Wednesday, July 31, 2019

Dystopia Transcript

Transcript Dystopias are a futuristic, imagined universe which enforce oppressive societal control and the illusion of a perfect society are maintained through corporate, bureaucratic, technological and moral control, such as in the text ‘We' by Yevgeny Zamyatin and ‘2081' by Chandler Tuttle. Often we see in these societies the ways that humanity can be repressed, losing one's individuality and also the ways a hero rises to challenge the Dystopia's laws, only to fail and become a victim to the dystopia, all being common conventions of dystopic texts from which we can learn about our own societies' flaws.After the long campaigns of One State, the world and all its citizens are under the control of this totalitarian society. Through D-503's journal we see that all humans suffer from a loss of individuality and emotion most particularly from the conformist nature of the society where regimentation and oppressive control has rid of the population of freedom and imagination, k ey factors in a human's individuality.The starting statement of â€Å"What I think-or, to be more exact what we think,† immediately when the novel begins, showcases the conformist nature of One State, tying in with the suppression of humane aspects, extrapolated by the motif, the table of hours which is One State's main instrument in controlling the population. This subjugation of citizens and further oppression is also seen in ‘2081,' where the more extraordinary of the population being handicapped to allow fair living.The constant display of the effects of added weights and shock devices linked to those who think too much show to us just how repressed everyone is in the society. Multiple close shots of Harrison Bergeron while he produced his speech about the flaws in their society illuminate to us the oppression and the dark nature of the society while he was dressed in many handicaps. â€Å"They had hoped to destroy in me, any trace of the extraordinary. Harrison's parents also demonstrate this oppression by the quick cuts to fragmented memories which are consequentially destroyed by handicaps and how the only ones without handicaps are the unintelligent, evident by Harrison's mother and the stuttering news reporter, revealing how degraded the dystopia has caused the human population. As in most dystopic fiction, there is a protagonist which rises against the society's laws and then becomes a victim. This is seen in the changes that occur to D-503 in ‘We. ‘ Throughout the beginning f the novel, D-503 constantly praises the â€Å"mathematically perfect† system of One State, evident in the constant inclusion of mathematics in his speech. â€Å"Irrational numbers†¦ I don't want root – 1. † he says as he displays the effect of this conformist society and how the propaganda around has affected him. This comes to change after being introduced to emotion and imagination by I 330, developing a ‘soul'. Howeve r, this causes his downfall as he is then subjected to the great operation, which had permanently taken away his free will and imagination, evident by his sudden indifferent attitude to I-330.From this we can see how the convention of the hero becoming a victim to his/her dystopic society. Similarly, Harrison in ‘2081’ undergoes similar events as the film progresses. He creates a performance revealing what the un-handicapped extraordinary can achieve, revealing what the dystopic society was hiding all while diegetic sound is played, highlighting the importance of his actions which continue onward to past his death at the hands of various security officers, becoming a victim to the regime despite fighting against it.Both dystopic texts follow the various conventions and ideas seen in dystopian societies, outlining to us multiple flaws in the human society and flaws we can create. As futuristic settings, these texts offer to us an understanding from which we can summarize that these dystopic texts are cautionary tales which we should learn from to create a brighter future. By Kevin Dai

Tuesday, July 30, 2019

Establishing a Secured Atm Banking System

Establishing a Secured ATM Banking System Contents 1. Abstract 2. Introduction 3. Executive Summary 4. Mission 5. Company Background 6. Statement of the Problem 1. Problem Statement 2. Problem Significant 7. Project Objective 8. Limitation of the Project 9. Methodology 10. Analysis of the Project 11. Scope of the Statement 12. Proposed Improvement 13. Expected Output 14. Recommendation 15. Acknowledgment Abstract The aim of this study is to investigate risk management, security and controls in the Context of Automated teller machines (ATMs).In doing so, it adopts a non-technical Approach by investigating the interrelationship and effect of risk management and controls In setting Automated Teller Machine security goals. The literature explores and discusses The risk management and different controls of ATMs. To reduce the risk of fraudulent Activity, several controls can be integrated into the ATM processing environment. However, the controls should not be considered a cure-all. Keywo rds: ATMs, data security, risk, fraud, electronic banking, and controls.Introduction This paper examines the effects of incompatibility in network industries. In a network industry such as telecommunications, the internet, or automatic teller machines (ATMs) in the banking industry,firms are technologically interconnected. This interconnection can lead to more complicated pricing structures than those observed in traditional industries, since a consumer may receive direct or indirect services both from his chosen firm and its rivals.While interconnection increases the size of the network available to consumers, in industries such as the banking industry, the introduction of price discrimination between affiliated and unaffiliated consumers reintroduces firm-level network economies by reducing compatibility within the shared network. This paper measures the impact of this incompatibility and finds significant effects on competition in the deposit market, welfare, and investment. It a lso briefly considers an alternative institutional structure in which provision of ATM and deposit services is separated.In the banking industry, the customers of one bank can use their ATM cards at ATMs owned byother banks, but the ATM owner may charge a fee called a surcharge. This can be interpreted aspartial incompatibility between components of a system comprised of ATM cards (bank affiliation)and ATMs. Analogous to the strong complementary relationships between CPUs and peripheralsor VCRs and video tapes, ATM cards and ATMs form complementary components of a system thatallows consumers to perform transactions on their bank accounts.Consumers can choose variouscombinations of these complementary goods, but the compatibility is only partial since there is acost associated with use of a foreign ATM, that is, an ATM not owned by the consumer’s bank. There is a sizeable theoretical literature on compatibility in industries with network externalitiesor complementary component s. This literature predicts that incentives for compatibility differacross firms and will be smaller for firms with larger networks, since these firms lose the competitive advantage their network size confers under incompatibility.The effects on consumer surplus should differ depending on the distribution of consumer characteristics and the new price equilibrium that is reached. In turn, the effects of compatibility on price competition depend on a number of factors. In the banking industry, while partial incompatibility achieved through surcharging should theoretically soften price competition in the deposit market by making an increase in deposit. This paper will focus on the types of ATM transactions that can be performed on any ATM within the shared network such as inquiries and cash withdrawals.Executive Summary ATM An automated teller machine (also known as an ATM or Cash Machine), is a computerized device that provides the customers of a financial institution with the ability to perform financial transactions without the need for a human clerk or bank teller. Crime at ATM’s has become a nationwide issue that faces not only customers, but also bank Operators. Security measures at banks can play a critical, contributory role in preventing attacks on customers.These measures are of paramount importance when considering vulnerabilities and causation in civil litigation and banks must meet certain standards in order to ensure a safe and secure banking environment for their customers. The Automated Teller machine is a terminal provided by bank or other financial institutions which enables the customer to withdraw cash to make a balance enquiry, to order a statement, to make a money transfer, or deposit cash. The ATMs are basically self-service banking terminals and are aimed at providing fast and convenient service to customers.Some of the new generations of ATMs are able to cash a check to the penny, dispense Traveller’scheques and postage stam ps, perform stock transfers, print discount coupons, issue phonecards, and even sell concert tickets. Customers are grateful for these ATM features but they are alsovery concerned with ATM crime and safety. Mission Key to Success Company Background 1. Statement of the Problems/Problem Definition/ Automatic Teller Machines (ATM) indicates the development of Information Technology in Banking sector.Two types of ATMs need to be addressed, one of which is the branch ATM, The other being the out of branch ATM. The branches will take care of the ATM located in Their respective branches, while the out of branch ATMs such as those located in department Store will be taken care by cash centers. Each cash center has ATMs under its responsibility. At VIT there are three ATMs out of which two are out of branch ATM() and one is branch ATM(). The major problem faced by these ATMs are the long queue of customers at the peak hours and then at the off peak hours the lack of customer entry.The number of customer are so large that many a times customer waits for more than half an hour to get his turn but at nights the ATMs remain idle that there are no customers to serve . Depending on the current capacity of each ATM, many alternative decisions can be made. Now the work process decision is made by operators. Thus,the problem of ATM facility is significant. In this study, methodology â€Å"Simulating ATMs† is proposed in order to maximize efficiency Of banks to improve their customer’s service and increasing long term relationship with them And also to reduce the congestion at the ATM centre at peak hours.The process will show How much time a customer spends and give suggestion whether a new ATM is required or With the same resources the performance can be improved. This research will support the Banks in terms of decisionmakingfor reducing the waiting time of customers, by solving a Simulation model with the help of queuing theory. The technique of simulation has long been used by the designers and analysis in the physical Sciences and it promises to become an important tool for tackling the complicated problems Of managerial decision making.It is actually imitation of reality and when it is being put into Mathematical form it is called simulation. Generally, the main objective of simulation is to Minimize the managerial problem in terms of decision making and hence helps in reaching Solution with at most accuracy. Also it is comparatively free from mathematical solution, Hence can be easily understood by the operating personal and nontechnical managers. On the other hand queuing model is used to overcome the congestion of the traffic? This traffic Can be of any form.This model mainly used in situation where customers are involved, hence When it is being coupled with simulation it becomes very much conducive to get solution to Solve the problem related to customers. Therefore, these two models are used to understand The situation related to ATM waiting line and to find some alternative to overcome this Problem by suggesting certain alternatives. Automated Teller Machines (ATMs) provide banking services such as withdrawals, deposits, and transfers on a 24 hrs with 7days basis. Due to their convenience they are nowuniversal and are used by a diverse set of users located around the world.Despite this success, however, ATMs still suffer from a variety of problems. Since ATMs are used for banking, security is paramount. Personal banking information is highly sensitive and users are vulnerable while using ATMs. Keypads in particular have been exploited by criminals who have installed small cameras or touch-sensitive overlays, or in some cases have simply observed users as they have keyed in their pins. The physical security of users is also important. ATMs are open late at night but often have limited security.Users may feel anxiety and, in those cases, it is best that they complete their ATM operations as quickly as possibl e. In addition to security concerns, there are a number of known usability issues with current ATMs. For example, users may not know which card they have entered into the machine, and accidental key presses may trigger unintended operations. Similarly, ATM interfaces are often loosely-coupled with underlying functions and allow the users to perform illegal operations, only informing them after the fact of the inability of the system to carry out a given task.A good solution to both the usability and security issues will require further exploration of how ATMs operate. Ultimately, such a solution will include a reformulation of certain key ATM functions and novel technologies such as touch screens and web-based interfaces. 1. 1Problem Statement In most of the ATMs the major problem is waiting of customers in the queue for more Duration. Mainly the objective of ATM for bank is to keep away the customers from coming To bank and make the process easy for them to avoid the basic procedur e they do in bank.But As stated the problem which most ATM face is the long queue in front, but then when the Problem is only for a short while as rest of the time the ATM remains idle means adding to The operating cost. The problem is to determine whether only one machine is required to Fulfill the need or two more machines needed to be installed to give comfort to customer Which is really of short period of time. 1. 2 Problem Significance The cost of the installing an ATM machine accounts for a sizeable part of the total operating Cost of a company.Adding to it is cost of extra security guard who is needed to be placed There. But the customer satisfaction point of it is necessary to incur these expenses as Retaining them is more important, hence these cost are overshadowed by this fact. This Research will provide a robust problem solving technique for the realworld? Make a decision Related to reducing the ATM queuing problem to reduce operating cost. †¢Problem Objective The o verall objective of the research is to develop a model to reduce the waiting time of Customers and the total cost related to ATM installation. Problem Constraints In this research, the researcher has focused on the Problem of waiting of customer in ATMs For long to undergo a simple transaction with the available ATM machine, also to know Whether another machine is required to reduce the traffic at the centers by keeping in mind The cost incurred in installing. Methodology Introduction to simulation and queuing It is the imitation of reality like laboratories in which numbers of experiments are performedon simulated models to determine the behavior of real system in true environments.The example cited above is of simulating the reality in the physical form, and are referred toas analogue simulation. For the complex and intricate problem of managerial decision Making, the analogue simulation may not be practicable, and actual experimentation with thesystem may not be uneconomical. Und er such circumstances, the complex system is Formulated into a mathematical model for which a computer programme is developed, and The problem is solved by using high speed electronic computer, and hence it is named as System simulation. Queuing theory has been applied to a variety of business situations.All situations are relatedto customer involvement. Generally, the customer expects a certain level of service, whereasthe firm provides service facility and tries to keep the costs minimum while proving therequired service. This widely used in manufacturing units. Here it helps in reducing theoverhead charges and the overall cost of manufacturing. Also used to know is the unit arrive, at regular or irregular intervals of time at a given point called the service point. General Analysis of the Project ATMs are used by all modern commercial banks and are found in cities around the world.Modern ATMs already address many human interaction concerns, but still suffer from a number of usabi lity and other issues. The following are seven important aspects to consider when attempting improving ATM interfaces: Security Issue ATMs act as electronic tellers, and security is always an important concern for users. Major security issues are already addressed in the modern ATM design. A password, or PIN number, is used to protect the information. After decades of use, ATMs have proven the effectiveness of this security policy.However, this approach may not be sufficient in the future. Mugging and PIN theft should be addressed in a new ATM system. Mature biometric technology may be a good candidate to provide additional security. Besides password protection, modern ATMs also include ‘card eating’ features to provide customers with more security. However, instead of increasing customer security, this feature can in fact cause problems for authorized users due to misunderstanding or carelessness. This feature should be reviewed as part of a user-centered design proces s. FunctionalityATMs handle as many traditional teller operations as possible. Traditional ATMs implement most basic daily banking functions, such as deposit, withdrawals and balance checking. These functions are designed based on the performance limitations of computing and networking, which have changed rapidly over the course of the last few years. These limited functions may not be satisfactory by modern standards. The next-generation ATM should support the following features if possible: †¢ Money transfer: transfer money from one bank account to another person’s bank account. Bill Payment: automatically pay bills. Although a valid feature is provided in internet banking right now, ideally ATMs would still provide these functions for users without internet access. †¢ Other Electronic Finance Tools: Good examples could be electronic bank notes or electronic bank travel cheques. Usability Unlike some other electronic devices, ATMs should be useful to a wide-range of users and those users should be able to use the system with limited or no assistance. This aspect is critical to the new ATM design.Although these issues are already taken into consideration in the current ATM designs, evaluation may reveal that there is room for improvement in current systems. Theoretically, it is also possible that there is no perfect design once we review the usability requirements. We may have to provide a compromised solution to suit the majority. The following are some typical user stories for review: †¢ ATMs currently allow users to insert different cards but do not display visual cues to identify which card was inserted. A displayed image would provide good feedback to prohibit accidental operations using the wrong card. The current key layouts, especially the function keys, are slightly different between different ATMs. A new standard high-resolution touch-screen would be preferable. †¢ Not all current ATMs can support multiple-languages. Consi dering growing international trade and communication, multiple language support would be a very important feature. †¢ The current deposit and withdrawal functions also need to be improved. For example, the standard process for putting multiple cheques into ATMs is confusing, and the ATM withdrawal function does not support bill selection based on the customer’s request. The new ATM should allow the user to easily access money across the world. Efficiency ATMs must be both easy to use and fast. The more time a user spends at an ATM, the more inconvenienced the user feels. Wait times also increase for other users. Clearly, this is an important issue to consider when designing an ATM system. Accessibility As ATMs are physical machines, their design must take accessibility concerns into account. Some good accessibility features can be found in current ATM design. For example, the ATM keyboard includes Braille support for the blind. Current ATM design does not do a good job o f protecting people from others peeking from behind. †¢ The fixed height of ATMs can be inconvenient for some users. Threat & Affect ATMs should be attractive. Potentially, good looking ATMs could attract new users and make existing users more comfortable. For example, relaxing background music could relieve user anxiety during complex operations. There are three basic types of ATM attacks: †¢ Attempts to steal a customer‘s bank card information; †¢ Computer and Network attacks against ATM‘s to gather bank card information; †¢ Physical attacks against the ATM.THEFT OF CUSTOMER‘S BANK CARD INFORMATION †¢Card Skimming †¢Fake ATM machines †¢Card Trapping/Card Swapping †¢Distraction theft or ‘manual’ skimming †¢Shoulder Surfing †¢Leaving transaction ‘Live’ †¢Cash trapping COMPUTER AND NETWORK ATTACKS †¢Network attacks against ATMs †¢Viruses and malicious software †¢Phishing †¢PIN cash-out attacks †¢Utilizing a Fake PIN pad overlay †¢PIN Interception PHYSICAL ATM ATTACKS †¢Ram Raid Attacks †¢Theft of ATMs †¢Smash and Grab of ATMs †¢Safe cutting/Safe Breaking †¢Explosive Attacks Scope of the Project We should evaluate whether or not the ATM is helping to extend banking services.By mixing the web/mobile preauthorization transaction service with the traditional 24 hours with 7 days ATM service, service time can be improved and wait times reduced. Proposed Improvements Our initial meeting yielded many ideas for new ATM technologies that have the potential to improve user experience. We considered mobile phone interfaces, voice interfaces, refinements of physical button interfaces, high resolution touch screen interfaces, biometric identification techniques (finger print or retinal scan), and a web interface for pre-specifying ATM transactions.After a brief discussion of each of these ideas, we decided to talk in depth about the final three. The use of an advanced high resolution touch screen would not solve any problems in itself. but would allow for a more sophisticated user interface. The potential for increased screen space and detail could help address the need for a more intuitive layout, the issue of restricting input to acceptable dollar amounts, and multi-language support. It might also allow ATMs to perform some actions that are not currently possible such as displaying the customer's preferred name for each account and facilitating transfers to third party accounts.An advanced display could also be designed to restrict the viewing angle so that private information is less visible to malicious onlookers. One final advantage of a high resolution display is that it would allow for much more attention to aesthetics, and as Donald Norman tells us, â€Å"attractive things work better. † The main disadvantage of using a touch screen is that it may confuse users, and providing accessibi lity for the blind is more difficult than in cases where Braille codes can simply be added to keypads.The use of biometrics for identification would yield many benefits. The most obvious benefit of biometric technology is that it would increase the security of bank accounts, as a finger print is much harder to steal than a PIN. If the use of a finger print could eliminate the need for an ATM card entirely, it could drastically reduce time spent at the ATM, and it would eliminate the problem of inserting the wrong card. The idea we spent the most time on is a web interface to allow users to pre-specify ATM transactions.The general idea is that the customer can access the bank's website from a PC or mobile phone to input the operations that will be done at the ATM. For example, a user could specify that she wants to withdraw 360 ETB from her chequing account and 220 ETB from her savings account. She also has three cheques to deposit for 250. 35 ETB, 298. 70 ETB, and 329. 11ETB. She wa nts 100 ETB of the deposit to go into her son’s account and the rest to go to her retirement account.When the user arrives at the ATM and identifies herself with a card and PIN or a fingerprint, the machine will display the options she selected earlier and ask if that is still what she wants to do. After selecting â€Å"yes,† she simply inserts the cheques into the machine and removes her cash. While the benefits of this idea may not be immediately apparent, and may not be significant for simple ATM usage, it has the potential to drastically improve the user experience under some circumstances. In the previous example, the user needed to perform many transactions with somewhat nusual amounts of money. If this were to be done at a standard ATM, it could take a very long time to navigate through the interface for each individual transaction. During this time, any number of distractions could occur, including a line of angry customers amassing behind the user or the user' s child suddenly beginning to cry. Under these circumstances, it would be easy for the user to enter an incorrect amount or even to forget one of the transactions completely. However, with the web site, all of the decisions would be made in the comfortable environment of the user's home or office.Besides helping the user to ensure that all transactions are executed properly, this web interface could cut down greatly on lines at ATMs, increasing customer satisfaction and physical security. Another scenario where this could be useful is for outdoor ATMs in bad weather. If the user drives to the ATM and then realizes that being outside would be unpleasant, she could access the web site through her mobile phone to pre set the transactions and minimize time spent outdoors. Such a radical departure from present ATM interactions is certainly not without drawbacks.One of the main issues is that not everybody has web access, especially through their mobile phones. The ATM would definitely ne ed to have a standard user interface in addition to web capabilities. The web site would also introduce security concerns with password attacks and network communication to the ATMs. Hopefully these problems have already been solved in the current implementation of online banking. Finally, as with any UI, poor design could cause this idea to become frustrating and useless. These preliminary ideas have been developed based on initial meetings and brainstorming.Further research and information gathering will lead to the refinement of our proposed system changes, and an iterative design process will allow us to develop a prototype of a highly improved, secure, accessible, and intuitive ATM system and extended web-based interface. Conclusion (Expected Output from the Project) The main purpose of this study is to develop an efficient procedure for ATM queuing Problem, which can be daily used by banks to reduce the waiting time of customers in the System. The queuing characteristics of cu stomers were observed and the researcher compared The process of customer behavior of different ATM services at VIT.It is concluded that the ATM service should introduce in men’s hostel (around ? thstudents strength stay in hostel) Will facilitate pulling more customers towards ATM service. The researcher suggested that the SBI can install a new ATM machine in men’s hostel in spite of high installation cost and thereby reduce the customer cost and service cost for attaining benefit in the long run. This will be helpful for commercial bank to sustain more potential customers in high competitive situations with other private banks.ATM provides financial services to an increasing segment of the population in many countries. Fingerprint scanning, continues to gain acceptance as a reliable identification and verification processes. This paper identifies a model for the modification of existing ATM systems to economically incorporate fingerprint scanning; and, outlines the a dvantages of using such system. It should be noted that the customers perception cannot be generalized as it was highly affected by the tradition/ culture of the user involves. Recommendation for Further StudySeveral aspects of waiting problem for the ATM that remained unsolved in this study will Form interesting topics for further study. The following recommendations are made for Further studies: It is observed that if a person is not well versed with ATM takes more time which is not Considered. Also many customers stand in the queue and leave which can be put into the consideration. †¢ The time the workers take to feed the ATM with currency is not considered. †¢ Out of stock situation can be considered. †¢ On holidays mostly after exams the utility of ATM to be considered.The main limitation of the research due to time constraint it is observed with minimum sample, if sample size would have increased, the result obtained by both in simulation and queuing will coinci de. This study would not consider waiting cost and service cost due to non availability of original information. For future research, this study can be extended by considering the cost factors to find out the best ATM facility. ACKNOWLEDGMENT I wish to acknowledge ________________University and Wegagen Bank, Addis Ababa Ethiopia for their support in providing the various facilities utilized in the presentation of this paper.

Monday, July 29, 2019

Devastatingly Human - An Analysis of Registered Nurses' Medication Essay

Devastatingly Human - An Analysis of Registered Nurses' Medication Error Accounts--NURSING - Essay Example According to Camire et al (2009), "given the large body of literature about patient safety, the limited evidence available to guide clinicians in selecting strategies to prevent and disclose medication errors in critically ill patients is surprising. Nevertheless, patient safety is a first step in providing high-quality health care, and ensuring the safety of patients is everyone’s responsibility and challenge." Since administration of accurate medication is the most embedded principle of nursing; any event of medication error jeopardizes the livelihood and identity of the professional self. Trieber and Jones (2010) analysed the medication error accounts of registered nurses through direct interview with them in order to facilitate better understanding of the perceives error of medication administration errors and to understand strategies employed by the nurses to deal with them. It is often difficult to quantify medication administration errors which are the most common medic al errors in the United States. However, only less than 5 percent are reported (Trieber and Jones, 2010). The Institute of Medicine or IOM has recognized medication administration error as an important target task and has attempted to study and analyze various aspects of environment of the nurses which contribute to errors. This included work design, organizational management and organizational culture. However, the institute failed to include certain aspects of nursing profession like perfectionism, self-sacrifice and duty and also issues related to gender and recent technologies. The institute also did not include the perceptions of nurses who are the frontliners in administration of medication to hospitalized people. This is important because; it is these nurses who are involved in both preventing medication errors and committing medication errors and nurses are emotionally affected when they commit a medication error. The main strategy to prevent medication error is by following the basic principle of "five rights"; right patient, right time, right route, right medication and right dose (Bates, 2007). There is no consensus on the definition of medication error and as to when the error must notified. While most nurses opine that giving wrong medication to a patient is wrong, only a few agree that giving the medication late is also wrong. Thus, discrepancies exist in the definition. Thus, if the rights definition is applied, the number of medication errors would actually escalate more than the estimated number (Trieber and Jones, 2010). Several error reduction technologies have come up which are said to help in decreasing medication errors. These include patient charting through computers, arm-bands that are bar coded, and dispensing cabinets that are automated (Bates, 2007). Other strategies to reduce medication errors include decrease in the number of medicine which look alike or sound alike and application of read back and confirm strategy for orders that were delivered verbally (Trieber and Jones, 2010). There is still controversy as to whether these strategies and procedures introduced to reduce medication errors actually help in reduction or errors or complicated the problem. Some researchers like Koppel et al (2008; cited in Trieber and Jones, 2010) are of the opinion that these recent gadgets actually confuse the nurses and worsen medication errors. Infact, in their study, they found that computerized

Sunday, July 28, 2019

Field Sales Experience Paper Assignment Example | Topics and Well Written Essays - 750 words - 1

Field Sales Experience Paper - Assignment Example I Tunes software serve the purpose of music transfer from computers to device by the use of Apple versions and operating systems of Microsoft windows. By the use of the description above, the salesperson hold prospects and attract the individual’s attention stimulating the desire and interest on the product. The customer is then left with the option to take action on the product. The customer is also presented with the opportunity to try, touch and hold the I Pod. The sales person uses a variety of presentation to win the customer. The first approach is by stimulus response. This is where by the sales person employ the use of appealing features of the I Pod as described, one after the other. The other way of presentation is the selling formula. It involves repetitive and memorized specifications of a product. Lastly, there is satisfaction of need formula. Being that each and every customer has different needs, the presentation should be aimed at a specific customer. During the time of sales the sales person makes sure that he addresses all the information needed to the buyer of the product and overcome the objections. For a sales person to overcome objections, the following should be taken into consideration: addressing and seeking out of objections, avoid coming up with objections not raised by the prospect, counter and anticipate the objection before the customer, the sales person should be satisfied by the price before selling of the product, retrieve information on the budget of the customer, and know the products value. For instance, I Pod is required by mostly the younger generation that needs to carry a lot of information in a portable drive and in the same time be able access movies and music. In this case, the customer’s need is a drive that can compress and satisfy different tastes of the targeted customer (Wood and Kotler). The sales person should be in a position to spot the needs of the

Saturday, July 27, 2019

Discussion Assignment Example | Topics and Well Written Essays - 250 words - 32

Discussion - Assignment Example In the event of establishing customer satisfaction, the employees seemed accurate in delivering their obligations towards the clientele groups (8-6). The mode of efficiency, cross-cultural teamwork, and value-added approaches inscribed through training was serviceable as their practices matched the strategies of the organization. The group seemed to have the ability to gain new orientations, which when applied led to value propositions and customer satisfaction (9-12). The evaluation process and the performance appraisal plans undertaken on a quarterly and annual basis deciphered knowledge that the group was devoted to deliver their tasks in exchange of the set goals and objectives. Eventually, the employees deserved the top five rankings due to their unified approaches in performances. They revealed a level of aggression towards the implementation of sound decisions. The group gained the ability to respond to customer needs through researches with an aim of acquiring innovative alternatives. Customers revealed their satisfaction in the acquired services through the collected reviews (10-13). Lastly, the appraisal revealed that the top five personnel bore the desired experience and knowledge in their specific careers thus; they had the ability to react towards any challenges, monitor the customer segments, and implement the acquired skill gained in the training for the organization’s

Friday, July 26, 2019

Is Facebook Response for our Loneliness Essay Example | Topics and Well Written Essays - 1250 words

Is Facebook Response for our Loneliness - Essay Example During her last days, she looked for companionship from fans whom she met through Internet sites and fan conventions. When news of her death got out, she was the subject of over 16,000 posts on Facebook and more than 800 tweets. In â€Å"Is Facebook Making Us Lonely,† published in the May 2012 edition of The Atlantic magazine, Stephen Marche looks at the phenomenon of Facebook and how it affects our relationships as human beings. In a similar way to most of us, Vickers’s network of communication had increased yet decreased at the same time. Many of us can be easily accessed but yet we live in isolation. In recent years, technology has moved us to a way of life (technology) that we wholesomely rely on. In the extreme, several miles of fiber-optic cables were installed between the Chicago Mercantile Exchange and New York Stock Exchange in order to increase the speed of transmission during trading by three milliseconds (Marche 2012). But, in spite of absolute and instant c ommunication, we can suffer from loneliness. The more the new socializing modes, the less of an actual society exists. The more the connection, the lonelier we become. As of last year, Facebook had over 800 million users and revenue in excess of $3 billion (Marche 2012). The company further aims to be the largest internet IPO ever. Although it is the first site to have more than a trillion page views in a month, the way in which it is used is causing harm to its users without them knowing (Lushing and Atwan 45). Even Facebook’s owner, Mark Zuckerberg, who is one of the youngest billionaries in the world, experiences loneliness like the rest of us. As can be seen in the film The Social Network, his loneliness is evident when he sends a friend request to his ex-lover and then waits for a response while refreshing the page (like many of us have desperately done). Unlike the Friends circle in Google+, which suggests that people only include his or her real friends, Facebook has c reated a cyber world that includes people with whom we have never interacted. This depicts the interference that Facebook has brought about in relationships—it promotes the isolation that it was designed to overcome. Many people thought that Facebook was developed as a solution to people suffering from loneliness. This innovation seemed to be a solution at the time; however, recent studies show that loneliness rates in American have significantly increased. Additionally, isolation has increased unhappiness in the U.S. To understand the real effect social media forms have caused, we need to realize there is a difference between loneliness and being alone. Being alone is a beautiful thing. On the other hand, loneliness is a sad thing; it is also a psychological condition. Analyzing data from Dutch twins in 2005 showed that they both had similar genetic conditions as they did psychological problems (Marche 2012). Nonetheless, loneliness is difficult to explain. The UCLA loneline ss scale is the best tool to measure the loneliness of a person. Studies using the scale have shown that loneliness is increasing rapidly within a short time. A leading American study shows about 20 percent of Americans suffer from loneliness (Marche 2012). Single people suffer from loneliness more than married couples who are confidants. Another study found that active believers who perceived God as helpful and nonfigurative were less lonely than those who saw God as wrathful. Due to increased rates of loneliness there is a fear of an epidemic across Europe, as suggested by health experts. Loneliness and bein

Project Management Case Study Example | Topics and Well Written Essays - 1250 words

Project Management - Case Study Example They are the driving force behind all the projects that are performed as well as the reactions to the projects so performed. In the case of XYZ Company, Carl was a very important stakeholder where most of the activities rotated around him as the key man with the post of the executive president. He has the control of all activities that go on at the company and in one case or another summons the different other stakeholders such as the accountant to negotiate on some deals that would oversee the company pushed to progressive levels. Stakeholder groups may involve individuals, groups and formal organizations. Stakeholders are the most important people that make sure that the execution of the project is carried out effectively. In fact, to a more basic level, a stakeholder to the company would be anyone who stands to gain or lose in effect of the project being carried out. In the case of the XYZ Company, the project team, the strategic partners, customers, alliances, vendors and the sen ior management team make up the stakeholders associated with the company. When all these stakeholders come together for the purpose of realizing the project objective, influence and collaboration must be adhered to in taking care of realization of the final objective. This is because effective success in the project implementation requires understanding and co-corporation between all the stakeholders. The customers (banks, insurance companies and investment companies) are usually the beneficiaries of the project that is created as the final consumers. Therefore, they are a very primary group to the operations of the project. Implementers (like the FS business unit) are the driving force behind the operations of the company and are equally very important. Stakeholders on the prime side can be divided into internal and external stakeholder groups. There are several internal factors that affect the outcome of

Thursday, July 25, 2019

Ethics Essay Example | Topics and Well Written Essays - 1500 words - 2

Ethics - Essay Example Usually the debate on the issue of abortion is based on the definition of human life, as both sides disagree as to what human life is. In this paper, an attempt will be made to resolve the moral question regarding the issue of abortion using utilitarianism. The issue of abortion will be evaluated using the utilitarian ethics and solutions will be proposed. The issue of abortion will also be discussed and arguments of both sides will also be evaluated. A brief description of utilitarianism will also be included in the paper. The Issue of Abortion Abortion involves human induced ending or terminating pregnancy. In the process of abortion, the embryo is removed before achieving human life form. Abortion is considered a moral issue all over the world. Some regard as taking away an innocent life. Mostly the criticism regarding abortion comes from religious circles. The argument made those who oppose abortion is that it is a process which disallows a life from coming into this world and th erefore it is equal to murder. Moral question regarding abortion is also raised because basic freedom of the living being is violated. People compare it with murder, and therefore abortion remains a controversial issue all over the world. Pro abortionists argue that abortion is not equivalent to murder because it does not involve taking a human life. ... abortionists also argue that parents are in the best position to decide about the future of their life and family, and therefore their decision should not be questioned or challenged when it comes to abortion. The main difference of opinion in both the schools of thought arises from the definition of a human life. Anti abortionist argue that a fertilized egg is a human being and therefore terminating it is equal to termination of a human life (Gutting, 1). On the other end, pro abortionists argue that human life is not achieved until a child takes up a human form, usually after several weeks of the pregnancy. This is the crux of the debate between the two schools of thought and it is not easily possible to take a side. There is no consensus as to what is human life and therefore this debate is yet to be resolved. Utilitarianism: A Brief Introduction Utilitarianism is a well known ethical theory forwarded by John Stuart Mill which argues that the morality of an action can be determine d by analyzing the consequences of that action on the majority members of the society. If an action yields maximum happiness or benefit for a maximum number of people then the action is morally permissible. Utilitarianism is a form of consequentalist ethical theory where morality of the action is determined by the consequences of those actions and nothing else. Utilitarianism determines the wrongness or the rightness by evaluating the action on the basis of the ‘good’ or ‘benefit’ it causes to the overall society or the maximum number of people involved. Utilitarian ethics ignore universal standards or any other standards for evaluating an action and place all weight on the consequences of the action and the positive or negative effect on the action on all parties involved.

Wednesday, July 24, 2019

The connection between quality and environment Essay

The connection between quality and environment - Essay Example Other components are the universal natural resources along with the physical phenomena such as energy, electric charge, magnetism and radiations. â€Å"To have a quality environment, the components of the natural environment should be maintained, and not get polluted.† (Smith and Aurora, 2006). It is because the natural environment provides quality natural resources to the surroundings. The built environment relates to the quality of the environment due to the human efforts employed to improve the same environment. â€Å"It refers to the surroundings that are human-made.† (Roof and Oleru, 2008). The built environment gives the human activity setting that ranges from green space, buildings, parks and infrastructure. â€Å"Good infrastructure and surroundings will enhance the quality of the environment by giving proper-conditioned surroundings to the living and non-living.† (Roof and Oleru, 2008). From the discussion, environmental quality is evaluated based on how natural or how built it is. The quality attached to the environment comes from the benefits it brings; in the form of natural resources or infrastructure. The natural environment ensures good natural environmental conditions while built environment give quality surroundings to the living. Thus, the two environments connect to create a quality

Tuesday, July 23, 2019

Girl in a Mirror Research Paper Example | Topics and Well Written Essays - 750 words

Girl in a Mirror - Research Paper Example His works include art collection inspired from the works of Renaissance, Baroque and Rocco artists (Gottileb, The Journal Of Aesthetics & Art Criticism.). The uniqueness in Picasso’s work existed not in the discovery of new themes, but in the way he portrayed the existing stuff. Picasso not only popularized the art of Cubism by combining geometrical shapes and abstract forms, but also was a believer of symbolism like the famous quote he said that â€Å"It is not necessary to paint a man with a gun. An apple can be just as revolutionary†. Picasso gave a new dimension to cubist paintings by adding human emotions to the multi faceted figure. With time Picasso experimented with Synthetic Cubism and included human forms and events with his symbolic styles. Picasso painted many women that came in his life, his famous painting â€Å"Girl before a Mirror† is from the series of paintings he made with the model Marie-Therese Walter. Marie was very young when she met Picass o, and served as his mistress for many years. The particular painting â€Å"Girl before a Mirror†, was painted during Picasso’s cubism period and reflects his bold display with forms and colors. The painting is based upon a girl looking herself in the mirror, but the reflection she sees is in complete contrast to herself. The painting represents Picasso’s style and highlights an image of vanity. ... The beautiful almond shape of her eyes is transformed into deep maroon circles. Her forehead and the upper part of the nose are in bright red color. This distortion of her reflection makes her look ethereal and fearsome (Gottileb, The Journal Of Aesthetics & Art Criticism.). The face of the girl is composed in two parts; the profile section is in lavender pink with slight blush on the cheek while the frontal view of her face is like a crescent shaped moon with bright yellow color with makeup such as lip stick and green eye shadow applied to it. Similarly the body of the girl is also formed in two parts which visually complement each other. These are the profile and front figure. If we see closely, there are dark black thick lines on light green base in the profile section and red curvilinear lines in the front. These might represent the ribs and vertebrae of the girl seen through flesh (Gottileb, The Journal Of Aesthetics & Art Criticism.) â€Å"Girl in a Mirror† depicts the v anity of a woman and sees herself as a death’s head. It shows Marie Walter’s self during the day and at night, it also highlights her transition from a young innocent girl to a woman who is conscious of her sexuality. The mirror in which the girl sees her reflection is device through which we can look into her sole and inner mysteries and ambiguities. The face of the girl in the reflection is dark with hollow eyes. The feminine contours of her body are twisted and knotted. Her reflection seems older and withered. The girl reaches out to unite and embrace herself with her reflection and is in an effort to become whole. The differences in the girl’s reflections can also suggest to the fact that she is anxious and

Monday, July 22, 2019

Microprocessor and Interfacing Essay Example for Free

Microprocessor and Interfacing Essay Peripherals and Interfacing PIO 8255 The parallel input-output port chip 8255 is also called as programmable peripheral input-output port. The Intel’s 8255 is designed for use with Intel’s 8-bit, 16-bit and higher capability microprocessors. It has 24 input/output lines which may be individually programmed in two groups of twelve lines each, or three groups of eight lines. The two groups of I/O pins are named as Group A and Group B. Each of these two groups contains a subgroup of eight I/O lines called as 8-bit port and another subgroup of four lines or a 4-bit port. Thus Group A contains an 8-bit port A along with a 4-bit port. C upper. PIO 8255 †¢ The port A lines are identified by symbols PA0-PA7 while the port C lines are identified as PC4-PC7. Similarly, GroupB contains an 8-bit port B, containing lines PB0-PB7 and 4-bit port C with lower bits PC0- PC3. The port C upper and port C lower can be used in combination as an 8-bitport C. †¢ Both the port C are assigned the same address. Thus one may have either three 8-bit I/O ports or two 8-bit and two 4-bit ports from 8255. All of these ports can function independently either as input or as output ports. This can be achieved by programming the bits of an internal register of 8255 called as control word register ( CWR ). PIO 8255 †¢ The internal block diagram and the pin configuration of 8255 are shown in fig. †¢ The 8-bit data bus buffer is controlled by the read/write control logic. The read/write control logic manages all of the internal and external transfers of both data and control words. †¢ RD, WR, A1, A0 and RESET are the inputs provided by the microprocessor to the READ/ WRITE control logic of 8255. The 8-bit, 3-state bidirectional buffer is used to interface the 8255 internal data bus with the external system data bus. PIO 8255 †¢ This buffer receives or transmits data upon the execution of input or output instructions by the microprocessor. The control words or status information is also transferred through the buffer. †¢ The signal description of 8255 are briefly presented as follows : †¢ PA7-PA0: These are eight port A lines that acts as either latched output or buffered input lines depending upon the control word loaded into the control word register. †¢ PC7-PC4 : Upper nibble of port C lines. They may act as either output latches or input buffers lines. PIO 8255 This port also can be used for generation of handshake lines in mode 1 or mode 2. †¢ PC3-PC0 : These are the lower port C lines, other details are the same as PC7-PC4 lines. †¢ PB0-PB7 : These are the eight port B lines which are used as latched output lines or buffered input lines in the same way as port A. †¢ RD : This is the input line driven by the microprocessor and should be low to indicate read operation to 8255. †¢ WR : This is an input line driven by the microprocessor. A low on this line indicates write operation. PIO 8255 †¢ CS : This is a chip select line. If this line goes low, it enables the 8255 to respond to RD and WR signals, otherwise RD and WR signal are neglected. †¢ A1-A0 : These are the address input lines and are driven by the microprocessor. These lines A1-A0 with RD, WR and CS from the following operations for 8255. These address lines are used for addressing any one of the four registers, i. e. three ports and a control word register as given in table below. †¢ In case of 8086 systems, if the 8255 is to be interfaced with lower order data bus, the A0 and A1 pins of 8255 are connected with A1 and A2 respectively. RD 0 0 0 0 RD 1 1 1 1 RD X 1 WR 1 1 1 1 WR 0 0 0 0 WR X 1 CS 0 0 0 0 CS 0 0 0 0 CS 1 0 A1 0 0 1 1 A1 0 0 1 1 A1 X X A0 0 1 0 1 A0 0 1 0 1 A0 X X Input (Read) cycle Port A to Data bus Port B to Data bus Port C to Data bus CWR to Data bus Output (Write) cycle Data bus to Port A Data bus to Port B Data bus to Port C Data bus to CWR Function Data bus tristated Data bus tristated Control Word Register PIO 8255. †¢ D0-D7 : These are the data bus lines those carry data or control word to/from the microprocessor. †¢ RESET : A logic high on this line clears the control word register of 8255. All ports are set as input ports by default after reset. Block Diagram of 8255 (Architecture) ( cont.. ) †¢ 1. 2. 3. 4. †¢ It has a 40 pins of 4 groups. Data bus buffer Read Write control logic Group A and Group B controls Port A, B and C Data bus buffer: This is a tristate bidirectional buffer used to interface the 8255 to system databus. Data is transmitted or received by the buffer on execution of input or output instruction by the CPU. Control word and status information are also transferred through this unit. †¢ Block Diagram of 8255 (Architecture) ( cont.. ) Read/Write control logic: This unit accepts control signals ( RD, WR ) and also inputs from address bus and issues commands to individual group of control blocks ( Group A, Group B). †¢ It has the following pins. a) CS Chipselect : A low on this PIN enables the communication between CPU and 8255. b) RD (Read) A low on this pin enables the CPU to read the data in the ports or the status word through data bus buffer. †¢ Block Diagram of 8255 (Architecture) ( cont.. ) WR ( Write ) : A low on this pin, the CPU can write data on to the ports or on to the control register through the data bus buffer. ) RESET: A high on this pin clears the control register and all ports are set to the input mode e) A0 and A1 ( Address pins ): These pins in conjunction with RD and WR pins control the selection of one of the 3 ports. †¢ Group A and Group B controls : These block receive control from the CPU and issues commands to their respective ports. c) Block Diagram of 8255 (Architecture) ( cont.. ) †¢ Group A PA and PCU ( PC7 -PC4) †¢ Group B PCL ( PC3 PC0) †¢ Control word register can only be written into no read operation of the CW register is allowed. a) Port A: This has an 8 bit latched/buffered O/P and 8 bit input latch. It can be programmed in 3 modes mode 0, mode 1, mode 2. b) Port B: This has an 8 bit latched / buffered O/P and 8 bit input latch. It can be programmed in mode 0, mode1. Block Diagram of 8255 (Architecture). c) Port C : This has an 8 bit latched input buffer and 8 bit out put latched/buffer. This port can be divided into two 4 bit ports and can be used as control signals for port A and port B. it can be programmed in mode 0. Modes of Operation of 8255 (cont.. ) †¢ These are two basic modes of operation of 8255. I/O mode and Bit Set-Reset mode (BSR). †¢ In I/O mode, the 8255 ports work as programmable I/O ports, while in BSR mode only port C (PC0-PC7) can be used to set or reset its individual port bits. †¢ Under the I/O mode of operation, further there are three modes of operation of 8255, so as to support different types of applications, mode 0, mode 1 and mode 2. Modes of Operation of 8255 (cont.. ) †¢ BSR Mode: In this mode any of the 8-bits of port C can be set or reset depending on D0 of the control word. The bit to be set or reset is selected by bit select flags D3, D2 and D 1 of the CWR as given in table. I/O Modes : a) Mode 0 ( Basic I/O mode ): This mode is also called as basic input/output mode. This mode provides simple input and output capabilities using each of the three ports. Data can be simply read from and written to the input and output ports respectively, after appropriate initialisation. D3 0 0 0 0 1 1 1 1 D2 0 0 1 1 0 0 1 1 D1 0 1 0 1 0 1 0 1 Selected bit s of port C D0 D1 D2 D3 D4 D5 D6 D7 BSR Mode : CWR Format PA 8 2 5 5 PCU PCL PA6 PA7 PC4 PC7 PC0-PC3 PB PB0 PB7 8 2 5 5 PA PCU PCL PB PA PC PB0 PB7 All Output Port A and Port C acting as O/P. Port B acting as I/P Mode 0 Modes of Operation of 8255 (cont.. ) †¢ 1. The salient features of this mode are as listed below: Two 8-bit ports ( port A and port B )and two 4-bit ports (port C upper and lower ) are available. The two 4-bit ports can be combinedly used as a third 8-bit port. Any port can be used as an input or output port. Output ports are latched. Input ports are not latched. A maximum of four ports are available so that overall 16 I/O configuration are possible. All these modes can be selected by programming a register internal to 8255 known as CWR. 2. 3. 4. †¢ Modes of Operation of 8255 (cont.. †¢ The control word register has two formats. The first format is valid for I/O modes of operation, i. e. modes 0, mode 1 and mode 2 while the second format is valid for bit set/reset (BSR) mode of operation. These formats are shown in following fig. D7 1 D6 X D5 X D4 X D3 D2 D1 D0 0- Reset 0-for BSR mode Bit select flags D3, D2, D1 are from 000 to 111 for bits PC0 TO PC71- Set I/O Mode Control Word Register Format and BSR Mode Control Word Register Format PA3 PA2 PA1 PA0 RD CS GND A1 A0 PC7 PC6 PC5 PC4 PC0 PC1 PC2 PC3 PB0 PB1 PB2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 0 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 PA4 PA5 PA6 PA7 WR Reset D0 D1 D2 D3 D4 D5 D6 D7 Vcc PB7 PB6 PB5 PB4 PB3 8255A 8255A Pin Configuration = D0-D7 CS RESET 8255A A0 A1 RD PA0-PA7 PC4-PC7 PC0-PC3 PB0-PB7 Vcc WR GND Signals of 8255 3 Group A control 1 D0-D7 Data bus Buffer 8 bit int data bus 4 Group A Port A(8) PA0-PA7 Group A Port C upper(4) Group B Port C Lower(4) PC7-PC4 PC0-PC3 2 RD WR A0 A1 RESET CS Block Diagram of 8255 READ/ WRITE Control Logic Group B control PB7-PB0 Group B Port B(8) D7 D6 D5 Mode for Port A D4 PA D3 PC U D2 Mode for PB D1 PB D0 PC L Mode Set flag 1- active 0- BSR mode Group A 1 Input PC u 0 Output 1 Input PA 0 Output 00 mode 0 Mode 01 mode 1 Select of PA 10 mode 2 Group B PCL PB Mode Select 1 Input 0 Output 1 Input 0 Output 0 mode- 0 1 mode- 1 Control Word Format of 8255 Modes of Operation of 8255 (cont.. ) b) Mode 1: ( Strobed input/output mode ) In this mode the handshaking control the input and output action of the specified port. Port C lines PC0-PC2, provide strobe or handshake lines for port B. This group which includes port B and PC0-PC2 is called as group B for Strobed data input/output. Port C lines PC3-PC5 provide strobe lines for port A. This group including port A and PC3-PC5 from group A. Thus port C is utilized for generating handshake signals. The salient features of mode 1 are listed as follows: Modes of Operation of 8255 (cont.. ) 1. 2. 3. 4. Two groups group A and group B are available for strobed data transfer. Each group contains one 8-bit data I/O port and one 4-bit control/data port. The 8-bit data port can be either used as input and output port. The inputs and outputs both are latched. Out of 8-bit port C, PC0-PC2 are used to generate control signals for port B and PC3-PC5 are used to generate control signals for port A. he lines PC6, PC7 may be used as independent data lines. Modes of Operation of 8255 (cont.. ) †¢ The control signals for both the groups in input and output modes are explained as follows: Input control signal definitions (mode 1 ): †¢ STB( Strobe input ) If this lines falls to logic low level, the data available at 8-bit input port is loaded into input latches. †¢ IBF ( Input buffer full ) If this signal rises to logic 1, it indicates that data has been loaded into latches, i. e. it works as an acknowledgement. IBF is set by a low on STB and is reset by the rising edge of RD input. Modes of Operation of 8255 (cont.. ) †¢ INTR ( Interrupt request ) This active high output signal can be used to interrupt the CPU whenever an input device requests the service. INTR is set by a high STB pin and a high at IBF pin. INTE is an internal flag that can be controlled by the bit set/reset mode of either PC4 (INTEA) or PC2(INTEB) as shown in fig. †¢ INTR is reset by a falling edge of RD input. Thus an external input device can be request the service of the processor by putting the data on the bus and sending the strobe signal. Modes of Operation of 8255 (cont.. Output control signal definitions (mode 1) : †¢ OBF (Output buffer full ) This status signal, whenever falls to low, indicates that CPU has written data to the specified output port. The OBF flip-flop will be set by a rising edge of WR signal and reset by a low going edge at the ACK input. †¢ ACK ( Acknowledge input ) ACK signal acts as an acknowledgement to be given by an output device. ACK sig nal, whenever low, informs the CPU that the data transferred by the CPU to the output device through the port is received by the output device. Modes of Operation of 8255 (cont.. ) †¢ INTR ( Interrupt request ) Thus an output signal that can be used to interrupt the CPU when an output device acknowledges the data received from the CPU. INTR is set when ACK, OBF and INTE are 1. It is reset by a falling edge on WR input. The INTEA and INTEB flags are controlled by the bit set-reset mode of PC 6and PC2 respectively. 1 0 1 0 Input control signal definitions in Mode 1 1/0 X X X 1 X X X X 1 1 X D7 D6 D5 D4 D3 D2 D1 D0 1 Input 0 Output For PC6 PC7 PA0 PA7 INTEA PC4 PC5 STBA IBFA D7 D6 D5 D4 D3 D2 D1 D0 PB0 PB7 INTEB PC 2 PC1 STBB IBFB PC3 RD PC6 PC7 INTRA I/O PC0 INTR A Mode 1 Control Word Group A I/P RD Mode 1 Control Word Group B I/P STB IBF INTR RD DATA from Peripheral Mode 1 Strobed Input Data Transfer WR OBF INTR ACK Data OP to Port Mode 1 Strobed Data Output Output control signal definitions Mode 1 1 0 1 0 1/0 X X X 1 X X X X 1 0 X D7 D6 D5 D4 D3 D2 D1 D0 1 Input 0 Output For PC4 PC5 PA0 PA7 INTEA PC7 PC6 OBF ACKA D7 D6 D5 D4 D3 D2 D1 D0 PB0 PB7 INTEB PC PC2 1 OBFB ACKB PC3 WR PC4 PC5 PC0 INTRA I/O INTRB Mode 1 Control Word Group A Mode 1 Control Word Group B Modes of Operation of 8255 (cont.. ) †¢ Mode 2 ( Strobed bidirectional I/O ): This mode of operation of 8255 is also called as strobed bidirectional I/O. This mode of operation provides 8255 with an additional features for communicating with a peripheral device on an 8-bit data bus. Handshaking signals are provided to maintain proper data flow and synchronization between the data transmitter and receiver. The interrupt generation and other functions are similar to mode 1. †¢ In this mode, 8255 is a bidirectional 8-bit port with handshake signals. The RD and WR signals decide whether the 8255 is going to operate as an input port or output port. Modes of Operation of 8255 (cont.. ) †¢ 1. 2. 3. 4. 5. The Salient features of Mode 2 of 8255 are listed as follows: The single 8-bit port in group A is available. The 8-bit port is bidirectional and additionally a 5-bit control port is available. Three I/O lines are available at port C. ( PC2 PC0 ) Inputs and outputs are both latched. The 5-bit control port C (PC3-PC7) is used for generating / accepting handshake signals for the 8-bit data transfer on port A. Modes of Operation of 8255 (cont.. ) †¢ Control signal definitions in mode 2: †¢ INTR (Interrupt request) As in mode 1, this control signal is active high and is used to interrupt the microprocessor to ask for transfer of the next data byte to/from it. This signal is used for input ( read ) as well as output ( write ) operations. †¢ Control Signals for Output operations: †¢ OBF ( Output buffer full ) This signal, when falls to low level, indicates that the CPU has written data to port A. Modes of Operation of 8255 (cont.. ) ACK ( Acknowledge ) This control input, when falls to logic low level, acknowledges that the previous data byte is received by the destination and next byte may be sent by the processor. This signal enables the internal tristate buffers to send the next data byte on port A. †¢ INTE1 ( A flag associated with OBF ) This can be controlled by bit set/reset mode with PC6 . †¢ Control signals for input operations : †¢ STB (Strobe inp ut ) A low on this line is used to strobe in the data into the input latches of 8255. Modes of Operation of 8255 (cont.. ) †¢ IBF ( Input buffer full ) When the data is loaded into input buffer, this ignal rises to logic ‘1’. This can be used as an acknowledge that the data has been received by the receiver. †¢ The waveforms in fig show the operation in Mode 2 for output as well as input port. †¢ Note: WR must occur before ACK and STB must be activated before RD. WR OBF INTR ACK STB IBF Data bus RD Mode 2 Bidirectional Data Transfer Data from 8085 Data towards 8255 Modes of Operation of 8255 (cont.. ) †¢ The following fig shows a schematic diagram containing an 8-bit bidirectional port, 5-bit control port and the relation of INTR with the control pins. Port B can either be set to Mode 0 or 1 with port A( Group A ) is in Mode 2. Mode 2 is not available for port B. The following fig shows the control word. †¢ The INTR goes high only if either IBF, INTE2, STB and RD go high or OBF, INTE1, ACK and WR go high. The port C can be read to know the status of the peripheral device, in terms of the control signals, using the normal I/O instructions. D7 1 D6 1 D5 X D4 X D3 X D2 1/0 D1 1/0 D0 1/0 1/0 mode Port A mode 2 Port B mode 0-mode 0 1- mode 1 PC2 PC0 1 Input 0 Output Port B 1- I/P 0-O/P Mode 2 control word PC3 PA0-PA7 INTR INTE 1 PC7 PC6 OBF ACK STB IBF 3 I/O INTE 2 RD WR PC4 PC5 Mode 2 pins

Sunday, July 21, 2019

The Use Of Facial Expressions In Communication English Language Essay

The Use Of Facial Expressions In Communication English Language Essay What messages are we conveying with the expression on our faces or with the twinkle in our eye. Is it a universal message known to all or is it interpreted differently by various cultures and people? Facial expressions are a major part of communication and have a profound impact on the messages we give and receive nonverbally. This paper will focus on facial expressions and the influences they have on the way we are able to understand another persons emotions without as much as a word from them. Discussion We are communicating with our bodies all the time whether we realize it or not. Most of the emotional meanings of our messages are given through facial expressions, body language, gestures and our appearance. People tend to believe nonverbal signs of communication more than the actual words because it is harder to mask the emotions behind them and they show through. Reading and interpreting these nonverbal cues is valuable skill. It is useful in all different types of relationships every day. Different cultures focus their attention on various parts of the face making this form on nonverbal communication different among cultures. In America we look at the face in its entirety as opposed to Easterners who concentrate more on just the eyes. This is shown through emoticons as well as in person. (Facial expressions,)When Westerners email or send a text message the emoticon s show a mouth smiling or frowning. Easterners emoticons have bigger eyes and the mouth is usually a straight across line. Westerners emoticons eyes are usually represented by dots. The differences in these show where different cultures focus their attention on and what they find most important. Often, people tend to mimic the facial expression of the person who is talking to them. It is said that this is an unconscious act so people dont always know when they are doing it. Some researchers have said it is a behavior we learn, for that reason it is different among cultures. These expressions are said to be so powerful that they can influence an emotional experience without the perceiver actually going through the experience. (Emotional empathy and, 2008). These influential gestures have the ability to make people empathize with one another. This made me think of the saying smile, its contagious. I have noticed if Im having a bad day and a random stranger smile at me I return the smile and sometime that puts me in a better mood. Even if my mood it just changes a little, it is still a strong tool. I believe facial expressions are a very powerful form of communication. I believe if we utilize them correctly they can be very persuasive and help us in our day to day lives. It has been proven that children with disabilities have a harder time understanding people socially. Studies show that people with autism and mental retardation have a different way of interpreting facial expressions. Instead of focusing on the entire face as a whole, people with autism look at the lower part of the face focusing their gaze mostly on the mouth. (Gross, 2007). When reading someones facial expressions we look at a number of things including eyes, mouth, eye brows and many other muscles of the face. By looking into someones eyes we can tell if they are lying, paying attention to us or if they are avoiding something. An autistic person generally avoids eye contact or has very little of it. They look at other people as little as possible. (Klin,Lin,Gorrindo,Ramsey,Jones, 2009). This is the main reason they do not interpret facial expressions as well as others. The lack of focus on the eyes has a major impact on this. They also do not mirror the expressions which is how yo u learn to read and interpret them starting at a young age. There are many different factors that we take into consideration when interpreting facial expressions. Place and time is a main one. If a person has just woken up we may see that on their face and interpret it as they are tired when in fact they are well rested and just waking up. Another factor is if alcohol has been added in the mix. In one study, after the participants were given alcohol, they had a harder time distinguishing between if the picture of the male was angry or disgusted. Because of the stereotypical belief that males are more aggressive their facial expression was perceived as this. The same study showed that alcohol did not affect the ability to perceive happy emotions. (Attwood,Ataya,Benton,Penton-Voak,Munafo, 2009). Positive emotions are easier to read and take less effort to distinguish. They are generally the same among different ages and cultures. Another factor that determines whether we accept or reject a facial expression is the current mood we are in. If we are happy we are more positive and more accepting or willing to believe the expression as genuine. If we are in a bad mood there is a better chance of us assuming that the person is controlling their expression and it isnt truly how they feel. (Forgas, East, 2008) We tend to analyze negative expressions more. If we are listening to someone talk and watching their expressions while we are angry or unhappy we are usually showing this on our face. If we are not mirroring the expressions of the person talking ,we usually dont fully understand or really believe what they are saying. We are a lot more skeptical of others while in a bad mood ,almost as if we are threatening situation. I think that is because they can lead to a more negative experience. Positive emotions are easier to read and understand. If we feel better about ourselves and our mood, we feel better about othe r people and are able to trust that they are being genuine. Conclusion- We are expressing and perceiving many different messages through nonverbal communication and our bodies. Our facial expressions have a major impact on this part of communication and can be the deciding factor on if what we are saying is believed by the other person. This very powerful nonverbal form of communication can be used as a persuasive tool to help us get what we want or help a perceiver emphasize with how we feel. It can also help a person lie to someone .If one learns to control their expressions they can be very deceitful. Because people with disabilities view the face in parts instead of a whole they do not get the full effect of the expressions and they are not able to grasp the meaning of it. There are other things factors that cloud our ability to interpret facial expressions such as stereotyping and alcohol. When added together it is easier to misread the signs we can usually interpret without a problem . This is usually only true when referring to males. I believe that nonverbal communication is a very important type of communication. Because facial expressions are such a major part of this, I think it is important to learn and understand them. They show how a person feels without them saying it. If the person interpreting the message is in a good mood they will most likely believe the person sending the message is being genuine. If you can learn to correctly use and interpret these important tools, than you will have outstanding communication skills needed for your work and personal life. Citations- Facial expressions. (n.d.).  In the News, Retrieved from http://library1.kvcc.edu:2086/WebZ/FTFETCH?sessionid=fsapp4-41904-gasyyy7a-20joz8:entitypagenum=4:0:rule=100:fetchtype=fulltext:dbname=WilsonSelectPlus_FT:recno=3:resultset=1:ftformat=PDF:format=BI:isbillable=TRUE:numrecs=1:isdirectarticle=FALSE:entityemailfullrecno=3:entityemailfullresultset=1:entityemailftfrom=WilsonSelectPlus_FT: Emotional empathy and facial feedback. (2008). Journal of Nonverbal Behavior, 32(4), 215-224. Retrieved from http://proquest.umi.com/pqdweb?index=9did=1570597881SrchMode=1sid=2Fmt=6VInst=PRODVType=PQDRQT=309VName=PQDTS=1277397393clientId=17874 Gross, T.F. (2007). Recognition of immaturity and emotional expressions in blended faces by children with autism and other developmental disabilities. Retrieved from http://proquest.umi.com/pqdweb?index=4did=1426442671SrchMode=1sid=1Fmt=6VInst=PRODVType=PQDRQT=309VName=PQDTS=1277401770clientId=17874 Klin,Lin,Gorrindo,Ramsey,Jones, A,D,P,G,W. (2009). Two-year-olds with autism orient to non-social contingencies rather than biological motion. Retrieved from http://proquest.umi.com/pqdweb?index=0did=1722927501SrchMode=1sid=1Fmt=3VInst=PRODVType=PQDRQT=309VName=PQDTS=1277403869clientId=17874 doi: 1722927501 Attwood,Ataya,Benton,Penton-Voak,Munafo, A,A,C,I,M. (2009). Effects of alcohol consumption and alcohol expectancy on the categorization of perceptual cues of emotional expression. Origional Investigation, Retrieved from http://proquest.umi.com/pqdweb?index=7did=1691777391SrchMode=1sid=6Fmt=6VInst=PRODVType=PQDRQT=309VName=PQDTS=1277406623clientId=17874 doi: 1691777391 Forgas, East, J,R. (2008). How Real is that smile? mood effects on accepting. Original Paper, Retrieved from http://library1.kvcc.edu:2081/pqdweb?index=13did=1493057881SrchMode=1sid=2Fmt=6VInst=PRODVType=PQDRQT=309VName=PQDTS=1277422728clientId=17874 doi: 1493057881

Effects Of Co2 Emission Legislation Economics Essay

Effects Of Co2 Emission Legislation Economics Essay The global climate conditions are incessantly changing which has become a threat and one of the greatest challenges faced by the international community. Transport is amongst one of the main factor causing one fifth of greenhouse gas emissions and also a large share of air pollution and noise nuisance (Braithwaite and Drahos, 2000). Additionally it divides natural areas into small patches that lead to severe consequences on the landscape which makes it detrimental to environmental sustainability. The number of vehicles worldwide is projected to increase from around 700 million at present to 1.1 billion by 2020, so if anything, the problems caused by cars will get worse not better, unless dramatic changes are made (Burns et al 2002). In response to the mounting concerns and substantial evidences over global warning, a suite of climate change legislation has been introduced. According to the Kyoto protocol the European Union must reduce greenhouse gas emission by 8%. International manu facturing is dominated by car industry and the vehicle production is considered as the worlds largest manufacturing sector. With internationally integrated investment, production and sales; the automotive industry has the supremacy to manage environmental damage. The authoritative positioning of car industry spawns two contrasting viewpoints; (i) the industrys products are a major source of global environmental damage; (ii) industrys persistently determined to strike a balance between the imperatives of profitability and environmental sustainability. Safety measures have been introduced and legislations have been put forward by the traditional car producing countries for reducing the specific emission for vehicles and to increase fuel efficiency of cars. The study expounds on the various aspects that encompasses the need for CO2 emission legislation and its pertinent ambiguities. The study further investigates the response of EU car industry by critically analysing its strategic app roach to fight against the challenges it faces due to proposed legislation and constantly evolving economic conditions. 1.1 ENVIRONMENTAL DAMAGE BY AUTOMOTIVE INDUSTRY Transport industry is responsible for several activities that one way or another cause environmental damage and these may include; fuel extraction, processing and transport, manufacturing and 90 percent of all carbon monoxide emissions are also cause by cars. In addition to this, cars are also a major cause of acid rain. Following are some facts and figures compiled by examining the existing data that accounts for ample evidence of the environmental damage caused by cars; Amongst all land-based modes of transport, cars are the most energy intensive with petrol-powered cars consuming in aggregate more energy and producing more greenhouse gas emissions than any other type of vehicle (International Energy Agency 1993). Annually seven billion pounds of scrap and waste is produced by international car industry (Elster,1989) Cars are a prime cause of the depletion of the worlds resources (Freund and Martin, 1993). About 25 percent of total CO2 emissions are caused by transportation industry out of which up to 85 percent is caused by road transport (UNEP 2003). On average, road transport accounts for 48 percent of NOx emissions in OECD countries and around 60 percent of this is done by cars (Paterson, 2000). 1.2 ANALYZING THE NEED FOR CO2 EMISSION LEGISLATION The CO2 emissions in the EU grew by 32% between 1990 and 2005 unlike other sectors accomplished to reduce their emissions by 9.5% on average over the same period (World Values Survey, 2003). Earlier, the share of CO2 emissions by transport was 21% in the year 1990 which rose up to 27% by 2005 (UNEP, 2003). Passenger cars and vans are responsible for over half of the CO2 emissions. Kyoto indicates that transport is the worst performing sector that seriously jeopardises the achievement of the targets. Under Kyoto protocol the European Union is committed to reduce greenhouse gas emissions by 8 per cent by 2008-2012 compared to the 1990 level (UNEP, 2003). Approximately 20% cut in its greenhouse gas emissions by 2020 has been committed by the EU and around 30% cut provided that the other countries follow suit when a new climate deal is agreed. The EU has also adopted a target of improving energy efficiency in the European Union by 20% by 2020 (UNEP, 2003). The legal implementation of the se targets along with climate and energy package was adopted in December 2008. The package of emissions trading scheme contains laws for carbon capture and storage, renewable energy, transport fuel quality, and car emissions (Held et al, 1999). 1.3 ASSESSING THE LOOPHOLES OF LEGISLATION The enforcement of CO2 emissions legislation will take place through a system of fines. For every g/km a manufacturer exceeds its company target, it has to pay a â‚ ¬95 fine per vehicle sold, in principle. However, there have been some ambiguities in the commandment indicated in several studies and when all these ambiguities are put together in practice then it signifies that the target for 2015 is close to 140 g/km, rather than 130 g/km (Paterson, 2000). The detected loopholes in the law include: For currently unmeasured and undefined eco-innovations, up to 7 g/km credits that could be exchanged for measured reductions; For very low-emission cars there are super credits, which would count for more than one car and hence water down overall CO2 reductions which are based on fleet averages; Much lower penalties for small surpassing of the target until 2018. The penalties for the first, second and third g/km of surpassing are only â‚ ¬5, 15 and 25 per g/km respectively instead of â‚ ¬95; Exemptions for small-volume carmakers. 1.4 EU CAR INDUSTRY VS CO2 EMISSION LEGISLATION In accordance with the CO2 emission legislation it has been anticipated that its implementation would be fruitful enough to gain at least 20% cut in domestic EU emissions and at most 30% is the target to attain (The Economist, 2002). Scientists believe that about 40% targets are essential to hit the EUs maximum 2 degrees warming (The Economist, 2002). The climate policy is going off track where the substitution of reduction in real emission has been counterbalanced by the effort sharing and ETS laws and the renewable energy law on the other hand, allows bio fuels which could cause the transport emissions to intensify. Transport is also critical in the debate on Europes energy dependence. By mid-2008, approximately â‚ ¬1 billion worth of oil has been imported by Europe per day (Leveque, 1996). The noticeable fact is that EU recognises cars as the single biggest consumer utilizing around 4.4 million barrels per day and is also responsible for 40 per cent of imports which constitutes that car MNCs have a very strong and economically powerful position (World Values Survey, 2003). In order to put political pressure on governments against environmental regulations car MNCs have consistently lobbied governments against emission controls to reduce greenhouse gases on the basis that this would lead to severe economic impacts (Bradsher, 2002). PROPOSED STRATEGY FOR THE EU CAR INDUSTRY Despite of the strict regulations by European Commissions that may impose financial loss to the EU car industry, even then they could gain. In accordance with the strategy suggested by Porter, selling poorly performing, unsafe, or environmentally damaging products is not a route to real competitive advantage in sophisticated industry and industry segments, especially in a world where environmental sensitivity and concern for social welfare are rising in all advanced nations (Porter 1990). The proposed strategic model also supports this vision together with the UNEP, World Resources Institute and World Business Council for Sustainable Development; which sees competitive advantages for businesses that voluntarily adopt environmentally sustainable strategies (United Nations Environment Programme and World Business Council for Sustainable Development 2002). 2.1 PESTLE ANALYSIS European Automotive industry is greatly influenced by the global economic circumstances, political scenarios, changing market trends and revolutionizing technological conditions (Hutton, 2002). All these factors put an impact both directly and indirectly upon the subsistence of the industry. This PESTLE analysis is a significant instrument to illustrate the political, economic, socio- demographic, technological and legislative aspects for managers to develop a strategic approach in order to reduce CO2 emissions in compliance with the legislation. POLITICAL The automotive industry is greatly influenced by European Union that will continue to introduce new legislation and modify the existing ones. The political scenario of EU is exacerbated by the fuel tax which is ineffective to address the environmental issues rather working as a tool for governments to raise revenues (Ostrom, 1990). The European Commissions Auto Oil II programme illustrated in the Table 01, indicates the inefficiency of fuel tax CO2 savings if fuel duty was increased by 20% above 1999 UK levels by 2002 which are unlikely for political reasons; Table: 01 Finland -0.43% France -0,43% Germany -0,61% Greece -2,14% Ireland -1,52 Italy -0,54 Netherland -0,52 Spain -1,41 United Kingdom -0,55 Source: European Commission 2.1.2 ECONOMIC There is a vast scope for improvements in efficiency and environmental sustainability within the automotive industry. The increased use of low carbon technologies in accordance with the CO2 emission legislation creates value and offer secure jobs in the automotive industry. Furthermore, it reduces the â‚ ¬30bn fuel bill that Europes businesses, particularly small and medium-sized enterprises, currently pay every year to fill up their vans and this account for a net benefit to the consumer (OBrien et al, 2000). Small and medium sized enterprises in particular stand to benefit from the fuel savings resulting from this legislation. SOCIO-DEMOGRAPHIC In future, China and Latin America are expected to account for the bulk of new car sales worldwide and the ability of the EU to enter these markets is restricted. Most of the revenue generated by the big three American firms is through the sales of pick-up trucks and sports utility vehicles (SUVs) which are considered tarnished due to their size, load and high fuel consumption however, European and Japanese manufacturers are producing similar gas-guzzlers to compete for market share in this sector (Storm Clouds over Detroit 2002; Fords Troubles 2003; Bradsher 2002). TECHNOLOGY For developing a low carbon emission strategy for sustaining business competitiveness, the EU automotive industry must enable cost effective reductions in carbon emissions from production, distribution and energy use across the production process (Dicken, 1998). There is a need for well-timed investment in technologies which are eco-friendly and vital enough to minimise the cost of making the conversion and will provide the potential for business to get the most out of market opportunities. LEGISLATION A number of legislative directives and government policies followed by the growing awareness of climate change issues are aimed at reducing the negative environmental impact of the EU automotive industry. The End of Life Vehicles Directive (ELV) is a complex piece of legislation that aims to increase the levels of re-use and recycling of vehicles that are to be scrapped to improve environmental standards and also limit the use of material harmful to the environment in new vehicles (Martin and Raes, 2002). Moving to low carbon fuel will require a technology shift for both fuel and vehicle technology. 2.2 PORTERS FIVE FORCE MODEL To develop a wholesome model for competitive rivalry risk-adjusted rates of return should be invariable across the business. The structure of an industry explains how it may sustain different levels of profitability (Hasenclever, Mayer and Rittberg, 1997). Porters model is a helpful contrivance to develop a well thought out and a competitive strategic plan that congregates the opportunities and threats of the external environment of the organizations. For an ideal stratagem the understanding of industry structures and their ways of evolution is extremely important. The following Porters five force analysis of EU car industry is intended to propose a valuable strategic approach that is profitable and also tends to comply with the CO2 emission regulations. Potential Entrants Supplier Power Buyer Power Competitive Rivalry Substitute of Products 2.2.1 BARGAINING POWER OF SUPPLIERS A significant proportion of the total number of vehicles in EU will continue to be outside warranty age thus generating business for the maintenance and repair sub-sector of the automotive industry but cars are likely to be less efficient potentially damaging the industrys environmental agenda (OBrien et al, 2000). On the other hand the legislation consents for basing car taxation on environmental characteristics of the vehicle however, suppliers choice is equally important regarding vehicles for development and promotion. To gain an eco-friendly development and promotion policy economic incentives to suppliers is much more effective and the consumers can be framed to meet the required targets. The adapted version of tradable CO2 performance scheme proposed by California could be beneficial to European automotive industry (OBrien et al, 2000). 2.2.2 BARGAINING POWER OF BUYERS Consumers help to encourage rivalry through their consumption decisions and switching behaviour however, they currently require the data about the environmental footprint of new and existing automotive products to make fully informed choices. Considering the consumers frame of mind a mixture of regulatory instruments and economic incentives should be launched by the automotive industry and attention should be drawn towards the trade of new cars as well as the usage of the vehicle supply. The public procurement directives could be a step forward to institute a lead market for EU automotive industry for environmentally enhanced vehicles. 2.2.3 THREATS OF POTENTIAL ENTRANTS The strict CO2 emission regulations do not unavoidably hinder competitive advantage against foreign rivals (Ordeshook, 1993). The EU automotive sector should situate determined environmental standards for its market as potential new entrants from Asia including China and India adopt EU car emission rules and hence progressive standards will put the EU automotive industry in a leading position to make the first move. 2.2.4 SUBSTITUTE OF PRODUCTS AND SERVICES Due to the highly technical environment of the automotive sector across the globe; the key challenge for European car industry is to introduce more inventive products in the markets. The revenues of electronics and catalyst firms of the automotive sector will be damaged if compromises are made over environmental standards for vehicles (Green and Shapiro, 1994). Moreover; it is not in the interest of the EU as a whole to become ever more dependent on oil imports. Dominance of the international players like US and China is often considered as a market barrier but the competitiveness of EU automotive industry depends on utilising its potential. It is also imperative to note that he demand for service and mechanical repairs has been evidently reduced due to improved reliability of cars which lead to cutting the labour hours by 32% and the total number of service and repair outlets has fallen by 5,500, to a total of 24,700 in 2004 (Paterson, 2000). 2.2.5 COMPETITIVE RIVALRY The interpretation of competitiveness in EU is heavily prejudiced towards creating monetary benefits for the car industry. The automotive sector of EU must recognise the significance of the soaring competition and rivalry and should adopt the norms of democratic society which demands self-confronting and integrates all stakeholders equally. The competitiveness of this knowledge-based economy can be improved if the car industry gives up its lobbying against the environmental regulations and develop an eco-friendly stratagem (Holliday, Schmidheiny and Watts 2002). CONCLUSIVE REMARKS The introduction of CO2 emissions legislation comes with both negative and positive externalities, information asymmetries and significant uncertainty that subsequently erect barriers. The strategic approach of EU automotive industry to persuade reduced carbon emissions in compliance with the CO2 emission legislation; needs to be addressed in a balanced and appropriate manner taking into account of relevant drivers of change such as market trends, consumer behaviour, the technological conditions and financial facet of the automotive industry. There is an evidence that strong environmental policy, indeed stronger than the rest of the worlds, does not hurt the industry and but improves rather than deteriorates its competitive position and this is illustrated by the voluntary commitments by EU car manufacturers to reduce fleet average CO2 emissions to140g/km by 2008 (ACEA 2002).

Saturday, July 20, 2019

Progressive Insurance :: Progressive Mutual Insurance Company

Abstract On March 10, 1937, Joseph Lewis and Jack Green started Progressive Mutual Insurance Company. They wanted to provide vehicle owners with security and protection and they thought an insurance company was a good investment for a couple of lawyers who were just getting started. Since its beginning, Progressive has taken an innovative approach to auto insurance. They offered drive-in claims service before any other auto insurance company and in another industry first, they allowed customers to pay their premiums in installments. An appealing option for those who could not afford annual payments. Progressive wanted and still wants to make auto insurance accessible and easy so more people could protect their vehicles. Progressive began in 1937, and over the years, they have worked hard to build a superior proposition for auto insurance consumers through competitive pricing and by continuously improving our products and services. Today, they offer competitive rates and 24-hour, in-person and online services to all drivers throughout the United States. Today, Progressive customers can purchase auto insurance directly from them online or by phone, or they can purchase from independent insurance agents. Headquartered in the Cleveland suburb of Mayfield Village, Ohio, Progressive has 28,000-plus employees in more than 450 offices throughout the country. Progressive people enjoy a casual dress code and a unique work environment where all are required to risk, learn, grow and perform. Progressive's larger locations house one of the country's largest, most eclectic contemporary art collections. Communicating a clear picture of Progressive by stating what they try to achieve, how they interact with custom ers, and what guides their behavior permits all people associated with Progressive to understand what they expect of each other and ourselves and how we conduct our business. Progressive has been in business since 1937 and currently is one of the largest auto insurance groups in the United States. They have more than 10 million policies in force and growth continues as more people choose us for their vehicle insurance needs. They sell insurance directly to customers online and by phone, and offer insurance through more than 30,000 local independent agents. In addition to auto insurance, Progressive offers the following types of insurance to customers throughout the country: boat/personal watercraft insurance, commercial auto insurance, homeowners insurance, motorcycle insurance, RV insurance and Segway insurance. Policies are available for people who choose to shop for auto insurance online at progressive.com or by phone at 1-800-PROGRESSIVE 1-800-776-4737. You also can compare rates for other top companies when you shop for a Progressive auto policy. Progressive Insurance :: Progressive Mutual Insurance Company Abstract On March 10, 1937, Joseph Lewis and Jack Green started Progressive Mutual Insurance Company. They wanted to provide vehicle owners with security and protection and they thought an insurance company was a good investment for a couple of lawyers who were just getting started. Since its beginning, Progressive has taken an innovative approach to auto insurance. They offered drive-in claims service before any other auto insurance company and in another industry first, they allowed customers to pay their premiums in installments. An appealing option for those who could not afford annual payments. Progressive wanted and still wants to make auto insurance accessible and easy so more people could protect their vehicles. Progressive began in 1937, and over the years, they have worked hard to build a superior proposition for auto insurance consumers through competitive pricing and by continuously improving our products and services. Today, they offer competitive rates and 24-hour, in-person and online services to all drivers throughout the United States. Today, Progressive customers can purchase auto insurance directly from them online or by phone, or they can purchase from independent insurance agents. Headquartered in the Cleveland suburb of Mayfield Village, Ohio, Progressive has 28,000-plus employees in more than 450 offices throughout the country. Progressive people enjoy a casual dress code and a unique work environment where all are required to risk, learn, grow and perform. Progressive's larger locations house one of the country's largest, most eclectic contemporary art collections. Communicating a clear picture of Progressive by stating what they try to achieve, how they interact with custom ers, and what guides their behavior permits all people associated with Progressive to understand what they expect of each other and ourselves and how we conduct our business. Progressive has been in business since 1937 and currently is one of the largest auto insurance groups in the United States. They have more than 10 million policies in force and growth continues as more people choose us for their vehicle insurance needs. They sell insurance directly to customers online and by phone, and offer insurance through more than 30,000 local independent agents. In addition to auto insurance, Progressive offers the following types of insurance to customers throughout the country: boat/personal watercraft insurance, commercial auto insurance, homeowners insurance, motorcycle insurance, RV insurance and Segway insurance. Policies are available for people who choose to shop for auto insurance online at progressive.com or by phone at 1-800-PROGRESSIVE 1-800-776-4737. You also can compare rates for other top companies when you shop for a Progressive auto policy.