Saturday, August 31, 2019

Differences Between My Best Friend and I

It’ is hard to believe that my best friend Kelly and I have a lots of differences. Even though, we love each other we are completely different In our personalities, work experience and how we take care of our family. We both have great personalities. Kelly and I have been friends since I was 5 years old. We went to the same school and stayed in the same class until we went to high school. For example, Kelly is very friendly and she has a great humor. She is very outgoing and love to talk with different people , even people she just Met .On the other hand, I am very shy and serious kind of person. I do not like to talk with other people. For these reason is hard for me to make new Friend . To illustrate that ,when we are invited to our neighbor birthday party , so we went to celebrate with his family and friends. The party was full of strangers and Kelly began to talk with those strangers. All I did was seat in the table alone and wait for someone to talk to me. Kelly came and start to introduce me to her new friends . I feel so proud of her , because if wasn’t for her , I never have the courage to introduce myself to them.Another example, is that Kelly and I have different kinds of works . She works as secretary and I work as house cleaner . She had this great job in Boston as secretary . It is near her house, she has a great salary and a month of vacation paid every year . Her job is so easy and she just have to answer the phone ,book appointments and be in the office the whole day. However, I work as house cleaner , it is very hard work by cleaning other people dirty houses. One of the problems is that I spend a lot of money on gas, cleaning products and vacuum repairs.My salary is not stable it depends in how many houses I clean every week. Paid vacation forget about it . Finally is our Family, that is the best and important gift that anyone can have . Kelly and I have a wonderful family, we both have kids and we have been married for 5 years. Kelly has two boys and one little girl, their names are Robert 10 years old, Nicholas 8 years old and Amanda 4 years old . I have three kids too ,instead, I have two girls keren 9 years old, Sarah 4 years old and a boy he is 12 years old. We both love Our family very much and we appreciate staying together with our family .Even though, Kelly prefer to stay home and be creative with her kids by doing crafts activities . I prefer to go outside and play with them . Last winter we went to Cocokeys Park and our kids got to play together and they had a terrific time . When the park was closing we decided to sleep at the hotel inside the park, again that was the best part for Kelly stay inside. Besides our differences , we both have a wonderful family and we always share with each other ways to raise and educate our kids. After all our differences we still best friends

Friday, August 30, 2019

Du Pont Case

The Lally School of Management & Technology Rensselaer Polytechnic Institute Rev. June 28, 2006 DuPont’s Biomax ®: The Push for Commercial Applications Biomax ®, a polyester material that can be recycled or decomposed, holds up under normal commercial conditions for a time period established in the product specifications.The material itself can be made into fibers, films, or resins and is suitable for countless agricultural, industrial, and consumer products: mulch containers, mulching film, seed mats, plant pots, disposable eating utensils, blister packs, yard waste bags, parts of disposable diapers, blown bottles, injection molded products, coated paper products, and many, many others. In the United State alone, where the average household creates over three tons of disposable waste each year, the number of potential applications for Biomax ® is immense.Its development represents a potentially huge business for DuPont and an important solution to the mounting problem o f solid waste in developed countries. In 1989 at the inception of the project, DuPont executives were pressing research units to find new products with commercial applications. One of these research units had-developed a new â€Å"melt-spun† elastomeric material and was seeking commercial applications through the Success Group, its business development unit. The initial target application was as a substitute for the tapes then used on disposable baby diapers, which at that time used more expensive DuPont Lycra for that purpose.Rather than lose that business, however, the division dropped the price of Lycra. The project had reached its first dead end. A senior research associate of the Success Group, Ray Tietz, had noted the degradable characteristics of this new material. â€Å"One of the problems they had with the fibers we made with this material was that it would disintegrate if you boiled it in water. This was because of the sulphonate in it. I knew that if I made a poly ester with this stuff in it, it would probably hydrolyze quickly. Iit might even be biodegradable. John Moore, the head of the Success Group, was a high energy â€Å"promoter,† as one colleague described him. He was determined to find a customer for whom degradability would be an important benefit-hopefully, a big one. A logical target was Procter & Gamble, a major vendor of disposable diapers. Procter & Gamble first introduced the disposable diaper in 1961 and by 1989 had built it into a huge business. Its success, however, coincided with a period of growing environmental This case was prepared by Mark Rice, Gina O’Connor, Richard Leifer, Christopher McDermott, Lois Peters, and Robert Veryzer, Jr. f the Lally School of Management and Technology, Rensselaer Polytechnic Institute, Troy, NY as a basis for class discussion, and is not designed to present illustrations of either correct or incorrect handling of management problems. All rights reserved  © 2000. To order c opies or request permission to reproduce materials, call 1-518-276-6842 or write Dr. Gina Colarelli O’Connor, Lally School of Management & Technology, Rensselaer Polytechnic Institute, 110 Eighth Street, Troy, NY 12180.No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means—electronic, mechanical, photocopying, recording, or otherwise, without the permission of the Lally School of Management & Technology. 1 DuPont’s Biomax ® awareness, and it didn't take long before the millions of used diapers sold by P and it imitators were attracting the attention of activists and regulators. By the 1980s, a growing number of voices were talking about either banning or significantly restricting the use of this class of products.Sensing the public mood and nervous about possible regulations, P was more than willing to listen to Moore's pitch about the new de- gradable material. It even rev ealed its interest in the development of an entirely new material, one that was both degradable, and that didn't have the â€Å"crinkly† feel of plastic or the â€Å"rustling† sound of paper. The diaper that P's people envisioned would be a laminate with a cloth-like feel on the inside and a waterproof film on the outside, and they encouraged DuPont to work on a prototype. Sensing a huge potential market, Moore's people were quick to oblige P. We spent a lot of research effort trying to make a degradable polymer that would be tough enough for the job,† Teitz later recalled. Months of effort produced a new laminated material that Teitz and others in the Success group thought would meet P&G's needs. Time and events, however, combined to work against them. Sensing that political pressure for restrictive regulation was on the wane, and that cost-conscious customers would not pay a premium for biodegradable materials, Procter & Gamble discontinued interest in the mate rial under development by Moore's development unit.From Degradable to Biodegradable The Success Group was now at a dead end. Furthermore, the standards for environmental acceptability were changing, becoming more stringent. Being degradable (i. e. , a substance that would disintegrate) had become passe; the new standard was biodegradability. Further, anything that passed itself off as biodegradable had to disappear in a reasonably short period of time. As of 1991, two years into the project, no one knew for sure whether DuPont's new material would qualify as biodegradable.Given these new conditions, senior management was concerned about John Moore's ability to command the respect of the technical community and decided to assign a new project manager, Ron Rollins. Credibility on the issue of biodegradability would be necessary for market acceptance. Obviously, no one would make a commitment to the new material until DuPont had firm data on its snack food appeal to microbes and on the rate at which it would disappear. Some suspected that the big opportunity with P&G had been missed because of the absence of solid test data.To test the material, which by this time had been registered as Biomax ®, and to assure the credibility of it data, the project recruited a highly respected company scientist on a parttime basis. Henn Kilkson was a DuPont Fellow with experience in biodegradation. His job was to design and implement a system for evaluating the biodegradation of the new material. The choice of Kilkson for this job was deliberate; he was, in fact, DuPont's representative to both an international committee and one formed by the American Society of Testing and Materials to set standards for biodegrabability.Before long, Kilkson's researchers were busily making and composting prototype diapers that incorporated the newly developed laminated material. Using a sludge composting facility in Fair- field, Connecticut as a test bed, researchers tossed the 2 DuPontâ€⠄¢s Biomax ® prototypes into the unsavory mess, and at the end of the composting cycle raked through the remains to observe the number and size of the remaining materials. This exercise determined the rate of disintegration, but never answered the question of biodegradability.Meanwhile, Kilkson found a European company that was actively involved in compost testing. A number of trials with Biomax ® samples were conducted; all indicated a favorable rate of biodegradation. However, Kilkson was not satisfied with the validity of these tests. Researchers also struck up a relationship with the city of Charlotte, North Carolina, which had a program for bagging and composing grass, leaves, and other yard wastes. The Charlotte facility used lots of manpower to empty bags of waste into a huge grinder and then transfer the ground waste to a composting pile.If employees could simply toss these bags into the grinder without having to cut them open and dispose of them separately, program mana gers reasoned that they could save substantially on labor costs. Of course, the ground up remnants of these bags would have to disappear — and quickly. The DuPont people gave the Charlotte facility a supply of net bags made from Biomax ® and enlisted their collaboration in testing biodegradable characteristics. Ideally, all remnants of these bags would be undetectable in less than a year.The bags themselves were made at a DuPont plant in Canada using a process introduced by a research associate in an- other laboratory. Employees in that tab were, like Rollins' people, also searching feverishly for commercially attractive projects that the operating units of the company would support. Results at the Charlotte facility were positive. Not only did the bags decompose quickly, but they degraded biologically as well. The Charlotte experiment gave the Biomax team something to cheer about. The bag-making plant in Canada was also elated; it too was looking for a big market to serve. Things were at last looking up. But real customers willing to write out real purchase orders were still illusory. Meanwhile, Down in the Banana Groves †¦ By 1992, the Ron Rollins' Success group had been disbanded and Biomax ® seemed destined to sit on the shelf—-one of many good ideas developed by DuPont scientists for which no market application could be found. Before this happened, however, the material caught the eye of Terry Fadem, head of the Corporate Development Group. Fadem thought that Biomax ® was worth another try.Even though a real customer had not signed on, the new polymer had two important features: first, no major capital investment would be needed to produce it in commercial quantities; and second, the potential market for a biodegradable alternative to the mountains of synthetic materials piling up in the industrialized world was huge-at least in the abstract. European consumer products companies, Fadem knew, were facing much stricter environmental controls than were their North American counterparts. The â€Å"Greens† were an active political force, particularly in Germany. Perhaps he could get some commitment from a European customer.According to Fadem, â€Å"I was of the opinion that if that didn't work, or if we didn't get some break in the market that was big enough, that we should either put the technology on the shelf or sell it off † So Fadem provided funds to support a small team of people working part time to keep the project alive As luck would have it, a break in favor of 3 DuPont’s Biomax ® Biomax ® appeared, but from a source that neither Fadem nor anyone else would have anticipated: the banana plantations of Costa Rica. Steve Gleich was a senior technical researcher working the DuPont's Research Division for Agricultural Products.A chemical engineer by training, Gleich was experimenting with different packaging systems for controlling the delivery of pesticides. One was by means of a wat er soluble â€Å"bio-disappearing† film, as he later described it. The pesticide was distributed evenly through the film; when the film became wet it disappeared into the soil, leaving the chemical behind. Thus, farm workers could lay lengths of the chemical-laden material over a row of strawberries, for example, and the first watering or rain would lay down a perfectly even and prescribed dose exactly where it was needed. Gleich was aware of the Biomax ® project.He was also familiar with work on biodegradables being conducted by a joint venture company owned by ConAgra and DuPont. One day, another packaging engineer told Gleich, â€Å"If you solve the banana bag problem down in Costa Rica, you'll be a big hero. † Banana bag problem? Gleich had no idea what he meant. So the engineer pulled a low-density polyethylene bag from his drawer. â€Å"They use millions of pounds of this stuff in the banana plantations,† he said. â€Å"They put a bag over every banana bunch. Some are impregnated with pesticides, but most are simply used as little hot-houses to ripen the fruit and protect it from bruises. This bit of information flipped on a switch in Gleich's mind. Millions of pounds of nondegradable polyethylene translated into two things: big revenues for the vendor and a massive waste disposal problem for growers. If a bag material could be designed to disintegrate and biodegrade at the right time, growers could eliminate major labor and waste handling costs. Working with contacts in Fadem's development unit, Gleich arranged to have 50 bags made from Biomax ® and sent down to a sales agent working with Delmonte's banana operation in Costa Rica.These bags were used to cover the fruit in the normal way and were observed over a 3-4 month period. As the bananas were harvested, the bags, now brittle, began to break apart into small strips and fall to the ground, where they could easily be raked up and composted. These first bags, however, turned brittle too soon in the cycle of fruit production, causing some bruising. So the enterprising researcher asked for another batch of bags — slightly heavier and formulated to come apart more readily.This second batch worked much better and Delmonte and its competitors, Dole and Chiquita, were soon expressing interest. They also wanted to explore applications for melons, strawberries, and other fruit. Ironically because of an internal squabble between the field manager and his counterpart at the head office, the field manager refused to install the redesigned banana bags and this application reached a dead-end. About this time Steve Gleich was assigned new duties within his business unit and his involvement in the Biomax ® project waned.The little band of part timers continued seeking applications. Some new potential agricultural applications emerged, but the project was going nowhere fast. Finally, Fadem convinced senior management to provide substantial corporate funding fo r a high profile advertising campaign soliciting inquiries. Approximately thirty serious responses were received. 4 DuPont’s Biomax ® They were deemed sufficiently promising that in 1996 Biomax ® was transferred out of development and into DuPont's polyester resins and intermediates business unit.When Fadem's team contacted the business unit manager to initiate the handoff, the manger asked where the prototype materials had been manufactured. She was surprised when Fadem told her that the prototype production had been done in her manufacturing facilities. Additional applications development work was required before significant production could be undertaken, and hence, even after the transfer, Terry Fadem's team remained involved. A product manager in the business unit was assigned the task of completing the technical and market development for Biomax ®.Unfortunately for the project, he had only just begun the effort when he was promoted. The project was at a standstill for almost a year until a new product manager was assigned and brought up to speed. The second product manager forced his team to assess the thirty plus leads that had been generated by the advertising campaign and to select four on which to focus. As of mid 2000, development of the product and the search for commercial applications continued. The new product manager was convinced that the first significant revenues were just around the corner. 5

Thursday, August 29, 2019

A Review Of Recent Evidence

A Review Of Recent Evidence PROJECT MANAGEMENT EMERGED FROM DIFFERENT FIELDS OF APPLICATION INCLUDING CONSTRUCTION, ENGINEERING, TELECOMMUNICATIONS, AND DEFENSE AS A DISCIPLINE. THE 1950S MARKED THE BEGINNING OF THE MODERN PROJECT MANAGEMENT ERA. BEFORE 1950S, PROJECTS WERE MANAGED ON AN AD-HOC BASIS USING GANTT CHARTS, OR INFORMAL TECHNIQUES AND TOOLS. PROJECT MANAGEMENT IS THE DISCIPLINE OF PLANNING, ORGANIZING, SECURING AND MANAGING RESOURCES (I.E. MANAGEMENT) TO BRING ABOUT THE SUCCESSFUL COMPLETION OF SPECIFIC PROJECT GOALS AND OBJECTIVES. B: DISCUSS PROJECT MANAGEMENT SYSTEM ELEMENTS ONCE PROJECT MANAGEMENT IS PUT IN PLACE ORGANIZATIONS GET THE NECESSARY TOOLS AND INFORMATION THAT ARE NEEDED TO COLLABORATE AND MANAGE THEIR WORKLOAD AS A TEAM. FOLLOWING ARE THE KEY ELEMENTS FOR BETTER PROJECT MANAGEMENT: 1. CLASSIFY -DEFINE THE TYPE OF WORK: IT HELPS EVERYONE UNDERSTAND WHAT NEEDS TO BE DONE E.G. NEW FEATURE, ACTION ITEM, DEFECT ETC. 2. TARGET -TARGET SETS YOUR PROJECT ¿Ã‚ ½S MILESTONES. MEASURING PROGR ESS IS EASY WITH METRICS WHEN REMAINING TASKS AND ISSUES CAN BE RELATED BACK TO THE PLAN, KEEPING TEAM MEMBERS FOCUSED AND WORKING TOWARD A COMMON GOAL. 3. PRIORITIZE – EACH TEAM MEMBER SHOULD UNDERSTAND THE PRIORITY SYSTEM. 4. COLLABORATE -RIGHT TASKS BE ASSIGNED TO THE RIGHT PEOPLE. MAKE SURE THAT OWNERSHIP BE CLEAR AND REASONABLE. WORKLOAD HAS TO BE BALANCED AND FAIR AND IT SHOULD BE EASY FOR PEOPLE TO GET HELP IF NEEDED FROM OTHER TEAM MEMBERS. 5. CHECK STATUS -TASK STATUS SHOULD BE REGULARLY TRACKED. IT SHOULD BE EASY TO SEE WHAT IS COMPLETED, WHAT REMAINS TO BE COMPLETED, AND WHAT ISSUES EXIST. 6. TRACK COMPLIANCE – KEEP A COMPLETE HISTORY FOR EVERY TASK. IT HELPS YOU UNDERSTAND WHAT ISSUES REMAIN, HOW TO IMPROVE YOUR PLANS, UNDERSTAND AND CORRECT PROCESS ISSUES, AND COMPLY WITH APPROPRIATE INDUSTRY STANDARDS LIKE ISO9000 CERTIFICATION ETC. C: DISCUSS EXTERNAL AND INTERNAL ENVIRONMENTAL ELEMENTS INFLUENCING PROJECT MANAGEMENT PROJECT MANAGEMENT CAN BE AFFECTED BY THE INTERNAL AND EXTERNAL FACTORS IN A BUSINESS ENVIRONMENT. THE EXTERNAL FORCES THAT AFFECT PROJECT MANAGEMENT INCLUDE SOCIOLOGICAL, POLITICAL, ECONOMICAL AND TECHNOLOGICAL. EXTERNAL FACTORS: 1. SOCIOLOGICAL: IT INCLUDES THE DEMOGRAPHIC STATUS, TRENDS, WORK ETHICS, PERSONAL VALUES, AND GENERAL CULTURES. THESE FACTORS INFLUENCE DIFFERENTLY ON HOW A PROJECT MANAGER ACCOMPLISHES ITS GOALS. THE SOCIAL ENVIRONMENT IN EACH COUNTRY IS UNIQUE AND AS THE BUSINESS BECOMES INTERNATIONAL, MANAGEMENT HAS TO UNDERSTAND THESE UNIQUE ENVIRONMENTS IN ORDER TO PLAN FOR THE FUTURE AND DESIGN PRODUCTS FOR A PARTICULAR GROUP OF PEOPLE. 2. ECONOMIC AND POLITICAL: IT INCLUDES THE ESSENTIAL FACTORS SUCH AS COMPETITORS, SUPPLIERS AND CUSTOMERS. PROJECT MANAGEMENT MUST STUDY THE ECONOMY AND POLITICAL ENVIRONMENT FOR A CONTINUAL AND DYNAMIC RELATIONSHIP. BY STUDYING THE COMPANIES, SUPPLIERS, COMPETITORS, CUSTOMERS AND CURRENT POLITICAL FACTORS, THE MANAGEMENT IS CAPABLE OF MAKING EFFECTIVE MANAGERIAL DECISI ONS. THUS THE PRODUCTS DESIGNED UNDER THIS POSSES PLACE, FORM AND TIME UTILITY TO SUCCEED IN THE MARKET PLACE. 3. TECHNOLOGY: TECHNOLOGY HAS THE MOST DRAMATIC EFFECT ON PROJECT MANAGEMENT AS ANY CHANGE IN THIS EXTERNAL ENVIRONMENT IS OFTEN QUICKLY FELT BY FIRM. AS THE MARKET CAN CHANGE OVERNIGHT THE PROJECT MANAGEMENT SHOULD BE IN A POSITION TO MAKE DECISIONS THAT WILL PUT THE COMPANY IN A FLEXIBLE POSITION TO ADAPT WITH THE TECHNOLOGICAL CHANGES.

Wednesday, August 28, 2019

Rain and Humidity Assignment Example | Topics and Well Written Essays - 750 words

Rain and Humidity - Assignment Example Answer: As the saturation vapor pressure varies directly with temperature, the relative humidity varies inversely with temperature. If no water vapor were added to or removed from unsaturated air, the relative humidity increase as the temperature drops and decreases as the temperature rises. That’s why the air temperature usually rises from a minimum during sunrise to a maximum during early to mid-afternoon on a clear calm day. Question 7. Why does the amount of precipitable water vary with the mean temperature of the troposphere? Answer: The average precipitable water decreases with latitude in response to the pole ward decline in the mean air temperature because evaporation and precipitable water are lower in cold regions. Precipitable water varies from 4.0 cm in the humid tropics to less than 0.5 cm at the Polar Regions. When troposphere in middle and high latitudes is warmest during summer, the amounts of precipitable water are highest. Question 9. Why are clouds and precipitation more likely on the windward slopes of a mountain range than the leeward slopes? Answer: Air that is forced to ascend the windward slopes expands and cools which increases its relative humidity. On sufficient cooling, saturation is achieved and clouds and precipitation develop.... Question 10. What is the significance of a rain shadow for agriculture? Answer: A rain shadow with semi-arid to arid conditions is considered to be the boundary between dry land and rain-fed agriculture. This climate contrast affects the indigenous plant and animal communities, domestic water supply, demand for irrigation water, types of crops that can be grown, and requirements for human shelter. Chapter 6, Critical Thinking Questions Question 2. How and why does the moisture content of the top soil affect the maximum air temperature in the lower troposphere? Answer: Solar radiation heats up the ground surface that transfers heat and moisture from top soil to the atmosphere. This heat and moisture transfer between earth’s surface and the atmosphere occurs by sensible heating (conduction and convection). The heated air has much more capacity to hold moisture content than cooler air. The release or absorption of latent heat affects temperature in the lower troposphere. The asce nding humid air currents also expand and cool influencing the surrounding ambient air temperature. The evaporated moisture content from top soils also adds to the green house effect by trapping more infrared radiation. Question 3. In late autumn or early winter, cold air flows on northwest winds from snow-covered ground across the ice-free waters of Lake Superior. Describe the changes in temperature, vapor pressure, and stability of the cold air as it flows over the lake. Answer: In late autumn or early winter, the ice free waters of Lake Superior are warmer compared to the cold air masses flowing from the North West. When this cold air passes over the lake, the lower levels of the atmosphere take up excessive moisture and heat. The

Tuesday, August 27, 2019

Monet and his painting Water Lilies Essay Example | Topics and Well Written Essays - 1750 words

Monet and his painting Water Lilies - Essay Example This essay tells us about the painting, â€Å"Water Lilies,† by Claude Monet, a great masterpiece, which carries several elements of expression to the spectator. More important, this particular painting uses different techniques and ideologies to make a statement within the society and the culture which Claude Monet was in. The different concepts which Monet used in this particular painting were a part of a series which was able to show a true reflection and impression of nature as well as the shifts which were occurring during Monet’s time. However, it is the aesthetics that Monet uses in this piece that allows it to become a masterpiece and which has allowed it to stand out from a variety of paintings for a longer time frame. The painting of â€Å"Water Lilies† is one which shows Claude Monet’s personal philosophies and which reflects the time frame. This particular painting was a part of a series of water lilies which were painted from 1906 to 1926. The others are placed in various museums throughout the world. The brush strokes that are used with this specific painting are thicker in texture and include wider and long strokes that create the reflection of the leaves, water and the look of the lilies. This is combined with the shading which is created through the use of the oil paints, specifically which can be seen in the layers of the piece. The shading of the painting is not from light and dark, but instead comes from a darker and lighter mixture with each of the colors used. Content The content that is used by Monet is of the water lilies that are by a specific water body. The piece works as an Impressionist piece, which was used commonly by Monet as one which was defined by a glance or look at a specific scene at a given time. The impression which was left with the main look was what was painted, as opposed to manipulating or changing the textures that were with the piece of work. The impression is important to note because i t defines elements that are not a part of the main expressions which an artist is trying to convey. Instead, the expression and message is sent through the natural scenery and the moment which is caught in the painting. It is this natural setting that is able to capture specific characteristics and relay a given message to the audience (Werner, 3). The Impressionism in this piece comes from looking at the water lilies and seeing the reflection and movement of the water. When looking at this piece, it can be seen that the impression was left with the water lilies, which stayed still in the water and which are seen by the layers of paint and color. The brush strokes of the water lilies are smaller and move upward, which creates a sense of stillness with the subject. The reflection of the leaves are seen with several layers of shading and with long brush strokes, which makes the eye move from one end of the canvas to the other. The portrayal of the water moves in the same way, which ma kes the water look like it is swaying or moving forward. Even though the water lilies are only on the right hand corner and left hand bottom corner, the changing brush strokes cause the eye to see the lilies as constant and not moving, despite the changing reflections and movement of the water. The content then leaves an impression on the natural elements and the characteristics, which show the lilies as a constant in the continuous changes of the water. Iconography The icons which are presented from the water lilies become important with this picture as well as the other subjects of water lilies which

Monday, August 26, 2019

Corruption and Multi-National Corporations Essay

Corruption and Multi-National Corporations - Essay Example Legally, facilitation payment is not allowed in the United Kingdom. However, it is allowed legally to certain extent in the United States (Special Cases, 2009). The issue of facilitation payment becomes specially challenging when doing business with a foreign country. The laws in a different country may or may not be similar to those your own country. Hence, this issue has to be studied clearly and carefully before deciding on its legal implications. Multi-national corporations operate in different countries all over the world. So it is not possible for them to work under one set of rules. Their memorandum of association must tally with the laws and customs of the host countries. They also have to do business with customers in the host countries as well as overseas. This makes the situation of facilitation payments more complicated if flexibility is not maintained (Special Cases, 2009). Research show that majority of multi-nationals have indulged in facilitation payments although they same majority would prefer not to make these payments. This is a catch-22 situation with the giver and taker harboring guilty conscience and yet performing the act in the larger interest of business (Gordon, Kathryn and Miyake, Maiko; 2001, p3) "Bribes can come in all sizes. ... ch-22 situation with the giver and taker harboring guilty conscience and yet performing the act in the larger interest of business (Gordon, Kathryn and Miyake, Maiko; 2001, p3) "Bribes can come in all sizes. The media likes to highlight the more flagrant examples, but the smaller, everyday forms often go undetected. In the past, governments have overlooked facilitation payments. Western lawmakers assumed that such payments were simply unavoidable, a necessary part of doing business abroad" (Wrage, Alexandra; 2009). Nonetheless, the issue does not stop at that. Time and again, facilitation payments have reached the courts and resulted in destabilizing outcomes. Daewoo is an example of a major multi-national firm collapsing owing to financial irregularities (Daewoo corruption scandal deepens, 2001). However, facilitation payments continue to be made the world over. How do these payments reflect in the eyes of the law Morally, facilitation payments, whether big or small, are wrong. But these payments are given and received in different and ambiguous ways and bypass the law. They may simply be given under the nomenclature of a gift or in the form of entertainment. International businesses have accepted it as a necessary evil. And it does appear that it is prospected to stay this way for a very long time to come (D'Ascenzo, Michael; 2008). By and large, in most countries, facilitation payments are tolerated if the sum involved is small. Nobody is inclined to run to the courts on small amounts spent on getting business. However, it is large facilitation amounts that can cause trouble. Large amounts not only cause legal hassles, they can even destabilize the concerned corporation. It is not healthy for large corporations to be paying out large facilitation amounts as these

Sunday, August 25, 2019

Invasion of Privacy in the Business World Research Paper

Invasion of Privacy in the Business World - Research Paper Example In business, there are two approaches to privacy; consumer protection and free market. In free market, commercial organizations are allowed to make the major business decisions based on idea that the consumers will do business within the desired degree of privacy (Francis, 1991). If some organizations do not sufficiently maintain privacy of their operations, then they lose competitive advantage and ultimately lose the market share. This occurs when an organization fails to offer favorable privacy option to its clients or by failing to provide sufficient information of the privacy practices that it carries out. Usually consumers are unable to claim the violation of privacy made by organizations. The consumer protection approach advocates more defined protection policies and heir enforcement by the government (Rosen, 2010). The reason is based on the idea that individuals do not have time or the knowledge to make decisive choices or they are not aware of alternatives available.In the U nited States privacy is not explicitly guaranteed by the Constitution. It has been implicitly mentioned in the 4th, 5th and 14th amendments of fundamental freedom right that ensures protection of citizen from government intrusion and interference. In addition, Common Law appears to recognize some degree of protection of privacy of information.In 1970, the Fair Credit Reporting Act was passed to law, to ensure that customers were protected from information gathered from them by the private sector.

Critically discuss, with examples, the contributions that Managing Essay

Critically discuss, with examples, the contributions that Managing Diversity policies can make to the promotion of equality in organisations - Essay Example Major differences like race, age, culture and gender are obvious but some difference (perceived differences) like personality and lifestyle, which change frequently on experiences and relationships, can be complicated to make out. The examination of these differences has to be done in a positive, nurturing and safe atmosphere. [2] â€Å"Diversity goes beyond employment equity to nurturing an environment that values the differences and maximizes the potential of all employees, one that stimulates employee creativity and innovativeness.† (U.S. Merit Systems Protection Board (U.S. MSPB), 1993) The term diversity management in business can be defined as a firm which employs heterogeneous workforce (like different generations, gender, race, age etc) and creates such an atmosphere that works for all employees. In order to manage the diversity successfully, an organization must commit to maintain and create such a working environment that respects all the employees, acknowledging the perspective and the diverse talents of individuals. Organizations gain competitive advantages through low turnover, high motivation, less internal conflict and more job satisfaction if their workforce diversity is well managed. A diverse workforce enables an organization to better meet the requirements of their customers. Different new ideas are brought to the organizations by diverse employees, which help them in solving various complicated problems. â€Å"Managing diversity is a process of creating and maintaining an environment that naturally encourages all individuals to reach their full potential in pursuit of organizational objectives.† (Jenner, 1994; Thomas, 1994 in Dagher & DNetto, 1997) Workforce diversity is becoming a major issue which is faced by the managers of the twenty first century. Few of these issues are differences in ethnicity and languages which caused breakdown in communication, increasing number of women in workforce and the ageing population holding the job

Saturday, August 24, 2019

Performing and Visual Arts Essay Example | Topics and Well Written Essays - 500 words

Performing and Visual Arts - Essay Example There are different kinds of music such as the rich music, dark; in fact, the form of the music is determined by the musician in terms of the sounds. On the other hand, during the Baroque period there was a culmination of the masterworks from composers like J.S Bach and G.F Handel. There was a development of new styles of music during the mid-eighteenth century, which was facilitated by Bach and Handel. Some of the developed musical styles were like the Rococo and pre-classical styles. During the Classic to Romantic, there was a discernment of these musical styles by composers such as Beethoven with symphonies, pianos and string quarters (Zuhur, 1988). As a creator of visual and performance art, one uses numerous elements to depict their thoughts through music or painting. For example, there are two-dimensional objects established in painting or three-dimensional objects, where the artist employs different elements. Moreover, from one point to the other is delineated by the elements in painting through the primary elements (Buck & Schoenberg, 2008). On the other hand, as a performer, one has a role of presenting their acts to the audience, and this can be scripted or unscripted, or it is random or orchestrated. It can also be planned or spontaneous and in some cases, the audiences are present or absent. Finally, the experience of an audience relates to the welcoming the performers, and there are instances where get involved actively in the performance and sometimes they are not witty. The value of  visual and performing art relates to the knowledge and meaning that is offered which cannot be gathered from other sources and subjects. Moreover, the visual and performance art applies a perspective, which is based on judgment, invention, imagination (Reed, 2009). In fact, the integration of visual and performing art in education offers a chance for envisioning the set

Friday, August 23, 2019

LIFE CYCLE - PLASTIC BAGS Essay Example | Topics and Well Written Essays - 2250 words

LIFE CYCLE - PLASTIC BAGS - Essay Example They are portable, light weight, reusable and easily disposable. However, use of plastic bag has always been a controversial issue given it affects the animal and marine life in many adverse ways and is conventionally manufactured from non-renewable natural resources. Besides, there are many other concerns associated with the use of plastic bags that are of huge significance to the environment and ecology. Use of plastic bags has been globally condemned and criticized with reasonable arguments. This paper elaborates the life cycle of plastic bags and critically analyzes the environmental effects of each stage of their life cycle. Furthermore, various alternatives that can help eliminate the draw backs of plastic bags while maintaining the capacity to deliver the same usability are also enlisted in the paper. All bags are supposedly light in weight, so they inflate once air is filled in them. This property is not limited to just plastic bags. Indeed, all bags irrespective of their material are light weight, and this property fundamentally makes them suitable for use in everyday life for all purposes. However, plastic bag has a significant edge over other types of bags in that they are purely impermeable and are often transparent. This is what differentiates plastic bags from other bags because they offer the user the ease of carrying liquids which many other types of bags do not. The strength of plastic bags is much more than that of a paper, so they are used for carrying significantly larger weights than other bags. Plastic bags are good in resisting tensile stresses. They bear sufficiently larger tensile forces than any other kind of bag. This makes them the best carrier among the variety of carriers available. They come in a variety of sizes. â€Å"Small bags have lower visibility th an large bags and thin light (HDPE) bags snag more easily than heavier (LLDPE) bags.† (Verghese, Jollands, and Allan, 2008, p. 10). In order to estimate the impact

Thursday, August 22, 2019

Betrayal in Julius Ceasar Essay Example for Free

Betrayal in Julius Ceasar Essay When a person is betrayed by someone he or she loves, something profound happens in the heart of the betrayed person. It is not simply that someone has let you down, or double-crossed you. Rather, the betrayer has done an action or taken special information and used it to harm you. The betrayer has held a position of confidence of your most sacred secrets, and then they treat those secrets as if they are to be exploited. A betrayer is a person who knows your heart and has ripped into that heart and ripped out that heart by exposing and exploiting your vulnerabilities. Betraying another person has become okay in modern day society due to the fact that we feel that we need to preserve ourselves, we have to defend our personal relationships with others, and we must always serve the greater good. In today’s society, people are focused on self-preservation when it comes to the betrayal of others. If a person feels that his life, his ego, or his friendships will be jeopardized by another person, he is most likely not afraid to betray another person. This is much like jealousy. We as people feel that we are never good enough. We want to be better than the person next to us, but when that doesn’t happen we feel that person needs to be expelled. In the novel Julius Caesar this is exactly what Brutus does to Caesar. He was afraid that Caesar would outshine the Triumvirate. Brutus killed him, thinking that maybe it would make him look better. This never worked out Brutus. Instead, everyone hated him. His self-preservation was the reverse psychology of what we as people think that betrayal will do for us. Another way that our society views betrayal is with our personal relationships with others. This can be summed up in one word: trust. Humans use trust as a comfort factor. We are always seeking the opportunity to ensue trust in the people in our lives. Betrayal is always ready to mess this up. If we feel that we cannot trust someone we betray them. This is what Caesar’s friends did to him. No one wanted to believe that they could trust him. So what did they do? They betrayed him. The last factor in betraying another person is for the greater good. Brutus believed that by killing Caesar that he was serving the people. He thought that is what they wanted. Just because he was afraid of Caesar he believed that everyone thought the same. The thought was that he would become king and that was very frightening to Brutus. Service to the greater good is a factor of betrayal that is used by many people. We do it because we think that we are able to protect others. Many times this form of betrayal does not do any good because it is done for the wrong reasons. Betraying another person has become okay in modern day society due to the fact that we feel that we need to preserve ourselves, we have to defend our personal relationships with others, and we must always serve the greater good. When a person is betrayed by someone he or she loves, something profound happens in the heart of the betrayed person. It is not simply that someone has let you down, or double-crossed you. Rather, the betrayer has done an action or taken special information and used it to harm you. The betrayer has held a position of confidence of your most sacred secrets, and then they treat those secrets as if they are to be exploited. A betrayer is a person who knows your heart and has ripped into that heart and ripped out that heart by exposing and exploiting your vulnerabilities. Betrayal is found in many different forms of literature, especially the novel Julius Caesar.

Wednesday, August 21, 2019

Male and Segmentation Base Essay Example for Free

Male and Segmentation Base Essay Introduction: In this assignment I am going to describe the customer profile for each of the five target groups for product/service and explain how and why these groups are targeted. 1.Product: IPhone 5 Segmentation base: Demographic, Psychographic/ Age, Social class, Target market: Teenagers and Adults Customer profile: Aged mainly between 18+, aimed at both male and female, medium/ high class How/ Why targeted * Product: IPhone 5, mainly used for calling/texting or communicating with others, also used for pictures, music and downloading apps. * Place: T-Mobile, Carphone warehouse, Phones4u, Tesco * Promotion: This product can be promoted through TV advertisement, posters, internet, and leaflets. By promoting this product, more people can then find out about it and it will get more popular which means that more people will be buying is. * Price: The price of IPhone 5 is from  £499  £529 2.Product: Colgate Toothpaste smiles Segmentation base: Benefit segmentation / needs, safety, esteem Target market: Children Customer profile: Aged mainly between 2-6 years old, aimed at both male and female, How/ Why targeted * Product: Colgate Toothpaste smiles is only used by children aged 4 to 6 as it is not a strong as adult’s toothpaste and it has a mild flavour. * Place: Boots, Superdrug’s, Tesco * Promotion: This product can be promoted through TV advertisement, posters, internet, and leaflets. By promoting this product, Adults/ mothers might consider in buying it if they have young children. * Price: The price of Colgate Toothpaste smiles is  £1.32 3.Product: Gucci by flora perfume Segmentation base: Demographical, psychological/ age group, gender, enjoys shopping Target market: Females Customer profile: Aged mainly between 16+, aimed at females. How/ Why  targeted * Product: Flora by Gucci perfume is only used by females as the smell is not as strong as males perfumes. * Place: Superdrug’s, Boots, Pharmacies. * Promotion: This product can be promoted through TV advertisement, posters, internet, and leaflets. By promoting this product, Females will be interested in buying the perfume as the brand is very popular. * Price: The price of the perfume can be between  £40 to  £72 4 .Product: Ford Segmentation base: Psychological, Demographical / lifestyle, enjoys shopping, age group, family size, Target market: young adults/ adults Customer profile: Aged aimed at 16 and over, aimed at both males and females. How/ Why targeted * Product: Ford cars are used by young adults and adults 16+ as it is illegal for anyone younger that this to be driving a car. * Place: The cars can be bought from their website, Auto trader * Promotion: This product can be promoted through TV advertisement, posters, internet, and leaflets. By promoting this product, people that are interested in buying a new car, can then go and visit one of their stores and buy a car. * Price: There are different prices for every car it can start from  £8,000  £20,000 and over. 5.Product: Disney Princess puzzles Segmentation base: Demographic, psychological / activities, interest, hobbies, age group, gender. Target market: female children Customer profile: Aged mainly between 4 5 Years old, aimed at females. How/ Why targeted * Product: Disney Princess puzzles is only used by female children aged 4 to 5. * Place: Argos and WHSmith * Promotion: This product can be promoted through TV advertisement, posters, internet, and leaflets. By promoting this product, parents and guardians might be interested in buying something for entertainment for their child or for a present. * Price: The price of the puzzles can be different depending on the size, but it will be around  £5 to  £10. Business-to-business market Costco to Corner shops 6.Product: Coca Cola Segmentation base: Geographical; region, area of the country, city Target market: males and females Customer profile: Aged mainly between 10+, aimed at males and females. How/ Why targeted * Product: Coca-Cola * Place: Corner shops could buy stacks of Coca-Cola from Costco as it is cheaper to buy it from there. * Promotion: This product can be promoted through TV advertisement, posters, internet, and leaflets. By promoting this product, people are more likely to go to Costco and buy it from there as it will be more cost efficient. * Price: 1 bottle of Coca Cola is  £1.99 at Corner shops, whereas if they go to Costco they will spend less as there will be 8 bottles of 1/2 litre for only  £6.25 Wilkinsfoods to Tesco 7.Product: Eggs Segmentation base: Geographical; region, area of the country, city Target market: males and females Customer profile: any ages, aimed at males and females. How/ Why targeted * Product: Eggs * Place: Tesco * Promotion: This product can be promoted through their website, leaflets and radio. By promoting this product, people will find out about this farm, and Tesco might consider in buying their eggs as they cheap. * Price: It depends on how many eggs the organisation wants; Small, medium, large and very large and come as standard packed into keyes trays (15 dozen outers or 30 dozen outers). Conclusion: In this assignment I have described the customer profile for each of the five target groups for product/service of Tesco’s and Car manufacturer and have explained how and why these groups are targeted.

Tuesday, August 20, 2019

Cryptography and Steganography For Secure Communication

Cryptography and Steganography For Secure Communication Combination of Cryptography and Steganography for secure communication is a tool that combines both Cryptography methods and Steganography techniques for secure communication. The application is a cross-platform tool that can be effectively hide a message inside a digital video file. In the field of data communication, security has the top priority. Cryptography is one of the technique for secure plain text messages. Cryptography makes the necessary elements for secure communication namely privacy, confidentiality, key exchange and authentication but reveals the fact that communication is happening. Steganography takes cryptography a step farther by hiding the existence of the information. Steganography plays a vital role in the data communication field in the future primarily in computer security and privacy on open systems such as internet. The figure below[1], gives different applications of Steganography. Protection against detection (Data hiding) and protection against removal (Document Marking) are two major areas Steganographic methods are used. Steganographic Data hiding algorithms allows user to hide large amounts of information within digital files like Image, audio and video files. These forms of Steganography often used in conjunction with cryptography adding layers of security. The Other major area of Steganography is document marking where the message to be inserted is used to assert copyright over a document. This can be further divided into watermarking and fingerprinting. Copyright abuse is the motivating factor in developing new document marking technologies like digital watermarking and digital fingerprinting. Digital Watermarking is a way to hide a secret or personal message to protect a products copyright or to demonstrate data integrity. Digital Fingerprinting  is an emerging technology to protect multimedia from unauthorized redistribution. It embeds a unique ID into each users copy, which can be extracted to help identify culprits when an unauthorized leak is found [2]. Neither Cryptography nor Steganography is a turnkey solution to privacy of open systems. To add multiple layers of security it is always a good practice to use both Cryptography and Steganography together. While performing Cryptography we should know two formulas ( Cipher formula, Decipher formula). Rationale: To make the communication more secure in this application we are implementing three layers of security like Steganography, Cryptography and Compression. The application first compresses the word document with secret message, and then encrypts the compressed file and uses the resulted file as the secret message to hide in the digital video file generating a Stego-object. The intended receiver de-embeds decrypts and decompresses the Stego-object respectively to get the hidden message. This paper also attempts to identify the requirements of a good Steganographic algorithm and briefly reflects on different types of steganalysis techniques.The application uses Tiny encryption algorithm and Discrete Cosine Transformation-Least significant bit algorithm for implementing Cryptography and Steganography respectively. The outcome of this project is to create a cross-platform tool that can effectively hide a message (i.e. Word document) inside a digital video file. It is concerned with embeddin g information in a secure and robust manner. REVIEW OF RELEVANT LITERATURE Background to subject of study: The idea of building this tool is to make the communication is such a way that no one can detect the message inside the stego-object. Earlier we have tools for different tools for Steganography and Cryptography. In this tool we are implementing three layers of security (Steganography, Cryptography and Compression) so that the communication can be more secure and all can be done in a single tool instead of using three different tools. Steganography has came into usage in 1990s and it is still using in many ways by Governments, Private citizens, Business and Terrorist organizations for communication to share information and passwords. Cryptography came into consideration in 18th century. The goal of cryptography is to make it possible for two communication entities to exchange a message in such a way that no third party can understand the message. Cryptography has been implementing from many days, in the World war Germany and USA. They have used it in sharing messages and implemented machines to implement cryptography. Examples and critique of current research in the field: There are many tools that are implementing Steganography now a days. The SARC (Steganography Analysis and Research Center has implemented three tools in steganography like Steganography Analyzer Artifact Scanner, Steganography Analyzer Signature Scanner and Steganography Analyzer Real-Time Scanner. The Steganography Analyzer Artifact Scanner detect files and registry entries associated with steganography applications where as Steganography Analyzer Signature Scanner detect files containing steganography and extract the hidden information and the Steganography Analyzer Real-Time Scanner detect steganography artifacts and signatures in real-time over a network. S-Tool is also one of the steganography tool that is using now a days. Its free to download and hides the data in an image or sound file. It compresses the data before encrypting and hides it in a image file or audio file. PILOT RESEARCH STUDY Hypothesis: As sending the message will be easy for unauthorized persons to detect the information in the situations like passwords sharing and confidential information sharing. So for that we have methods that can make the information secure. By using Steganography and Cryptography techniques we can share the information more securely by hiding the information in other files. Even though we have some risks that are involved in these techniques we can be rectified to certain extend by using this tool. Research method: This application is implemented for secure transmission of data. In this application we have three layers of security like compression, Cryptography and Steganography. We are using different type of algorithms in Cryptography and Steganography so that the hackers cannot identify which algorithm is supposed to be used. In secret key Cryptography several algorithms are in operation like Data Encryption Standard (DES), Rivest Chipers (aka Rons Code), Advanced Encryption Standard (AES), Blowfish and CAST-128/256. In public key Cryptography we have Elliptic Curve Cryptography(ECC), ElGamal, Digital signature Algorithm (DSA), Diffie-Hellman and RSA algorithms mostly isong now a days. In hash function in Cryptography Hash of variable length(HAVAL), Tiger, RIPEMD, Secure Hash Algorithm (SHA) and Message Digest Algorith(MD) are in use. Tiny Encryption Algorithm is also one of the Feistel Cipher encryption algorithm that was designed in 1994 is used in Cryptography that uses mixed orthogonal algebraic groups like ADD, SHIFT and XOR. In steganography we are using different Steganographic methods for hiding information into a video file like LSB (Discrete Cosine Transformation-List Significant Bit Encoding). Each frame in a video file holds a piece of secret message. Cryptography use cipher algorithm for encryption and decryption of data. In the previous decades they were used ciphers like Scytale Transportation Cipher, Caesar Substitution Chiper, Zodiac Chiper and Vigenere Polyalphabetic Substitution. Both Steganography and Cryptography are data security techniques, but the cryptography is implemented to data unread and Steganography in for data unseen. Steganography can use Cryptography where as Cryptography cannot use Steganography. Steganography implemented to Cryptographic data will increase in security level. Initial Results: In this application i am implementing three layers of security to make the information more secure. There are no any tools that implementing all the three layers like compression, Cryptography and Steganograpy. We have tools for steganography like S-Tool and for Cryptography. By using one tool instead of using three tools will save time and money with more security. This is the basic advantage of this application. The help document will guide in Interface. OUT LINE OF PROPOSAL Aims of the Investigation: The aim of this paper is to describe a method for integrating together cryptography and Steganography for secure communication using a Video file. The proposed system first compresses the secret message (i.e. word document) and then implements cryptographic algorithms to the compressed message. The resulted file is used as the secret message to be hidden in the digital video file. Once the video file is embedded with the secret message, it is sent to the intended receiver. The video file should be de-embedded, decrypted and decompressed to get the original secret message hence, adding three layers of security to the communication. I am going to design a good Graphical User Interface (GUI) with help notes so that anyone can understand ahout the application easily. Research Objectives: The objective of this project is to hide secret messages (e.g. Text Phrase, word document) inside other harmless messages such as Image and Video file, in a way that does not allow any third party to even detect that there is a second secret message present in it. The application implements this by combining the Steganographic methods with Cryptographic techniques (i.e. Encryption, decryption) to make the transfer more secure. It is concerned with embedding information in a secure and robust manner. The Text file will be compressed and after that the compressed file will go on with a Cryptography and Steganography. Methodologies: Modules of the Application: The application has two modes of operation i.e. Sender and Receiver. The three major modules for Sender mode of application are Compression: The application first compresses the document to be transferred Encryption: An Encryption algorithm encrypts the compressed file and the resulted file is used as secret message. Embedding: The encrypted file is hidden in the Harmless Message (video file) using corresponding Steganographic algorithm, which generates a Stego Object, which is sent to the intended recipient. The three major modules for the Receiver mode of application are De-Embedding: The Stego Object is de-embedded generating an encrypted file. Decryption: The encrypted file is decrypted using an the Encryption algorithm, and the resulted file is given to the compression module De-Compression: The application then de-compresses the document and we have the Secret message. Steganography and cryptography are closely related. Cryptography scrambles messages so they cannot be understood Whereas, Steganography will hide the message so there is no knowledge of the existence of the message [7]. Sending an encrypted message will arouse suspicion while an invisible message will not do so. The application developed in this project combines both sciences to produce better protection of the message. Even if the Steganography fails since the message is in encrypted form it is of no use for the third party, hence the information is secure. In Cryptography we have used three types of methodologies and are implemented depending on the encryption Algorithm.They are Secret key Cryptography, Public key Cryptography and hash function. These 3 methods are briefly explained below. Secret Key Cryptography: Secret key Cryptography, also known as symmetric encryption uses same key for encryption and decryption. The sender uses key to encrypt the text and sends ciphertext to the receiver. The receiver applies the same key to decrypt the message and recover the Text. K K Text Ciphertext Text E( ) D( ) K-key, E-Encryption, D-Decryption Secret key Cryptography The above figure shows the process of secret key cryptography. The biggest difficulty with this approach is the distribution of the key. Block ciphers can operate in one of the several modes. Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB) are the most important modes. Data Encryption Standard (DES), Advanced Encryption Standard (AES), CAST-128/256, Rivest Ciphers (aka Rons Code), Blowfish are some of the Secret key cryptography algorithms [3]. Public-Key Cryptography: K1 K2 Text Ciphertext Text E( ) D( ) K-key, E-Encryption, D-Decryption Public key Cryptography Public key cryptography is a two-key cryptography system in which two keys are used in encryption and decryption for secure communication without having to share a secret key. One key is used to encrypt the text, designated the public key which can be advertised. The other key is used to decrypt the ciphertext to plaintext and is designated the private key which is never revealed to another party. This approach also called as asymmetric cryptography, because we use a pair of keys. The figure shows the process of the public cryptographic algorithms. Public key cryptography depends upon the one-way functions, which are easy to compute whereas their inverse function is relatively difficult to compute. RSA, Diffie-Hellman, Digital signature Algorithm (DSA), ElGamal, and Elliptic Curve Cryptography (ECC, are the examples of Public-key cryptography algorithms [3]. Hash Functions: Hash functions, are also called as message digests and one-way encryption. Hash function algorithms do not use a key to carry out the encryption and decryption process. Instead, the algorithm computes a fixed length hash value based upon the text that keeps both the contents and the length of the message secure. Tiny Encryption Algorithm is a Feistel cipher encryption algorithm that uses operations from mixed orthogonal algebraic groups like XOR, ADD and SHIFT. David Wheeler and Roger Needham of the Cambridge University Computer Laboratory designed TEA in the year 1994. A Feistel cipher is a block cipher with a structure known as a Feistel network. In a Feistel cipher, the data been encrypted is split into two halves. The function F( ) is applied to one half using a sub key and the output of F() is XORed with the other half and the two halves are swapped. Each round function follows the same pattern except for last round. A nice feature of a Feistel cipher is that encryption and decryption are identical i.e. the sub keys used during encryption at each round are taken in reverse order while decryption [4]. The main goal of TEA is to minimize memory footprint and maximize speed. TEA is simple to implement, has less execution time, and takes minimal storage space. TEA uses a large number of iterations rather than a complicated program. Notation: Any number subscripted with h represents a Hexadecimal number e.g: 10h represents 16 in decimal values. Notations for Bitwise Shifts and Rotations: x x >> y: denotes logical right shift of x by y bits. x x >>> y: denotes right rotation of x by y bits. XOR: In computer science, an XOR is a mathematical operation that combines two bits. It returns value is TRUE if either of the two bits is TRUE, but false if both are equal. For our cryptography algorithm, we do an XOR combining two strings of bits. Say x and y are two string patterns then XOR for x and y is denoted by xà ¢Ã…  Ã¢â‚¬ ¢y [4]. Integer Addition and Subtraction: The operation of integer addition modulo 2n is denoted by and subtraction modulo 2n is denoted by. Where x, y à ¢Ã‹â€ Ã‹â€  Z2n (The value of n should be clear from the context) The key is set at 128 bits and the key schedule algorithm splits the 128-bit key K into four 32-bit blocks K = ( K[0], K[1], K[2], K[3]). The 128-bit key is enough to prevent simple search techniques being effective [4]. Encryption Routine: The Encrypt Routine given in figure [4], is written in the C language and assumes a 32-bit word size. The 128 bit key is split into four parts and is stored in K[0] k[3] and the Data is stored in v[0] and v[1]. void code(long* v, long* k) { unsigned long y=v[0],z=v[1], sum=0, /* set up */ delta=0x9e3779b9, /* a key schedule constant */ n=32 ; while (n>0) { /* basic cycle start */ sum += delta ; y += ((z>5)+k[1]) ; z += ((y>5)+k[3]) ; } /* end cycle */ v[0]=y ; v[1]=z ; } Encryption Routine for TEA The constant delta is given as delta = (à ¢Ã‹â€ Ã… ¡5 -1) * 231 i.e. 9E3779B9h and is derived from the golden number ratio to ensure that the sub keys are distinct and its precise value has no cryptographic significance. TEA uses addition and subtraction as the reversible operators instead of XOR. The TEA encryption routine relies on the alternate use of XOR and ADD to provide nonlinearity. The algorithm has 32 cycles (64 rounds). TEA is short enough to write into almost any program on any computer. TEA on one implementation is three times as fast as a good software implementation of DES, which has 16 rounds. The figure shown below [4], gives an overview of two rounds i.e. one cycle of TEA. Key size: 128 bit key is split into four subkeys K = { K[0],K[1],K[2],K[3] } Block size: 64 bits Structure: Feistel Network Rounds: Variable (64 Feistel rounds (32 cycles) is recommended). . Represents Integer addition modulo Represents XOR Represents logical left shift by 4 bits Represents logical right shift by 5 bits Two Feistel Rounds (one cycle) of TEA Inputs for the Encryption routine: Plaintext P, Key K The plaintext is split into two halves as P= (Left[0],Right[0]) Output for the Encryption routine: The cipher text is C Where C=(Left[64], Right[64]). The plaintext block is split into two halves, Left[0] and Right[0] and each half is used to encrypt the other half over 64 rounds of processing then combined to produce the cipher text block. Each round i has inputs Left[i-1] and Right[i-1], derived from the previous round, as well as a sub key K[i] derived from the 128 bit overall K. The Output and the delta constant of the ith cycle of TEA are given as Left [i+1] = Left[i] F ( Right[i], K [0, 1], delta[i] ), Right [i +1] = Right[i] F ( Right[i +1], K [2, 3], delta[i] ), delta[i] = (i +1)/2 * delta, The sub keys K[i] are different from K and from each other. The Round function F contains the key addition, bitwise XOR and both left and right shift operations, and given as F(M, K[j,k], delta[i] ) = ((M > 5) K[k]) F Round function and K[i] key for the ith round Encryption Process for TEA The keys K[0] and K[1] are used in the odd rounds and the keys K[2] and K[3] are used in even rounds. The round function of TEA encryption algorithm differs slightly from a classical Feistel cipher structure where integer addition modulo-2 ³Ãƒâ€šÃ‚ ² is used instead of XOR as the combining operator. The above figure[4] gives an overview of the encryption process for TEA. Decryption Routine: void decode(long* v, long* k) { unsigned long n = 32, sum, y = v[0], z = v[1], delta = 0x9e3779b9 ; sum = delta /* start cycle */ while (n>0) { z = (y>5)+k[3] ; y -= (z>5)+k[1] ; sum -= delta ; } /* end cycle */ v[0] = y ; v[1] = z ; } Decryption Routine for TEA The decryption routine shown in the figure[4], is same as the encryption routine with the cipher text as input and the sub keys K[i] are used in the reverse order. Inputs for the Decryption routine: Cipher text C, Key K The cipher text is split into two halves as C= (DLeft[0],DRight[0]) Where Dleft[0]=ERight[64] and DRight[0]=Eleft[64] Output for the Decryption routine: The plain text is P, Where C=(DLeft[64], DRight[64]). F Round function and K[i] key for the ith round. Decryption Process for TEA The figure [4] gives the structure of the decryption algorithm for TEA. The intermediate value for the decryption process equals the corresponding value of the encryption process with the two halves of the value swapped. For example say the output of the nth round of the encryption process is ELeft[i] concatenated with ERight[i] then the input to the (64-i)th decryption round is DRight[i] concatenated with DLeft[i]. DCT-LSB (Discrete Cosine Transformation-List Significant Bit Encoding): DCT-LSB is a Steganographic method is a substitution algorithm used for hiding information behind Video files. Each frame in the video holds a part of the secret message. Discrete Cosine Transform (DCT) transforms successive 8 ÃÆ'- 8 pixel blocks of the frame into 64 DCT coefficients each. The DCT coefficients D(i, j) of an 8 ÃÆ'- 8 block of image pixels p(x, y) are given by the formula below Least Significant Bit (LSB) is a simple Steganographic method that takes the individual pixels of the frame and replaces the least significant bits with the secret message bits. It is by far the most popular of the coding techniques used. The process of LSB algorithm is shown in the figure below. Embed Extract LSB Process We can commandeer the least significant bit of 8-bit true color image to hold each bit of our secret message by simply overwriting the data that was already there. The impact of changing the least significant bit is almost imperceptible. Input: message, cover image Output: steganographic object containing message while data left to embed do get next DCT coefficient from cover file if DCT à ¢Ã¢â‚¬ °Ã‚   0 and DCT à ¢Ã¢â‚¬ °Ã‚   1 then get next bit from the Secret message replace DCT LSB with message bit end if insert DCT into steganographic object end while Embedding Process of DCT-LSB Input: steganographic object containing message Output: message, cover image while data left to extract do get next DCT coefficient from Stego object if DCT à ¢Ã¢â‚¬ °Ã‚   0 and DCT à ¢Ã¢â‚¬ °Ã‚   1 then Extract the DCT LSB bit from the object Copy to message file end if end while Extracting Process of DCT-LSB The above figures[5] gives algorithms for embedding and extracting secret information in video files using DCT-LSB algorithm respectively. DEFLATE COMPRESSION ALGORITHM DEFLATE is a no loss compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding. Independent of CPU type, operating system, file system, and character set Compatible with widely used gzip utility Worst case 5bytes per 32Kbyte block[6]. Ethical Considerations: There are two possible ways of attacks on Steganography (Detection and Destruction) of embedded message. The properties of the file in which we are hiding information will differ when hiding message into it. The Steganalysis will find it and analyse the stego object. Steganalysis is the technique used to detect hidden messages in digital data like video or audio file steganographically[7]. Steganalysis is used to disrupt the steganographic elements to transfer by extracting, disabling or disrupting. Detection: Most Steganographic techniques involve in changing the properties of original harmless messages like Image and Video files and the detection algorithms concentrate on detecting these changes [8]. Detecting the existence of a hidden message will save time in the message elimination phase by processing only those digital files that contains hidden information. Detecting an embedded message defeats the primary goal of Steganography techniques that is concealing the very existence of a message [8]. The algorithms vary in their approaches for hiding information. Without knowing which algorithm is used and which Stego-key is used, detecting the hidden information is quite complex. Destruction or Defeating algorithms concentrate on removing the hidden messages from the Stego object [8]. Steganalysis techniques are similar to the cryptanalysis for the cryptography methods. As we have discussed previously. Harmless Message + secret message + stego-key = stega-object Some of the known attacks for the Steganography are stego-only, known cover, known message, chosen stego, and chosen message. In Cryptography there are many types of Cryptographic attacks. The attacks are done on the Cipher text. There are some of the ways to attack cipher text like Brute force attacks, Meet in the middle attack, Birthday attack and side channel attack[9]. Plan Time Table: Activity Nov 09 Dec09 Dec09 Dec09 Jan 09 Jan 09 Jan 09 Jan 09 Feb 09 Selection of topic XX analyzing XX Research XX Literature review XX introduction XX Rationale XX methodologies XX Initial results XX conclusion XX After the approval of the research proposal the project will be started. The dissertation will be preceded according to the steps that are given by the supervisor. Limitations and Scope: Steganography is an effective way to obscure data and hide sensitive information. The effectiveness of Steganography is amplified by combining it with cryptography. By using the properties of the DCT-LSB Steganography algorithm for video file and combining it with the TEA cryptography standards, we developed a method, which adds layers of security to the communication. Steganographic methods do not intended to replace cryptography but supplement it. The strength of our system resides in adding multiple layers of security. First the secret message i.e. word document to be transferred is compressed, encrypted and then embedded in a video file using Steganographic algorithm hence, adding three layers of security. The weakness of the system developed is the size of the secret file i.e. word document after compression should be less than the size of the Cover object i.e. Video file. Since we are using compression algorithm this happens only for huge documents. As future work, we intend to study more steganalytic techniques i.e. detecting whether a particular file contains any form of embedding or not. We also plan to extend our system so that it can hide digital files in other digital files, for example hiding Audio files in Videos files etc. Personal Development and Requirement: Regarding this research a brief knowledge on steganography and cryptography and the methods that are used in embedding and de-embedding file. We should also have a brief idea on encryption and decryption algorithms in cryptography. In this application we can also encrypt strings and document files. Resource reruirements: This Application will work on any Microsoft Operating systems and the hard disk should have atleast of 4 MB memory. The RAM should be 256 Mega Bytes or higher.

Monday, August 19, 2019

Delinquent Parents :: essays research papers fc

Delinquent Parents? Gone are the good old days when mom and dad were around to teach their children about morality and the basics of growing up. Instead, we see parents who have replaced caring and personal involvement with the purchase of material goods. We see parents who are afraid to discipline their children and who are afraid to set boundaries. We see parents who are afraid to hug their children and be involved in their lives. A child's behavior shows the kind of home he or she comes from. Parents are suppose to be role models, but what do we find. Parents are neglecting their responsibility. Parents, who ought to teach by precept and example, have fallen prey to the "do as I say, but not as I do" syndrome. We as a society, often times fail to look at the root cause of many of the adolescent problems being witnessed today. I watched a PBS documentary entitled "The Lost Children of Rockdale County." I found this documentary to be very disturbing look into th e lives of middle to upper class youth. Though the focus of the program was sexual promiscuity, drugs, pornography, and alcohol, but what I found far more troubling was the tremendous breakdown that exists between the children of Rockdale County and their parents. This entire documentary was full of houses that were empty and void of supervision and adult presence. Some recent research on adolescent behavior has provided an insight into factors that contribute to juvenile delinquency. The relationships between parents and children play a significant role in the social well being of the children. Children who do the best, have parents who use both a great deal of warmth and caring with their children and also exercise a high level of control over their children's actions. High levels of warmth and control characterize the form of parenting referred to as authoritative. (Teenagers in Trouble, Gallagher, p.2) Authoritative parents are both firm and fair. Rarely did I see this type of p arent in the program. "I thought that if I disciplined you, you would run away" was one comment made by a mother whose daughter had gone on a drinking bing at age twelve, blacked out, and realized she had been raped when she came to. Many of the parents documented were not able to connect with their children and even when they did, they thought that just showing concern was enough.

Transgenderism and Feminism Essay -- essays research papers

Judith Halberstam’s lecture focused on the issues regarding transgenderism/transsexualism, feminism/trans feminism (FTM), and the relationships between them. The lecture mainly addressed the necessity of trans feminism and reasons for its absence in the present queer and feminist communities. Trans feminism is necessary for all trans individuals. Leaving femininity behind creates a problem for FTMs. Growing up; they were subject to the same challenges that other young women faced. In fact, they most likely still do face obstacles on top of the challenges that come with not fitting in a â€Å"socially proper† category of gender. As Sandy Stone put in her essay, MTFs need feminism for the transition, to recognize the privileges that come with being born male and living as a man, that they don’t have now but had at some point in their lives. If they get rid of feminism, then their transition can be attributed to an inherent misogyny. Feminists also need to recognize that transgenderism/transsexualism and feminism are not necessarily odds. Feminism needs the inclusion and the support of all genders. Feminists need to have conversations with trans individuals in order to expand their movement. The necessary first step to take is to be inclusive, allow both transmen and transwomen be a part of all women’s events. Michigan Women’s Music Festival is the most mentioned event that this problem arises. The â€Å"womyn born womyn† requirement to attend the festival is bluntly another way of sa...

Sunday, August 18, 2019

Ulysses S. Grant Essay -- essays research papers

Ulysses S. Grant lived an interesting life. He gave so much to this country. His life was exciting and he lived in many different places, from small houses to a house given by people to the white house. From saving the blacks from more slavery to giving the U.S. bad years from presidency.   Ã‚  Ã‚  Ã‚  Ã‚  Ulysses S. Grant was an American general and the 18th president of the U.S. (Williams 53).Grant was born in point pleasant, Ohio, on April 27 ,1822, the son os Hannah Simpson and Jesse Grant, the owner of a tannery (Williams 52). In 1839, under the name of Ulysses Simpson, instead of his original Hiram Ulysses, he was appointed to West Point (â€Å"Ulysses†Online). Graduating 21st in a class of 39,loosing to Robert E. Lee, who came 1st (â€Å"Ulysses†Online). There he met Julia Dent, whom he married after the Mexican war (â€Å"Grant†314). During the Mexican war, Grant served under both General Zachary Taylor and General Winfield Scott and distinguished himself (â€Å"Ulysses†Online). In 1854, while stationed at Fort Humboldt, California, Grant resigned his commission because of loneliness and drinking problems, and in the following years he engaged in generally unsuccessful farming and business ventures in Missouri(Williams 19- 59). He moved to Galena, Illinois, in 1860, where he became a clerk in his father's leather store (Williams 21).   Ã‚  Ã‚  Ã‚  Ã‚  In the Civil War, after an indecisive battle raid on Belmont, Missouri, he gained fame when in February 1862, in conjunction with the navy; he succeeded in reducing Forts Henry and Donelson, Tennessee, forcing General Simon B. Buckner to accept unconditional surrender and earned him the nickname Unconditional Surrender Grant (Williams 52). In 1863 he established his reputation as a strategist in the brilliant campaign against Vicksburg, Mississippi, which took place on July 4 (â€Å"Ulysses†Online). After being appointed commander in the west, he defeated Braxton Bragg at Chattanooga (â€Å"Ulysses†Online). Grant's victories made him so prominent that he was promoted to the rank of Lieutenant General and in February 1864 was given command of all Union armies(â€Å"Ulysses†Online). Grant accompanied the army of the Potomac in its overland assault on Richmond, Virginia.Grant continues to press the drive against General Robert E. Lee's army (â€Å"Ulysses†Online). After... ...p;After retiring from the presidency, Grant took a long trip around the world. Returning in 1879, he became an unsuccessful candidate for the presidential nomination, which went to James A. Garfield (Williams 58). In 1881 Grant moved to New York City, Where he became a partner in the Wall Street firm of Grant and Ward; he was so close to ruin when the company collapsed in 1884 (â€Å"Ulysses†Online). To provide for his family, he wrote his memoirs while fighting cancer of the throat; he died at Mount Gregor, New York, on July 23,1885 (Williams 52-59).   Ã‚  Ã‚  Ã‚  Ã‚  He gave so much to this country and we never had a chance to thank him, not by giving stuff to him like the memorial but to say it up close and shaking hands with him. He was a great   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  3 General by giving the slaves freedom and fighting for them, if he hadn’t fought for us think about where we would be right know. From the best General of the U.S. Army to 1 of the worst Presidents he still did good for this country. Ulysses S. Grant Essay -- essays research papers Ulysses S. Grant lived an interesting life. He gave so much to this country. His life was exciting and he lived in many different places, from small houses to a house given by people to the white house. From saving the blacks from more slavery to giving the U.S. bad years from presidency.   Ã‚  Ã‚  Ã‚  Ã‚  Ulysses S. Grant was an American general and the 18th president of the U.S. (Williams 53).Grant was born in point pleasant, Ohio, on April 27 ,1822, the son os Hannah Simpson and Jesse Grant, the owner of a tannery (Williams 52). In 1839, under the name of Ulysses Simpson, instead of his original Hiram Ulysses, he was appointed to West Point (â€Å"Ulysses†Online). Graduating 21st in a class of 39,loosing to Robert E. Lee, who came 1st (â€Å"Ulysses†Online). There he met Julia Dent, whom he married after the Mexican war (â€Å"Grant†314). During the Mexican war, Grant served under both General Zachary Taylor and General Winfield Scott and distinguished himself (â€Å"Ulysses†Online). In 1854, while stationed at Fort Humboldt, California, Grant resigned his commission because of loneliness and drinking problems, and in the following years he engaged in generally unsuccessful farming and business ventures in Missouri(Williams 19- 59). He moved to Galena, Illinois, in 1860, where he became a clerk in his father's leather store (Williams 21).   Ã‚  Ã‚  Ã‚  Ã‚  In the Civil War, after an indecisive battle raid on Belmont, Missouri, he gained fame when in February 1862, in conjunction with the navy; he succeeded in reducing Forts Henry and Donelson, Tennessee, forcing General Simon B. Buckner to accept unconditional surrender and earned him the nickname Unconditional Surrender Grant (Williams 52). In 1863 he established his reputation as a strategist in the brilliant campaign against Vicksburg, Mississippi, which took place on July 4 (â€Å"Ulysses†Online). After being appointed commander in the west, he defeated Braxton Bragg at Chattanooga (â€Å"Ulysses†Online). Grant's victories made him so prominent that he was promoted to the rank of Lieutenant General and in February 1864 was given command of all Union armies(â€Å"Ulysses†Online). Grant accompanied the army of the Potomac in its overland assault on Richmond, Virginia.Grant continues to press the drive against General Robert E. Lee's army (â€Å"Ulysses†Online). After... ...p;After retiring from the presidency, Grant took a long trip around the world. Returning in 1879, he became an unsuccessful candidate for the presidential nomination, which went to James A. Garfield (Williams 58). In 1881 Grant moved to New York City, Where he became a partner in the Wall Street firm of Grant and Ward; he was so close to ruin when the company collapsed in 1884 (â€Å"Ulysses†Online). To provide for his family, he wrote his memoirs while fighting cancer of the throat; he died at Mount Gregor, New York, on July 23,1885 (Williams 52-59).   Ã‚  Ã‚  Ã‚  Ã‚  He gave so much to this country and we never had a chance to thank him, not by giving stuff to him like the memorial but to say it up close and shaking hands with him. He was a great   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  3 General by giving the slaves freedom and fighting for them, if he hadn’t fought for us think about where we would be right know. From the best General of the U.S. Army to 1 of the worst Presidents he still did good for this country.

Saturday, August 17, 2019

Ford Motor Company

Henry Ford Henry Ford was one of America's greatest businessperson, the founder of Ford Motor Company and the man largely responsible for mass production in the American economy. This achievement led Ford to becoming a rich and famous man. Ever since Ford was a child, he had a dream to become an engineer and to manufacture cars. He began to pursue his dream when he Introduced the Assembly line, by breaking down production into simple tasks. He lowered the skill level needed to work in a factory, which allowed enormous amounts of products to be produced at lower prices.During the sass's, Henry Ford's management skills and leadership of The Ford Motor Company expanded the economy by making cars available to all Americans and stimulating industries related to the automobile empire. One way Henry Ford expanded the economy was by making automobiles available to all Americans. His Motor Company helped him produce and manufacture tons of cars. In order to get his company running, he had to pay employees at a lower rate, but also made sure they were paid enough so expenses were affordable. The automobiles made Its Impact felt first In rural areas where cars were used for oaring.They were also used for pastime on the weekends and soon enough the cars were replacing existing transit that brought people to and from work in urban areas (Melodies). Automobiles spurred over many areas, but rural areas were first because of all the activities happening on the weekends. As well as, the number of people who used automobiles to get to and from work. As a matter of fact, â€Å"the convenience of the automobile freed people from the need to live near rail lines or stations; they could choose locations almost anywhere in an urban area, as long as roads were available to connect them to other places† ( History of Automobile).The automobile allowed people to live wherever they chose to rather than living in a specific area, Just so they could get to work or travel places. â₠¬Å"As automobile sales increased, the demand for fuel led to a more systematic way of delivery, and In 1914, Standard 011 of California opened a chain of 34 standardized stations among the West Coast† (Melodies). This is implying that the demand for fuel allowed the automobile companies produce more so that they could get more consumers and increase the assure for all Americans.In fact, â€Å"three hundred men were now employed by the Ford Motor Company, and they were making twenty-five cars a day, and the company was supplying a sales force of 450 agencies across the continent† ( Titlists). The more men meant that more cars were produced, and the more cars produced intended that more cars were available to the employees and any other Americans. Ford's Company later â€Å"increased the production of cars by building several models offering different amenities be sold simultaneously at deferent prices, the company's ratters hoped to maximize their profits by appealing t o a large number of car buyers† (39).By building more different models people had the option to choose what type of car they wanted to get. It also allowed an average American to decide whether to purchase a stylish car that less expensive, or a appealing car that was more class; however, with various models, even a simple car was made affordable by an average household. Overall, cars helped the workers and the Americans because it reduced the work they had to put into carrying parts to and from work and it allowed any people to live freely rather than living in an area where communication to work was accessible.Another way Henry Ford expanded the economy was by stimulating industries related to the automobile empire. For example, â€Å"oil and steel were two well- established industries that received a serious boost by the demand for automobiles† (Age of the Automobile). Many industries like the oil and steel were increasing production for more automobiles being produc ed. During this automobile era, â€Å"manufacturing became a highly mechanized process in which mass manufacturing was performed by unskilled workers and the assembly line cut down on human handling, and machines were designed to handle multiple tasks†(Bianca).In other words, quick development was a very important skill that unskilled workers had to master; however, this was made easy because a lot of the times machines did most of the work and the workers would have to put a little effort to make sure everything was right. This enabled Ford â€Å"to increase production from about 475 cars in a nine-hour day to more than 1,200 auto assemblies in an eight-hour day' (Bianca). Due to more manufacturing of cars and more products of steel, rubber, and glass being created, Ford increased the production of the assembly lines.Having raw materials such as rubber and steel available in the market, â€Å"more people would buy raw materials and products, which stimulated public spendin g throughout. † This gave Ford a chance to another company called â€Å"The Ford Manufacturing Company, which was started to produce engines, running gears and other car parts† (Tilting, 41). Ford realized that in order for the cars to be perfect, he needed another company to aka all his cars stronger, so different industries with different productions parts were created to increase the production of automobiles even more.Although Ford's ultimate goal was to increase the production of automobile, he also focused on the efficiency of the automobiles. His major concern regarding the efficiency was â€Å"mainly towards the strength and reliability, knowing that the metal he was using for certain parts, such as the gears, was too brittle, so he looked out for a stronger kind of steel† (45). Ford knew that if his gears or any other car part broke, the car would be selves, so he wanted to guarantee that his car would be stronger and more efficient than anything else on the market.Thus, Ford not only expanded the production of automobiles, but also other industries that played a major role in producing an automobile. Consequently, Henry Ford has played a huge leadership role because he made Americans lives better. He used many techniques that improved the economy. He did most of this by expanding his company so cars were available to Americans, and by stimulating public spending through many industries. The auto industry provided tit a large market of steel, rubber, glass and petroleum products.All of which were available to consumers in the market at any time. Cars made exploration of the world outside easier and more affordable, which motivated public spending for good roads. His production line manufacturing was widely used for efficiency because before to work or other parts of the city. Many even traveled really far Just to get to work, because trains were mostly the means of transportation before the automobiles (Melodies). Shortly after the inventions of automobiles, the lives of many Americans hanged and the production of cars increased. Ford Motor Company Henry Ford Henry Ford was one of America's greatest businessperson, the founder of Ford Motor Company and the man largely responsible for mass production in the American economy. This achievement led Ford to becoming a rich and famous man. Ever since Ford was a child, he had a dream to become an engineer and to manufacture cars. He began to pursue his dream when he Introduced the Assembly line, by breaking down production into simple tasks. He lowered the skill level needed to work in a factory, which allowed enormous amounts of products to be produced at lower prices.During the sass's, Henry Ford's management skills and leadership of The Ford Motor Company expanded the economy by making cars available to all Americans and stimulating industries related to the automobile empire. One way Henry Ford expanded the economy was by making automobiles available to all Americans. His Motor Company helped him produce and manufacture tons of cars. In order to get his company running, he had to pay employees at a lower rate, but also made sure they were paid enough so expenses were affordable. The automobiles made Its Impact felt first In rural areas where cars were used for oaring.They were also used for pastime on the weekends and soon enough the cars were replacing existing transit that brought people to and from work in urban areas (Melodies). Automobiles spurred over many areas, but rural areas were first because of all the activities happening on the weekends. As well as, the number of people who used automobiles to get to and from work. As a matter of fact, â€Å"the convenience of the automobile freed people from the need to live near rail lines or stations; they could choose locations almost anywhere in an urban area, as long as roads were available to connect them to other places† ( History of Automobile).The automobile allowed people to live wherever they chose to rather than living in a specific area, Just so they could get to work or travel places. â₠¬Å"As automobile sales increased, the demand for fuel led to a more systematic way of delivery, and In 1914, Standard 011 of California opened a chain of 34 standardized stations among the West Coast† (Melodies). This is implying that the demand for fuel allowed the automobile companies produce more so that they could get more consumers and increase the assure for all Americans.In fact, â€Å"three hundred men were now employed by the Ford Motor Company, and they were making twenty-five cars a day, and the company was supplying a sales force of 450 agencies across the continent† ( Titlists). The more men meant that more cars were produced, and the more cars produced intended that more cars were available to the employees and any other Americans. Ford's Company later â€Å"increased the production of cars by building several models offering different amenities be sold simultaneously at deferent prices, the company's ratters hoped to maximize their profits by appealing t o a large number of car buyers† (39).By building more different models people had the option to choose what type of car they wanted to get. It also allowed an average American to decide whether to purchase a stylish car that less expensive, or a appealing car that was more class; however, with various models, even a simple car was made affordable by an average household. Overall, cars helped the workers and the Americans because it reduced the work they had to put into carrying parts to and from work and it allowed any people to live freely rather than living in an area where communication to work was accessible.Another way Henry Ford expanded the economy was by stimulating industries related to the automobile empire. For example, â€Å"oil and steel were two well- established industries that received a serious boost by the demand for automobiles† (Age of the Automobile). Many industries like the oil and steel were increasing production for more automobiles being produc ed. During this automobile era, â€Å"manufacturing became a highly mechanized process in which mass manufacturing was performed by unskilled workers and the assembly line cut down on human handling, and machines were designed to handle multiple tasks†(Bianca).In other words, quick development was a very important skill that unskilled workers had to master; however, this was made easy because a lot of the times machines did most of the work and the workers would have to put a little effort to make sure everything was right. This enabled Ford â€Å"to increase production from about 475 cars in a nine-hour day to more than 1,200 auto assemblies in an eight-hour day' (Bianca). Due to more manufacturing of cars and more products of steel, rubber, and glass being created, Ford increased the production of the assembly lines.Having raw materials such as rubber and steel available in the market, â€Å"more people would buy raw materials and products, which stimulated public spendin g throughout. † This gave Ford a chance to another company called â€Å"The Ford Manufacturing Company, which was started to produce engines, running gears and other car parts† (Tilting, 41). Ford realized that in order for the cars to be perfect, he needed another company to aka all his cars stronger, so different industries with different productions parts were created to increase the production of automobiles even more.Although Ford's ultimate goal was to increase the production of automobile, he also focused on the efficiency of the automobiles. His major concern regarding the efficiency was â€Å"mainly towards the strength and reliability, knowing that the metal he was using for certain parts, such as the gears, was too brittle, so he looked out for a stronger kind of steel† (45). Ford knew that if his gears or any other car part broke, the car would be selves, so he wanted to guarantee that his car would be stronger and more efficient than anything else on the market.Thus, Ford not only expanded the production of automobiles, but also other industries that played a major role in producing an automobile. Consequently, Henry Ford has played a huge leadership role because he made Americans lives better. He used many techniques that improved the economy. He did most of this by expanding his company so cars were available to Americans, and by stimulating public spending through many industries. The auto industry provided tit a large market of steel, rubber, glass and petroleum products.All of which were available to consumers in the market at any time. Cars made exploration of the world outside easier and more affordable, which motivated public spending for good roads. His production line manufacturing was widely used for efficiency because before to work or other parts of the city. Many even traveled really far Just to get to work, because trains were mostly the means of transportation before the automobiles (Melodies). Shortly after the inventions of automobiles, the lives of many Americans hanged and the production of cars increased.