of occurrence. F. Industry success matrix In the industry we have decided to place all the direct competitors in our bubble according to the Strategic groups. Picking only 3 companies for convenience Key factors |weight |Dell |score |sony |score | |1 | Increased internet |. 20 |3 | . 6 |Increases dell profit | | |access in Egypt | | | |by reaching more | | | | | | |customers | |2 |Outsourcing |. 05 |4 |. |Improve the quality of | | | | | | |services offered by | | | | | | |dell | |3 |Ecommerce |. 10 |4 |. 4 |Increasing profits | | | | | | |through usage of dell | | | | | | |direct model | |4 |Maintaining Low Price |. 05 |2 |. 1 |Questionable as it's an| | Leadership | | | |old strategy used for | | | | | | |companies in growth | | | | | | |stage | |THREATS | |THREATS | | | | |1 |I. T. Advancement |. 0 |4 |. 8 |Well positioned | |2 |Price Wars |. 10 |3 |. 3 |Questionable | |3 |Strong Brands in The |. 10 |3 |. 3 |Dell brand name is also| | |Market (IBM) | | | |a strong ones | |4 |HP / Compaq Merger | . 20 |4 |. |Well positioned | |Total |1. 00 |3. 5 | | | | The 3. 50 WEIGHTED SCORE in Dell’s EFE Matrix is above average and represents that Dell is responding in an excellent way to its opportunities and threats in the I. T industry. In other words we can c onclude that Dell’s strategies efficiently and effectively take advantage of its opportunities and take serious steps to minimize the potential threats. http://www. ijazconsulting. com/uploads/Dell-Strategic_Case-Analysis_by_Ijaz_and_Muffich. pdf 4. Internal scanning A. Organizational structureDell Corporation’s organizational structure is a functional, decentralized structure. The company encourages different departments and functional components to contribute ideas to enhance the strength of the organization. The hierarchical structure provides defines the various functions provided by Dell Corporation, including Business Development, Education, and Global. A decentralized structure provides more learning availability for all members of the enterprise, as decisions come from various levels; in contrast, the centralized structure has more of the decision-making coming from the upper levels of the enterprise, such as the CEO and Vice Presidents.In the divisional organi zation, every division has its own groups to support that specific division (such as purchasing units and human resources units). [pic] 2. Culture: |Dell believes in being direct in everything we do. Our ultimate success is based on maintaining direct | |relationships built on trust. Our relationships with diverse partners help us reach multicultural consumer groups| |across the world and recruit the best and brightest talent to achieve success in the marketplace. | |Dell's Winning Culture and comprehensive diversity initiatives create a corporate environment based on | |meritocracy, personal achievement and equal access to all available opportunities.We focus our internal efforts | |on cultivating and promoting best practices among our global workforce in the areas of policy development, | |training, recruitment, mentoring, development, advancement and culture change. Furthermore, our Work/Life | |Effectiveness and career management programs enhance our ability to retain and develo p valuable team members and | |demonstrate our commitment to the Dell Team. | |Networking Groups | |Dell sponsors a community of networking groups formed by employees with common interests in areas such as | |ethnicity, gender, nationality, lifestyle, and sexual orientation.These groups offer Dell employees the | |opportunity to network with other employees from around the company, while providing encouragement and an | |enhanced sense of belonging through informal mentoring, professional and community events and access to personal | |and professional development and growth. Additionally, networking groups help foster a more inclusive work | |environment, improve communication among employees and enhance understanding of all employees about the value of | |diversity. | |Networking Groups currently chartered: | |BRIDGE – Building Relationships in Diverse Group Environments (African-American Networking Group) | |W. I. S. E. Women In Search of Excellence | |aDellante – Hispanic Networking Group | |PRIDE – Partnering for Respect of Individuality in the Dell Environment (A Gay, Lesbian, Bisexual, Transgender & | |Straight Alliance) | |A. I. M. – Asians in Motion | | | |Work/Life Effectiveness | |At Dell, our people are our most valuable asset and we are committed to fostering a culture that exhibits this | |value. Our goal is to enable employees to maximize their contribution to the company while also maintaining | |effectiveness between their work and personal lives.We advocate flexibility in the workplace to empower | |employees, teams and managers to hold discussions about both the needs of the business and each employee's | |individual Work/Life Effectiveness goals, and then to construct a plan for fulfilling both priorities. As | |individual circumstances vary, solutions that enable flexibility can be different, including informal and formal | |flexible work arrangements such as variable daily work times, work-from-home, and par t-time work arrangements. | |Additionally, Dell offers corporate employee resources that enable employees to better manage their Work/Life | |situations, such as: | |Employee Assistance Program | |Dependent Care ReferralResources | |Mothers Rooms | |Staying Well at Dell Initiatives like â€Å"Weight Watchers at Work† | | | | | | | | | | | |Career Management Program | |Dell is committed to developing our workforce and helping employees achieve their personal and professional best. | |Through an intensive, six-month Career Management Program, we strive to develop, fully engage, and retain | |high-performing talent. Specifically, participants in the program spend 6-8 hours per month developing and | |strengthening network and mentoring relationships; engaging in new activities; and exploring new assignments or | |positions at Dell. Managers participate in a kickoff session and a mid-program discussion with the coach and | |participant, in addition to holding monthly career- related discussions with participants. | http://www. dell. com/content/topics/global. spx/corp/diversity/en/culture? c=us=en 3. Resources (Value chain): 1. Typical value chain |Raw materials | |Primary | |manufacturing | |Fabrication | |Distributor | |Retailer | In this case dell here saves a lot of cost compared to any other competitor in the market simply because dell acts as a distributor and retailer, leading to a huge reduction of cost. As it is dells signature to deliver their product right to your door as ordered over the internet. This is how it works in America but of course this does not occur here in Egypt. As here in Egypt it only seems enough to have the name dell in the market.This point has many other factors because here in Egypt the income level is lower than in the America so people here such as my self for example would rather want to customize his personal computer. Rather than buying a brand name. 2. Corporate Value chain [pic] Dell Company here in Egypt doesnâ €™t work as a full company, but only works in Egypt as a distributor only. The company works with agents and people have the possibility to buy through the internet as the company use its direct model to deliver customized products anywhere in the world. Dell Company has 2 of the primary activities here in Egypt they are marketing and sales, and services. Marketing and sales:I have seen with my own eyes that Dell Company does marketing activities to increase awareness and sales in booths in computer mall Also they provide discounts on their products to increase sales. Services There are for any dell products after sales services and repair possibilities incase anything could go wrong with a dell computer. IFAS |Internal Factor |INTERNAL STRENGTHS |WEIGHTS |RATINGS |WEIGHTED |Comment | |Evaluation Matrix | | | |SCORE | | |3 |Product Reliability |. 0 | 4 |. 8 |Important as product | | | | | | |reliability leads to good | | | | | | |reputation of dell | |4 |C. Relationship |. 10 | 2 |. 2 |Questionable | |7 |Leading tech |. 10 | 3 |. |Good ,but there are more | | | | | | |powerful technologies | |8 |Supply Chain |. 20 | 4 |. 8 |Excellent supply chain by | | | | | | |using dell direct model | |Internal weaknesses | | | | | | |1 |Little Product Diversification |. 20 | 4 |. |Focusing on laptop | | | | | | |manufacturing | |2 |No in house repair capability |. 10 | 3 |. 3 |Bad service | |3 |No Business Diversification |. 20 | 4 |. 8 |The company doesn't produce | | | | | | |anything rather than | | | | | | |electronics | |Total | | 1. 0 | |4 | | |6 | |5 |duration | |Opportunities (O) |O1. changes in life style |S1. strong brand name |W. 1 low variety of products | | |O2. technology innovation |S2. Huge capital investment |W. 2 low quality products | | |O3. Expand market share |S3. Affordable prices | | | |O4. New Market entrance |S4.High qualified employees | | |Treats (T) |T1. High competition | | | | |T2. finacail recession | | | | |T3. Market entrance (in Middle | | | | |East) | | | S1&O1 as dell has a very strong brand name dell can use its brand name in a way that affects changes in life style.For example entering a new product to compete with the I-pod. S1&O2 In the computer bossiness technological invention is created by the companied that do process the microchips such as Intel and AMD Dell just gives you the final product of the computer. Dell can use this to their advantage to collaborate with tease companies and create a technology that is only available to dell only. S1&T1 in the computer there is a lot of completion so dell can use their high qualified employees to compete with the other companies. W2&O4 one of the weaknesses of dell is their low quality products dell can use this to their advantage to enter new markets for example the African market. Porter’s model |Lower cost |Differentiation | |Broad target |Cost leadership |Differentiation | |Narrow target |Cost focus |Differentiation focus | It is believe that dell ha s more then 1 characteristic according to porter’s model dell has a lot of more products then Acer for example. Laptops, PCs, Monitors ext. While Acer only do laptops For this example dell is certainly in the differentiation for broad target row. While as in the case of Dell and Apple. Dell certainly has a cost leadership over Apple. I would also like to highlight something that in computers there is no cheap or expensive computers. It is all about the power you have in the computer. The more power you have the more expensive it would be. 6-Strategy Formulation 1.Corporate strategy Directional:- It seems that Dell Company is in the stability stage in its life cycle. Dell Company has achieved a lot in its years and is a very well know brand that is why you will find their brand name as strength in the TOWS Matrix. We also believe that the company uses 2 strategies in the stability bracket. It is always the case in the technology filed that if any company does something new a c ompetitor would at least do the same if not even better so in this case Dell is always on the look out for what their competitors do. The seconded strategy Dell uses is the profit strategy by cutting down any unnecessary expensive Portfolio:-Product line of dell 1. Laptops & Tablets 2. Personal computer &workstation 3. Speakers 4. Monitors 5. Monitors LCD 6. Keyboard 7. Mouse 8. Servers BCG Matrix | | | | | Relative Market Share | | | | | | | | | | |High 1. 0 | Medium . 50 | | | | | | | |Low 0. | | | | | | | | | |High +20 |Stars |Question Marks | | | | | |Speakers | | | | | | | | | | |Laptops & Tablets |Keyboard | | | | |Monitor LCD | | | | | | |Mouse | | | | | | | | | | | | | |Industry Sales | | | | | |Growth Rate | | | | | | | |Medium 0 |Cash Cows |Dogs | | | |Personal computers & workstations |Monitors | | | |Servers | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |Low -20 | | | Laptops where chosen as stars simply because they have a large market share and a high growth rate. The same is also on the LCD monitors because every computer needs a monitor. The other types of monitors which are the old style are considered to be almost obsolete therefore the original monitors where put in the dogs sector.As for the personal computers because most of the people prefer laptops the demand for personal computers over the years has dropped tremendously. There are more for custom users because you can get more power from a personal computer then a laptop therefore you can say that personal computers have a high market share while the growth rate is dropping. Speaker, keyboards, mice are all considered to be an essential for any computer there froe they have a high growth but a low market share as they are not specialist in these products. 2. Cooperative strategies Strategic alliance: Dell and Perot Systems Announce Strategic Alliance To Provide Fully-Integrated Virtualized Healthcare Technology Solutions To Reduce Cost and Improve Patient Care: Ne w Solutions will Promote Electronic Health Records (EHR) Implementation Dell and Perot Systems today announced a strategic alliance where their combined delivery teams will provide fully-integrated global IT solutions that unite their best-in-class technology and services solutions to provide virtualized desktop, storage and server solutions for hospitals, health systems and physician practices – virtualized on premises or hosted either off-site or in secure, private clouds. Dell, a leading technology provider to commercial enterprises around the world, and Perot Systems, the leading healthcare technology solutions provider in the U. S. , are jointly introducing their first series of innovative solutions that bring desktop mobility and virtual storage and server scalability to the Healthcare Industry at the HIMSS Annual Event in Chicago, Ill.These solutions are designed to help improve patient care and to help healthcare organizations achieve the standard of â€Å"meaningful use† for EHRs established in the American Recovery and Reinvestment Act (ARRA). TheNews: Mobile Clinical Computing †¢ Puts virtual technology in the hands of healthcare professionals at the point of care for improved clinical decision-making and efficiency †¢ Improves healthcare delivery with EHR implementation and usability †¢ Improves staff productivity by eliminating repeated, time consuming log-ins and improving application response time for remote users   †¢ Can reduce up-front capital expense and improve TCO Virtual Server Platform Simplifies the provisioning and scaling of health information systems, including servers and storage, by using standardized and virtualized public and private virtual computing environments †¢ Features structured technology assessment and consulting to optimize applications that will benefit most from virtualization   †¢ Addresses technology obsolescence issues by enabling dynamic compute workloads †¢ Ca n reduce up-front capital expense and improve TCO  Ã‚  Ã‚   †¢ Makes compute power a variable expense by aligning technology to business needs Virtual EHR Solutions †¢ Dell and Perot Systems will create hosted and secure private cloud-based EHR  alternatives to dedicated, on-premise EHR solutions †¢ Makes EHR adoption easier by eliminating the need to purchase, deploy and maintain hardware and software onsite †¢ Reduces up-front capital requirements and accelerates time to positive ROI †¢ Reduces burden of systems management for IT staff †¢ Simplifies the challenge of achieving â€Å"meaningful use† as defined in the ARRA Virtual Medical Archiving Solution Simplifies data management by storing patient records, images and other information in a virtual or secure private cloud environment †¢ Reduces capital outlay and total cost of ownership with world-class advisory and consulting services  Ã‚   †¢ Addresses myriad of healthcare ar chiving needs and budgets †¢ Scales as archiving requirements change †¢ Aligns cost and data availability to the regulatory requirements of various types of data produced in healthcare What this means for customers: †¢ Healthcare today is more sophisticated, with more cost pressures and operational complexity than ever before. Healthcare providers need secure access to reliable, real-time and easy-to-use information technology that enables them to obtain and manage treatment information, patient histories and other clinical resources to improve productivity and patient care while reducing costs. These new Dell and Perot Systems virtualized solutions will address these needs while simplifying and reducing the cost of EHR adoption so that healthcare providers can more easily achieve â€Å"meaningful use† for EHR Medicare and Medicaid incentive payments under the   American Recovery and Reinvestment Act of 2009 (ARRA). Quotes: Dr. James Coffin, vice president an d general manager, Dell Healthcare and Life Sciences:    â€Å"The role technology plays in shaping the future of healthcare around the globe has never been as important as it is today with medical professionals and government leaders looking for ways to improve the quality of healthcare and reduce its cost to citizens, employers and government.Our partnership with Perot Systems is focused on developing new solutions and delivering them in new ways to improve delivery of healthcare and patient outcomes. † Chuck Lyles, president of Perot Systems healthcare group: â€Å"In the current environment, clients are seeking solutions which improve services while reducing expenses. With the combined capabilities of Dell and Perot systems, these virtual solutions will increase user satisfaction and ease administration effort while reducing cost and preserving capital. † About Dell Dell listens to customers and delivers innovative technology and services they trust and value. De ll serves those who serve with next generation infrastructure for healthcare. About Perot SystemsPerot Systems is a worldwide provider of information technology services and business solutions. Through its flexible and collaborative approach, Perot Systems integrates expertise from across the company to deliver custom solutions that enable clients to accelerate growth, streamline operations and create new levels of customer value. Headquartered in Plano, Texas, Perot Systems reported 2008 revenue of $2. 8 billion. The company has more than 23,000 associates located in the Americas, Europe, Middle East and Asia Pacific. Additional information on Perot Systems is available at http://www. perotsystems. com/. http://content. dell. com/us/en/corp/d/press-releases/DellandPerotSystemsStrategicAlliance. aspx 3. Functional: Manufacturing and Operations at Dell | | | | | |Dell is committed to fully integrating environmental performance into overall business and operational management. Dell | |manufacturing and operations facilities around the globe maintain a strong focus on minimizing impact on the environment| |while providing a safe workplace environment for our employees. | |Dell's direct business model yields strong production inventory and capital investment efficiencies that translate into | |tangible benefits for the environment.Because all products are made to order, Dell currently maintains only three days | |of inventory for most parts and equipment, which keeps the environmental impact of warehousing to a minimum. Components | |and parts are only ordered and shipped to Dell when they are ready to be assembled into the final computer product, | |thereby saving energy and operational costs associated with storing inventory. | |Keeping our employees healthy and well is a high priority, and Dell is committed to providing a safe workplace for our | |employees. Dell's occupational health, safety, and wellness programs are designed to meet our employees' needs, | |motivating them to stay healthy and safe as they go about their daily activities both at work and at home.The | |Environmental, Health, and Safety team works closely with manufacturing, facilities, design, and process engineers, with| |a goal to continually improve the safety of our operations. | http://www1. euro. dell. com/content/topics/global. aspx/corp/environment/en/mfg_ops_main? c=ma=ar | Human resources : | |The Human Resources department has long been the Rodney Dangerfield of the enterprise. â€Å"I can’t get no respect! † the comedian | |complained to anyone who’d listen. And so it goes with HR in the enterprise. | |There are lots of reasons for this.For some of rank-and-file employees, HR embodies the pettiness of corporate life and a slavish | |devotion to inane rules and outmoded processes. Others see it in a more sinister light: the CFO’s enforcer that slashes jobs and | |benefits, all in service of the bottom line. | |Just three years ag o, a business magazine published an article  Ã¢â‚¬â€ â€Å"Why We Hate HR† — that portrayed HR executives as mindless | |bureaucrats. â€Å"I’m the cork in the bottom of the boat,† complained one HR director on a popular Web forum. â€Å"We get no respect until we | |save them from themselves and some of the bad choices they make when our back is turned,† said another. |Fortunately, at least at forward-thinking companies, that stereotype is as out of date as the secretarial pool on â€Å"Mad Men. † Many of | |today’s HR leaders are now accepted among the upper ranks of corporate leadership and act as trusted advisers to their CEOs. | |And increasingly, these HR leaders are turning to their enterprise IT colleagues to pry open the boardroom door and get the respect | |they deserve. A new generation of HR management tools makes it easier to find new talent, enable existing employees, and track trends | |that have an impact far beyond the HR department’s traditional boundaries. | |Of course, any competent HR executive uses the Internet to recruit and select employees.